I'm trying to set up VPNs with our Cisco PIXs around Europe which currently work on our FW1 4.1 box. I'm not having much success and have found Phoneboy's hotfix recommendation in his book. I can't seem to find the hotfix on Checkpoint's site anymore, is that because it's part of the R55 update?
I'm running NG FP3 on Windows 2000. I've not got any of the hotfix packs on yet.
I can tell you that my vpn tunnel works fine between Cisco PIX and Secureplatform NG with AI R55 HFA008-001. I don't know much about CP running on Windows to give you any advice. I personally hate Microsoft Windows. Anything that runs on Windows, in my opinion, is a bad idea. Then again, as a linux geek, I am biased.
With NG AI R55 HFA008-001, vpn traffics can be initiated by either side. This wasn't the case with NG Feature Pack 3 HF1 (or HF2) and earlier, 4.1 included. With earlier version of Checkpoint, anytime when traffic is initiated from the Checkpoint side, it generates a "malformed" payload. I work for a Managed Service Provider and I've seen it countless time. when that happens, the vpn tunnel must be cleared on both side and the traffic must be initiated from the pix side. After that eveyryone is happy.
With Checkpoint NG Feature Pack 3 HFA317 or higher, this problem is fixed. I don't know what else to tell you except that upgrade your firewall to HFA008-001. Furthermore, when testing VPN connectivity between Checkpoint and PIX, make sure you clear the tunnel on both side. On checkpoint side, use the "vpn tu" utility to clear the tunnel. Again, this command works on both the Nokia and Secureplatform so I don't know if it is applicable in your situation. On the PIX side, you want to use "clear isakmp sa" and "clear ipsec sa" to clear the tunnel.
One last point that I want to make is that, whenever possible, use "simplified" method to configure your VPN since this is the preferred method in Checkpoint NG. I prefer this method because each vpn tunnel has it own parameters which is much more desirable and the "traditional" method. If you have to setup vpn between Cisco Pix and Netscreen vpn at the same time, simplified mode is the way to go.
In checkpoint 4.1, if you want to clear the vpn tunnel, here is the way to do it, without repush the policy:
You must be missing something. I have the VPN between PIX and checkpoint 4.1 workinng just fine with 3DES/SHA1.
The other thing you need to remember is that you do NOT need the "no nat" rule in simplified mode. In the VPN community setup, there is a "checkbox" that will allow to disable NAT inside VPN community. If you check this box, then you don't need the "no nat" rule. It is a different story if you are using double nat or something.
Now that you have NG with AI up and running, you may want to look at AES256/sha1 setup. It's faster and more secure.