07-15-2008 02:56 AM - edited 02-21-2020 03:49 PM
How do I solve for a vendor/customer that insists I includes the IPSEC PEER IP with in the crypto ACL?
A netscreen user has asked me to build a crypto ACL that includes the PeerIP address. If I use a mask structure in the ACL to exclude the Peer from the crypto domain it works and I get good SA's. If the tunnel is initiated from the netscreen, and my pix7 is the responder, then SA range includes the peer ip address and returning traffic fails.
Any suggestions? Thanks in advance..
07-21-2008 11:39 AM
The peer ip address should be a routable public ip address and theres is no need for the peer ip address to be in the range of source and destination ip address.so try using the SA range without the peer ip address.
07-21-2008 12:31 PM
Beside the obvious "Peer IP can not be included in the Crypto Domain" issue, the remote CHECKPOINT needed to be in "host" mode. If it is in "network" mode then it would send a superneted mask in the originating SA that included the peer IP. That big mask would break the vpn and prevent my piX from talking to the peer IP.
THis would happen regardless of my crypto ACL's. Wierd!.
Thanks.
07-21-2008 12:35 PM
Netscreen is not Checkpoint
07-21-2008 11:57 AM
ask netscreen user to not include the PeerIP address in a crypto ACL
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide