cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
869
Views
0
Helpful
2
Replies

IPSec VPN between Cisco IOS routers through Checkpoint firewall

kevin.jones1
Level 1
Level 1

wonder if someone can explain this:

LanA--Ra---CheckpointNGx_Fw---Rb--LanB

Both Ra and Rb is using version 12.2(15)T17

Ra ip address is 192.168.1.2 and

it is NATted by the checkpoint to be

129.174.1.2. Rb ip address is 129.174.1.3

IPSec is between Ra and Rb for LanA and LanB.

Straight forward IPSec between Ra and Rb,

no GRE whatsoever.

On the checkpoint firewall, I have static

NAT for Ra from 192.168.1.2 to 129.174.1.2

and I have rule on the firewall to allow

EVERYTHING through the firewall.

On the router, I explicitly put in the

following command:

crypto ipsec nat-transparency udp-encapsulation

The VPN between Ra and Rb is working and traffic

between Ra and Rb is working; however, tcpdump

on the checkpoint firewall reveals that the routers

are using ESP (proto 50) instead of NAT-T (udp/4500).

I thought that if the VPN device detects that

it is behind a NAT device, it will use nat-t

instead of ESP. Furthermore, the command

I put into the router should be enough

to tell the routers to use udp/4500.

I asked Cisco about this before but they have an

answer for me either.

2 Replies 2

irisrios
Level 6
Level 6

Turning on this command turns on NAT-T on the router. Try a sniffer between router and the NAT-T device to check if NAT-T really works. Also make sure client supports it .

debug on routers doesn't tell me anything

I didn't already knew.

Any other advices? Thanks.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: