User`s guide

Page 26 of 30 Rel. 3.5 Release Notes
Inter-operability with Third-Party VPN Gateways Release Notes
Release 3.5 Enhanced Support for VPN Clients
4. Enter a Network Object for the ANG-1102 Private Address. Select Manage >
Network objects > New (or Edit) >.
Enter the name of the Network Object (reference only).
Enter the Private Address/Mask of the ANG-1102 network.
(192.168.1.0/24).
Set the location = External.
5. Enter a Network Object for the ANG-1102. Select Manage > Network objects
> New > Workstation.
Enter the Gateway Tunnel Endpoint of the ANG-1102 (146.115.206.68)
Set the Location = External, Type = Gateway.
NOTE
Do not select the VPN-1/FireWall-1 check box.
6. Configure the IKE properties for the Phase I Connection. Select Manage >
Network objects > Edit to edit the Checkpoint gateway endpoint created in
Step 3.
Select the VPN tab.
Select Other, under Domain.
Select the inside of the Checkpoint network name (Step 2) from the drop-
down list.
Select IKE under Encryption schemes defined and then click Edit.
Change the IKE properties to 3DES encryption.
Change the IKE properties to SHA1 hashing.
NOTE
The ANG-1102 supports 3DES/SHA1 and 3DES/MD5 & PFS Group 2 for a Phase
I connection.
Change the following settings:
- De-select Aggressive Mode.
- Select the Supports Subnets check box.
- Select the Pre-Shared Secret check box.
- Click Edit Secrets to set the pre-shared key to what was set on the
ANG-1102.
7. Repeat the Process for the ANG-1102 connection created in Step 5.
8. Create a Rule for the Source and Destination. Policy > Add Rule.
Select the Source and Destination to be the Private Address objects
created with Step 2 and Step 4, make the Bidirectional).
Set Service = ANY, Action = Encrypt, Track = Long.