Options

Pix 515e VPN Config Question

ok well im a noob when it comes to 515e PIX. Let me tell you how my current setup is. Pix is doing dhcp (10.25.19.x network). My vpn pool is 172.16.38.100 /27. I can get connected to the VPN using ipsec, and i get a valid ip, but i cannot access/ping any hosts on the 10.25.19.x subnet. heres my config. I have the debugs if you all wanna check em out.

pix# wr term
Building configuration...
: Saved
:
PIX Version 6.3(5)
interface ethernet0 100full
interface ethernet1 100full
interface ethernet2 auto shutdown
interface ethernet3 auto shutdown
interface ethernet4 auto shutdown
interface ethernet5 auto shutdown
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security4
nameif ethernet3 intf3 security6
nameif ethernet4 intf4 security8
nameif ethernet5 intf5 security10
enable password VKKa1d/R9Lng.i7d encrypted
passwd VKKa1d/R9Lng.i7d encrypted
hostname pix
domain-name mysubnetzone.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list outside_in permit ip any host x.x.x.x
access-list outside_in permit tcp any host x.x.x.x eq www
access-list inside_outbound_nat0_acl permit ip 10.25.19.0 255.255.255.240 172.16
.38.96 255.255.255.224
pager lines 24
mtu outside 1500
mtu inside 1500
mtu intf2 1500
mtu intf3 1500
mtu intf4 1500
mtu intf5 1500
ip address outside x.x.x.x 255.255.255.248
ip address inside 10.25.19.1 255.255.255.240
no ip address intf2
no ip address intf3
no ip address intf4
no ip address intf5
ip audit info action alarm
ip audit attack action alarm
ip local pool VPN 172.15.38.100-172.15.38.125
ip local pool SubnetZone 172.16.38.100-172.16.38.125 mask 255.255.255.224
no failover
failover timeout 0:00:00
failover poll 15
no failover ip address outside
no failover ip address inside
no failover ip address intf2
no failover ip address intf3
no failover ip address intf4
no failover ip address intf5
pdm location 10.25.19.2 255.255.255.255 inside
pdm location 10.25.19.0 255.255.255.240 inside
pdm location 10.25.19.3 255.255.255.255 inside
pdm location 172.15.38.96 255.255.255.224 outside
pdm location 10.25.16.0 255.255.255.240 inside
pdm location 10.25.16.0 255.255.240.0 inside
pdm location 172.16.38.96 255.255.255.224 outside
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 10.25.19.0 255.255.255.240 0 0
static (inside,outside) tcp x.x.x.x www 10.25.19.2 www netmask 255.255.255.2
55 0 0
static (inside,outside) tcp x.x.x.x ftp 10.25.19.2 ftp netmask 255.255.255.2
55 0 0
static (inside,outside) tcp x.x.x.x 3389 10.25.19.2 3389 netmask 255.255.255
.255 0 0
static (inside,outside) tcp x.x.x.x ftp-data 10.25.19.2 ftp-data netmask 255
.255.255.255 0 0
static (inside,outside) tcp x.x.x.x smtp 10.25.19.2 smtp netmask 255.255.255
.255 0 0
static (inside,outside) tcp x.x.x.x pop3 10.25.19.2 pop3 netmask 255.255.255
.255 0 0
access-group outside_in in interface outside
route outside 0.0.0.0 0.0.0.0 x.x.x.x
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 10.25.19.3 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
sysopt connection permit-pptp
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp nat-traversal 20
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup VPN address-pool SubnetZone
vpngroup VPN dns-server 24.93.41.125
vpngroup VPN idle-time 1800
vpngroup VPN password ********
telnet 10.25.19.0 255.255.255.240 inside
telnet timeout 5
ssh timeout 5
console timeout 60
vpdn username ruben password *********
vpdn username jason password *********
vpdn username thisisalex02 password *********
vpdn enable outside
dhcpd address 10.25.19.3-10.25.19.14 inside
dhcpd dns 24.93.41.125
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd enable inside
username thisisalex02 password 5RXdwS/M0QcGzTbj encrypted privilege 15
terminal width 80
Cryptochecksum:42128f72ded93e389c10b3a9e0194aa8
: end
[OK]
pix#



