Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Chris Miller on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Cisco 501 PPPOE NO GO!!!!!!!

Status
Not open for further replies.

quazimotto

Programmer
Mar 29, 2008
772
US
Greetings to all. I am new to this forum and to Cisco routers. I have a PIX 501 I am trying to install on a DSL connection from Verizon. I can not get an IP address from the ISP. Here is the config. Please have a look and point me in the right direction.

Thanks/Quaz



PIX Version 6.3(5)

interface ethernet0 auto

interface ethernet1 100full

nameif ethernet0 outside security0

nameif ethernet1 inside security100

enable password sAwfjSP6.yP2/mgh encrypted

passwd sAwfjSP6.yP2/mgh encrypted

hostname Eddie

domain-name DigitalVoiceData

fixup protocol dns maximum-length 512

fixup protocol ftp 21

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol http 80

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol sip 5060

fixup protocol sip udp 5060

fixup protocol skinny 2000

fixup protocol smtp 25

fixup protocol sqlnet 1521

fixup protocol tftp 69

<--- More --->

names

access-list outside_access_in permit tcp any interface outside eq 4899

access-list nonat permit ip 192.168.3.0 255.255.255.0 192.168.2.0 255.255.255.0

access-list nonat permit ip 192.168.8.0 255.255.255.0 192.168.2.0 255.255.255.0

access-list nonat permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list nonat permit ip 192.168.8.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list ipsec-quazlink2 permit ip 192.168.3.0 255.255.255.0 192.168.2.0 255.255.255.0

access-list ipsec-quazlink2 permit ip 192.168.8.0 255.255.255.0 192.168.2.0 255.255.255.0

access-list ipsec-quazlink1 permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list ipsec-quazlink1 permit ip 192.168.8.0 255.255.255.0 192.168.1.0 255.255.255.0

pager lines 24

logging trap informational

mtu outside 1492

mtu inside 1500

ip address outside pppoe setroute

ip address inside 192.168.1.1 255.255.255.0

ip audit info action alarm

ip audit attack action alarm

pdm logging informational 100

pdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 0 access-list nonat

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

<--- More --->

static (inside,outside) tcp interface 4899 10.200.9.10 4899 netmask 255.255.255.255 0 0

access-group outside_access_in in interface outside

route outside 0.0.0.0 0.0.0.0 192.168.1.1 1

timeout xlate 0:05:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout sip-disconnect 0:02:00 sip-invite 0:03:00

timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+

aaa-server TACACS+ max-failed-attempts 3

aaa-server TACACS+ deadtime 10

aaa-server RADIUS protocol radius

aaa-server RADIUS max-failed-attempts 3

aaa-server RADIUS deadtime 10

aaa-server LOCAL protocol local

http server enable

http 192.168.3.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server community pfc54321

snmp-server enable traps

floodguard enable

sysopt connection permit-ipsec

crypto ipsec transform-set esp3des2 esp-3des esp-sha-hmac

<--- More --->

crypto ipsec transform-set aes192 esp-aes-192 esp-sha-hmac

crypto ipsec transform-set esp3des esp-3des esp-md5-hmac

crypto map map1 10 ipsec-isakmp

! Incomplete

crypto map map1 11 ipsec-isakmp

crypto map map1 11 match address ipsec-quazlink2

crypto map map1 11 set peer 151.204.187.95

crypto map map1 11 set transform-set esp3des2

crypto map map1 12 ipsec-isakmp

crypto map map1 12 match address ipsec-quazlink1

crypto map map1 12 set peer 76.116.17.197

crypto map map1 12 set transform-set esp3des2

crypto map map1 interface outside

isakmp enable outside

isakmp key ******** address 151.204.187.95 netmask 255.255.255.255 no-xauth no-config-mode

isakmp key ******** address 76.116.17.197 netmask 255.255.255.255 no-xauth no-config-mode

isakmp identity address

isakmp keepalive 300

isakmp policy 10 authentication rsa-sig

isakmp policy 10 encryption des

isakmp policy 10 hash sha

isakmp policy 10 group 1

isakmp policy 10 lifetime 86400

isakmp policy 11 authentication pre-share

<--- More --->

isakmp policy 11 encryption 3des

isakmp policy 11 hash sha

isakmp policy 11 group 2

isakmp policy 11 lifetime 86400

telnet 0.0.0.0 0.0.0.0 outside

telnet 192.168.3.0 255.255.255.0 inside

telnet timeout 60

ssh 0.0.0.0 0.0.0.0 outside

ssh 10.1.0.0 255.255.0.0 inside

ssh 192.168.0.0 255.255.0.0 inside

ssh timeout 5

console timeout 0

vpdn group ISP request dialout pppoe

vpdn group ISP localname daveperfetti

vpdn group ISP ppp authentication pap

vpdn username daveperfetti password *********

dhcpd address 192.168.1.42-192.168.1.65 inside

dhcpd lease 3600

dhcpd ping_timeout 750

dhcpd auto_config outside

dhcpd enable inside

terminal width 80

Cryptochecksum:7f9cb028cecdcaec113208e3d97e9862

: end

 
So, no modem between the PIX and the ISP???

/

tim@tim-laptop ~ $ sudo apt-get install windows
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Couldn't find package windows...Thank Goodness!
 
Just let the modem do the PPPoE auth and don't bridge it, and give the PIX either DHCP from the modem or a static in the same subnet as the modem LAN.

/

tim@tim-laptop ~ $ sudo apt-get install windows
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Couldn't find package windows...Thank Goodness!
 
Ok. Is there something wrong with config that is preventing it from working in bridge mode? If the router is installed as you have suggested, will it be able to establish a VPN?

Thank you for your ideas.

Quaz
 
Sorry---read the post quickly...never had to do PPPoE on a PIX or ASA...I would say this acl

access-list outside_access_in permit tcp any interface outside eq 4899

needs to allow the PPPoE packets in, and your default route needs to point to something other than your inside interface...

You may want to [post in the PIX forum also.

/


tim@tim-laptop ~ $ sudo apt-get install windows
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Couldn't find package windows...Thank Goodness!
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top