IPSEC L2L to netscreen peer IP problem

Unanswered Question
Jul 15th, 2008

How do I solve for a vendor/customer that insists I includes the IPSEC PEER IP with in the crypto ACL?

A netscreen user has asked me to build a crypto ACL that includes the PeerIP address. If I use a mask structure in the ACL to exclude the Peer from the crypto domain it works and I get good SA's. If the tunnel is initiated from the netscreen, and my pix7 is the responder, then SA range includes the peer ip address and returning traffic fails.

Any suggestions? Thanks in advance..

I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
smahbub Mon, 07/21/2008 - 11:39

The peer ip address should be a routable public ip address and theres is no need for the peer ip address to be in the range of source and destination ip address.so try using the SA range without the peer ip address.

emaestas Mon, 07/21/2008 - 12:31

Beside the obvious "Peer IP can not be included in the Crypto Domain" issue, the remote CHECKPOINT needed to be in "host" mode. If it is in "network" mode then it would send a superneted mask in the originating SA that included the peer IP. That big mask would break the vpn and prevent my piX from talking to the peer IP.

THis would happen regardless of my crypto ACL's. Wierd!.


a.alekseev Mon, 07/21/2008 - 11:57

ask netscreen user to not include the PeerIP address in a crypto ACL


This Discussion