Hi everybody !
I've browsed the forum a lot without finding anyone having the same issue as i do... so here is my post ...
The configuration is as follow:
- 2 sites connected by VPN (working correctly)
- on each site, PIX-501 - v6.3(3)
I'm trying, beside the site-to-site VPN, to setup remote access with Cisco VPN Client 4.6.
I configured one of the PIX with vpngroup to make my tests, I will later change the auth method to something else (either local or radius).
Here is the point :
At home, with my laptop, I "dial" the VPN connection through Cisco VPN Client. Everything wents OK, and the VPN seems to be established. The laptop is wired on local LAN and goes through an IPTABLES firewall. It uses UDP and UDP-500 port is
forwared correctly to my laptop.
Once the VPN is established, I try to ping a Linux box which is connected on the DMZ, so directly after the PIX, without success.
The network debug I made gave :
- the ICMP requests reach the Linux box and it answers to them (used tcpdump and saw incoming and outgoing packets)
- the laptop never gets the replies.
- watching the logs on my Iptables, I see nothing dropped
- I've tested other kind of access (POP, SMTP, HTTP,...) and had each time the same symptoms.
My first idea is that there's a routing or ACL issue on my PIX that blocks the returning packets.
Network "diagram" :
Remote Office with 10.3.3.0/24 & 192.168.2.0/24
PIX-501
/
/
/
/
-----------
| Internet |------------ Home IpTables FW ------ Laptop
-----------
\
\
PIX-501
|
|
10.12.1.0/24 DMZ
|
|
Internal IPTABLES FW
|
|
192.168.70.0/24 Internal LAN
Here my PIX configuration :
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
[...]
names
name 195.XXX.XXX.11 ldeml01-I
name 10.12.1.4 ldeml01-D
name 195.XXX.XXX.30 Kiwi-I
name 10.12.1.30 Kiwi-D
name 10.12.1.16 ST16-D
name 10.12.1.3 lddmz01-D
name 10.12.2.0 ld_ras_lan
name 82.XXX.XXX.225 else_home
name 82.XXX.XXX.176 somewhere_home
name 195.XXX.XXX.10 LDAPP01-I
access-list 101 permit ip 192.168.70.0 255.255.255.0 192.168.2.0 255.255.255.0
access-list 101 permit ip 10.12.1.0 255.255.255.0 192.168.2.0 255.255.255.0
access-list 101 permit ip 192.168.70.0 255.255.255.0 10.3.3.0 255.255.255.0
access-list 101 permit ip 10.12.1.0 255.255.255.0 10.3.3.0 255.255.255.0
access-list 101 permit ip ld_ras_lan 255.255.255.0 192.168.70.0 255.255.255.0
access-list 101 permit ip ld_ras_lan 255.255.255.0 10.12.1.0 255.255.255.0
access-list 101 permit ip 192.168.70.0 255.255.255.0 ld_ras_lan 255.255.255.0
access-list 101 permit ip 10.12.1.0 255.255.255.0 ld_ras_lan 255.255.255.0
access-list 200 permit tcp any host ldeml01-I eq https
access-list 200 permit tcp any host ldeml01-I eq imap4
access-list 200 permit tcp any host ldeml01-I eq smtp
access-list 200 permit tcp any host 195.XXX.XXX.1 eq domain
access-list 200 permit udp any host 195.XXX.XXX.1 eq domain
access-list 200 permit tcp any host 195.XXX.XXX.111 eq www
access-list 200 permit tcp any host 195.XXX.XXX.111 eq https
access-list 200 permit tcp any host 195.XXX.XXX.108 eq www
access-list 200 permit tcp any host Kiwi-I eq www
access-list 200 permit tcp any host Kiwi-I eq https
access-list 200 permit tcp any host 195.XXX.XXX.31 eq www
access-list 200 permit tcp any host 195.XXX.XXX.31 eq https
access-list 200 permit tcp host 62.XXX.XXX.29 host ldeml01-I eq ssh
access-list 200 permit tcp host 81.XXX.XXX.90 host ldeml01-I eq ssh
access-list 200 permit tcp any host 195.XXX.XXX.1 eq https