IP Configuration on VPN Client -

Windows IP Configuration


Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . :
IP Address. . . . . . . . . . . . : x.x.x.x
Subnet Mask . . . . . . . . . . . : 255.255.255.248
Default Gateway . . . . . . . . . :

Ethernet adapter Local Area Connection 3:

Connection-specific DNS Suffix . :
IP Address. . . . . . . . . . . . : 172.16.38.100
Subnet Mask . . . . . . . . . . . : 255.255.255.224
Default Gateway . . . . . . . . . : 172.16.38.100

C:\Documents and Settings\ALeX_Ocho>ping 10.25.19.2 (03 server ip)

Pinging 10.25.19.2 with 32 bytes of data:

Request timed out.
Request timed out.
Request timed out.
Request timed out.

Ping statistics for 10.25.19.2:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
Switches are bridges on steroids!

Comments

  • Options
    AhriakinAhriakin Member Posts: 1,799 ■■■■■■■■□□
    I've only worked with Network Extension VPNs not a client side pool and I don't time at the moment to dig up the reference material but shouldn't there be a translation between your VPN pool and the private pool?
    We responded to the Year 2000 issue with "Y2K" solutions...isn't this the kind of thinking that got us into trouble in the first place?
  • Options
    thisisalex02thisisalex02 Member Posts: 136
    mike help
    Switches are bridges on steroids!
  • Options
    mikej412mikej412 Member Posts: 10,086 ■■■■■■■■■■
    mike help
    which mike?
    Ahriakin wrote:
    shouldn't there be a translation between your VPN pool and the private pool?
    Those 10s are DHCP'ed to hosts on the inside interface network?

    Nothing is getting into the inside network unless you explicitly allow it.

    You can also NAT them in.

    I don't see either configuration..... but I am reviewing like the wind for my lab exam..... so I don't have time to ponder the config (other than hope I don't see it on the Lab Exam icon_lol.gif )
    :mike: Cisco Certifications -- Collect the Entire Set!
  • Options
    thisisalex02thisisalex02 Member Posts: 136
    access-list inside_outbound_nat0_acl permit ip 10.25.19.0 255.255.255.240 172.16.38.96 255.255.255.224


    This wouldnt allow it ?? dammit wheres my pix book

    yea i meant you mike.. lol
    Switches are bridges on steroids!
  • Options
    mikej412mikej412 Member Posts: 10,086 ■■■■■■■■■■
    Isn't it source first in the ACL? Or are you trying to confuse me for the lab exam? icon_lol.gif

    The 10s are a higher security interface so they should be able to get out from inside without a problem.

    You'd need the ACL to get from the VPN pool through the higher security inside interface.

    Great -- now you got me all confused and now I'll have to stay up all night and re-read the Doc DVD.... just kidding. icon_lol.gif I was already planning to do that anyway.... just kidding again. icon_lol.gif I'm really planning to memorize all the IDS signature configurations tonight. Ha ha -- got you again! icon_lol.gif I'm done studying and plan to just drink until my Lab exam.

    Okay -- enough jokes.... back to my IDS Sensor.... I'm near the end of the Lab Blueprint and trying to figure out what "Advanced IDS features" could be....
    :mike: Cisco Certifications -- Collect the Entire Set!
  • Options
    thisisalex02thisisalex02 Member Posts: 136
    lol are you drunk mike ! ! lol

    so u think i need to flip around those private pools in the acl so that it looks like

    access-list inside_outbound_nat0_acl permit ip 172.16.38.96 255.255.255.224 10.25.19.0 255.255.255.240

    Put down that blueprint for a bit.. grab a beer.. and help me out.. :)

    When u got lab ?
    Switches are bridges on steroids!
Sign In or Register to comment.