I am having some difficulty getting a tunnel to come up between a Pix 501 and a NetWolves FoxBox.
This is the debug report I get:
mc5(config)# ping 10.0.1.254
VPN Peer: ISAKMP: Added new peer: ip:24.242.xxx.xxx Total VPN Peers:1
VPN Peer: ISAKMP: Peer ip:24.242.xxx.xxx Ref cnt incremented to:1 Total VPN Peers:1
ISAKMP (0): beginning Main Mode exchange
crypto_isakmp_process_block: src 24.242.xxx.xxx, dest 65.66.xxx.xxx
OAK_MM exchange
ISAKMP (0): processing SA payload. message ID = 0
ISAKMP (0): Checking ISAKMP transform 1 against priority 10 policy
ISAKMP: encryption DES-CBC
ISAKMP: hash SHA
ISAKMP: default group 2
ISAKMP: auth pre-share
ISAKMP: life type in seconds
ISAKMP: life duration (basic) of 6000
ISAKMP (0): atts are acceptable. Next payload is 0
ISAKMP (0): processing vendor id payload
ISAKMP (0): SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
return status is IKMP_NO_ERROR 10.0.1.254 NO response received -- 1260ms
crypto_isakmp_process_block: src 24.242.xxx.xxx, dest 65.66.xxx.xxx
OAK_MM exchange
ISAKMP (0): processing KE payload. message ID = 0
ISAKMP (0): processing NONCE payload. message ID = 0
ISAKMP (0): processing vendor id payload
ISAKMP (0): ID payload
next-payload : 8
type : 1
protocol : 17
port : 500
length : 8
ISAKMP (0): Total payload length: 12
return status is IKMP_NO_ERROR
crypto_isakmp_process_block: src 24.242.xxx.xxx, dest 65.66.xxx.xxx
OAK_MM exchange
ISAKMP (0): processing ID payload. message ID = 0
ISAKMP (0): processing HASH payload. message ID = 0
ISAKMP (0): SA has been authenticated
ISAKMP (0): beginning Quick Mode exchange, M-ID of -1777929188:9606f41cIPSEC(key_engine): got a queue event...
IPSEC(spi_response): getting spi 0x416f10d3(1097797843) for SA
from 24.242.xxx.xxx to 65.66.xxx.xxx for prot 2
IPSEC(spi_response): getting spi 0x7b021c75(2063735925) for SA
from 24.242.xxx.xxx to 65.66.xxx.xxx for prot 3
return status is IKMP_NO_ERROR
ISAKMP (0): sending INITIAL_CONTACT notify
ISAKMP (0): sending NOTIFY message 24578 protocol 1
ISAKMP (0): sending INITIAL_CONTACT notify
retransmitting phase 2...IPSEC(key_engine): request timer fired: count = 1,
(identity) local= 65.66.xxx.xxx, remote= 24.242.xxx.xxx,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.0.1.0/255.255.255.0/0/0 (type=4)
ISAKMP (0): beginning Quick Mode exchange, M-ID of -881301200:cb786930IPSEC(key_engine): got a queue event...
IPSEC(spi_response): getting spi 0xaedf0d01(2933853441) for SA
from 24.242.xxx.xxx to 65.66.xxx.xxx for prot 2
IPSEC(spi_response): getting spi 0x2b83b23c(730051132) for SA
from 24.242.xxx.xxx to 65.66.xxx.xxx for prot 3
ISAKMP (0): retransmitting phase 2...
ISAKMP (0): retransmitting phase 2...
ISAKMP (0): retransmitting phase 2...IPSEC(key_engine): request timer fired: count = 2,
(identity) local= 65.66.xxx.xxx, remote= 24.242.xxx.xxx,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.0.1.0/255.255.255.0/0/0 (type=4)
ISAKMP (0): retransmitting phase 2...
ISAKMP (0): retransmitting phase 2...
ISAKMP (0): deleting SA: src 65.66.xxx.xxx, dst 24.242.xxx.xxx
ISADB: reaper checking SA 0x80a89df0, conn_id = 0 DELETE IT!
