I have a PIX at corporate office and a PIX in remote office location. I have a VPN Connection between corporate office and remote office and Remote VPN access into corporate but not remote office.
I want to create a Remote VPN connection to remote location so users from home can remote VPN into the remote office.
Here is my current config...
PIX passwd:
Welcome to the PIX firewall
Type help or '?' for a list of available commands.
pgi-pix> en
Password: ***************
pgi-pix# show config
: Saved
:
PIX Version 6.1(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxxxxx encrypted
passwd xxxxxxxx encrypted
hostname pgi-pix
domain-name plangraphics.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.111.0 255.255.255.0
access-list outside_access_in permit tcp any host 65.5.133.198
access-list outside_access_in permit tcp any host 65.5.133.199
access-list outside_access_in permit tcp any host 65.5.133.200
access-list outside_access_in permit tcp any host 65.5.133.201
access-list outside_access_in permit tcp any host 65.5.133.196
access-list outside_access_in permit tcp any host 65.5.133.203
access-list outside_access_in permit tcp any host 65.5.133.202
access-list outside_access_in permit tcp any host 65.5.133.206
access-list outside_access_in permit icmp any any
access-list outside_access_in permit tcp any host 65.5.133.204
access-list outside_access_in permit udp any any eq 1023
access-list outside_access_in permit udp any any eq 6277
access-list outside_access_in permit udp any any eq 62515
access-list outside_access_in permit udp any host 68.208.204.98
access-list outside_access_in permit tcp any host 65.5.133.207
access-list 100 permit ip 192.168.1.0 255.255.255.0 10.4.2.0 255.255.255.0
access-list 100 permit ip 192.168.1.0 255.255.255.0 192.168.111.0 255.255.255.0
access-list 110 permit ip 192.168.1.0 255.255.255.0 10.4.2.0 255.255.255.0
access-list 102 permit ip 192.168.1.0 255.255.255.0 host 149.19.2.58
access-list 121 permit udp 192.168.1.0 255.255.255.0 149.19.2.0 255.255.255.0
access-list 121 permit udp 192.168.1.0 255.255.255.0 host 64.109.191.130
access-list 121 permit udp 192.168.1.0 255.255.255.0 host 68.208.204.98
access-list outside-access_in permit tcp any host 65.5.133.205
pager lines 24
logging on
logging trap warnings
logging history debugging
logging facility 23
logging host inside 192.168.1.8
interface ethernet0 auto
interface ethernet1 auto
mtu outside 1500
mtu inside 1500
ip address outside 65.5.133.195 255.255.255.224
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool pgpool 192.168.111.1-192.168.111.254
pdm location 192.168.1.8 255.255.255.255 inside
pdm location 192.168.1.76 255.255.255.255 inside
pdm location 192.168.1.12 255.255.255.255 inside
pdm location 66.7.29.0 255.255.255.248 outside
pdm location 192.168.1.50 255.255.255.255 inside
pdm location 192.168.1.253 255.255.255.255 inside
pdm location 192.168.1.15 255.255.255.255 inside
pdm location 65.5.133.194 255.255.255.255 outside
pdm location 65.5.133.202 255.255.255.255 inside
pdm location 65.5.133.202 255.255.255.255 outside
pdm history enable
arp timeout 14400
global (outside) 1 65.5.133.222 netmask 255.255.255.255
nat (inside) 0 access-list 100
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp 65.5.133.200 81 192.168.1.250 81 netmask 255.255.255.255 0 0
static (inside,outside) tcp 65.5.133.200 255.255.255.255 0 0
static (inside,outside) tcp 65.5.133.200 443 192.168.1.250 443 netmask 255.255.255.255 0 0
static (inside,outside) tcp 65.5.133.200 7432 192.168.1.250 7432 netmask 255.255.255.255 0 0
static (inside,outside) tcp 65.5.133.200 2401 192.168.1.250 2401 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.198 192.168.1.15 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.201 192.168.1.253 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.196 192.168.1.12 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.203 192.168.1.13 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.206 192.168.1.11 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.204 192.168.1.16 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.202 192.168.1.50 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.199 192.168.1.6 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.207 192.168.1.17 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 65.5.133.193 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.1.8 255.255.255.255 inside
