Question : Problem: Unable to get ISAKMP negotiation between PIX and Cisco 831 router

I've been trying to set up a VPN between a 831 Router at a remote office and the PIX firewall at the corporate office. I've stared at these configs until I'm blue in the face and cannot find the problem. I think it might be in the access list, but I'm not sure what to do. I have run debug crypto isakmp on both sides and cannot get any output indicating there is communication between the two. I do have vpdn set up and working so I can work from both sides of the connection. I have tried pinging from boxes on the inside of each network, but neither device will bring up the tunnel or show any output through debug.
Here are the configs:
-----------------------------------------------------------------------------------------
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security10
enable password Ww0YZPh.iCQFGluP encrypted
passwd Ww0YZPh.iCQFGluP encrypted
hostname pix.133154-01
domain-name xxxxxxxxx.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
fixup protocol ftp 20
names
access-list VPN permit ip 192.168.1.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list VPN permit ip 192.168.2.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list VPN permit ip 192.168.3.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list VPN permit ip 192.168.4.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list VPN permit ip 192.168.5.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list VPN permit ip 192.168.6.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list VPN permit ip 192.168.7.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list VPN permit ip 192.168.8.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list VPN permit ip 192.168.10.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list emiller permit ip 192.168.1.0 255.255.255.0 192.168.8.0 255.255.255.0
pager lines 24
interface ethernet0 100full
interface ethernet1 100basetx
interface ethernet2 auto shutdown
mtu outside 1500
mtu inside 1500
mtu intf2 1500
ip address outside 69.11.xxx.xxx 255.255.255.240
ip address inside 192.168.1.1 255.255.255.0
ip address intf2 127.0.0.1 255.255.255.255
ip audit info action alarm
ip audit attack action alarm
ip local pool clients 192.168.200.100-192.168.200.119
pdm history enable
arp timeout 14400
global (outside) 1 69.11.xxx.xxx
nat (inside) 0 access-list VPN
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
conduit permit icmp any any
route outside 0.0.0.0 0.0.0.0 69.11.xxx.xxx 1
route inside 10.138.88.0 255.255.255.0 192.168.1.2 1
route inside 192.168.2.0 255.255.255.0 192.168.1.2 1
route inside 192.168.3.0 255.255.255.0 192.168.1.2 1
route inside 192.168.4.0 255.255.255.0 192.168.1.2 1
route inside 192.168.5.0 255.255.255.0 192.168.1.2 1
route inside 192.168.6.0 255.255.255.0 192.168.1.2 1
route inside 192.168.10.0 255.255.255.0 192.168.1.2 1
route inside 192.168.100.0 255.255.255.0 192.168.1.2 1
route inside 192.168.101.0 255.255.255.0 192.168.1.2 1
route inside 192.168.102.0 255.255.255.0 192.168.1.2 1
route inside 192.168.200.0 255.255.255.0 192.168.1.2 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
sysopt connection permit-pptp
no sysopt route dnat
crypto ipsec transform-set strong esp-3des esp-md5-hmac
crypto ipsec security-association lifetime seconds 3600
crypto map emiller 21 ipsec-isakmp
crypto map emiller 21 match address emiller
crypto map emiller 21 set peer 24.94.xxx.x
crypto map emiller 21 set transform-set strong
crypto map emiller interface outside
isakmp enable outside
isakmp key ******** address 24.94.xxx.x netmask 255.255.255.255
isakmp identity address
isakmp policy 21 authentication pre-share
isakmp policy 21 encryption 3des
isakmp policy 21 hash md5
isakmp policy 21 group 2
isakmp policy 21 lifetime 86400
telnet 0.0.0.0 0.0.0.0 inside
telnet timeout 15
ssh 24.94.xxx.x 255.255.255.255 outside
ssh timeout 15
vpdn group 1 accept dialin pptp
vpdn group 1 ppp authentication mschap
vpdn group 1 ppp encryption mppe auto required
vpdn group 1 client configuration address local clients
vpdn group 1 client configuration dns 192.168.1.25
vpdn group 1 pptp echo 60
vpdn group 1 client authentication local
vpdn username xxxxxxxx password *********
vpdn username xxxxxx password *********
vpdn enable outside
terminal width 80
Cryptochecksum:86eeb0849b6741ffb23f298d9f4b08d7
: end

