speedingwolf
IS-IT--Management
Greetings all:
I've configured cisco VPN tunnel before between PIX506 and VPN concentrator without any problem. I've configured Cisco VPN client to terminate at our HQ PIX516E without any problem. But now I am having problem creating a site to site tunnel between a PIX501 to a PIX515E. For the life of me, I can't seem to find out what's the problem. I reset both pixes to default manufacturer and configured both with cli as well as asdm and still running into problem. Here is the shortcut of my configures and i'm sure with additional minds, maybe you can point out what I did wrong. Thanks in advance. The ultimate goals is configure the HQ Pix to accept VPN client and site to site with remote office.
Remote Site: 192.168.101.0
PIX501# show config
PIX Version 6.3(5)
access-list TunnelToHQ permit ip 192.168.101.0 255.255.255.0 192.168.100.0 255.255.255.0
ip address outside X.X.X.X 255.255.255.128
ip address inside 192.168.101.1 255.255.255.0
global (outside) 1 interface
nat (inside) 0 access-list TunnelToHQ
nat (inside) 1 192.168.101.0 255.255.255.0 0 0
route outside 0.0.0.0 0.0.0.0 X.X.X.x 1
sysopt connection permit-ipsec
crypto ipsec transform-set strong esp-3des esp-sha-hmac
crypto map ToIHQ 10 ipsec-isakmp
crypto map ToIHQ 10 match address TunnelToHQ
crypto map ToIHQ 10 set peer Y.Y.Y.Y
crypto map ToIHQ 10 set transform-set strong
crypto map ToIHQ interface outside
isakmp enable outside
isakmp key ******** address Y.Y.Y.Y netmask 255.255.255.255
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
telnet timeout 5
console timeout 0
dhcpd address 192.168.101.2-192.168.101.33 inside
dhcpd dns ispdsn1, ispdns2
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
dhcpd enable inside
terminal width 80
===========
HQ Network: 192.168.100.0
PIX515E
FW1Test# show config
: Saved
: Written by enable_15 at 19:09:15.037 UTC Sat Mar 11 2006
!
PIX Version 7.1(1)
!
hostname FW1Test
same-security-traffic permit intra-interface
access-list 110 extended permit ip 192.168.100.0 255.255.255.0 192.168.101.0 255.255.255.0
access-list nonat extended permit ip 192.168.100.0 255.255.255.0 192.168.101.0 255.255.255.0
global (outside) 1 interface
nat (inside) 0 access-list nonat
nat (inside) 1 192.168.100.0 255.255.255.0
route outside 0.0.0.0 0.0.0.0 Y.Y.Y.y 1
crypto ipsec transform-set myset esp-3des esp-sha-hmac
crypto map toPIX501 10 set peer X.X.X.x
crypto map toPIX501 10 set transform-set myset
crypto map toPIX501 interface outside
isakmp enable outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
tunnel-group X.X.X.x type ipsec-l2l
tunnel-group X.X.X.x ipsec-attributes
pre-shared-key *
I've configured cisco VPN tunnel before between PIX506 and VPN concentrator without any problem. I've configured Cisco VPN client to terminate at our HQ PIX516E without any problem. But now I am having problem creating a site to site tunnel between a PIX501 to a PIX515E. For the life of me, I can't seem to find out what's the problem. I reset both pixes to default manufacturer and configured both with cli as well as asdm and still running into problem. Here is the shortcut of my configures and i'm sure with additional minds, maybe you can point out what I did wrong. Thanks in advance. The ultimate goals is configure the HQ Pix to accept VPN client and site to site with remote office.
Remote Site: 192.168.101.0
PIX501# show config
PIX Version 6.3(5)
access-list TunnelToHQ permit ip 192.168.101.0 255.255.255.0 192.168.100.0 255.255.255.0
ip address outside X.X.X.X 255.255.255.128
ip address inside 192.168.101.1 255.255.255.0
global (outside) 1 interface
nat (inside) 0 access-list TunnelToHQ
nat (inside) 1 192.168.101.0 255.255.255.0 0 0
route outside 0.0.0.0 0.0.0.0 X.X.X.x 1
sysopt connection permit-ipsec
crypto ipsec transform-set strong esp-3des esp-sha-hmac
crypto map ToIHQ 10 ipsec-isakmp
crypto map ToIHQ 10 match address TunnelToHQ
crypto map ToIHQ 10 set peer Y.Y.Y.Y
crypto map ToIHQ 10 set transform-set strong
crypto map ToIHQ interface outside
isakmp enable outside
isakmp key ******** address Y.Y.Y.Y netmask 255.255.255.255
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
telnet timeout 5
console timeout 0
dhcpd address 192.168.101.2-192.168.101.33 inside
dhcpd dns ispdsn1, ispdns2
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
dhcpd enable inside
terminal width 80
===========
HQ Network: 192.168.100.0
PIX515E
FW1Test# show config
: Saved
: Written by enable_15 at 19:09:15.037 UTC Sat Mar 11 2006
!
PIX Version 7.1(1)
!
hostname FW1Test
same-security-traffic permit intra-interface
access-list 110 extended permit ip 192.168.100.0 255.255.255.0 192.168.101.0 255.255.255.0
access-list nonat extended permit ip 192.168.100.0 255.255.255.0 192.168.101.0 255.255.255.0
global (outside) 1 interface
nat (inside) 0 access-list nonat
nat (inside) 1 192.168.100.0 255.255.255.0
route outside 0.0.0.0 0.0.0.0 Y.Y.Y.y 1
crypto ipsec transform-set myset esp-3des esp-sha-hmac
crypto map toPIX501 10 set peer X.X.X.x
crypto map toPIX501 10 set transform-set myset
crypto map toPIX501 interface outside
isakmp enable outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
tunnel-group X.X.X.x type ipsec-l2l
tunnel-group X.X.X.x ipsec-attributes
pre-shared-key *