Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Site-to-site VPN between PIX 501's 1

Status
Not open for further replies.

rick283

MIS
Jul 5, 2002
22
0
0
US
I am having issues with a site-to-site VPN between two PIX 501 firewalls. The diagram is like this:

OfficeA-->PIX-1---INTERNET---PIX-2<--OfficeB

I had the site up and running the other day...now it is only working one-way. This does not appear to be a client machine issue.

Machines in OfficeA can map drives to OfficeB, but machines in OfficeB __cannot__ map drives to OfficeA.

Below are the "sh run", "sh isakmp sa" and "sh crypto ipsec sa" command results for both PIX. It looks like the PIX-2 has two tunnels open...but I'm not sure.


PIX-1 Config:

PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password XXXXXX encrypted
passwd XXXXXXX encrypted
hostname PIX-1
domain-name default
names
access-list acl_out permit ip any any
access-list PROTECT permit ip 10.0.0.0 255.255.255.0 192.168.0.0 255.255.255.0
access-list IPSEC permit udp host 42.25.8.158 host 42.25.8.162
access-list IPSEC permit ah host 42.25.8.158 host 42.25.8.162
access-list IPSEC permit esp host 42.25.8.158 host 42.25.8.162
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 42.25.8.162 255.255.255.252
ip address inside 10.0.0.138 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 10.0.0.0 255.255.255.0 inside
pdm location 192.168.0.0 255.255.255.0 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list PROTECT
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group IPSEC in interface outside
access-group acl_out in interface inside
route outside 0.0.0.0 0.0.0.0 72.25.7.161 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
crypto ipsec transform-set PIX3transform esp-3des esp-md5-hmac
crypto map CRYPTO-MAP 10 ipsec-isakmp
crypto map CRYPTO-MAP 10 match address PROTECT
crypto map CRYPTO-MAP 10 set peer 42.25.8.158
crypto map CRYPTO-MAP 10 set transform-set PIX3transform
crypto map CRYPTO-MAP interface outside
isakmp enable outside
isakmp key ******** address 42.25.8.158 netmask 255.255.255.255
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
: end
PIX-1# sh isakmp sa
Total : 1
Embryonic : 0
dst src state pending created
42.25.8.162 42.25.8.158 QM_IDLE 0 0
rv-manheim-pix501# sh crypto ipsec sa


interface: outside
Crypto map tag: CRYPTO-MAP, local addr. 42.25.8.162

local ident (addr/mask/prot/port): (10.0.0.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (192.168.0.0/255.255.255.0/0/0)
current_peer: 42.25.8.158:500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 3333, #pkts encrypt: 3333, #pkts digest 3333
#pkts decaps: 3632, #pkts decrypt: 3632, #pkts verify 3632
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
#send errors 2, #recv errors 0

local crypto endpt.: 42.25.8.162, remote crypto endpt.: 42.25.8.158
path mtu 1500, ipsec overhead 56, media mtu 1500
current outbound spi: 146b0b16

inbound esp sas:
spi: 0x71914b34(1905347380)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 3, crypto map: CRYPTO-MAP
sa timing: remaining key lifetime (k/sec): (4607995/26926)
IV size: 8 bytes
replay detection support: Y


inbound ah sas:


inbound pcp sas:


outbound esp sas:
spi: 0x146b0b16(342559510)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 4, crypto map: CRYPTO-MAP
sa timing: remaining key lifetime (k/sec): (4608000/26926)
IV size: 8 bytes
replay detection support: Y


outbound ah sas:


outbound pcp sas:


PIX-2 Config:

interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password XXXXXX encrypted
passwd XXXXXXX encrypted
hostname PIX-2
domain-name default
names
access-list acl_out permit ip any any
access-list acl_out permit icmp any any
access-list PROTECT permit ip 192.168.0.0 255.255.255.0 10.0.0.0 255.255.255.0
access-list IPSEC permit udp host 42.25.8.162 host 42.25.8.158 eq isakmp
access-list IPSEC permit ah host 42.25.8.162 host 42.25.8.158
access-list IPSEC permit esp host 42.25.8.162 host 42.25.8.158
pager lines 24
logging buffered errors
mtu outside 1500
mtu inside 1500
ip address outside 42.25.8.158 255.255.255.252
ip address inside 192.168.0.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 10.0.0.0 255.255.255.0 outside
pdm location 192.168.0.0 255.255.255.0 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list PROTECT
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
route outside 0.0.0.0 0.0.0.0 42.25.8.157 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set PIX3transform esp-3des esp-md5-hmac
crypto map CRYPTO-MAP 10 ipsec-isakmp
crypto map CRYPTO-MAP 10 match address PROTECT
crypto map CRYPTO-MAP 10 set peer 42.25.8.162
crypto map CRYPTO-MAP 10 set transform-set PIX3transform
crypto map CRYPTO-MAP interface outside
isakmp enable outside
isakmp key ******** address 42.25.8.162 netmask 255.255.255.255
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
: end
PIX-2# sh isakmp sa
Total : 1
Embryonic : 0
dst src state pending created
42.25.8.162 42.25.8.158 QM_IDLE 0 6
PIX-2# sh crypto ipsec sa


interface: outside
Crypto map tag: CRYPTO-MAP, local addr. 42.25.8.158

local ident (addr/mask/prot/port): (192.168.0.0/255.255.255.0/1/0)
remote ident (addr/mask/prot/port): (10.0.0.0/255.255.255.0/1/0)
current_peer: 42.25.8.162:0
PERMIT, flags={origin_is_acl,}
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0

local crypto endpt.: 42.25.8.158, remote crypto endpt.: 42.25.8.162
path mtu 1500, ipsec overhead 0, media mtu 1500
current outbound spi: 0

inbound esp sas:


inbound ah sas:


inbound pcp sas:


outbound esp sas:


outbound ah sas:


outbound pcp sas:



local ident (addr/mask/prot/port): (192.168.0.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (10.0.0.0/255.255.255.0/0/0)
current_peer: 42.25.8.162:500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 52, #pkts encrypt: 52, #pkts digest 52
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
#send errors 2, #recv errors 0

local crypto endpt.: 42.25.8.158, remote crypto endpt.: 42.25.8.162
path mtu 1500, ipsec overhead 56, media mtu 1500
current outbound spi: 71914b34

inbound esp sas:
spi: 0x146b0b16(342559510)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 3, crypto map: CRYPTO-MAP
sa timing: remaining key lifetime (k/sec): (4608000/27607)
IV size: 8 bytes
replay detection support: Y


inbound ah sas:


inbound pcp sas:


outbound esp sas:
spi: 0x71914b34(1905347380)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 4, crypto map: CRYPTO-MAP
sa timing: remaining key lifetime (k/sec): (4607997/27607)
IV size: 8 bytes
replay detection support: Y


outbound ah sas:


outbound pcp sas:
 
Put this in the Pix 1 config:

sysopt connection permit-ipsec
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top