-------------------------------------------------------------------------------------------------
!This is the running config of the router: 192.168.8.1
!----------------------------------------------------------------------------
!version 12.3
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname BrownDeer
!
security authentication failure rate 3 log
security passwords min-length 6
logging buffered 51200 debugging
logging console critical
enable secret 5 $1$VJ6t$PTMACj/MR9aRy0ntlZUhv0
!
username Eric privilege 15 password 7 141A010E1E127F78
clock timezone Chicago -6
clock summer-time Chicago date Apr 3 2004 2:00 Oct 31 2004 2:00
no aaa new-model
ip subnet-zero
no ip source-route
ip domain lookup source-interface Ethernet1
ip domain name xxxxxxx.com
ip dhcp excluded-address 192.168.8.1 192.168.8.100
ip dhcp excluded-address 192.168.8.200 192.168.8.254
!
ip dhcp pool CLIENT
   import all
   network 192.168.8.0 255.255.255.0
   default-router 192.168.8.1
   lease infinite
!
!
no ip bootp server
ip cef
ip inspect name DEFAULT100 cuseeme
ip inspect name DEFAULT100 ftp
ip inspect name DEFAULT100 h323
ip inspect name DEFAULT100 netshow
ip inspect name DEFAULT100 rcmd
ip inspect name DEFAULT100 realaudio
ip inspect name DEFAULT100 rtsp
ip inspect name DEFAULT100 smtp
ip inspect name DEFAULT100 sqlnet
ip inspect name DEFAULT100 streamworks
ip inspect name DEFAULT100 tftp
ip inspect name DEFAULT100 tcp
ip inspect name DEFAULT100 udp
ip inspect name DEFAULT100 vdolive
ip inspect name DEFAULT100 icmp
ip audit notify log
ip audit po max-events 100
ip ssh time-out 60
ip ssh authentication-retries 2
no ftp-server write-enable
!
!
!
!
crypto isakmp policy 10
 encr 3des
 hash md5
 authentication pre-share
 group 2
crypto isakmp key 0 xxxxx address 69.11.xxx.xxx
!
!
crypto ipsec transform-set strong esp-3des esp-md5-hmac
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
 description Tunnel to 69.11.xxx.xxx
 set peer 69.11.xxx.xxx
 set transform-set strong
 match address 103
!
!
!
!
interface Null0
 no ip unreachables
!
interface Ethernet0
 description $ETH-LAN$$FW_INSIDE$
 ip address 192.168.8.1 255.255.255.0
 ip access-group 100 in
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip nat inside
 ip route-cache flow
 no cdp enable
!
interface Ethernet1
 description $FW_OUTSIDE$
 ip address dhcp client-id Ethernet1
 ip access-group 101 in
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip nat outside
 ip inspect DEFAULT100 out
 ip route-cache flow
 duplex auto
 no cdp enable
 crypto map SDM_CMAP_1
!
interface FastEthernet1
 no ip address
 duplex auto
 speed auto
!
interface FastEthernet2
 no ip address
 duplex auto
 speed auto
!
interface FastEthernet3
 no ip address
 duplex auto
 speed auto
!
interface FastEthernet4
 no ip address
 duplex auto
 speed auto
!
ip nat inside source route-map SDM_RMAP_1 interface Ethernet1 overload
ip classless
ip http server
ip http access-class 1
ip http authentication local
ip http secure-server
!
logging trap debugging
logging 192.168.8.101
access-list 1 permit 192.168.8.101
access-list 1 remark SDM_ACL Category=17
access-list 1 permit 192.168.8.0 0.0.0.255
access-list 1 deny   any
access-list 100 remark auto generated by SDM firewall configuration
access-list 100 remark SDM_ACL Category=1
access-list 100 remark IPSec Rule
access-list 100 deny   ip 192.168.8.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 100 permit tcp host 192.168.8.101 host 192.168.8.1 eq telnet
access-list 100 permit tcp host 192.168.8.101 host 192.168.8.1 eq 22
access-list 100 permit tcp host 192.168.8.101 host 192.168.8.1 eq www
access-list 100 permit tcp host 192.168.8.101 host 192.168.8.1 eq 443
access-list 100 permit tcp host 192.168.8.101 host 192.168.8.1 eq cmd
access-list 100 deny   tcp any host 192.168.8.1 eq telnet
access-list 100 deny   tcp any host 192.168.8.1 eq 22
access-list 100 deny   tcp any host 192.168.8.1 eq www
access-list 100 deny   tcp any host 192.168.8.1 eq 443
access-list 100 deny   tcp any host 192.168.8.1 eq cmd
access-list 100 deny   udp any host 192.168.8.1 eq snmp
access-list 100 deny   ip 24.94.xxx.x 0.0.0.3 any
access-list 100 deny   ip host 255.255.255.255 any
access-list 100 deny   ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip any any
access-list 101 remark auto generated by SDM firewall configuration
access-list 101 remark SDM_ACL Category=1
access-list 101 remark IPSec Rule
access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.8.0 0.0.0.255
access-list 101 permit udp host 69.11.xxx.xxx any eq non500-isakmp
access-list 101 permit udp host 69.11.xxx.xxx any eq isakmp
access-list 101 permit esp host 69.11.xxx.xxx any
access-list 101 permit ahp host 69.11.xxx.xxx any
access-list 101 permit tcp host 69.11.xxx.xxx host 24.94.xxx.x eq 22
access-list 101 permit tcp host 69.11.xxx.xxx host 24.94.xxx.x eq 443
access-list 101 permit tcp host 69.11.xxx.xxx host 24.94.xxx.x eq cmd
access-list 101 permit gre host 69.11.xxx.xxx host 24.94.xxx.x
access-list 101 deny   tcp any host 24.94.xxx.x eq telnet
access-list 101 deny   tcp any host 24.94.xxx.x eq www
access-list 101 deny   udp any host 24.94.xxx.x eq snmp
access-list 101 remark Auto generated by SDM for NTP (123) 132.163.4.101
access-list 101 permit udp host 132.163.4.101 eq ntp any eq ntp
access-list 101 deny   ip 192.168.8.0 0.0.0.255 any
access-list 101 permit udp any eq bootps any eq bootpc
access-list 101 permit icmp any any echo-reply
access-list 101 permit icmp any any time-exceeded
access-list 101 permit icmp any any unreachable
access-list 101 deny   ip 10.0.0.0 0.255.255.255 any
access-list 101 deny   ip 172.16.0.0 0.15.255.255 any
access-list 101 deny   ip 192.168.0.0 0.0.255.255 any
access-list 101 deny   ip 127.0.0.0 0.255.255.255 any
access-list 101 deny   ip host 255.255.255.255 any
access-list 101 deny   ip any any log
access-list 102 remark VTY Access-class list
access-list 102 remark SDM_ACL Category=17
access-list 102 permit ip host 192.168.8.101 any
access-list 102 permit ip host 69.11.232.202 any
access-list 102 deny   ip any any
access-list 103 remark SDM_ACL Category=4
access-list 103 remark IPSec Rule
access-list 103 permit ip 192.168.8.0 0.0.0.255 192.168.1.0 0.0.0.255
no cdp run
route-map SDM_RMAP_1 permit 1
 match ip address 100
!
banner login ^C
Unauthorized access to this router is forbidden.
If you violate this policy, you may be prosecuted to the full extent of the law.

