Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations TouchToneTommy on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Same old..... VPN Problem

Status
Not open for further replies.

Spawnadv

Technical User
Nov 10, 2003
11
DK
Hi,


Well problem is running PIX506E 6.3 and trying to allow LAN users to access internet and at the same time allowing VPN users to access internet, can anybody help?????
Been trying 3 weeks to solve the problem on my own now....


THX in ADV.
 
It is easily doable but without something (as a config to go on) it would be hard to tell you exactly where in your config your error is.

I can say it is one of acouple of things.

access-list or nat statement or both & split tunneling & access-list commands for the vpn users.

Terry
 
ok here's the config:

: Saved
:
PIX Version 6.3(1)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ***************** encrypted
passwd ********************* encrypted
hostname *****************
domain-name **************
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521

object-group service rdp tcp
description Remote Desktop Protocol
port-object range 3389 3389
access-list compiled
access-list acl_in permit tcp any host outside_address eq smtp
access-list acl_in permit tcp any host outside_address eq www
access-list acl_in permit tcp any host outside_address eq ftp log
access-list acl_in permit tcp any host outside_address eq pop3
access-list acl_in permit tcp any host outside_address eq pptp log
access-list acl_in permit tcp any host outside_address eq 4661
access-list acl_in permit tcp any host outside_address eq 4662
access-list acl_in permit tcp any host outside_address eq 4242
access-list acl_in permit tcp 192.168.135.0 255.255.255.0 eq domain host 10.11.41.2 eq domain
access-list acl_in permit udp 192.168.135.0 255.255.255.0 eq domain host 10.11.41.2 eq domain
access-list acl_in permit ip 192.168.135.0 255.255.255.0 any log
access-list inside_outbound_nat0_acl permit ip any 192.168.135.0 255.255.255.0
pager lines 69
logging on
logging timestamp
logging trap informational
logging host inside 10.11.41.2
icmp permit any echo-reply outside
icmp permit any time-exceeded outside
icmp permit any echo outside
icmp permit any outside
icmp permit any inside
icmp permit any echo-reply inside
icmp permit any echo inside
icmp permit any time-exceeded inside
mtu outside 1500
mtu inside 1500
ip address outside outside_address 255.255.255.252
ip address inside 10.11.41.1 255.255.255.0
ip verify reverse-path interface outside
ip audit info action alarm
ip audit attack action alarm
ip local pool Pool1 192.168.135.1-192.168.135.50
arp timeout 14400
global (outside) 1 interface
nat (outside) 0 access-list outside_inbound_nat0_acl outside
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp outside_address smtp 10.11.41.2 smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp outside_address 255.255.255.255 0 0
static (inside,outside) tcp outside_address ftp 10.11.41.7 ftp netmask 255.255.255.255 0 0
static (inside,outside) tcp outside_address pop3 10.11.41.2 pop3 netmask 255.255.255.255 0 0
static (inside,outside) tcp outside_address 4661 10.11.41.5 4661 netmask 255.255.255.255 0 0
static (inside,outside) tcp outside_address 4662 10.11.41.5 4662 netmask 255.255.255.255 0 0
static (inside,outside) tcp outside_address 4242 10.11.41.5 4242 netmask 255.255.255.255 0 0
access-group acl_in in interface outside
route outside 0.0.0.0 0.0.0.0 outside_gateway 1
route inside 10.11.25.0 255.255.255.0 10.11.41.2 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server 212.242.86.186 source outside prefer
ntp server 130.149.17.8 source outside
http server enable
http 80.62.80.198 255.255.255.255 outside
http 80.162.162.254 255.255.255.255 outside
http 80.63.208.50 255.255.255.255 outside
http 10.11.41.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
snmp-server enable traps
tftp-server inside 10.11.41.5 pixjfv.conf
floodguard enable
sysopt connection permit-pptp
telnet 10.11.41.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn group Curit accept dialin pptp
vpdn group Curit ppp authentication pap
vpdn group Curit ppp authentication chap
vpdn group Curit ppp authentication mschap
vpdn group Curit ppp encryption mppe 40
vpdn group Curit client configuration address local Pool1
vpdn group Curit client configuration dns 10.11.41.2
vpdn group Curit pptp echo 60
vpdn group Curit client authentication local
vpdn username ***** password *********
vpdn username ***** password *********
vpdn enable outside
terminal width 170
Cryptochecksum:******************************
: end
 
Hello Buddy:

I´m trying to configure easy vpn on a pix 515 to 8 Cisco 827.

The 8 routers are connected to ADSL with public dynamic IP.

The point is that I cann´t send trafic and for wath I saw your Configuration is easy VPN.

Can You Help Me?

Thanks Man
 
Sorry my config is "dial" in only PPTP VPN
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top