I have been trying to config a PIX 515E, version 8.0(4), with remote access vpn groups that has limitted access to the mailserver through http (webmail). I got the first vpn-user group throught the tunnel, but cannot get anything else. Can somebody look at the config below and give some helps. Thanks
CS-PIX2# sh run
: Saved
:
PIX Version 8.0(4)
!
hostname CS-PIX2
domain-name pixtestINC.NET
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
multicast-routing
names
name A.B.C.233 Mail_server
name A.B.C.232 Masked_intf
name xxx.yyy.zzz.111 Private_Mail_server
name xxx.yyy.zzz.111 vpn1-pool
dns-guard
!
interface Ethernet0
nameif outside
security-level 0
ip address A.B.C.231 255.255.255.240
ospf cost 10
!
interface Ethernet1
nameif inside
security-level 100
ip address xxx.yyy.zzz.111 255.255.255.0
no pim
ospf cost 10
!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup inside
dns server-group DefaultDNS
name-server Private_Mail_server
domain-name pixtestINC.NET
object-group protocol TCPUDP
protocol-object udp
protocol-object tcp
object-group service RemoteDesktop tcp-udp
port-object eq 3389
port-object eq echo
port-object eq www
object-group service DM_INLINE_SERVICE_2
service-object icmp
service-object tcp eq ftp
service-object tcp eq ftp-data
service-object tcp eq www
service-object tcp eq https
service-object tcp eq smtp
service-object tcp eq ssh
service-object tcp eq telnet
service-object udp eq nameserver
access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 xxx.yyy.zzz.111 255.255.25
5.0 any
access-list outside_access_in extended permit tcp any host Mail_server eq smtp
access-list outside_access_in extended permit icmp any host Masked_intf echo-reply
access-list noNAT-vpn1 extended permit ip xxx.yyy.zzz.111 255.255.255.0 vpn1-pool 255.255.255.248
access-list Split-Vpn1-Group extended permit ip xxx.yyy.zzz.111 255.255.255.0 vpn1-pool 255.255.255.248
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
ip local pool vpn1-pool xxx.yyy.zzz.111-xxx.yyy.zzz.111 mask 255.255.255.248
ip verify reverse-path interface outside
ip verify reverse-path interface inside
icmp unreachable rate-limit 1 burst-size 1
icmp permit any outside
icmp permit any inside
asdm image flash:/asdm-61551.bin
no asdm history enable
arp timeout 14400
nat-control
global (outside) 200 interface
global (outside) 300 Masked_intf netmask 255.255.255.255
nat (inside) 0 access-list noNAT-vpn1
nat (inside) 300 xxx.yyy.zzz.111 255.255.255.0
static (inside,outside) Mail_server Private_Mail_server netmask 255.255.255.255
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 A.B.C.225 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http server enable
http xxx.yyy.zzz.111 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set CS-Encr-Set esp-aes-256 esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-256-SHA ESP-AES-256-MD5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 46080
00
crypto dynamic-map Cs-dyn-map 10 set pfs
crypto dynamic-map Cs-dyn-map 10 set transform-set CS-Encr-Set
crypto dynamic-map Cs-dyn-map 10 set security-association lifetime seconds 28800
crypto dynamic-map Cs-dyn-map 10 set security-association lifetime kilobytes 4608000
crypto dynamic-map Cs-dyn-map 10 set reverse-route
crypto map Tunnel-Map 10 ipsec-isakmp dynamic Cs-dyn-map
crypto map Tunnel-Map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
no vpn-addr-assign aaa
vpn-addr-assign local reuse-delay 3
telnet xxx.yyy.zzz.111 255.255.255.0 inside
telnet timeout 60
ssh timeout 5
console timeout 0
dhcpd address xxx.yyy.zzz.111-xxx.yyy.zzz.111 inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
group-policy DfltGrpPolicy attributes
wins-server value xxx.yyy.zzz.111
dns-server value xxx.yyy.zzz.111
vpn-simultaneous-logins 6
group-lock value DefaultRAGroup
ipsec-udp enable
default-domain value pixtest.local
group-policy vpn1 internal
group-policy vpn1 attributes
wins-server value xxx.yyy.zzz.111
dns-server value xxx.yyy.zzz.111
vpn-simultaneous-logins 6
vpn-filter value Split-Vpn1-Group
vpn-tunnel-protocol IPSec
group-lock value vpn1
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Split-Vpn1-Group
default-domain value pixtest.local
address-pools value vpn1-pool
client-access-rule none
username Cs_Frw_uSeR password HPXbKgDDIFmfelF1 encrypted privilege 15
username vpn1 password uAXM3kU9UI7rf/JM encrypted
username vpn1 attributes
vpn-group-policy vpn1
vpn-simultaneous-logins 6
vpn-filter value Split-Vpn1-Group
group-lock value vpn1
service-type remote-access
tunnel-group vpn1 type remote-access
tunnel-group vpn1 general-attributes
address-pool vpn1-pool
default-group-policy vpn1
tunnel-group vpn1 ipsec-attributes
pre-shared-key *
!