^C
!
line con 0
 login local
 no modem enable
 transport output telnet
line aux 0
 login local
 transport output telnet
line vty 0 4
 access-class 102 in
 privilege level 15
 login local
 transport input telnet ssh
!
scheduler max-task-time 5000
scheduler interval 500
sntp server 132.163.4.101
!
end
-----------------------------------------------------------------------

Any help you can give would be greatly appreciated.

Answer : Problem: Unable to get ISAKMP negotiation between PIX and Cisco 831 router

>access-list emiller permit ip 192.168.1.0 255.255.255.0 192.168.8.0 255.255.255.0
>crypto map emiller 21 match address emiller
>crypto map emiller 21 set peer 24.94.xxx.x

With those entries, can I assume that this is for the LAN-LAN tunnel to the router?

I would expect to also see an addition to the nat zero acl that matches the "emiller" acl:
access-list VPN permit ip 192.168.1.0 255.255.255.0 192.168.8.0 255.255.255.0

On the router side:

Given:
>interface Ethernet1
> description $FW_OUTSIDE$
> ip access-group 101 in

Your access-list is specifically permitting the network on the other side of the PIX (Good!)
>access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.8.0 0.0.0.255

Your tunnel match acl is mirror of the PIX (Good!)
>access-list 103 permit ip 192.168.8.0 0.0.0.255 192.168.1.0 0.0.0.255

Route-map for NAT is OK on the router (Good!)

Everything else looks good. Two more things to check:

PC on 192.168.8.x side has default gateway pointing to 192.168.8.1 (router) - Check?
PC on 192.168.1.x side has default gateway pointing to 192.168.1.1 (pix) - Check?
PC on 192.168.1.x side has default gateway pointing to 192.168.1.2 (router?) - Does this router have a route statement in it pointing to the PIX for the 192.168.8.x subnet?





Random Solutions  
 
programming4us programming4us