access-list 200 permit tcp any host 195.XXX.XXX.2 eq www
access-list 200 permit tcp any host ldeml01-I eq www
access-list 200 permit tcp any host 195.XXX.XXX.4 eq https
access-list 200 permit tcp host somewhere_home host ldeml01-I eq ssh
access-list 200 permit tcp host 82.XXX.XXX.114 host ldeml01-I eq ssh
access-list 200 permit tcp host else_home host ldeml01-I eq ssh
access-list 200 permit tcp any host 195.XXX.XXX.1 eq 2401
access-list 200 permit tcp any host 195.XXX.XXX.1 eq ssh
access-list 200 permit icmp any any echo-reply
access-list 200 permit tcp any host LDAPP01-I eq www
no pager
icmp permit 10.12.1.0 255.255.255.0 echo outside
mtu outside 1500
mtu inside 1500
ip address outside 195.XXX.XXX.1 255.255.255.128
ip address inside 10.12.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool ld_ras_pool 10.12.2.32-10.12.2.63
pdm history enable
arp timeout 14400
global (outside) 1 195.XXX.XXX.3 netmask 255.255.255.255
nat (inside) 0 access-list 101
nat (inside) 1 10.12.1.0 255.255.255.0 0 0
nat (inside) 1 192.168.70.0 255.255.255.0 0 0
static (inside,outside) tcp interface domain lddmz01-D domain netmask 255.255.255.255 0 0
static (inside,outside) udp interface domain lddmz01-D domain netmask 255.255.255.255 0 0
static (inside,outside) tcp interface https lddmz01-D https netmask 255.255.255.255 0 0
static (inside,outside) tcp 195.XXX.XXX.1 2401 lddmz01-D 2401 netmask 255.255.255.255 0 0
static (inside,outside) ldeml01-I ldeml01-D netmask 255.255.255.255 0 0
static (inside,outside) 195.XXX.XXX.111 ST16-D netmask 255.255.255.255 0 0
static (inside,outside) 195.XXX.XXX.108 10.12.1.108 netmask 255.255.255.255 0 0
static (inside,outside) 195.XXX.XXX.31 10.12.1.31 netmask 255.255.255.255 0 0
static (inside,outside) Kiwi-I Kiwi-D netmask 255.255.255.255 0 0
static (inside,outside) 195.XXX.XXX.4 10.12.1.14 netmask 255.255.255.255 0 0
static (inside,outside) 195.XXX.XXX.2 10.12.1.6 netmask 255.255.255.255 0 0
static (inside,outside) LDAPP01-I 10.12.1.5 netmask 255.255.255.255 0 0
access-group 200 in interface outside
route outside 0.0.0.0 0.0.0.0 195.XXX.XXX.126 1
route inside 192.168.70.0 255.255.255.0 10.12.1.2 1
timeout xlate 1:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server 84.XXX.XXX.38 source outside
snmp-server host inside 192.XXX.XXX.18 poll
no snmp-server location
no snmp-server contact
snmp-server community XXXXXXXXX
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set toyota esp-des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set toyota
crypto map bmw 1 ipsec-isakmp
crypto map bmw 1 match address 101
crypto map bmw 1 set peer 66.XXX.XXX.4
crypto map bmw 1 set transform-set toyota
crypto map bmw 20 ipsec-isakmp dynamic dynmap
crypto map bmw interface outside
isakmp enable outside
isakmp key ******** address 66.XXX.XXX.4 netmask 255.255.255.255
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption des
isakmp policy 1 hash md5
isakmp policy 1 group 2
isakmp policy 1 lifetime 1000
vpngroup groupras address-pool ld_ras_pool
vpngroup groupras dns-server lddmz01-D
vpngroup groupras default-domain XXXXXXXXXXX.local
vpngroup groupras idle-time 1800
vpngroup groupras password ********
telnet timeout 5
ssh 66.XXX.XXX.10 255.255.255.255 outside
ssh else_home 255.255.255.255 outside
ssh 10.12.1.0 255.255.255.0 inside
ssh timeout 10
console timeout 10
terminal width 120
I hope I gave enough info to get some help !
