Top Banner
Prepared By: Simon Richardson Department Professional Services Version: 1.0 Dated: 30 th August 2011 Classification: Released Page Page 1 of 25 Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG Checkpoint NGX (R75) to Vyatta VC6.2 Virtual Firewall VPN (virtual private network) CONTENTS 1. Introduction 1 2. Aim 2 3. Roles & Responsibilities 3 4. Procedure 4 1 Introduction The idea of this document is to show you the screen shots and configuration necessary to establish an IPSEC tunnel between Checkpoint NGX R75 (no HFAs) to Vyatta VC 6.2 The author of the document had no previous experience of Vyatta and the third party (managing the Vyatta) had no previous experience of managing Checkpoint products. 2 Aim To help someone troubleshoot, or establish a vpn tunnel between Checkpoint and Vyatta products. 3 Roles & Responsibilities
25

vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Feb 09, 2018

Download

Documents

nguyenkhue
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 1 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Checkpoint NGX (R75) to Vyatta VC6.2

Virtual Firewall VPN (virtual private network)

CONTENTS

1. Introduction 1

2. Aim 2

3. Roles & Responsibilities 3

4. Procedure 4

1 Introduction

The idea of this document is to show you the screen shots and

configuration necessary to establish an IPSEC tunnel between

Checkpoint NGX R75 (no HFAs) to Vyatta VC 6.2

The author of the document had no previous experience of Vyatta

and the third party (managing the Vyatta) had no previous

experience of managing Checkpoint products.

2 Aim

To help someone troubleshoot, or establish a vpn tunnel between

Checkpoint and Vyatta products.

3 Roles & Responsibilities

Page 2: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 2 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Customer and third party to have very clear understanding of their

respective firewall products, and a very clear understanding of

establishing and troubleshooting VPNs.

4 Procedure

Here is the config for the checkpoint end of things

As this was established on production equipment, and for security

reasons, the screen shots are sometimes obfuscated. You will have

to transpose your own IP addressing into the procedure to ensure

the tunnel works.

Be careful if initially enabling/disabling PFS (Perfect Forward

Secrecy) otherwise (if PFS is disabled on the Checkpoint) then the

tunnel will establish one-way. The Vyatta end will be able to ping

the Checkpoint protected network, but not vice versa.

One thing we noticed, which needs careful consideration, is that in

the event that the Checkpoint firewall doesn’t have the VPN

domain manually defined in the Checkpoint object (Topology) then

it will be necessary to create tunnels on the Vyatta to EVERY

network directly connected to the Checkpoint firewall. For

example, imagine you have 5 network interfaces in your

Checkpoint firewall like this

10.0.5.0/24

172.16.60.0/24

Page 3: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 3 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

192.168.1.0/24

172.17.1.0/24

Internet range x.x.x.x/30

You will need to create VPN’s to all of the ranges other than the

Internet range. This is because the Checkpoint firewall (if NOT set

to have a manually defined encryption domain) will offer all of its

networks and topology to the Vyatta. This will confuse the Vyatta

as normally you only define the ‘single’ network or networks you

want in your encryption domain. This seems to be only an issue

with Checkpoint to non-Checkpoint products. If you create a

Checkpoint to Checkpoint tunnel, the products are much more

‘forgiving’ when it comes to topology.

Page 4: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 4 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Checkpoint firewall object, defined in this case as the

external/Internet facing IP address

Page 5: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 5 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Inside LAN IP address subnet with class C mask

Page 6: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 6 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Page 7: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 7 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Page 8: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 8 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Page 9: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 9 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Page 10: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 10 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Page 11: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 11 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Page 12: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 12 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Page 13: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 13 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Page 14: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 14 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Page 15: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 15 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

Page 16: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 16 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

The log file shows how initially the tunnel failed (because PFS was

enabled on the Vyatta end) then the pings and RDP test

connections initiated from the Checkpoint side worked fine.

Notice how the tunnel timeouts for Phase1/2 had been changed

from their Checkpoint default settings.

Notice how NAT had been disabled, and the tunnel used

simplified mode so that all traffic was allowed to pass for testing

At a later stage a rule could easily be setup for the ‘VPN

community’ to filter traffic by source and destination and service

type.

