|
|
Question : Problem: VPN client will connect but cannot access anything within the PIX506E firewall.
|
|
I'm trying to configure a PIX506E to accept incoming connections from remote VPN users, using the Windows Network and Dial-up Connections. I'm not referring to static IPSEC Tunnels; those are established and functioning, fine.
At this point, the remote user connects but that's the end of it. The remote PC thinks it's connected and the PIX shows that the connection is established. The remote PC, however, cannot communicate (or ping) with anything inside the PIX firewall. The subnet inside the firewall is 10.0.11.0, the PIX device is 10.0.11.7.
My PIX configuration: Building configuration... : Saved : PIX Version 6.3(5) interface ethernet0 auto interface ethernet1 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password LmXFXS55H6KD/t/H encrypted passwd LmXFXS55H6KD/t/H encrypted hostname pixfirewall domain-name ciscopix.com clock timezone CST -6 clock summer-time CDT recurring fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol pptp 1723 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names name 10.0.0.0 Roscoe name 10.0.3.0 United name 10.0.50.0 DMSHome name 10.0.4.0 Grayslake name 10.0.10.0 LincolnSquare access-list inside_nat0_outbound permit ip 10.0.11.0 255.255.255.0 interface outside access-list inside_nat0_outbound permit ip 10.0.11.0 255.255.255.0 United 255.255.255.0 access-list inside_nat0_outbound permit ip 10.0.11.0 255.255.255.0 DMSHome 255.255.255.0 access-list inside_nat0_outbound permit ip 10.0.11.0 255.255.255.0 Grayslake 255.255.255.0 access-list inside_nat0_outbound permit ip 10.0.11.0 255.255.255.0 LincolnSquare 255.255.255.0 access-list inside_nat0_outbound permit ip 10.0.11.0 255.255.255.0 Roscoe 255.255.255.0 access-list inside_nat0_outbound permit ip 10.0.11.0 255.255.255.0 192.168.1.0 255.255.255.0 access-list outside_cryptomap_21 permit ip 10.0.11.0 255.255.255.0 Roscoe 255.255.255.0 access-list outside_cryptomap_41 permit ip 10.0.11.0 255.255.255.0 United 255.255.255.0 access-list outside_cryptomap_61 permit ip 10.0.11.0 255.255.255.0 DMSHome 255.255.255.0 access-list outside_cryptomap_81 permit ip 10.0.11.0 255.255.255.0 Grayslake 255.255.255.0 access-list outside_cryptomap_101 permit ip 10.0.11.0 255.255.255.0 LincolnSquare 255.255.255.0 access-list outside_access_in remark Allow PING access-list outside_access_in permit tcp any any eq pptp access-list outside_access_in permit udp any any eq 1723 access-list outside_access_in permit icmp any any access-list outside_access_in permit gre host 67.111.111.251 any pager lines 24 icmp permit any outside icmp permit any inside mtu outside 1500 mtu inside 1500 ip address outside 67.111.111.251 255.255.255.248 ip address inside 10.0.11.7 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool Remote_Access 192.168.1.100-192.168.1.150 mask 255.255.255.0 pdm location 10.0.11.0 255.255.255.0 inside pdm location 192.168.1.0 255.255.255.0 inside pdm location Roscoe 255.255.255.0 outside pdm location United 255.255.255.0 outside pdm location DMSHome 255.255.255.0 outside pdm location Grayslake 255.255.255.0 outside pdm location LincolnSquare 255.255.255.0 outside pdm location 10.0.11.11 255.255.255.255 inside pdm location 192.168.1.0 255.255.255.0 outside pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list inside_nat0_outbound nat (inside) 1 0.0.0.0 0.0.0.0 0 0 static (inside,outside) udp interface 1723 10.0.11.11 1723 netmask 255.255.255.255 0 0 access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 67.111.111.249 1 timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout sip-disconnect 0:02:00 sip-invite 0:03:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local http server enable http 192.168.1.0 255.255.255.0 inside http 10.0.11.