I've browsed the forum a lot without finding anyone having the same issue as i do... so here is my post ...
The configuration is as follow:
- 2 sites connected by VPN (working correctly)
- on each site, PIX-501 - v6.3(3)
I'm trying, beside the site-to-site VPN, to setup remote access with Cisco VPN Client 4.6.
I configured one of the PIX with vpngroup to make my tests, I will later change the auth method to something else (either local or radius).
Here is the point :
At home, with my laptop, I "dial" the VPN connection through Cisco VPN Client. Everything wents OK, and the VPN seems to be established. The laptop is wired on local LAN and goes through an IPTABLES firewall. It uses UDP and UDP-500 port is
forwared correctly to my laptop.
Once the VPN is established, I try to ping a Linux box which is connected on the DMZ, so directly after the PIX, without success.
The network debug I made gave :
- the ICMP requests reach the Linux box and it answers to them (used tcpdump and saw incoming and outgoing packets)
- the laptop never gets the replies.
- watching the logs on my Iptables, I see nothing dropped
- I've tested other kind of access (POP, SMTP, HTTP,...) and had each time the same symptoms.
My first idea is that there's a routing or ACL issue on my PIX that blocks the returning packets.
Network "diagram" :
Remote Office with 10.3.3.0/24 & 192.168.2.0/24
PIX-501
/
/
/
/
-----------
| Internet |------------ Home IpTables FW ------ Laptop
-----------
\
\
PIX-501
|
|
10.12.1.0/24 DMZ
|
|
Internal IPTABLES FW
|
|
192.168.70.0/24 Internal LAN
Here my PIX configuration :
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
[...]
names
name 195.XXX.XXX.11 ldeml01-I
name 10.12.1.4 ldeml01-D
name 195.XXX.XXX.30 Kiwi-I
name 10.12.1.30 Kiwi-D
name 10.12.1.16 ST16-D
name 10.12.1.3 lddmz01-D
name 10.12.2.0 ld_ras_lan
name 82.XXX.XXX.225 else_home
name 82.XXX.XXX.176 somewhere_home
name 195.XXX.XXX.10 LDAPP01-I
access-list 101 permit ip 192.168.70.0 255.255.255.0 192.168.2.0 255.255.255.0
access-list 101 permit ip 10.12.1.0 255.255.255.0 192.168.2.0 255.255.255.0
access-list 101 permit ip 192.168.70.0 255.255.255.0 10.3.3.0 255.255.255.0
access-list 101 permit ip 10.12.1.0 255.255.255.0 10.3.3.0 255.255.255.0
access-list 101 permit ip ld_ras_lan 255.255.255.0 192.168.70.0 255.255.255.0
access-list 101 permit ip ld_ras_lan 255.255.255.0 10.12.1.0 255.255.255.0
access-list 101 permit ip 192.168.70.0 255.255.255.0 ld_ras_lan 255.255.255.0
access-list 101 permit ip 10.12.1.0 255.255.255.0 ld_ras_lan 255.255.255.0
access-list 200 permit tcp any host ldeml01-I eq https
access-list 200 permit tcp any host ldeml01-I eq imap4
access-list 200 permit tcp any host ldeml01-I eq smtp
access-list 200 permit tcp any host 195.XXX.XXX.1 eq domain
access-list 200 permit udp any host 195.XXX.XXX.1 eq domain
access-list 200 permit tcp any host 195.XXX.XXX.111 eq www
access-list 200 permit tcp any host 195.XXX.XXX.111 eq https
access-list 200 permit tcp any host 195.XXX.XXX.108 eq www
access-list 200 permit tcp any host Kiwi-I eq www
access-list 200 permit tcp any host Kiwi-I eq https
access-list 200 permit tcp any host 195.XXX.XXX.31 eq www
access-list 200 permit tcp any host 195.XXX.XXX.31 eq https
access-list 200 permit tcp host 62.XXX.XXX.29 host ldeml01-I eq ssh
access-list 200 permit tcp host 81.XXX.XXX.90 host ldeml01-I eq ssh
access-list 200 permit tcp any host 195.XXX.XXX.1 eq https