VPN Peer: ISAKMP: Peer ip:24.242.xxx.xxx Ref cnt decremented to:0 Total VPN Peers:1
VPN Peer: ISAKMP: Deleted peer: ip:24.242.xxx.xxx Total VPN peers:0
The first phase seems to get through OK but phase time just times out.
Any ideas? I actually had the tunnel created at one point at time but lost the config on that. =(
Here is my current config:
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname mc5
domain-name mamas.net
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list nonatinside permit ip any 10.0.1.0 255.255.255.0
access-list To-Corp permit ip any 10.0.1.0 255.255.255.0
access-list tocorp permit ip any host 24.242.xxx.xxx
access-list tocorp permit ip 10.0.7.0 255.255.255.0 any
access-list fromcorp permit ip host 24.242.xxx.xxx any
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 65.66.xxx.xxx 255.255.255.248
ip address inside 10.0.7.254 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 10.0.1.0 255.255.255.0 outside
pdm location 24.242.xxx.xxx 255.255.255.255 outside
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list nonatinside
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group fromcorp in interface outside
access-group tocorp in interface inside
route outside 0.0.0.0 0.0.0.0 65.66.xxx.xxx 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server 128.194.254.9 source outside
http server enable
http 10.0.7.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set mytransform ah-sha-hmac esp-des esp-sha-hmac
crypto ipsec security-association lifetime seconds 3600
crypto map CorpEncr 11 ipsec-isakmp
crypto map CorpEncr 11 match address To-Corp
crypto map CorpEncr 11 set pfs
crypto map CorpEncr 11 set peer 24.242.xxx.xxx
crypto map CorpEncr 11 set transform-set mytransform
crypto map CorpEncr interface outside
isakmp enable outside
isakmp key ******** address 24.242.xxx.xxx netmask 255.255.255.255
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 6000
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 5
terminal width 80
Any help you can offer is appreciated. I'm at the point of pulling hair.
Thank You.
This is the debug report I get:
mc5(config)# ping 10.0.1.254
VPN Peer: ISAKMP: Added new peer: ip:24.242.xxx.xxx Total VPN Peers:1
VPN Peer: ISAKMP: Peer ip:24.242.xxx.xxx Ref cnt incremented to:1 Total VPN Peers:1
ISAKMP (0): beginning Main Mode exchange
crypto_isakmp_process_block: src 24.242.xxx.xxx, dest 65.66.xxx.xxx
OAK_MM exchange
ISAKMP (0): processing SA payload. message ID = 0
ISAKMP (0): Checking ISAKMP transform 1 against priority 10 policy
ISAKMP: encryption DES-CBC
ISAKMP: hash SHA
ISAKMP: default group 2
ISAKMP: auth pre-share
ISAKMP: life type in seconds
ISAKMP: life duration (basic) of 6000
ISAKMP (0): atts are acceptable. Next payload is 0
ISAKMP (0): processing vendor id payload
ISAKMP (0): SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
return status is IKMP_NO_ERROR 10.0.1.254 NO response received -- 1260ms
crypto_isakmp_process_block: src 24.242.xxx.xxx, dest 65.66.xxx.xxx
OAK_MM exchange
ISAKMP (0): processing KE payload. message ID = 0
ISAKMP (0): processing NONCE payload. message ID = 0
ISAKMP (0): processing vendor id payload
ISAKMP (0): ID payload
next-payload : 8
type : 1
protocol : 17
port : 500
length : 8
ISAKMP (0): Total payload length: 12
return status is IKMP_NO_ERROR
crypto_isakmp_process_block: src 24.242.xxx.xxx, dest 65.66.xxx.xxx
OAK_MM exchange
ISAKMP (0): processing ID payload. message ID = 0
ISAKMP (0): processing HASH payload. message ID = 0
ISAKMP (0): SA has been authenticated
ISAKMP (0): beginning Quick Mode exchange, M-ID of -1777929188:9606f41cIPSEC(key_engine): got a queue event...
