techracer74
MIS
Hello, I have a Pix to Pix IPsec tunnel up and would like to add another but am having problem. I have what looks like the correct config on each side according to cisco but it still isn't working correctly. Tried searching through the forums but didn't quite see anything that would help me out.
BTW, tried reloading also to no avail.
Scenario:
ROUTER----PIX1------INTERNET---------PIX2
3.0/24 | 192.168.6.0/24
5.0/24 |
|
|
PIX3
192.168.1.0/24
Pix2 and pix3 terminate their ipsec tunnels back to pix1 and pix1 has 2 networks behind it off the router 192.168.3.0 and 192.168.5.0
Pix2 has 192.168.6.0 behind it and Pix3 has 192.168.1.0 behind it.
Pix1 and Pix2 sessions are fine, it's Pix3 that has me getting grey hairs.
PIX1 config:
ip address outside x.251.175.234 255.255.255.252
ip address inside 192.168.254.1 255.255.255.252
global (outside) 1 x.150.173.238-x.150.173.254 netmask 255.255.255.224
nat (inside) 0 access-list vpn
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto ipsec transform-set set esp-3des esp-md5-hmac
crypto map vpn 10 ipsec-isakmp
crypto map vpn 10 match address vpn2
crypto map vpn 10 set peer x.231.36.137
crypto map vpn 10 set transform-set myset
crypto map vpn 20 ipsec-isakmp
crypto map vpn 20 match address vpn3
crypto map vpn 20 set peer x.231.38.11
crypto map vpn 20 set transform-set set
crypto map vpn interface outside
isakmp enable outside
isakmp key ******** address x.231.36.137 netmask 255.255.255.255 no-xauth no-config-mode
isakmp key ******** address x.231.38.11 netmask 255.255.255.255 no-xauth no-config-mode
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 2
isakmp policy 1 lifetime 86400
access-list vpn2 permit ip 192.168.5.0 255.255.255.0 192.168.6.0 255.255.255.0
access-list vpn2 permit ip host x.251.175.234 host x.231.36.137
access-list vpn2 permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0
access-list vpn2 permit ip 192.168.3.0 255.255.255.0 192.168.6.0 255.255.255.0
access-list vpn2 permit ip 192.168.5.0 255.255.255.0 host x.231.36.137
access-list vpn2 permit ip 192.168.254.0 255.255.255.252 192.168.6.0 255.255.255.0
access-list vpn2 permit ip 192.168.253.0 255.255.255.252 192.168.6.0 255.255.255.0
access-list vpn2 permit ip host x.251.175.234 192.168.6.0 255.255.255.0
access-list vpn2 permit ip host 192.168.254.2 192.168.6.0 255.255.255.0
access-list vpn2 permit ip host 192.168.253.1 192.168.6.0 255.255.255.0
access-list vpn2 permit ip 192.168.0.0 255.255.0.0 192.168.6.0 255.255.255.0
access-list vpn2 permit ip 192.168.0.0 255.255.0.0 host x.231.36.137
access-list vpn3 permit ip host x.251.175.234 host x.231.38.11
access-list vpn3 permit ip 192.168.3.0 255.255.255.0 host x.231.38.11
access-list vpn3 permit ip 192.168.5.0 255.255.255.0 host x.231.38.11
access-list vpn3 permit ip 192.168.254.0 255.255.255.252 host x.231.38.11
access-list vpn3 permit ip 192.168.253.0 255.255.255.252 host x.231.38.11
access-list vpn3 permit ip host x.251.175.234 192.168.1.0 255.255.255.0
access-list vpn3 permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list vpn3 permit ip 192.168.5.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list vpn3 permit ip 192.168.254.0 255.255.255.252 192.168.1.0 255.255.255.0
access-list vpn3 permit ip 192.168.253.0 255.255.255.252 192.168.1.0 255.255.255.0
-----------------------------------------------
Pix3 config:
ip address outside x.231.38.11 255.255.255.0
ip address inside 192.168.1.254 255.255.255.0
global (outside) 1 interface
nat (inside) 0 access-list vpn
