Closed krims0n32 closed 4 months ago
Hi, there can be two issues: IPSec transport is disabled on the VPN server (UDP port 4500 is blocked) or it is enabled but only via TCPT protocol (Checkpoint proprietary TCP tunnel) which isn't supported by snx-rs. You could try selecting SSL tunnel type as a workaround.
Great, -e ssl works! I can't get it to work through the GUI though. I get this error when clicking Fetch info
And then I am unable to select an authentication method.
Interesting, i will fix it. thanks for reporting.
Should be fixed now in the main branch, you could build it as described in the README file.
Progress, but:
Ok there can be some complications, that server info dump above, is it a complete one? It seems to be missing the login factors. They are displayed in the UI to select authentication type.
I'm not sure, I got the curl command from another ticket:
curl -k -X POST -d '(CCCclientRequest :RequestHeader ( :id (0) :type (ClientHello)) :RequestData ( :client_info ( :client_type (TRAC) :client_version (1) :client_support_saml (true))))' https://X.X.X.X/clients
snx-rs -s X.X.X.X --ignore-server-cert=true -m info
Supported tunnel protocols:
IPSec
SSL
L2TP
I think it is supposed to show login types but it doesn't.
What do you specify as a login-type parameter?
I have added an initial support for legacy CP servers which do not advertise login types.
currently it assumes vpn_Username_Password
as a login type. If it doesn't work for you please let me know which one does.
Works perfectly, thanks!
Thanks for your work on this client. We have an older Checkpoint 600 that I can't get to work though. Is this supported at all?
I get this error no matter what login type I select:
Error: Probing failed, server is not reachable via ESPinUDP tunnel!
Thanks.