Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Can't add site to site VPN with existing remote access VPN 2

Status
Not open for further replies.

wholmer

Technical User
Oct 4, 2002
37
0
0
US
I have an existing PIX #1 515e running 6.3(1) PDM 3.0(1) using NAT on the inside with an

existing remote client VPN set up. I need to add a site to site vpn with a PIX 515 #2 not

using NAT also running the same os.

PIX #1 config

nsrocpix# show config
: Saved
: Written by enable_15 at 11:18:34.241 EDT Mon Apr 4 2005
PIX Version 6.3(1)
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
interface ethernet3 auto
interface ethernet4 auto shutdown
interface ethernet5 auto shutdown
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
nameif ethernet3 web security25
nameif ethernet4 intf4 security8
nameif ethernet5 intf5 security10
enable password m86ZWgB8PHyT1K4O encrypted
passwd m86ZWgB8PHyT1K4O encrypted
hostname pix1
domain-name domain1.net
clock timezone EST -5
clock summer-time EDT recurring
fixup protocol ftp 21
fixup protocol h323 h225 1720
no fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol pptp 1723
no fixup protocol rsh 514
no fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
no fixup protocol sqlnet 1521
names
name 172.16.0.1 Gateway
name 192.168.0.70 dns1
name 192.168.0.0 domain2
name 192.168.0.11 dns2
access-list compiled
access-list 101 permit ip 192.168.0.64 255.255.255.192 any
access-list dmz_access_in permit tcp host WAL3 host wal4aoutside eq smtp
access-list dmz_access_in remark Permit access 205 network outside
access-list inside_outbound_nat0_acl permit ip 172.16.0.0 255.255.255.0 172.16.1.0

255.255.255.0
pager lines 24
logging timestamp
logging trap critical
logging host inside holmerw1 6/1470
icmp permit host 192.168.0.2 outside
icmp permit 172.16.0.0 255.255.255.0 inside
icmp deny any dmz
mtu outside 1500
mtu inside 1500
mtu dmz 1500
mtu nsrocnet 1500
mtu intf4 1500
mtu intf5 1500
ip address outside 172.16.0.1 255.255.255.0
ip address inside 172.16.0.2 255.255.255.0
no ip address intf4
no ip address intf5
ip audit info action alarm
ip audit attack action alarm
ip local pool VPN1 172.16.1.1-172.16.1.254
no failover
failover timeout 0:00:00
failover poll 15
pdm location 192.168.0.1 255.255.255.0 outside
pdm location 192.168.0.64 255.255.255.192 outside
pdm location 172.16.1.0 255.255.255.0 outside
no pdm history enable
arp timeout 14400
global (outside) 1
global (dmz) 1
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 172.16.0.0 255.255.255.0 0 0
static (inside,dmz) 172.16.0.0 172.16.0..0 netmask 255.255.255.0 0 0
static (inside,dmz) 172.16.0.50 netmask 255.255.255.255 0 0
static (inside,outside) 172.16.0.50 netmask 255.255.255.255 0 0
access-group 101 in interface outside
access-group dmz_access_in in interface dmz
route outside 0.0.0.0 0.0.0.0 172.16.0.1 1
route inside 172.16.0.0 255.255.255.0 172.16.0.1 1
route inside 172.16.1.0 255.255.255.0 172.16.0.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute uauth 0:05:00 inactivity
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server DC source inside prefer
http server enable
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
tftp-server inside mybox /pix
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set myset esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 10 set transform-set myset
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address PIX outside IP netmask 255.255.255.255 no-xauth no-con
fig-mode
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup VPN1 address-pool VPN1
vpngroup VPN1 dns-server dns1 dns2
vpngroup VPN1 default-domain domain1.NET
vpngroup VPN1 idle-time 1800
vpngroup VPN1 password ********
telnet ITLAPTOP1 255.255.255.255 inside
telnet ITLAPTOP 255.255.255.255 inside
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:0dbf0348c85ebcebfe6187a17ff94c0b


I tried using the VPN wizard on PIX #1 and it added the following.


isakmp key ******** address 192.168.0.2 netmask 255.255.255.255 no-xauth no-config-mode
access-list inside_outbound_nat0_acl line 2 permit ip any any
nat (inside) 0 access-list inside_outbound_nat0_acl
access-list outside_cryptomap_20 permit ip any any
crypto map outside_map 20 set peer 192.168.1.2
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set transform-set myset
crypto map outside_map 20 set security-association lifetime seconds 28800 kilobytes 4608000
crypto map outside_map interface outside
sysopt connection permit-ipsec

It caused the PIX to not allow inside to outside and killed the existing vpn.
Can the PIX have more than one crypto map set to the outside interface?
Should I have used a different transform set than the one used on the existing vpn?
Should I use the same isakmp policy as the existing vpn?
 
Glad to help.

Chris.

**********************
Chris A.C, CCNA, CCSA
**********************
 
Very nice breakdown of the entire syntax, Chris :)

A firm beleiver of "Keep it Simple" philosophy
Cheers
/T
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top