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto ipsec transform-set set esp-3des esp-md5-hmac
crypto map vpn 10 ipsec-isakmp
crypto map vpn 10 match address vpn2
crypto map vpn 10 set peer x.251.175.234
crypto map vpn 10 set transform-set set
isakmp enable outside
isakmp key ******** address x.251.175.234 netmask 255.255.255.255 no-xauth no-config-mode
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 2
isakmp policy 1 lifetime 86400
access-list vpn permit ip host x.231.38.11 host x.251.175.234
access-list vpn permit ip host x.231.38.11 192.168.3.0 255.255.255.0
access-list vpn permit ip host x.231.38.11 192.168.5.0 255.255.255.0
access-list vpn permit ip host x.231.38.11 192.168.254.0 255.255.255.252
access-list vpn permit ip host x.231.38.11 192.168.253.0 255.255.255.252
access-list vpn permit ip 192.168.1.0 255.255.255.0 host x.251.175.234
access-list vpn permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
access-list vpn permit ip 192.168.1.0 255.255.255.0 192.168.5.0 255.255.255.0
access-list vpn permit ip 192.168.1.0 255.255.255.0 192.168.254.0 255.255.255.252
access-list vpn permit ip 192.168.1.0 255.255.255.0 192.168.253.0 255.255.255.252
access-list vpn2 permit ip host x.231.38.11 host x.251.175.234
access-list vpn2 permit ip host x.231.38.11 192.168.3.0 255.255.255.0
access-list vpn2 permit ip host x.231.38.11 192.168.5.0 255.255.255.0
access-list vpn2 permit ip host x.231.38.11 192.168.254.0 255.255.255.252
access-list vpn2 permit ip host x.231.38.11 192.168.253.0 255.255.255.252
access-list vpn2 permit ip 192.168.1.0 255.255.255.0 host x.251.175.234
access-list vpn2 permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
access-list vpn2 permit ip 192.168.1.0 255.255.255.0 192.168.5.0 255.255.255.0
access-list vpn2 permit ip 192.168.1.0 255.255.255.0 192.168.254.0 255.255.255.252
access-list vpn2 permit ip 192.168.1.0 255.255.255.0 192.168.253.0 255.255.255.252
Please Help.
thanks in advance,
Bryan
BTW, tried reloading also to no avail.
Scenario:
ROUTER----PIX1------INTERNET---------PIX2
3.0/24 | 192.168.6.0/24
5.0/24 |
|
|
PIX3
192.168.1.0/24
Pix2 and pix3 terminate their ipsec tunnels back to pix1 and pix1 has 2 networks behind it off the router 192.168.3.0 and 192.168.5.0
Pix2 has 192.168.6.0 behind it and Pix3 has 192.168.1.0 behind it.
Pix1 and Pix2 sessions are fine, it's Pix3 that has me getting grey hairs.
PIX1 config:
ip address outside x.251.175.234 255.255.255.252
ip address inside 192.168.254.1 255.255.255.252
global (outside) 1 x.150.173.238-x.150.173.254 netmask 255.255.255.224
nat (inside) 0 access-list vpn
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto ipsec transform-set set esp-3des esp-md5-hmac
crypto map vpn 10 ipsec-isakmp
crypto map vpn 10 match address vpn2
crypto map vpn 10 set peer x.231.36.137
crypto map vpn 10 set transform-set myset
crypto map vpn 20 ipsec-isakmp
crypto map vpn 20 match address vpn3
crypto map vpn 20 set peer x.231.38.11
crypto map vpn 20 set transform-set set
crypto map vpn interface outside
isakmp enable outside
isakmp key ******** address x.231.36.137 netmask 255.255.255.255 no-xauth no-config-mode
isakmp key ******** address x.231.38.11 netmask 255.255.255.255 no-xauth no-config-mode
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 2
isakmp policy 1 lifetime 86400
access-list vpn2 permit ip 192.168.5.0 255.255.255.0 192.168.6.0 255.255.255.0
access-list vpn2 permit ip host x.251.175.234 host x.231.36.137
access-list vpn2 permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0
access-list vpn2 permit ip 192.168.3.0 255.255.255.0 192.168.6.0 255.255.255.0