Page 17: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 17 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

The Vyatta config looks like this

firewall { all-ping enable broadcast-ping disable conntrack-expect-table-size 4096 conntrack-hash-size 4096 conntrack-table-size 32768 conntrack-tcp-loose enable group { address-group admin-group { address *.*.*.* address *.*.*.* description "" } address-group nagios-group { address *.*.*.* address *.*.*.* description "" } address-group remote-group { address *.*.*.* description "Remote access auth group" } address-group snmp-group { address *.*.*.* address *.*.*.* description "SNMP Clients" } network-group vpn-subnets { network 192.168.2.0/23 network x.x.x.x/24

Page 18: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 18 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

} port-group web { port 80 port 443 } } ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name eth0-in { default-action drop rule 10 { action accept description ESTABLISHED state { established enable related enable } } rule 20 { action accept description ICMP_ECHO_REQ icmp { type-name echo-request } protocol icmp } rule 30 { action accept description WEB destination { group { port-group web } } protocol tcp } rule 40 { action accept description RDP destination { port 3389 } protocol tcp source {

Page 19: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 19 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

group { address-group remote-group } } } rule 50 { action accept description NRPE destination { port 5666 } protocol tcp source { group { address-group nagios-group } } } rule 60 { action accept source { group { network-group vpn-subnets } } } rule 70 { action accept destination { port 902 } protocol tcp } } name eth0-local { default-action drop rule 10 { action accept description ESTABLISHED state { established enable } } rule 20 { action accept description ICMP-ECHO-REQ

Page 20: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 20 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

icmp { type-name echo-request } protocol icmp } rule 30 { action accept description SSH destination { port 2222 } protocol tcp source { group { address-group admin-group } } } rule 40 { action accept description SNMP destination { port 161 } protocol udp source { group { address-group snmp-group } } } rule 50 { action accept description ESP protocol esp } rule 60 { action accept description IKE destination { port 500 } protocol udp } rule 70 { action accept

Page 21: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 21 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

source { group { network-group vpn-subnets } } } rule 80 { action accept description GRE protocol gre } rule 90 { action accept description PPTP destination { port 1723 } protocol tcp } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 178.251.234.xyz/30 duplex auto firewall { in { name eth0-in } local { name eth0-local } } hw-id 00:50:56:80:01:94 smp_affinity auto speed auto } ethernet eth1 { address 10.255.15.1/24 duplex auto hw-id 00:50:56:80:01:9a smp_affinity auto

Page 22: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 22 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

speed auto } loopback lo { } } service { nat { rule 1 { description "VPN EXCLUSION - 192.168.2.0/23" destination { address 192.168.2.0/23 } exclude outbound-interface eth0 source { address 10.255.15.0/24 } type source } rule 2 { description "VPN EXCLUSION – x.x.x.x/24" destination { address x.x.x.x/24 } exclude outbound-interface eth0 source { address 10.255.15.0/24 } type source } rule 10 { description "DEFAULT SNAT" outbound-interface eth0 outside-address { address 178.251.234.194 } source { address 10.255.15.0/24 } type source } rule 20 { destination { address 178.251.234.194 port 902

Page 23: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 23 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

} inbound-interface eth0 inside-address { address 10.255.15.50 } protocol tcp type destination } } ssh { port 2222 protocol-version v2 } } system { config-management { commit-revisions 20 } console { device ttyS0 { speed 9600 } } gateway-address *.*.*.* host-name fw100544 login { user 100544 { authentication { encrypted-password ****** plaintext-password "" } level admin } } name-server 193.169.90.4 name-server 193.169.91.4 ntp { server 0.vyatta.pool.ntp.org { } server 1.vyatta.pool.ntp.org { } server 2.vyatta.pool.ntp.org { } } package { auto-sync 1

Page 24: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 24 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

repository community { components main distribution stable password "" url http://packages.vyatta.com/vyatta username "" } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone GMT } vpn { ipsec { esp-group ESP1 { compression disable lifetime 3600 mode tunnel pfs dh-group2 proposal 1 { encryption 3des hash md5 } } ike-group IKE1 { dead-peer-detection { action restart interval 30 timeout 120 } lifetime 28800 proposal 1 { dh-group 2 encryption 3des hash md5 } } ipsec-interfaces {

Page 25: vyatta to checkpoint vpn howto guide - Welcome to · PDF fileit will be necessary to create tunnels on the Vyatta to EVERY network directly connected to the Checkpoint firewall. For

Prepared By: Simon Richardson Department Professional

Services Version: 1.0 Dated: 30th August 2011

Classification: Released Page Page 25 of 25

Carrwood Park T 0113 341 0123 Swillington Common Road E [email protected] Selby Road W www.itogether.co.uk Leeds LS15 4LG

interface eth0 } site-to-site { peer 86.xx.rr.zz { authentication { mode pre-shared-secret pre-shared-secret xxxxxxxxxxxxxxx } connection-type initiate ike-group IKE1 local-ip 178.251.234.194 tunnel 1 { allow-nat-networks disable allow-public-networks disable esp-group ESP1 local { subnet 10.255.15.0/24 } remote { subnet x.x.x.x/24 } } } } } }