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec sysopt connection permit-pptp crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto map outside_map 21 ipsec-isakmp crypto map outside_map 21 match address outside_cryptomap_21 crypto map outside_map 21 set peer 66.111.111.20 crypto map outside_map 21 set transform-set ESP-3DES-SHA crypto map outside_map 41 ipsec-isakmp crypto map outside_map 41 match address outside_cryptomap_41 crypto map outside_map 41 set peer 64.111.111.186 crypto map outside_map 41 set transform-set ESP-3DES-SHA crypto map outside_map 61 ipsec-isakmp crypto map outside_map 61 match address outside_cryptomap_61 crypto map outside_map 61 set peer 64.111.111.187 crypto map outside_map 61 set transform-set ESP-3DES-SHA crypto map outside_map 81 ipsec-isakmp crypto map outside_map 81 match address outside_cryptomap_81 crypto map outside_map 81 set peer 64.111.111.203 crypto map outside_map 81 set transform-set ESP-3DES-SHA crypto map outside_map 101 ipsec-isakmp crypto map outside_map 101 match address outside_cryptomap_101 crypto map outside_map 101 set peer 66.111.111.117 crypto map outside_map 101 set transform-set ESP-3DES-SHA crypto map outside_map client configuration address initiate crypto map outside_map client configuration address respond crypto map outside_map interface outside crypto map mymap client configuration address initiate crypto map mymap client configuration address respond isakmp enable outside isakmp enable inside isakmp key ******** address 66.111.111.20 netmask 255.255.255.255 no-xauth no-config-mode isakmp key ******** address 64.111.111.186 netmask 255.255.255.255 no-xauth no-config-mode isakmp key ******** address 64.111.111.187 netmask 255.255.255.255 no-xauth no-config-mode isakmp key ******** address 64.111.111.203 netmask 255.255.255.255 no-xauth no-config-mode isakmp key ******** address 66.111.111.117 netmask 255.255.255.255 no-xauth no-config-mode isakmp identity address isakmp nat-traversal 20 isakmp policy 10 authentication pre-share isakmp policy 10 encryption des isakmp policy 10 hash sha isakmp policy 10 group 1 isakmp policy 10 lifetime 86400 isakmp policy 20 authentication pre-share isakmp policy 20 encryption des isakmp policy 20 hash sha isakmp policy 20 group 1 isakmp policy 20 lifetime 28800 telnet 10.0.11.0 255.255.255.0 inside telnet 0.0.0.0 0.0.0.0 inside telnet timeout 5 ssh 0.0.0.0 0.0.0.0 outside ssh timeout 5 management-access inside console timeout 0 vpdn group Remote_Access accept dialin pptp vpdn group Remote_Access ppp authentication chap vpdn group Remote_Access ppp authentication mschap vpdn group Remote_Access ppp encryption mppe auto vpdn group Remote_Access client configuration address local Remote_Access vpdn group Remote_Access client configuration dns 10.0.0.10 10.0.0.15 vpdn group Remote_Access client configuration wins 10.0.0.10 10.0.0.15 vpdn group Remote_Access pptp echo 300 vpdn group Remote_Access client authentication local vpdn username mschexxx password ********* vpdn username jmooxxx password ********* vpdn username atomxxx password ********* vpdn enable outside dhcpd address 10.0.11.100-10.0.11.199 inside dhcpd dns 10.0.0.15 65.106.7.196 dhcpd wins 10.0.0.10 10.0.0.15 dhcpd lease 3600 dhcpd ping_timeout 750 dhcpd domain chicago21.net dhcpd auto_config outside dhcpd enable inside terminal width 80 Cryptochecksum:04bfa27b9d7365fcff307c49ec720933 : end [OK]
Any ideas? Keep it simple, because that's me.
|
Answer : Problem: VPN client will connect but cannot access anything within the PIX506E firewall.
|
|
any time you change a static nat the clear xlate just makes sure that all of the existing nats are reset.
|
|
|
|