VPN PIX 501 (dyn IP) to Watchguard Firebox (static IP)
I'm trying to establish a VPN connection between a PIX 501 and a Watchguard Firebox.
The Watchguard has a static IP, the PIX connects to the internet using a dynamically assigned IP.
For that reason on the PIX-side I configured a host- and domainname and added "isakmp identity hostname". My understanding was that the PIX will use it's FQDN as the ID for the IKE session instead of it's dynamically assigned IP address.
On the Watchguard side I see the following log entries:
iked: FROM 22.214.171.124 MM-HDR ISA_SA ISA_VENDORID ISA_VENDORID
iked: WARNING - Unknown remote gateway ip: 126.96.36.199 id '188.8.131.52'
iked: ACTION - Verify remote gateways in config file
iked: ipsec_rgw_is_dynamic: unable to find id
Also the PIX shows
(identity) local= 184.108.40.206, remote= 220.127.116.11
when enabling a debug crypto.
I think the ID used by the PIX is still the public IP instead of the FQDN and for that reason the Watchguard can't find the matching context for the PIX.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...