http 192.168.1.76 255.255.255.255 inside
snmp-server host inside 192.168.1.15 poll
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
sysopt ipsec pl-compatible
no sysopt route dnat
crypto ipsec transform-set plangraphics esp-des esp-md5-hmac
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto dynamic-map pg 4 set transform-set plangraphics
crypto dynamic-map dynmap 30 set transform-set myset
crypto map dyn-map 20 ipsec-isakmp dynamic pg
crypto map dyn-map client configuration address initiate
crypto map dyn-map client configuration address respond
crypto map newmap 10 ipsec-isakmp
crypto map newmap 10 match address 110
crypto map newmap 10 set peer 66.7.29.162
crypto map newmap 10 set transform-set myset
crypto map newmap 20 ipsec-isakmp dynamic dynmap
crypto map newmap interface outside
isakmp enable outside
isakmp key xxxxx address 0.0.0.0 netmask 0.0.0.0
isakmp key xxxxx address 66.7.29.162 netmask 255.255.255.255 no-xauth no-config-mode
isakmp identity address
isakmp client configuration address-pool local pgpool outside
isakmp policy 8 authentication pre-share
isakmp policy 8 encryption des
isakmp policy 8 hash md5
isakmp policy 8 group 2
isakmp policy 8 lifetime 86400
vpngroup pgvpn address-pool pgpool
vpngroup pgvpn dns-server 192.168.1.8
vpngroup pgvpn default-domain plangraphics.com
vpngroup pgvpn split-tunnel 101
vpngroup pgvpn idle-time 1800
vpngroup pgvpn password ********
telnet 12.44.208.145 255.255.255.255 outside
telnet 66.7.29.0 255.255.255.248 outside
telnet 65.5.133.194 255.255.255.255 outside
telnet 218.214.120.176 255.255.255.255 outside
telnet 10.4.2.5 255.255.255.255 outside
telnet 192.168.1.76 255.255.255.255 inside
telnet 66.5.133.194 255.255.255.255 inside
telnet 65.5.133.194 255.255.255.255 inside
telnet 10.4.2.5 255.255.255.255 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 5
terminal width 80
Cryptochecksum:bf1bf961eefa564c5e055381fa3852f4
pgi-pix#
Any help would be appreciation
I want to create a Remote VPN connection to remote location so users from home can remote VPN into the remote office.
Here is my current config...
PIX passwd:
Welcome to the PIX firewall
Type help or '?' for a list of available commands.
pgi-pix> en
Password: ***************
pgi-pix# show config
: Saved
:
PIX Version 6.1(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxxxxx encrypted
passwd xxxxxxxx encrypted
hostname pgi-pix
domain-name plangraphics.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.111.0 255.255.255.0
access-list outside_access_in permit tcp any host 65.5.133.198
access-list outside_access_in permit tcp any host 65.5.133.199
access-list outside_access_in permit tcp any host 65.5.133.200
access-list outside_access_in permit tcp any host 65.5.133.201
access-list outside_access_in permit tcp any host 65.5.133.196
access-list outside_access_in permit tcp any host 65.5.133.203
access-list outside_access_in permit tcp any host 65.5.133.202
access-list outside_access_in permit tcp any host 65.5.133.206
access-list outside_access_in permit icmp any any
access-list outside_access_in permit tcp any host 65.5.133.204
access-list outside_access_in permit udp any any eq 1023
access-list outside_access_in permit udp any any eq 6277
access-list outside_access_in permit udp any any eq 62515
access-list outside_access_in permit udp any host 68.208.204.98
access-list outside_access_in permit tcp any host 65.5.133.207
access-list 100 permit ip 192.168.1.0 255.255.255.0 10.4.2.0 255.255.255.0
access-list 100 permit ip 192.168.1.0 255.255.255.0 192.168.111.0 255.255.255.0
access-list 110 permit ip 192.168.1.0 255.255.255.0 10.4.2.0 255.255.255.0
access-list 102 permit ip 192.168.1.0 255.255.255.0 host 149.19.2.58
access-list 121 permit udp 192.168.1.0 255.255.255.0 149.19.2.0 255.255.255.0
access-list 121 permit udp 192.168.1.0 255.255.255.0 host 64.109.191.130
access-list 121 permit udp 192.168.1.0 255.255.255.0 host 68.208.204.98
