NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [FW-1] Linksys & VPN-1



I got this from Phoneboy's web site.....

How do I make SecuRemote work through a LinkSys Cable/DSL router?
LinkSys routers can pass SecuRemote connections provided the following is
true:
1. Firewall should be at version 4.1 SP3 or above.
2. Firewall and users are both defined to use IKE (not FWZ) with 3DES
encryption and SHA1 authentication (MD5 doesn't work).
3. Secure Client is configured to use IKE as it's default encryption scheme.
UDP Encapsulation is highly recommended, but not required.
4. Linksys router has firmware version 1.39 or above and one of the
following enabled (not all options work in all situations):
* Enable the DMZ feature for the host doing SecuRemote
* Enable port forwarding for port 500 to the PC doing the VPN
* Enable port triggering on port 500 (no need to specify which machine)
* Enable SPI (Stateful Packet Inspection) mode
* Enable IPSec Passthru



-----Original Message-----
From: Mailing list for discussion of Firewall-1
[mailto:[email protected]]On Behalf Of Hernandez,
Moses
Sent: Thursday, August 29, 2002 8:29 AM
To: [email protected]
Subject: Re: [FW-1] Linksys & VPN-1

You mean what version of the SecureRemote Client or which version of the
Checkpoint Firewall. In any case here is what we are using on the Firewall:
Checkpoint FW-1 4.1 Build 41821. We are also using SecureRemote 4.1 SP5
(Build 4199), which must be what you are refering to. Interestingly enough
we are not having the Client access the Nokia 650 (we have 2 650's and one
330 acting as a backup). One of the 650's is our firewall, the other is just
vpn. I know this configuration is wrong, don't ask me i just inherited this.
Question is though the VPN's are not going in through the IP of the ethernet
interface of the nokia but rather the management server ip address. Could
this be the issue? Why would it only affect Bellsouth PPPOE customers?


-----Original Message-----
From: Miller, Curt A. [mailto:[email protected]]
Sent: Tuesday, August 27, 2002 2:30 PM
To: [email protected]
Subject: Re: [FW-1] Linksys & VPN-1


Moses,

We had the same problem until we upgraded our SR.  What build are you
using.  It is mentioned in the release notes of SR that it supports
PPPOE as of that release.  I think it was 4199.

Curt

-----Original Message-----
From: Hernandez, Moses [mailto:[email protected]]
Sent: Tuesday, August 27, 2002 11:48 AM
To: [email protected]
Subject: Re: [FW-1] Linksys & VPN-1


I'm having serious problems as well. I am in an area were the major
TelCo is the big DSL provider. They use PPPOE (thank you bellsouth.net).
None of my users can connect so far. The issue i think is they may be
blocking VPN unless you have the Business class service. Will the
SofaWare solution fix this? We are going to try and demo it and see. I
am wonderinng only because i think the SofaWare box may use PPTP and not
IPSec. Anyone have a similar theory?


-----Original Message-----
From: Lars Troen [mailto:[email protected]]
Sent: Tuesday, August 27, 2002 9:54 AM
To: [email protected]
Subject: Re: [FW-1] Linksys & VPN-1


Yes. It uses udp 2946 and tcp or udp 500. This is not valid for site to
site vpn's, only client vpn's (securemote/secureclient).

Lars

> -----Original Message-----
> From: Andrea Coppini [mailto:[email protected]]
> Sent: Tuesday, August 27, 2002 11:45
> To: [email protected]
> Subject: Re: [FW-1] Linksys & VPN-1
>
>
> I would also like to know this.
>
> -----Original Message-----
> From: Rob Patrick [mailto:[email protected]]
> Sent: 27 August 2002 12:45 AM
> To: [email protected]
> Subject: Re: [FW-1] Linksys & VPN-1
>
>
> Some VPN solutions allow tunneling the IPSEC packets across UDP or
> TCP.
>
> Cisco VPN, as one example, allows the user to tunnel IPSEC through
> either UDP or TCP packets - just set the gateway appliance with a
> given port (default is 10000) and you're running with a VPN solution
> that traverses
> most firewalls (especially when using TCP) and carriers like
> Comcast can't
> block (you could tunnel out port 80 or whatever is known open).
>
> Does VPN-1 provide any capability to transparently tunnel IPSEC across

> either TCP or UDP?
>
> ----- Original Message -----
> From: "Scott Friedman" <[email protected]>
> To: <[email protected]>
> Sent: Monday, August 26, 2002 3:31 PM
> Subject: Re: [FW-1] Linksys & VPN-1
>
>
> > Also find out what kind of broadband connection he has.  I called
> > Comcast and they informed me that they are blocking VPN's on their
> > cable networks for Home users (the NON-Pro version).
> >
> > If they are, he will be able to get the topology of the
> site but won't
> > be able to Key Exchange when it tries to encrypt.
> >

=================================================
To set vacation, Out Of Office, or away messages,
send an email to [email protected]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[email protected]
=================================================

=================================================
To set vacation, Out Of Office, or away messages,
send an email to [email protected]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[email protected]
=================================================



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.