Hi there,
I have two PIX firewalls now working quite happily with a VPN between them. I have a PIX 515E which is the hub and in future plan more 501's as spokes off of it.
In the meantime, what I want to do is incorporate a number of laptops with the Cisco VPN client so they can access from home etc... Can anyone offer me some advice on this please?
Internal networks for VPN segments are 192.168.1.x and 192.168.10.x
I have tried getting the Cisco VPN client to work but I suspect my configurations of the 515 are wrong.
Thanks in advance,
Peter
My configuration for the 515E is below:
PIX Version 6.1(3)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password snipped encrypted
passwd snipped encrypted
hostname xxxxx
domain-name xxxxxxxxx.co.uk
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
no names
name 192.168.1.11 xxx02
name 192.168.1.13 xxx03
name 192.168.1.10 xxx01
access-list external permit tcp any host 62.xx.xx.xx4 eq smtp
access-list external permit tcp any host 62.xx.xx.xx5 eq xxxxx
access-list external permit udp any host 62.xx.xx.xx5 eq xxxxx
access-list external permit udp any host 62.xx.xx.xx4 eq xxxxx
access-list external permit tcp any host 62.xx.xx.xx4 eq xxxxx
access-list external permit tcp any host 62.xx.xx.xx6 eq xxxxx
access-list external permit udp any host 62.xx.xx.xx6 eq xxxxx
access-list external permit tcp any host 62.xx.xx.xx6 eq xxxx
access-list external permit ip 192.168.1.0 255.255.255.0 192.168.10.0 255.255.255.0
pager lines 24
logging console notifications
interface ethernet0 auto
interface ethernet1 auto
mtu outside 1500
mtu inside 1500
ip address outside 62.xx.xx.xx2 255.255.255.xxx
ip address inside 192.168.1.211 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
no failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
pdm location 192.168.1.11 255.255.255.255 inside
pdm location 192.168.1.210 255.255.255.255 inside
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list external
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 62.xx.xx.xx4 192.168.1.11 netmask 255.255.255.255 0 0
static (inside,outside) 62.xx.xx.xx5 192.168.1.10 netmask 255.255.255.255 0 0
static (inside,outside) 62.xx.xx.xx6 192.168.1.13 netmask 255.255.255.255 0 0
access-group external in interface outside
route outside 0.0.0.0 0.0.0.0 62.xx.xx.xx3 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.1.210 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set 111111 esp-3des esp-md5-hmac
crypto map 2222222 1 ipsec-isakmp
crypto map 2222222 1 match address external
crypto map 2222222 1 set peer 62.yy.yyy.yy6
crypto map 2222222 1 set transform-set 111111
crypto map 2222222 interface outside
isakmp enable outside
isakmp key ******** address 62.yy.yyy.yy6 netmask 255.255.255.255
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000
telnet timeout 5
ssh timeout 5
terminal width 80
Cryptochecksum:snipped
I have two PIX firewalls now working quite happily with a VPN between them. I have a PIX 515E which is the hub and in future plan more 501's as spokes off of it.
In the meantime, what I want to do is incorporate a number of laptops with the Cisco VPN client so they can access from home etc... Can anyone offer me some advice on this please?
Internal networks for VPN segments are 192.168.1.x and 192.168.10.x
I have tried getting the Cisco VPN client to work but I suspect my configurations of the 515 are wrong.
Thanks in advance,
Peter
My configuration for the 515E is below:
PIX Version 6.1(3)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password snipped encrypted
passwd snipped encrypted
hostname xxxxx
domain-name xxxxxxxxx.co.uk
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
no names
name 192.168.1.11 xxx02
name 192.168.1.13 xxx03
name 192.168.1.10 xxx01
access-list external permit tcp any host 62.xx.xx.xx4 eq smtp
access-list external permit tcp any host 62.xx.xx.xx5 eq xxxxx
access-list external permit udp any host 62.xx.xx.xx5 eq xxxxx
access-list external permit udp any host 62.xx.xx.xx4 eq xxxxx
access-list external permit tcp any host 62.xx.xx.xx4 eq xxxxx
access-list external permit tcp any host 62.xx.xx.xx6 eq xxxxx
access-list external permit udp any host 62.xx.xx.xx6 eq xxxxx
access-list external permit tcp any host 62.xx.xx.xx6 eq xxxx
access-list external permit ip 192.168.1.0 255.255.255.0 192.168.10.0 255.255.255.0
pager lines 24
logging console notifications
interface ethernet0 auto
interface ethernet1 auto
mtu outside 1500
mtu inside 1500
ip address outside 62.xx.xx.xx2 255.255.255.xxx
ip address inside 192.168.1.211 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
no failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
pdm location 192.168.1.11 255.255.255.255 inside
pdm location 192.168.1.210 255.255.255.255 inside
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list external
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 62.xx.xx.xx4 192.168.1.11 netmask 255.255.255.255 0 0
static (inside,outside) 62.xx.xx.xx5 192.168.1.10 netmask 255.255.255.255 0 0
static (inside,outside) 62.xx.xx.xx6 192.168.1.13 netmask 255.255.255.255 0 0
access-group external in interface outside
route outside 0.0.0.0 0.0.0.0 62.xx.xx.xx3 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.1.210 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set 111111 esp-3des esp-md5-hmac
crypto map 2222222 1 ipsec-isakmp
crypto map 2222222 1 match address external
crypto map 2222222 1 set peer 62.yy.yyy.yy6
crypto map 2222222 1 set transform-set 111111
crypto map 2222222 interface outside
isakmp enable outside
isakmp key ******** address 62.yy.yyy.yy6 netmask 255.255.255.255
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000
telnet timeout 5
ssh timeout 5
terminal width 80
Cryptochecksum:snipped