access-list outside-access_in permit tcp any host 65.5.133.205
pager lines 24
logging on
logging trap warnings
logging history debugging
logging facility 23
logging host inside 192.168.1.8
interface ethernet0 auto
interface ethernet1 auto
mtu outside 1500
mtu inside 1500
ip address outside 65.5.133.195 255.255.255.224
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool pgpool 192.168.111.1-192.168.111.254
pdm location 192.168.1.8 255.255.255.255 inside
pdm location 192.168.1.76 255.255.255.255 inside
pdm location 192.168.1.12 255.255.255.255 inside
pdm location 66.7.29.0 255.255.255.248 outside
pdm location 192.168.1.50 255.255.255.255 inside
pdm location 192.168.1.253 255.255.255.255 inside
pdm location 192.168.1.15 255.255.255.255 inside
pdm location 65.5.133.194 255.255.255.255 outside
pdm location 65.5.133.202 255.255.255.255 inside
pdm location 65.5.133.202 255.255.255.255 outside
pdm history enable
arp timeout 14400
global (outside) 1 65.5.133.222 netmask 255.255.255.255
nat (inside) 0 access-list 100
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp 65.5.133.200 81 192.168.1.250 81 netmask 255.255.255.255 0 0
static (inside,outside) tcp 65.5.133.200 255.255.255.255 0 0
static (inside,outside) tcp 65.5.133.200 443 192.168.1.250 443 netmask 255.255.255.255 0 0
static (inside,outside) tcp 65.5.133.200 7432 192.168.1.250 7432 netmask 255.255.255.255 0 0
static (inside,outside) tcp 65.5.133.200 2401 192.168.1.250 2401 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.198 192.168.1.15 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.201 192.168.1.253 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.196 192.168.1.12 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.203 192.168.1.13 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.206 192.168.1.11 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.204 192.168.1.16 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.202 192.168.1.50 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.199 192.168.1.6 netmask 255.255.255.255 0 0
static (inside,outside) 65.5.133.207 192.168.1.17 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 65.5.133.193 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.1.8 255.255.255.255 inside
http 192.168.1.76 255.255.255.255 inside
snmp-server host inside 192.168.1.15 poll
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
sysopt ipsec pl-compatible
no sysopt route dnat
crypto ipsec transform-set plangraphics esp-des esp-md5-hmac
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto dynamic-map pg 4 set transform-set plangraphics
crypto dynamic-map dynmap 30 set transform-set myset
crypto map dyn-map 20 ipsec-isakmp dynamic pg
crypto map dyn-map client configuration address initiate
crypto map dyn-map client configuration address respond
crypto map newmap 10 ipsec-isakmp
crypto map newmap 10 match address 110
crypto map newmap 10 set peer 66.7.29.162
crypto map newmap 10 set transform-set myset
crypto map newmap 20 ipsec-isakmp dynamic dynmap
crypto map newmap interface outside
isakmp enable outside
isakmp key xxxxx address 0.0.0.0 netmask 0.0.0.0
isakmp key xxxxx address 66.7.29.162 netmask 255.255.255.255 no-xauth no-config-mode
isakmp identity address
isakmp client configuration address-pool local pgpool outside
isakmp policy 8 authentication pre-share
isakmp policy 8 encryption des
isakmp policy 8 hash md5
isakmp policy 8 group 2
isakmp policy 8 lifetime 86400
vpngroup pgvpn address-pool pgpool
vpngroup pgvpn dns-server 192.168.1.8
vpngroup pgvpn default-domain plangraphics.com
vpngroup pgvpn split-tunnel 101
vpngroup pgvpn idle-time 1800
vpngroup pgvpn password ********
telnet 12.44.208.145 255.255.255.255 outside
telnet 66.7.29.0 255.255.255.248 outside
telnet 65.5.133.194 255.255.255.255 outside
telnet 218.214.120.176 255.255.255.255 outside
telnet 10.4.2.5 255.255.255.255 outside
telnet 192.168.1.76 255.255.255.255 inside
telnet 66.5.133.194 255.255.255.255 inside
telnet 65.5.133.194 255.255.255.255 inside
telnet 10.4.2.5 255.255.255.255 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 5
terminal width 80
Cryptochecksum:bf1bf961eefa564c5e055381fa3852f4
pgi-pix#
Any help would be appreciation