My internal network IP is 192.168.25.0 255.255.255.0
I set my PPTP local IP pool to 192.168.25.101 - 192.168.25.115.
Is this fine assigning the PPTP pool with the same subnet of my internal network. Maybe this is the problem with the routing why I cannot ping the Internal network in the PPTP connection.
Here is the only access-list that I define from PIX
access-list japvpn permit ip 192.168.0.0 255.255.0.0 130.2.0.0 255.255.0.0
The Nat I define is
nat (inside) 0 access-list japvpn
Conduit permit icmp any any
ip local pool pptp-pool 192.168.20.150-192.168.20.159
Everything seems to be fine, including login, internal network can view the PPTP client.
However PPTP client cannot ping the Internal network, beign block by PIX. Is there away to allow PPTP client to ping and access the resource of internal network.
The only other thing I can remember doing is adding an access-list to nat 0.
access-list pptp-list permit ip any host 192.168.20.150
access-list pptp-list permit ip any host 192.168.20.151
access-list pptp-list permit ip any host 192.168.20.152
access-list pptp-list permit ip any host 192.168.20.153
access-list pptp-list permit ip any host 192.168.20.154
access-list pptp-list permit ip any host 192.168.20.155
access-list pptp-list permit ip any host 192.168.20.156
access-list pptp-list permit ip any host 192.168.20.157
access-list pptp-list permit ip any host 192.168.20.158
access-list pptp-list permit ip any host 192.168.20.159
nat (inside) 0 access-list pptp-list
That should prevent packets from internal hosts from being nated when they go to the VPN users.
What version of the PIX software are you running?
Bluecrack
Let's backup a step. Is the problem: the vpn connection is not established? Or is the problem: once the vpn connectionis established, the vpn user cannot hit any server inside your network?
I believe the problem is the later. If so, then you will need routes on the PIX to any subnet behind a router internally. More importantly though you need to be able to get those packets past the firewall.
You said you added the access-list and the nat 0 statement. What do the logs say now when a user connects and trys to hit a server inside the network?
After Adding the acces-list, it still give me the same error. PIX is not permitting 106010: Deny inbound icmp src outside.
Below is the config of my PIX firewall, I manage to connect VPN though PIX to PIX. But for PPTP I still cannot make it work.
Although PPTP client (Windows client) can login to PIX however PPTP client cannot still hit any internal server or client. BElow is my config.. maybe I still miss something in the access-list.
names
access-list testvpn permit ip 192.168.0.0 255.255.255.0 130.2.0.0 255.255.0.0
access-list testvpn permit ip any host 192.168.30.100
access-list testvpn permit ip any host 192.168.30.101
access-list testvpn permit ip any host 192.168.30.103
no logging on
interface ethernet0 10baset
interface ethernet1 10baset
mtu outside 1500
mtu inside 1500
ip address outside x.x.x.x x.x.x.x
ip address inside 192.168.25.56 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool pptp-pool 192.168.30.100-192.168.30.110
arp timeout 14400
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
sysopt connection permit-pptp
no sysopt route dnat
1. What do you have two NAT 1 statements that let the same traffic out? I would assume you could remove the first one and leave 'nat (inside) 1 192.168.0.0 255.255.0.0'.
2. Is this statement correct? 'route inside 192.167.30.0 255.255.255.0 192.168.25.1 1' Based on all your other routes I would assume you are using 192.168.x.x internally.
Next, I think the access-list testvpn may need to be changed. Try creating a new list like the following:
access-list pptpvpn permit ip 192.168.25.0 255.255.255.0 host 192.168.30.100
access-list pptpvpn permit ip 192.168.25.0 255.255.255.0 host 192.168.30.101
etc.
Then bind this access list to the NAT 0 statement. This way you can save your other access-list while you test. This access-list should permit vpn clients to hit hosts on the 192.168.25.x/24 subnet. You will need to add entries in the ACL to allow access to/from hosts on other subnets.
Finally, If you are using 192.168.30.x inside somewhere then you should change the VPN clients to use something else, perhaps 192.168.31.x/24
I hope this helps. I will check my pix 5.3(1) config when I get to work and compare it with yours.
Sorry for the delay. I've had some problems at work I had to deal with. When I ran the pptp protocol I had the following setup. (note: I modified the addressing to use the 192.168.30.x network as you have)
ip local pool pptp-pool 192.168.30.100-192.168.30.109
access-list pptpvpn permit ip any hos 192.168.30.100
access-list pptpvpn permit ip any hos 192.168.30.101
access-list pptpvpn permit ip any hos 192.168.30.102
access-list pptpvpn permit ip any hos 192.168.30.103
access-list pptpvpn permit ip any hos 192.168.30.104
access-list pptpvpn permit ip any hos 192.168.30.105
access-list pptpvpn permit ip any hos 192.168.30.106
access-list pptpvpn permit ip any hos 192.168.30.107
access-list pptpvpn permit ip any hos 192.168.30.108
access-list pptpvpn permit ip any hos 192.168.30.109
nat 0 (inside) access-list pptpvpn
aaa-server myradius protocol radius
aaa-server myradius (inside) host x.x.x.x pwd timeout 5
aaa-server myradius (inside) host y.y.y.y pwd timeout 5
vpdn group 1 accept dialin pptp
vpdn group 1 ppp authentication mschap
vpdn group 1 ppp encryption mppe 40 required
vpdn group 1 client configuration address local pptp-pool
vpdn group 1 client configuration dns x.x.x.x y.y.y.y
vpdn group 1 client authentication aaa myradius
vpdn enable outside
sysopt connection permit-pptp
I am not aware of any way to bind two access-lists to NAT 0. However you can put the statements from both access-lists together in one access-list and bind it that to NAT 0.
How are you lately, first of all you are very helpfull indeed in solving my problem in PIX. I think this will be my last question on this problem to solve it.
HOw can I combind these two access-list in one access-list and bind it to NAT 0
access-list pptpvpn permit ip 192.168.25.0 255.255.255.0 130.2.0.0 255.255.0.0
access-list pptpvpn permit ip 192.168.25.0 255.255.255.0 192.168.30.0 255.255.255.0
You should be able to take the statments from both access-lists and put them both in one access-list. Then use that access-list to the NAT 0 statement. It looks like you've got.
That should do the trick. I don't know of any problems with this. NAT 0 with the access-list command should just not NAT the traffic specified the the access-lists.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.