Check Point IPSec VPN with Cisco Router
A site-to-site IPsec VPN between a Check Point firewall and a Cisco router involves establishing a secure, encrypted connection over the internet to link two separate networks. This configuration ensures that data transmitted between the networks is protected and authenticated, through the use of IPsec protocols and appropriate configuration on both the Check Point device and the Cisco router.
Topology
Here’s the topology for this lab deployment
Configuring IPSec VPN on Check Point
First, create a new network object for the Check Point’s LAN Network
And also another one for the Cisco Router’s LAN Network
On Check Point SmartConsole, on Access Control enable IPSec VPN
Then on VPN Domain, select the LAN Network
Next on Link Selection, select the External Interface IP Address, and hit Ok
After that, add the Cisco Router as an Externally Managed VPN Gateway
Enter the name and the IP Address, then select both Firewall and IPSec VPN
Then on VPN Domain, select the Cisco’s LAN Network, and hit Ok
Configuring VPN Communities
On Security Policies » VPN Communities, add a new Meshed VPN with Check Point and Cisco Router as participant gateways
Next on Encryption, configure the Phase 1 and Phase 2 IKE encryption and hash algorithm
Then on Shared Secret, configure the shared secret
Here’s how the VPN Community ends up like
Configuring Policy
Next on Policy, create a policy to allow traffic going back and forth between these 2 lan network through VPN
That should do it on the Check Point side.
Configuring IPSec VPN on Cisco Router
First we’ll configure an Internet Security Association and Key Management Protocol (ISAKMP) policy on the Cisco Router, this policy defines how the router will establish tunnels for VPNs using the IPsec protocol suite.
- crypto isakmp policy 1 : This command starts the configuration of an ISAKMP policy with the priority (or policy number) of 1. Policies are evaluated in order of their priority number, starting with the lowest. A priority of 1 means this policy will be considered first.
- encryption 3des : This specifies the encryption algorithm to use for securing the VPN tunnel. 3des stands for Triple Data Encryption Standard, which is an enhancement of the original DES algorithm that applies encryption three times to each data block, making it more secure.
- hash md5 : This sets the hash algorithm used for ensuring data integrity. md5 (Message Digest Algorithm 5) produces a 128-bit hash value, which is used to verify that the data has not been altered during transmission.
- authentication pre-share : This specifies the method of authentication for the VPN peers. pre-share means pre-shared keys (PSK) are used.
- group 2 : This determines the Diffie-Hellman group used for key exchange. Group 2 corresponds to a 1024-bit key length, which determines the strength of the cryptographic key exchange process.
- lifetime 86400 : This sets the lifetime of the ISAKMP security association in seconds. 86400 seconds equals 24 hours. After this period, the ISAKMP security association will need to be re-established.
Next we configure a pre-shared key for ISAKMP. This pre-shared key will be used for authenticating a VPN peer with a the address of Check Point Firewall
After that, we define an extended IP access control list (ACL) that will be used to specify which traffic should be protected by IPsec when establishing a VPN tunnel.
Then we create an IPsec transform set that defines the combination of encryption and authentication protocols that will be used to protect the data being transmitted through the VPN tunnel.
Next we configure a crypto map to establish an IPsec VPN connection
- crypto map c-map 10 ipsec-isakmp : This command creates a crypto map entry named c-map with a sequence number of 10 and specifies that it will use ISAKMP for IPsec. The sequence number 10 determines the order in which the crypto map entries are evaluated.
- set peer 172.16.1.3 : This specifies the IP address of the remote VPN peer.
- set transform-set cpsg : This sets the transform set to be used with this crypto map. The transform set named cpsg defines the encryption and authentication protocols to be used (in this case, esp-3des for encryption and esp-md5-hmac for authentication).
- match address ipsec-acl : This command specifies the access control list (ACL) named ipsec-acl that defines the traffic to be encrypted and sent through the IPsec tunnel.
Lastly, we apply the previously defined crypto map to a the Gig2 interface on the Cisco router
Validating VPN Session
Runing “show crypto session detail” shows that the IPSec VPN between this Cisco Router to the Check Point Firewall is established
Testing the IPSec VPN
Now on the PC from the Cisco Router’s LAN network, we are able to connect to the pc on the Checkpoint’s LAN network
And back on the Check Point SmartConsole, we can see all the traffic crossing the IPSec VPN