[vpn] Checkpoint/Netscreen VPN IKE Error Messages

Tom McHugh TomM at spectrum-systems.com
Mon Jan 21 16:00:32 EST 2002


I happened to run across this bug report in the release notes for the latest
version of NetScreen's OS.  The problem reported was that Checkpoint didn't
delete the SA for Phase 2 when the NetScreen sent a message to it to delete
*both* Phase 1 and Phase 2 SAs.  This is still reported in the current
version of NetScreen's OS, but no mention is made about CheckPoint's version
or any work-around.

Hope that helps,

Tom McHugh, Senior Systems Engineer
mailto:tomm at spectrum-systems.com

Spectrum Systems, Inc.
"Today's Technology--Solutions for Tomorrow"

11320 Random Hills Road, Suite 630
Fairfax, VA 22030-6001
703-591-7400 x218
703-591-9780 (Fax)
http://www.spectrum-systems.com/

Concerned about the security of your network?  Spectrum Systems' Network
Security products and services can take the worry out of protecting your
network.  Call us at 800-929-3781 or visit us at
http://www.spectrum-systems.com to learn more.


> -----Original Message-----
> From: dparmer at dsscorp.com [mailto:dparmer at dsscorp.com]
> Sent: Monday, January 14, 2002 9:17 AM
> To: vpn at securityfocus.com
> Subject: [vpn] Checkpoint/Netscreen VPN IKE Error Messages
> 
> 
> Hello,
> 
> We are having trouble for the past few weeks trying to get a 
> Netscreen 5 to
> an NT 4.0 Checkpoint 4.1 SP5 site to site VPN operational.  
> Generally IKE
> Phase 1 completes between the firewalls, but only very 
> infrequently does
> IKE Phase 2 compete between the firewalls, according to the 
> Checkpoint and
> Netscreen logs.  When Phase 2 does complete, outbound traffic 
> is encrypted
> but the return decrypts do not come back.  We have encryption schemes
> identical for Phase 1 & Phase 2 between the Checkpoint & 
> Netscreen boxes.
> When Phase 2 does not complete, messages in the log viewer include
> "Received delete SA from Peer" and  "Received Notification from Peer:
> payload malformed", with the source address being the 
> Checkpoint firewall
> and the destination being the Netscreen.
> 
> Just for kicks, we tried creating a VPN connection to two 
> other Checkpoint
> 4.1 sites (one had NT 4.0 using 4.1 SP2 and another had W2K 
> using 4.1 SP5)
> using the same Netscreen 5 box with identical encryption 
> properties, and
> both Phase 1 & Phase 2 became operational, and traffic was 
> being encrypted
> and decrypted in both directions.  Thus I eliminated the 
> possibility that
> the Netscreen may be the issue.
> 
> I then compared a few files on the various firewalls (crypt.def,
> objects.C), and could not find anything except cosmetic items 
> that were
> different. I also tried the various debugging tools (fw 
> monitor, fw -d d,
> FWIKE_DEBUG), and have examined the resultant file output, 
> and was not able
> to decipher anything enlightening from these files, although 
> I must admit
> that I don't know exactly what kind of packet flow or 
> sequencing I should
> be looking for.
> 
> Thanks in advance for any assistance.
> 
> ============================
> Dave Parmer
> Distributed Systems Services
> 610-927-2026
> dparmer at dsscorp.com
> 
> 
> 
> VPN is sponsored by SecurityFocus.com
> 

VPN is sponsored by SecurityFocus.com





More information about the VPN mailing list