access-list vpn2 permit ip 192.168.5.0 255.255.255.0 host x.231.36.137
access-list vpn2 permit ip 192.168.254.0 255.255.255.252 192.168.6.0 255.255.255.0
access-list vpn2 permit ip 192.168.253.0 255.255.255.252 192.168.6.0 255.255.255.0
access-list vpn2 permit ip host x.251.175.234 192.168.6.0 255.255.255.0
access-list vpn2 permit ip host 192.168.254.2 192.168.6.0 255.255.255.0
access-list vpn2 permit ip host 192.168.253.1 192.168.6.0 255.255.255.0
access-list vpn2 permit ip 192.168.0.0 255.255.0.0 192.168.6.0 255.255.255.0
access-list vpn2 permit ip 192.168.0.0 255.255.0.0 host x.231.36.137
access-list vpn3 permit ip host x.251.175.234 host x.231.38.11
access-list vpn3 permit ip 192.168.3.0 255.255.255.0 host x.231.38.11
access-list vpn3 permit ip 192.168.5.0 255.255.255.0 host x.231.38.11
access-list vpn3 permit ip 192.168.254.0 255.255.255.252 host x.231.38.11
access-list vpn3 permit ip 192.168.253.0 255.255.255.252 host x.231.38.11
access-list vpn3 permit ip host x.251.175.234 192.168.1.0 255.255.255.0
access-list vpn3 permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list vpn3 permit ip 192.168.5.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list vpn3 permit ip 192.168.254.0 255.255.255.252 192.168.1.0 255.255.255.0
access-list vpn3 permit ip 192.168.253.0 255.255.255.252 192.168.1.0 255.255.255.0
-----------------------------------------------
Pix3 config:
ip address outside x.231.38.11 255.255.255.0
ip address inside 192.168.1.254 255.255.255.0
global (outside) 1 interface
nat (inside) 0 access-list vpn
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto ipsec transform-set set esp-3des esp-md5-hmac
crypto map vpn 10 ipsec-isakmp
crypto map vpn 10 match address vpn2
crypto map vpn 10 set peer x.251.175.234
crypto map vpn 10 set transform-set set
isakmp enable outside
isakmp key ******** address x.251.175.234 netmask 255.255.255.255 no-xauth no-config-mode
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 2
isakmp policy 1 lifetime 86400
access-list vpn permit ip host x.231.38.11 host x.251.175.234
access-list vpn permit ip host x.231.38.11 192.168.3.0 255.255.255.0
access-list vpn permit ip host x.231.38.11 192.168.5.0 255.255.255.0
access-list vpn permit ip host x.231.38.11 192.168.254.0 255.255.255.252
access-list vpn permit ip host x.231.38.11 192.168.253.0 255.255.255.252
access-list vpn permit ip 192.168.1.0 255.255.255.0 host x.251.175.234
access-list vpn permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
access-list vpn permit ip 192.168.1.0 255.255.255.0 192.168.5.0 255.255.255.0
access-list vpn permit ip 192.168.1.0 255.255.255.0 192.168.254.0 255.255.255.252
access-list vpn permit ip 192.168.1.0 255.255.255.0 192.168.253.0 255.255.255.252
access-list vpn2 permit ip host x.231.38.11 host x.251.175.234
access-list vpn2 permit ip host x.231.38.11 192.168.3.0 255.255.255.0
access-list vpn2 permit ip host x.231.38.11 192.168.5.0 255.255.255.0
access-list vpn2 permit ip host x.231.38.11 192.168.254.0 255.255.255.252
access-list vpn2 permit ip host x.231.38.11 192.168.253.0 255.255.255.252
access-list vpn2 permit ip 192.168.1.0 255.255.255.0 host x.251.175.234
access-list vpn2 permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
access-list vpn2 permit ip 192.168.1.0 255.255.255.0 192.168.5.0 255.255.255.0
access-list vpn2 permit ip 192.168.1.0 255.255.255.0 192.168.254.0 255.255.255.252
access-list vpn2 permit ip 192.168.1.0 255.255.255.0 192.168.253.0 255.255.255.252
Please Help.
thanks in advance,
Bryan