I am unable to get bidirectional traffic between an Astaro UTM v9 and a Checkpoint Firewall v R77. The Traffic from the Astaro network is fine but the traffic to the Astaro network will not encryppt. I am getting proper hase1 and phase2 negotiation. Below is the log entries from the astaro for starting the vpn as well as for the traffic from Astaro side to Checkpoint side.
Astaro external ip is yy.yyyy.yyy.yyy
CheckPoint external ip is xx.***.***.***
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: listening for IKE messages
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: forgetting secrets
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loading secrets from "/etc/ipsec.secrets"
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loaded PSK secret for yy.yyy.yyy.yyy xx.***.***.***
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loaded private key from 'Local X509 Cert.pem'
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: forgetting secrets
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loading secrets from "/etc/ipsec.secrets"
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loaded PSK secret for yy.yyy.yyy.yyy xx.***.***.***
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loaded private key from 'Local X509 Cert.pem'
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loading ca certificates from '/etc/ipsec.d/cacerts'
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loaded ca certificate from '/etc/ipsec.d/cacerts/VPN Signing CA.pem'
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loading aa certificates from '/etc/ipsec.d/aacerts'
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loading ocsp certificates from '/etc/ipsec.d/ocspcerts'
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: loading attribute certificates from '/etc/ipsec.d/acerts'
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: Changing to directory '/etc/ipsec.d/crls'
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: added connection description "S_SecNoc_VPN"
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: "S_SecNoc_VPN" #323: initiating Main Mode
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: added connection description "S_SecNoc_VPN"
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: added connection description "S_SecNoc_VPN"
2013:12:05-17:24:17 sigodsas-1 pluto[6835]: added connection description "S_SecNoc_VPN"
2013:12:05-17:24:18 sigodsas-1 pluto[6835]: "S_SecNoc_VPN" #323: Peer ID is ID_IPV4_ADDR: 'xx.***.***.***'
2013:12:05-17:24:18 sigodsas-1 pluto[6835]: "S_SecNoc_VPN" #323: ISAKMP SA established
2013:12:05-17:24:18 sigodsas-1 pluto[6835]: "S_SecNoc_VPN" #324: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#323}
2013:12:05-17:24:18 sigodsas-1 pluto[6835]: "S_SecNoc_VPN" #325: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#323}
2013:12:05-17:24:18 sigodsas-1 pluto[6835]: "S_SecNoc_VPN" #326: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#323}
2013:12:05-17:24:18 sigodsas-1 pluto[6835]: "S_SecNoc_VPN" #327: initiating Quick Mode PSK+ENCRYPT+TUNNEL+UP {using isakmp#323}
2013:12:05-17:24:18 sigodsas-1 pluto[6835]: "S_SecNoc_VPN" #323: discarding duplicate packet; already STATE_MAIN_I4
2013:12:05-17:24:18 sigodsas-1 pluto[6835]: id="2203" severity="info" sys="SecureNet" sub="vpn" event="Site-to-site VPN up" variant="ipsec" connection="SecNoc_VPN" address="yy.yyy.yyy.yyy" local_net="172.16.1.0/24" remote_net="172.31.254.0/24"
2013:12:05-17:24:18 sigodsas-1 pluto[6835]: "S_SecNoc_VPN" #324: sent QI2, IPsec SA established {ESP=>0xdab92480 0x06c98a3d 0xf4939b19 0x8a114817
This thread was automatically locked due to age.