IPSEC(spi_response): getting spi 0x416f10d3(1097797843) for SA
from 24.242.xxx.xxx to 65.66.xxx.xxx for prot 2
IPSEC(spi_response): getting spi 0x7b021c75(2063735925) for SA
from 24.242.xxx.xxx to 65.66.xxx.xxx for prot 3
return status is IKMP_NO_ERROR
ISAKMP (0): sending INITIAL_CONTACT notify
ISAKMP (0): sending NOTIFY message 24578 protocol 1
ISAKMP (0): sending INITIAL_CONTACT notify
retransmitting phase 2...IPSEC(key_engine): request timer fired: count = 1,
(identity) local= 65.66.xxx.xxx, remote= 24.242.xxx.xxx,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.0.1.0/255.255.255.0/0/0 (type=4)
ISAKMP (0): beginning Quick Mode exchange, M-ID of -881301200:cb786930IPSEC(key_engine): got a queue event...
IPSEC(spi_response): getting spi 0xaedf0d01(2933853441) for SA
from 24.242.xxx.xxx to 65.66.xxx.xxx for prot 2
IPSEC(spi_response): getting spi 0x2b83b23c(730051132) for SA
from 24.242.xxx.xxx to 65.66.xxx.xxx for prot 3
ISAKMP (0): retransmitting phase 2...
ISAKMP (0): retransmitting phase 2...
ISAKMP (0): retransmitting phase 2...IPSEC(key_engine): request timer fired: count = 2,
(identity) local= 65.66.xxx.xxx, remote= 24.242.xxx.xxx,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.0.1.0/255.255.255.0/0/0 (type=4)
ISAKMP (0): retransmitting phase 2...
ISAKMP (0): retransmitting phase 2...
ISAKMP (0): deleting SA: src 65.66.xxx.xxx, dst 24.242.xxx.xxx
ISADB: reaper checking SA 0x80a89df0, conn_id = 0 DELETE IT!
VPN Peer: ISAKMP: Peer ip:24.242.xxx.xxx Ref cnt decremented to:0 Total VPN Peers:1
VPN Peer: ISAKMP: Deleted peer: ip:24.242.xxx.xxx Total VPN peers:0
The first phase seems to get through OK but phase time just times out.
Any ideas? I actually had the tunnel created at one point at time but lost the config on that. =(
Here is my current config:
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname mc5
domain-name mamas.net
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list nonatinside permit ip any 10.0.1.0 255.255.255.0
access-list To-Corp permit ip any 10.0.1.0 255.255.255.0
access-list tocorp permit ip any host 24.242.xxx.xxx
access-list tocorp permit ip 10.0.7.0 255.255.255.0 any
access-list fromcorp permit ip host 24.242.xxx.xxx any
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 65.66.xxx.xxx 255.255.255.248
ip address inside 10.0.7.254 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 10.0.1.0 255.255.255.0 outside
pdm location 24.242.xxx.xxx 255.255.255.255 outside
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list nonatinside
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group fromcorp in interface outside
access-group tocorp in interface inside
route outside 0.0.0.0 0.0.0.0 65.66.xxx.xxx 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server 128.194.254.9 source outside
http server enable
http 10.0.7.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set mytransform ah-sha-hmac esp-des esp-sha-hmac
crypto ipsec security-association lifetime seconds 3600
crypto map CorpEncr 11 ipsec-isakmp
crypto map CorpEncr 11 match address To-Corp
crypto map CorpEncr 11 set pfs
crypto map CorpEncr 11 set peer 24.242.xxx.xxx
crypto map CorpEncr 11 set transform-set mytransform
crypto map CorpEncr interface outside
isakmp enable outside
isakmp key ******** address 24.242.xxx.xxx netmask 255.255.255.255
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 6000
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 5
terminal width 80
Any help you can offer is appreciated. I'm at the point of pulling hair.
Thank You.