I am trying to get the PIX to allow me to VPN pass-through to my RAS server on the inside interface. It gets as far as verifying username and password and then times out after about 30 seconds with a 721 not responding error.
I am guessing this is a GRE problem however I have experimented with letting it through on the outside interface but still the same result. Anyone got any ideas?
My settings are as follows:
PIX Version 6.1(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
enable password aqUd5fpvTbYGCrNf encrypted
passwd xxx encrypted
hostname PIXfirewall
domain-name uk.pas.local
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
names
access-list outside_access_in permit tcp any host 212.240.1xx.18 eq 1723
access-list outside_access_in permit tcp any host 212.240.1xx.19 eq 443
access-list outside_access_in permit tcp any host 212.240.1xx.18 eq pop3
access-list outside_access_in permit tcp any host 212.240.1xx.18 eq smtp
access-list outside_access_in permit tcp any host 212.240.1xx.18 eq 143
access-list outside_access_in permit tcp any host 212.240.1xx.20 eq www
access-list outside_access_in permit tcp any host 212.240.1xx.19 eq ftp
access-list outside_access_in permit tcp any host 212.240.1xx.22 eq www
access-list outside_access_in permit tcp any host 212.240.1xx.22 eq 98
access-list dmz_access_in permit tcp host 192.168.1.2 host 10.99.99.12 eq 1433
access-list dmz_access_in permit tcp host 192.168.1.2 eq smtp host 10.99.99.7 eq smtp
access-list dmz_access_in permit tcp host 192.168.1.4 eq smtp host 10.99.99.7 eq smtp
access-list dmz_access_in permit tcp host 192.168.1.5 eq smtp host 10.99.99.7 eq smtp
access-list inside_access_in permit ip any any
pager lines 24
logging monitor notifications
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
icmp permit any outside
icmp permit any inside
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip address outside 212.240.1xx.18 255.255.255.240
ip address inside 10.3.3.4 255.0.0.0
ip address dmz 192.168.1.1 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm location 10.250.250.250 255.255.255.255 inside
pdm location 10.250.250.251 255.255.255.255 inside
pdm location 10.99.99.7 255.255.255.255 inside
pdm location 10.99.99.3 255.255.255.255 inside
pdm location 192.168.1.2 255.255.255.255 dmz
pdm location 192.168.1.3 255.255.255.255 dmz
pdm location 192.168.1.5 255.255.255.255 dmz
pdm location 192.168.1.4 255.255.255.255 dmz
pdm location 10.99.99.12 255.255.255.255 inside
pdm history enable
arp timeout 14400
global (outside) 1 interface
global (dmz) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
nat (dmz) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp interface 1723 10.99.99.3 1723 netmask 255.255.255.255 0 0
static (inside,outside) tcp 212.240.1xx.19 443 10.99.99.7 443 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface pop3 10.99.99.7 pop3 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 143 10.99.99.7 143 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface smtp 10.99.99.7 smtp netmask 255.255.255.255 0 0
static (dmz,outside) tcp 212.240.1xx.20 255.255.255.255 0 0
static (dmz,outside) tcp 212.240.1xx.19 ftp 192.168.1.3 ftp netmask 255.255.255.255 0 0
static (dmz,outside) tcp 212.240.1xx.22 255.255.255.255 0 0
static (dmz,outside) tcp 212.240.1xx.22 98 192.168.1.5 98 netmask 255.255.255.255 0 0
static (inside,dmz) 10.99.99.12 10.99.99.12 netmask 255.255.255.255 0 0
static (inside,dmz) 10.99.99.7 10.99.99.7 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
access-group dmz_access_in in interface dmz
route outside 0.0.0.0 0.0.0.0 212.240.134.17 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:15:00 absolute uauth 0:05:00 inactivity
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 10.0.0.0 255.0.0.0 inside
http 10.250.250.250 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
tftp-server inside 10.250.250.250 /PIX
floodguard enable
no sysopt route dnat
telnet 10.250.250.250 255.255.255.255 inside
telnet 10.250.250.251 255.255.255.255 inside
telnet timeout 10
ssh timeout 5
dhcpd lease 3600
dhcpd ping_timeout 750
terminal width 80
Cryptochecksum:e0b2e3c7089706039107ee172189bdfe
: end
I am guessing this is a GRE problem however I have experimented with letting it through on the outside interface but still the same result. Anyone got any ideas?