!
prompt hostname context
Cryptochecksum:e3337ea8631b5b90c7ec0a28a3e801ba
: end
CS-PIX2#
CS-PIX2# sh run
: Saved
:
PIX Version 8.0(4)
!
hostname CS-PIX2
domain-name pixtestINC.NET
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
multicast-routing
names
name A.B.C.233 Mail_server
name A.B.C.232 Masked_intf
name xxx.yyy.zzz.111 Private_Mail_server
name xxx.yyy.zzz.111 vpn1-pool
dns-guard
!
interface Ethernet0
nameif outside
security-level 0
ip address A.B.C.231 255.255.255.240
ospf cost 10
!
interface Ethernet1
nameif inside
security-level 100
ip address xxx.yyy.zzz.111 255.255.255.0
no pim
ospf cost 10
!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup inside
dns server-group DefaultDNS
name-server Private_Mail_server
domain-name pixtestINC.NET
object-group protocol TCPUDP
protocol-object udp
protocol-object tcp
object-group service RemoteDesktop tcp-udp
port-object eq 3389
port-object eq echo
port-object eq www
object-group service DM_INLINE_SERVICE_2
service-object icmp
service-object tcp eq ftp
service-object tcp eq ftp-data
service-object tcp eq www
service-object tcp eq https
service-object tcp eq smtp
service-object tcp eq ssh
service-object tcp eq telnet
service-object udp eq nameserver
access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 xxx.yyy.zzz.111 255.255.25
5.0 any
access-list outside_access_in extended permit tcp any host Mail_server eq smtp
access-list outside_access_in extended permit icmp any host Masked_intf echo-reply
access-list noNAT-vpn1 extended permit ip xxx.yyy.zzz.111 255.255.255.0 vpn1-pool 255.255.255.248
access-list Split-Vpn1-Group extended permit ip xxx.yyy.zzz.111 255.255.255.0 vpn1-pool 255.255.255.248
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
ip local pool vpn1-pool xxx.yyy.zzz.111-xxx.yyy.zzz.111 mask 255.255.255.248
ip verify reverse-path interface outside
ip verify reverse-path interface inside
icmp unreachable rate-limit 1 burst-size 1
icmp permit any outside
icmp permit any inside
asdm image flash:/asdm-61551.bin
no asdm history enable
arp timeout 14400
nat-control
global (outside) 200 interface
global (outside) 300 Masked_intf netmask 255.255.255.255
nat (inside) 0 access-list noNAT-vpn1
nat (inside) 300 xxx.yyy.zzz.111 255.255.255.0
static (inside,outside) Mail_server Private_Mail_server netmask 255.255.255.255
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 A.B.C.225 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http server enable
http xxx.yyy.zzz.111 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set CS-Encr-Set esp-aes-256 esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-256-SHA ESP-AES-256-MD5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 46080
00
crypto dynamic-map Cs-dyn-map 10 set pfs
crypto dynamic-map Cs-dyn-map 10 set transform-set CS-Encr-Set
crypto dynamic-map Cs-dyn-map 10 set security-association lifetime seconds 28800
crypto dynamic-map Cs-dyn-map 10 set security-association lifetime kilobytes 4608000
crypto dynamic-map Cs-dyn-map 10 set reverse-route
crypto map Tunnel-Map 10 ipsec-isakmp dynamic Cs-dyn-map
crypto map Tunnel-Map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
no vpn-addr-assign aaa
vpn-addr-assign local reuse-delay 3
telnet xxx.yyy.zzz.111 255.255.255.0 inside
telnet timeout 60
ssh timeout 5
console timeout 0
dhcpd address xxx.yyy.zzz.111-xxx.yyy.zzz.111 inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
group-policy DfltGrpPolicy attributes
wins-server value xxx.yyy.zzz.111
dns-server value xxx.yyy.zzz.111
vpn-simultaneous-logins 6
group-lock value DefaultRAGroup
ipsec-udp enable
default-domain value pixtest.local
group-policy vpn1 internal
group-policy vpn1 attributes
wins-server value xxx.yyy.zzz.111
dns-server value xxx.yyy.zzz.111
vpn-simultaneous-logins 6
vpn-filter value Split-Vpn1-Group
vpn-tunnel-protocol IPSec
group-lock value vpn1
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Split-Vpn1-Group
default-domain value pixtest.local
address-pools value vpn1-pool
client-access-rule none
username Cs_Frw_uSeR password HPXbKgDDIFmfelF1 encrypted privilege 15
username vpn1 password uAXM3kU9UI7rf/JM encrypted
username vpn1 attributes
vpn-group-policy vpn1
vpn-simultaneous-logins 6
vpn-filter value Split-Vpn1-Group
group-lock value vpn1
service-type remote-access
tunnel-group vpn1 type remote-access
tunnel-group vpn1 general-attributes
address-pool vpn1-pool
default-group-policy vpn1
tunnel-group vpn1 ipsec-attributes
pre-shared-key *
!
!
prompt hostname context
Cryptochecksum:e3337ea8631b5b90c7ec0a28a3e801ba
: end
CS-PIX2#