Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Weird prob. PIX 501 site to site vpn...

Status
Not open for further replies.

karmic

Technical User
Jul 20, 2001
973
0
0
CA
Have 2 pix 501, 10 licenses each.

I've set up many pix tunnels but this one just doesn't want to go. Need some fresh eyes to take a look at the config for me and see if i'm doing something wrong?

Doesn't seem like they are even trying to connect.
These are new systems, bought last week. Did cisco throw another step in there without my knowledge?

I don't have any outbound restrictions set up yet.

The internet IP's are not on the same subnet either.
XXX.XXX.196.52
XXX.XXX.194.160

Configs are pretty much the same, cept for the internal IP's. Main site - 192.168.1.0 remote - 192.168.2.0

Thanks :)

Building configuration...
: Saved
:
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8P4uuaQ/w3egAt70 encrypted
passwd 8P4uuaQ/w3egAt70 encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 192.168.2.0 XXXXXX
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 XXXXXX 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.1.48 255.255.255.240
access-list outside_cryptomap_20 permit ip 192.168.1.0 255.255.255.0 ghtcad 255.255.255.0
access-list outside_cryptomap_dyn_20 permit ip any 192.168.1.48 255.255.255.240
pager lines 24
logging on
logging timestamp
logging trap informational
logging host inside 192.168.1.251
mtu outside 1500
mtu inside 1500
ip address outside dhcp setroute
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool remotes 192.168.1.50-192.168.1.60
pdm location XXXXXX 255.255.255.0 outside
pdm location 192.168.1.251 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer XXX.XXX.194.160
crypto map outside_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address XXX.XXX.194.160 netmask 255.255.255.255
isakmp identity address
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup XXXXXXXXX address-pool remotes
vpngroup XXXXXXXXX dns-server 192.168.1.251
vpngroup XXXXXXXXX wins-server 192.168.1.251
vpngroup XXXXXXXXX default-domain XXX.local
vpngroup XXXXXXXXX idle-time 1800
vpngroup XXXXXXXXX password ********
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
terminal width 80
Cryptochecksum:8ed2009cc05e39fdd0c39a7de68e5745
: end
[OK]


~ K.I.S.S - Don't make it any more complex than it has to be ~
 
anybody??? These are new units, right out of the box and they won't even make the attempt to connect thru vpn. There's no sign of a connection.

I've set up dozens of tunnels with these pix units and I can't figure it out.

~ K.I.S.S - Don't make it any more complex than it has to be ~
 
I see a couple of things different from one of mine is:

crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20

I don't have this "match to an access-list".

Also I use a separate access-list for the nonat.

What happens when you do the sh cry isakmp sa? and also sh cry ipsec sa?

Look for the source for tunnel creation. Crank up debug and watch the information to see if any packets are being generated.
 
I wish I could swear like a trooper on here...

Turns out, after 2 days of pulling my hair out, all I had to do was ping the tunnel to bring it up. Needed some interesting traffic was what I was told.

Funny, I never had to do that before.

~ K.I.S.S - Don't make it any more complex than it has to be ~
 
I had the same problem a while ago. Sorry, didn't read this forum for a while ! I too had spent a few days trying to figure it out !
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top