Good morning,
I am ready to pull out hair. I am trying to help a friend at a small office with a Pix 501. There are 3 users and a Small Business Server hosting web,ftp,e-mail. They have a single static IP address 216.51.xxx.xx3 and the route the current firewall is on is set to 216.51.xxx.xx4. They want to use IPSEC and the Cisco VPN client to VPN back into the business.
I am unable to get the VPN client to connect, it gives a remote peer no longer responding error and I am unable to get to the web from inside the network. I will say the acls to permit traffic in work as the FTP and website are accesible. What step am I missing? Thank you in advance.
PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 2qb3w7Qquh3X.N20 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname CSDPix
domain-name comsoftdev.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 172.16.1.0 vpnclient
name 192.168.168.0 someone.com
fixup protocol pptp 1723
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq pop3
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq smtp
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq ftp
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq pptp
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq 1604
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq www
access-list inside_nat0_outbound remark VPN Client
access-list outside_cryptomap_dyn_10 remark VPN Client
access-list outside_cryptomap_dyn_10 permit ip someone.com
access-list is_splitTunnelAcl permit ip someone.com 255.255.255.0 any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 216.51.xxx.xx3 255.255.255.192
ip address inside 192.168.168.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.1.0 255.255.255.255 inside
pdm location 192.168.168.0 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 216.51.xxx.xx3 192.168.168.xxx netmask 255.255.255.255 0 0
route outside 0.0.0.0 0.0.0.0 216.51.xxx.xx4 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
aaa-server partnerauth protocol radius
aaa-server partnerauth (inside) host 192.168.168.xx4 xxx timeout 5
aaa-server partnerauth (inside) host 192.168.168.xx3 xxx timeout 5
aaa authentication telnet console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 inside
http 192.168.168.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection tcpmss 1100
sysopt connection permit-ipsec
sysopt connection permit-pptp
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 10 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client configuration address initiate
crypto map outside_map client authentication partnerauth
crypto map outside_map interface outside
isakmp enable outside
isakmp identity address
isakmp keepalive 10 4
isakmp nat-traversal 10
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
telnet 192.168.1.0 255.255.255.0 inside
telnet 192.168.168.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
username username password xxxxxxxxxxxxxxxx encrypted privilege 15
terminal width 80
I am ready to pull out hair. I am trying to help a friend at a small office with a Pix 501. There are 3 users and a Small Business Server hosting web,ftp,e-mail. They have a single static IP address 216.51.xxx.xx3 and the route the current firewall is on is set to 216.51.xxx.xx4. They want to use IPSEC and the Cisco VPN client to VPN back into the business.
I am unable to get the VPN client to connect, it gives a remote peer no longer responding error and I am unable to get to the web from inside the network. I will say the acls to permit traffic in work as the FTP and website are accesible. What step am I missing? Thank you in advance.
PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 2qb3w7Qquh3X.N20 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname CSDPix
domain-name comsoftdev.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 172.16.1.0 vpnclient
name 192.168.168.0 someone.com
fixup protocol pptp 1723
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq pop3
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq smtp
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq ftp
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq pptp
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq 1604
access-list acl_in permit tcp any host 216.51.xxx.xx3 eq www
access-list inside_nat0_outbound remark VPN Client
access-list outside_cryptomap_dyn_10 remark VPN Client
access-list outside_cryptomap_dyn_10 permit ip someone.com
access-list is_splitTunnelAcl permit ip someone.com 255.255.255.0 any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 216.51.xxx.xx3 255.255.255.192
ip address inside 192.168.168.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.1.0 255.255.255.255 inside
pdm location 192.168.168.0 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 216.51.xxx.xx3 192.168.168.xxx netmask 255.255.255.255 0 0
route outside 0.0.0.0 0.0.0.0 216.51.xxx.xx4 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
aaa-server partnerauth protocol radius
aaa-server partnerauth (inside) host 192.168.168.xx4 xxx timeout 5
aaa-server partnerauth (inside) host 192.168.168.xx3 xxx timeout 5
aaa authentication telnet console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 inside
http 192.168.168.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection tcpmss 1100
sysopt connection permit-ipsec
sysopt connection permit-pptp
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 10 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client configuration address initiate
crypto map outside_map client authentication partnerauth
crypto map outside_map interface outside
isakmp enable outside
isakmp identity address
isakmp keepalive 10 4
isakmp nat-traversal 10
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
telnet 192.168.1.0 255.255.255.0 inside
telnet 192.168.168.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
username username password xxxxxxxxxxxxxxxx encrypted privilege 15
terminal width 80