My settings are as follows:
PIX Version 6.1(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
enable password aqUd5fpvTbYGCrNf encrypted
passwd xxx encrypted
hostname PIXfirewall
domain-name uk.pas.local
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
names
access-list outside_access_in permit tcp any host 212.240.1xx.18 eq 1723
access-list outside_access_in permit tcp any host 212.240.1xx.19 eq 443
access-list outside_access_in permit tcp any host 212.240.1xx.18 eq pop3
access-list outside_access_in permit tcp any host 212.240.1xx.18 eq smtp
access-list outside_access_in permit tcp any host 212.240.1xx.18 eq 143
access-list outside_access_in permit tcp any host 212.240.1xx.20 eq www
access-list outside_access_in permit tcp any host 212.240.1xx.19 eq ftp
access-list outside_access_in permit tcp any host 212.240.1xx.22 eq www
access-list outside_access_in permit tcp any host 212.240.1xx.22 eq 98
access-list dmz_access_in permit tcp host 192.168.1.2 host 10.99.99.12 eq 1433
access-list dmz_access_in permit tcp host 192.168.1.2 eq smtp host 10.99.99.7 eq smtp
access-list dmz_access_in permit tcp host 192.168.1.4 eq smtp host 10.99.99.7 eq smtp
access-list dmz_access_in permit tcp host 192.168.1.5 eq smtp host 10.99.99.7 eq smtp
access-list inside_access_in permit ip any any
pager lines 24
logging monitor notifications
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
icmp permit any outside
icmp permit any inside
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip address outside 212.240.1xx.18 255.255.255.240
ip address inside 10.3.3.4 255.0.0.0
ip address dmz 192.168.1.1 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm location 10.250.250.250 255.255.255.255 inside
pdm location 10.250.250.251 255.255.255.255 inside
pdm location 10.99.99.7 255.255.255.255 inside
pdm location 10.99.99.3 255.255.255.255 inside
pdm location 192.168.1.2 255.255.255.255 dmz
pdm location 192.168.1.3 255.255.255.255 dmz
pdm location 192.168.1.5 255.255.255.255 dmz
pdm location 192.168.1.4 255.255.255.255 dmz
pdm location 10.99.99.12 255.255.255.255 inside
pdm history enable
arp timeout 14400
global (outside) 1 interface
global (dmz) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
nat (dmz) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp interface 1723 10.99.99.3 1723 netmask 255.255.255.255 0 0
static (inside,outside) tcp 212.240.1xx.19 443 10.99.99.7 443 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface pop3 10.99.99.7 pop3 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 143 10.99.99.7 143 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface smtp 10.99.99.7 smtp netmask 255.255.255.255 0 0
static (dmz,outside) tcp 212.240.1xx.20 255.255.255.255 0 0
static (dmz,outside) tcp 212.240.1xx.19 ftp 192.168.1.3 ftp netmask 255.255.255.255 0 0
static (dmz,outside) tcp 212.240.1xx.22 255.255.255.255 0 0
static (dmz,outside) tcp 212.240.1xx.22 98 192.168.1.5 98 netmask 255.255.255.255 0 0
static (inside,dmz) 10.99.99.12 10.99.99.12 netmask 255.255.255.255 0 0
static (inside,dmz) 10.99.99.7 10.99.99.7 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
access-group dmz_access_in in interface dmz
route outside 0.0.0.0 0.0.0.0 212.240.134.17 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:15:00 absolute uauth 0:05:00 inactivity
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 10.0.0.0 255.0.0.0 inside
http 10.250.250.250 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
tftp-server inside 10.250.250.250 /PIX
floodguard enable
no sysopt route dnat
telnet 10.250.250.250 255.255.255.255 inside
telnet 10.250.250.251 255.255.255.255 inside
telnet timeout 10
ssh timeout 5
dhcpd lease 3600
dhcpd ping_timeout 750
terminal width 80
Cryptochecksum:e0b2e3c7089706039107ee172189bdfe
: end