Hi, I am trying to configure a PIX 501 for simple PPTP VPN access so that there would be no need to use anything other than the standard Windows Built-in VPN Client. I am a Cisco newbie so I have been using the cisco website and documentation. I think I have done everything they suggested but must be missing something. When I try to connect using Windows VPN I get Error 800 (Win XP) or Error 651 (Win 2K). I have an ADSL connection with static IP and internal mail server.
Configuration of PIX:
Gateway IP: 203.x.x.93
PIX IP External: 203.x.x.94
PIX IP Internal: 192.168.10.100
Server IP: 192.168.10.1
PIX Version 6.1(3)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ********** encrypted
passwd ********** encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
name 192.168.10.1 mailserver
access-list acl_out permit icmp any any
access-list acl_out permit tcp any host 203.x.x.94 eq smtp
access-list acl_out permit tcp any host 203.x.x.94 eq ident
access-list inside_access_in permit ip any any
access-list 101 permit ip 192.168.10.0 255.255.255.0 192.168.11.0 255.255.255.0
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 203.x.x.94 255.255.255.0
ip address inside 192.168.10.100 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool pptp-pool 192.168.11.11-192.168.11.50
pdm location 203.213.111.94 255.255.255.255 inside
pdm location mailserver 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list 101
nat (inside) 1 192.168.10.0 255.255.255.0 0 0
static (inside,outside) 203.213.111.94 mailserver netmask 255.255.255.255 0 0
access-group acl_out in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 203.213.111.93 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.10.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
no floodguard enable
sysopt connection permit-pptp
no sysopt route dnat
telnet timeout 5
ssh timeout 5
vpdn group 1 accept dialin pptp
vpdn group 1 ppp authentication pap
vpdn group 1 ppp authentication chap
vpdn group 1 ppp authentication mschap
vpdn group 1 ppp encryption mppe auto
vpdn group 1 client configuration address local pptp-pool
vpdn group 1 pptp echo 60
vpdn group 1 client authentication local
vpdn username cisco password cisco
vpdn enable outside
terminal width 80
Cryptochecksum:d959cc6875adb61ea434e161d39519e1
Configuration of PIX:
Gateway IP: 203.x.x.93
PIX IP External: 203.x.x.94
PIX IP Internal: 192.168.10.100
Server IP: 192.168.10.1
PIX Version 6.1(3)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ********** encrypted
passwd ********** encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
name 192.168.10.1 mailserver
access-list acl_out permit icmp any any
access-list acl_out permit tcp any host 203.x.x.94 eq smtp
access-list acl_out permit tcp any host 203.x.x.94 eq ident
access-list inside_access_in permit ip any any
access-list 101 permit ip 192.168.10.0 255.255.255.0 192.168.11.0 255.255.255.0
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 203.x.x.94 255.255.255.0
ip address inside 192.168.10.100 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool pptp-pool 192.168.11.11-192.168.11.50
pdm location 203.213.111.94 255.255.255.255 inside
pdm location mailserver 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list 101
nat (inside) 1 192.168.10.0 255.255.255.0 0 0
static (inside,outside) 203.213.111.94 mailserver netmask 255.255.255.255 0 0
access-group acl_out in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 203.213.111.93 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.10.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
no floodguard enable
sysopt connection permit-pptp
no sysopt route dnat
telnet timeout 5
ssh timeout 5
vpdn group 1 accept dialin pptp
vpdn group 1 ppp authentication pap
vpdn group 1 ppp authentication chap
vpdn group 1 ppp authentication mschap
vpdn group 1 ppp encryption mppe auto
vpdn group 1 client configuration address local pptp-pool
vpdn group 1 pptp echo 60
vpdn group 1 client authentication local
vpdn username cisco password cisco
vpdn enable outside
terminal width 80
Cryptochecksum:d959cc6875adb61ea434e161d39519e1