Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Westi on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Please help... config pix 515 w/ dmz and vpn

Status
Not open for further replies.

fpower

MIS
Aug 12, 2003
54
US
hi,

I am new to cisco and have been asked to implement vpn conectivity, (cisco 3.5 client), with Windows IAS authentication to the internal domain, but using an IAS server in the dmz.
I have been able to get vpn connectivity with the following config, (which I was able to get here), but I have been unable to have my dmz communicate with the insdie network, or have the inside network communicate with the dmz. (the IAS authentication is only working with local accounts... not domain accounts)
I can't even ping the dmz interface from an inside pc.

Does anyone out there have any idea how I can accomplish this?
Thank you in advance.

My current config....
PIX Version 6.1(3)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 DMZ1 security30
enable password XXXXXXXXXX encrypted
passwd XXXXXXXXXX encrypted
hostname one
domain-name
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
fixup protocol smtp 25
names
pager lines 24
logging on
logging trap debugging
logging host inside 10.0.1.40
interface ethernet0 10full
interface ethernet1 100full
interface ethernet2 100full
mtu outside 1500
mtu inside 1500
mtu DMZ1 1500
ip address outside xxx.xxx.xx.xx 255.255.255.0
ip address inside 10.0.1.1 255.255.0.0
ip address DMZ1 192.168.0.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 xxx.xxx.xx.xxx
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-list 80 permit ip 10.0.0.0 255.255.0.0 10.0.150.0 255.255.255.0
nat (inside) 0 access-list 80
static (inside,outside) xxx.xxx.xx.xx 10.0.1.28 netmask 255.255.255.255 0 0
static (inside,outside) xxx.xxx.xx.xx 10.0.1.6 netmask 255.255.255.255 0 0
conduit permit tcp host xxx.xxx.xx.xx eq conduit permit tcp host xxx.xxx.xx.xx eq 443 any
conduit permit tcp host xxx.xxx.xx.xx eq smtp any
route outside 0.0.0.0 0.0.0.0 209.73.41.1 1
route inside 172.16.0.0 255.255.0.0 10.10.1.254 1
route inside 172.20.0.0 255.255.0.0 10.10.1.254 1
route inside 192.168.250.0 255.255.255.0 10.10.1.254 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
ip local pool vpnippool 10.0.150.1-10.10.150.100
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server partnerauth protocol radius
aaa-server partnerauth (dmz) host 192.168.0.15
no snmp-server location
no snmp-server contact
snmp-server community
no snmp-server enable traps
no floodguard enable
no sysopt route dnat
crypto map partnet-map client configuration address initiate;
crypto ipsec transform-set strong-des esp-des esp-sha-hmc
crypto dynamic-map cisco 4 set transform-set strong-des
crypto map partner-map 20 ipsec-isakmp dynamic cisco
crypto map partner-map client authentication partnerauth
crypto map partner-map interface outside
isakmp key 12345 address 0.0.0.0 netmask 0.0.0.0
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
vpngroup vpngroup address-pool vpnippool
vpngroup vpngroup dns-server 10.0.1.126
vpngroup vpngroup wins-server 10.0.1.127
vpngroup vpngroup default-domain domain.com
vpngroup vpngroup idle-time 1800
sysopt conection permit-ipsec
telnet 10.0.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
terminal width 80
 
>I can't even ping the dmz interface from an inside pc
I don't think the PIX will let you ping the actual dmz interface from your inside PC. It will let you ping a pc/server in the dmz with the correct acl or conduit.

You will need to create a static from your inside to dmz:
static (inside, dmz) 10.0.0.0 10.0.0.0 netmask 255.255.0.0

Create acl to allow dmz to inside. For testing purpose, you can create one that allows all ip from dmz to inside and apply the acl to the dmz interface. After all is working, then you will want to trim the acl down to what you need:
access-list DMZ permit ip any any

Looks like your are using acl and conduit. You should use only one and migrate your conduits to acls.
 
Thanks DX1,

another newbie question for you... the
access-list DMZ permit ip any any
statement, what would I replace if I only wanted any type of traffic from 192.168.10.10 and 10.11 allowed onto the internal network?
Thanks again in advance.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top