access-list 200 permit tcp any host 195.XXX.XXX.2 eq www
access-list 200 permit tcp any host ldeml01-I eq www
access-list 200 permit tcp any host 195.XXX.XXX.4 eq https
access-list 200 permit tcp host somewhere_home host ldeml01-I eq ssh
access-list 200 permit tcp host 82.XXX.XXX.114 host ldeml01-I eq ssh
access-list 200 permit tcp host else_home host ldeml01-I eq ssh
access-list 200 permit tcp any host 195.XXX.XXX.1 eq 2401
access-list 200 permit tcp any host 195.XXX.XXX.1 eq ssh
access-list 200 permit icmp any any echo-reply
access-list 200 permit tcp any host LDAPP01-I eq www
no pager
icmp permit 10.12.1.0 255.255.255.0 echo outside
mtu outside 1500
mtu inside 1500
ip address outside 195.XXX.XXX.1 255.255.255.128
ip address inside 10.12.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool ld_ras_pool 10.12.2.32-10.12.2.63
pdm history enable
arp timeout 14400
global (outside) 1 195.XXX.XXX.3 netmask 255.255.255.255
nat (inside) 0 access-list 101
nat (inside) 1 10.12.1.0 255.255.255.0 0 0
nat (inside) 1 192.168.70.0 255.255.255.0 0 0
static (inside,outside) tcp interface domain lddmz01-D domain netmask 255.255.255.255 0 0
static (inside,outside) udp interface domain lddmz01-D domain netmask 255.255.255.255 0 0
static (inside,outside) tcp interface https lddmz01-D https netmask 255.255.255.255 0 0
static (inside,outside) tcp 195.XXX.XXX.1 2401 lddmz01-D 2401 netmask 255.255.255.255 0 0
static (inside,outside) ldeml01-I ldeml01-D netmask 255.255.255.255 0 0
static (inside,outside) 195.XXX.XXX.111 ST16-D netmask 255.255.255.255 0 0
static (inside,outside) 195.XXX.XXX.108 10.12.1.108 netmask 255.255.255.255 0 0
static (inside,outside) 195.XXX.XXX.31 10.12.1.31 netmask 255.255.255.255 0 0
static (inside,outside) Kiwi-I Kiwi-D netmask 255.255.255.255 0 0
static (inside,outside) 195.XXX.XXX.4 10.12.1.14 netmask 255.255.255.255 0 0
static (inside,outside) 195.XXX.XXX.2 10.12.1.6 netmask 255.255.255.255 0 0
static (inside,outside) LDAPP01-I 10.12.1.5 netmask 255.255.255.255 0 0
access-group 200 in interface outside
route outside 0.0.0.0 0.0.0.0 195.XXX.XXX.126 1
route inside 192.168.70.0 255.255.255.0 10.12.1.2 1
timeout xlate 1:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server 84.XXX.XXX.38 source outside
snmp-server host inside 192.XXX.XXX.18 poll
no snmp-server location
no snmp-server contact
snmp-server community XXXXXXXXX
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set toyota esp-des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set toyota
crypto map bmw 1 ipsec-isakmp
crypto map bmw 1 match address 101
crypto map bmw 1 set peer 66.XXX.XXX.4
crypto map bmw 1 set transform-set toyota
crypto map bmw 20 ipsec-isakmp dynamic dynmap
crypto map bmw interface outside
isakmp enable outside
isakmp key ******** address 66.XXX.XXX.4 netmask 255.255.255.255
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption des
isakmp policy 1 hash md5
isakmp policy 1 group 2
isakmp policy 1 lifetime 1000
vpngroup groupras address-pool ld_ras_pool
vpngroup groupras dns-server lddmz01-D
vpngroup groupras default-domain XXXXXXXXXXX.local
vpngroup groupras idle-time 1800
vpngroup groupras password ********
telnet timeout 5
ssh 66.XXX.XXX.10 255.255.255.255 outside
ssh else_home 255.255.255.255 outside
ssh 10.12.1.0 255.255.255.0 inside
ssh timeout 10
console timeout 10
terminal width 120
I hope I gave enough info to get some help !