Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Split Tunneling on PIX 6.3 does not work

Status
Not open for further replies.

ralwyn

IS-IT--Management
Sep 23, 2003
34
0
0
US
Hi everyone:

I am having issue on PIX 6.3 version on split tunneling. When I had the previous version

6.2 works great - no remote users complain. Now, on version 6.3 it does not work. One good thing on 6.3 is the NAT

traversal. I have looked at all the Thread for the PIX split tunneling and I did not see the answer. Please help! Please see my config below:

PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto shutdown
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security10
enable password KPwAVS2lnH.ASq2B encrypted
passwd .zrG4EyjBAtPgU41 encrypted
hostname temp-fw
domain-name temp.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list 100 permit tcp any host xxx.xx.109.1 eq smtp
access-list 100 permit tcp any host xxx.xx.109.1 eq pop3
access-list 100 permit icmp any any
access-list 100 permit tcp any host xxx.xx.109.1 eq www
access-list 100 permit tcp any host xxx.xx.109.1 eq lotusnotes
access-list 100 permit tcp host 161.xx.xxx.24 host xx.xx.109.3 gt 1023
access-list 100 permit tcp host 161.xx.xxx.25 host xx.xx.109.3 gt 1023
access-list 100 permit tcp host 161.xx.xxx.26 host xx.xx.109.3 gt 1023
access-list 100 permit tcp host 161.xx.xxx.27 host xx.xx.109.3 gt 1023
access-list 100 permit tcp host 161.xx.xxx.24 host xx.xx.109.3 eq www
access-list 100 permit tcp host 161.xx.xxx.25 host xx.xx.109.3 eq www
access-list 100 permit tcp host 161.xx.xxx.26 host xx.xx.109.3 eq www
access-list 100 permit tcp host 161.xx.xxx.27 host xx.xx.109.3 eq www
access-list 101 permit ip 192.168.142.0 255.255.254.0 172.16.1.0 255.255.255.0
access-list 101 permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
mtu intf2 1500
ip local pool vpnusers 172.16.1.100-172.16.1.150
ip local pool vpntemp 172.16.1.160-172.16.1.170
pdm history enable
arp timeout 14400
global (outside) 1 xxx.xxx.109.4
nat (inside) 0 access-list 101
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) xx.xxx.109.1 192.168.143.245 netmask 255.255.255.255 0 0
static (inside,outside) xx.xxx.109.3 192.168.143.130 netmask 255.255.255.255 0 0
access-group 100 in interface outside
route outside 0.0.0.0 0.0.0.0 xx.xxx.109.6 1
route inside 192.168.128.0 255.255.255.0 192.168.142.1 1
route inside 192.168.126.0 255.255.255.0 192.168.142.1 1
route inside 192.168.129.0 255.255.255.0 192.168.142.1 1
route inside 192.168.184.0 255.255.255.0 192.168.142.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-3des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynamic dynmap
crypto map mymap client configuration address initiate
crypto map mymap client configuration address respond
crypto map mymap interface outside
isakmp enable outside
isakmp key ******** address 0.0.0.0 netmask 0.0.0.0
isakmp identity address
isakmp client configuration address-pool local vpnusers outside
isakmp nat-traversal 20
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup vpnremote address-pool vpnusers
vpngroup vpnremote dns-server xxx.xxx.11.201 xxx.xxx.1.7
vpngroup vpnremote wins-server 192.168.143.246
vpngroup vpnremote default-domain temp.com
vpngroup vpnremote split-tunnel 101
vpngroup vpnremote idle-time 1800
vpngroup vpnremote password ********
vpngroup vpngsm idle-time 1800
vpngroup vpntempu address-pool vpntemp
vpngroup vpntempu dns-server xxx.xxx.11.201 xxx.xxx.1.7
vpngroup vpntempu wins-server 192.168.143.246
vpngroup vpntempu default-domain temp.com
vpngroup vpntempu split-tunnel 101
vpngroup vpntempu idle-time 1800
vpngroup vpntempu password ********
terminal width 80
Cryptochecksum:7c448503e25a07808bd8d0ba01ce4832
: end
 
Hi ralwyn

I have a question, you said that you had the vpn working with pix 6.2. I have pix ver. 6.2 and I can't get it to work. Could you just tell me if it is possible with 6.2 to setup this:

cisco vpn client connect to the network using ipsec. The PAT is setup on the PIX. Do I have to upgrade to ver. 6.3 and use the net-traversal 20 command?

I will appriciate your input or if the answer is yes, could you post your old config for 6.2?

Thank you,

Alex.
 
Hi themut:

I went over and over on the link that you have provided and I saw 3 things that was different from my configs. I removed them and test - no success - so i put it back to the original configs. Tested from 3.6 and 4.0 client version.

Thank you
ralwyn

==============================================

Hi ZenMuster:

To enable NAT-Traversal you have to upgrade to 6.3

Thanks,
ralwyn
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top