Site-to-Site Checkpoint to Cisco
Learning Outcomes:
For this project section we learned many concepts such as:
Understanding VPN technologies: Working with IPSec, encryption and the Checkpoint firewall GUI.
Configuration:
We had to figure out how to configure the Cisco router using the correct authentication methods and encryptions through the CLI. Also, we had to set the correct static routes and follow best practices by setting up an ACL. Essentially we were also using core and fundamental concepts we have learned previously.
Troubleshooting Skills: We had to troubleshoot a few errors that took us some time. We had to use various commands to try to find errors and logs to help resolve our problems. But overall, this helped reinforce previous concepts we learned and also learn some new concepts as well for the future.
Diagram:

Table of IP Addresses:
Device Name
IP Addresses
PC-1
192.168.1.224/24
Checkpoint
142.232.197.149/24
Cisco Router
G0/0 - 142.232.197.191/24
G1/0 – 192.168.2.1/24
Webterm
192.168.2.2/24
Steps:
R1 Config: G0/0 - we used DHCP and is the interface connected to the WAN.
R1 Config: G1/0 - we assigned the interface connecting to the webterm 192.168.2.1.
Also added static routes(0.0.0.0 0.0.0.0) for both interfaces so it can pass through the WAN connection

Webterm config
We assigned the webterm ip address 192.168.2.2, with the DNS for 8.8.8.8

PC-A Settings
We used the default IP address for the PC and the gateway assigned to the checkpoint was 192.168.1.1

Checkpoint Site to Site VPN Configuration
This is the settings we used to implement Site to Site.
The IP address is of the Cisco Router, the preshared key we used has to be the same (even on Cisco Router) in order for the site to site VPN to work.

Remote Site Encryption
We had to add the networks (PC-A,Webterm) below in order for the pings to work across vpn, otherwise it would be dropped.

Show Run of Cisco Router
Settings that we used for the cisco router is shown. We created the crypto isakmp policy and used the number 10. We used the encryption aes 256 and hashing sha256. We also specified the authentication to be using a pre-shared key and used group 2. We set the peer address using the checkpoint ip to find the ipsec tunnel.

Tunnel Confirmation
We used the command show crypto isakmp sa to verify the ipsec tunnel has been created between the destination 142.232.197.191 and the source 142.232.197.149.

Verification
For the final step we pinged the GNS3 Webterm address from our PC-1 to verify connectivity of the Site-to-Site VPN. As seen here we got 2 successful replies.

Resources:
Checkpoint User Manual
Team:
Huang, Ming-Hao
Johal, Bishmanjot
Kamdar, Arya
Liu, Wei Chen
Velasco, Victor Vince
Last updated