In your config below the vpn client is being assigned an address that is on
a different subnet than the inside interface of the pix and there is no sign
of a router on that subnet (no default inside route to a router).

BTW, you may want to get rid of the conduit permit any any!

Chris

""Anh Lam""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Can someone in this group help me with this problem?
>
> I am trying to setup VPN connections for remote users (people
> who use laptops on the road or when people to who are on their
> own corporate network) to connect to my home network  using
> IPSec.  I am using a PIX515-UR Firewall at my home network.
> The external IP address (outside) of the PIX is 66.61.46.240
> while the internal IP address (inside) of the PIX is 172.16.1.254.
>
> On the PIX, I also setup an IP pool so that the PIX will assign
> IP address to remote clients when they connect to my home
> network.  This ip pool has ip range of 172.16.2.1-172.16.2.254.
>
> On the clients side, everyone is running Cisco VPN client
> software version 3.0.6.rel2-k9 which I download from Cisco
> website.  The clients are running either WinNT 4.0 workstation,
> or Win2k Professional or RedHat Linux 7.1 with kernel 2.4.10.
>
> When a client attempts to make a VPN connection to the PIX
> (66.61.46.240), the connection is successfully and the client is
> also assigned an IP address of 172.16.2.1.  So what is the problem
> you ask?  Well, even though the client is successfully authenticated
> to my home network, he/she can NOT ping any of the devices in the
> 172.16.1.0/24 network.  From the client, I can see the packet gets
> encrypted before sending out but nothing coming back (the counter
> on the packet decrypted on the client is zero).  Rebooting the PIX
> several times didnot resolve the situation either.
>
> At this point, I decided to replace the PIX515 with a PIX520
> with the exact configuration.  With the PIX520, everything WORKS.
> Client can access devices on the 172.16.1.0/24 network.
> I am running the same PIX IOS code on both the 515 and 520.  Am
> I missing something in the PIX515?  I thought since I am running the
> Un-Restricted(UR) license, VPN is supported.  Below is the
> configuration of the PIX515.  Please help.
>
> Thanks.
> Anh
>
> ciscopix#sh ver
>
> Cisco PIX Firewall Version 6.1(1)
> Cisco PIX Device Manager Version 1.0(2)
>
> Compiled on Tue 11-Sep-01 07:45 by morlee
>
> ciscopix up 9 hours 37 mins
>
> Hardware:   PIX-515, 96 MB RAM, CPU Pentium 200 MHz
> Flash i28F640J5 @ 0x300, 16MB
> BIOS Flash AT29C257 @ 0xfffd8000, 32KB
>
> 0: ethernet0: address is 0050.54ff.7a24, irq 10
> 1: ethernet1: address is 0050.54ff.7a25, irq 7
> 2: ethernet2: address is 00aa.00bc.ba87, irq 11
>
> Licensed Features:
> Failover:       Enabled
> VPN-DES:        Enabled
> VPN-3DES:       Disabled
> Maximum Interfaces:     6
> Cut-through Proxy:      Enabled
> Guards:         Enabled
> Websense:       Enabled
> Inside Hosts:   Unlimited
> Throughput:     Unlimited
> ISAKMP peers:   Unlimited
>
> ciscopix# wr t
> Building configuration...
> : Saved
> :
> PIX Version 6.1(1)
> nameif ethernet0 outside security0
> nameif ethernet1 inside security100
> nameif ethernet2 dmz security99
> enable password xxxxxxx encrypted
> passwd xxxxxxxxx encrypted
> hostname ciscopix
> domain-name micronet.com
> fixup protocol ftp 21
> fixup protocol http 80
> fixup protocol h323 1720
> fixup protocol rsh 514
> fixup protocol rtsp 554
> fixup protocol smtp 25
> fixup protocol sqlnet 1521
> fixup protocol sip 5060
> fixup protocol skinny 2000
> no names
> access-list 101 permit ip 172.16.1.0 255.255.255.0 172.16.2.0
255.255.255.0
> access-list 101 permit ip host 66.61.46.240 172.16.2.0 255.255.255.0
> access-list 80 permit ip 172.16.1.0 255.255.255.0 172.16.2.0 255.255.255.0
> pager lines 24
> interface ethernet0 auto
> interface ethernet1 auto
> interface ethernet2 100full shutdown
> mtu outside 1500
> mtu inside 1500
> mtu dmz 1500
> ip address outside 66.61.46.240 255.255.248.0
> ip address inside 172.16.1.254 255.255.255.0
> ip address dmz 127.0.0.1 255.255.255.0
> ip audit info action alarm
> ip audit attack action alarm
> ip local pool ippool 172.16.2.1-172.16.2.254
> no failover
> failover timeout 0:00:00
> failover poll 15
> failover ip address outside 0.0.0.0
> failover ip address inside 0.0.0.0
> failover ip address dmz 0.0.0.0
> pdm location 164.109.0.0 255.255.0.0 outside
> pdm location 172.16.1.0 255.255.255.0 inside
> pdm history enable
> arp timeout 14400
> nat (inside) 0 access-list 101
> conduit permit ip any any
> route outside 0.0.0.0 0.0.0.0 66.61.40.1 1
> timeout xlate 3:00:00
> timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00
> h323 0:05:00 sip 0:30:00 sip_media 0:02:00
> timeout uauth 0:05:00 absolute
> aaa-server TACACS+ protocol tacacs+
> aaa-server RADIUS protocol radius
> http 172.16.1.0 255.255.255.0 inside
> http 172.16.1.0 255.255.255.0 dmz
> no snmp-server location
> no snmp-server contact
> snmp-server community public
> no snmp-server enable traps
> floodguard enable
> sysopt connection permit-ipsec
> no sysopt route dnat
> auth-prompt prompt prompt
> crypto ipsec transform-set myset esp-des esp-md5-hmac
> crypto dynamic-map dynmap 10 set transform-set myset
> crypto map mymap 10 ipsec-isakmp dynamic dynmap
> crypto map mymap interface outside
> isakmp enable outside
> isakmp identity address
> isakmp policy 10 authentication pre-share
> isakmp policy 10 encryption des
> isakmp policy 10 hash md5
> isakmp policy 10 group 2
> isakmp policy 10 lifetime 86400
> isakmp policy 20 authentication pre-share
> isakmp policy 20 encryption des
> isakmp policy 20 hash md5
> isakmp policy 20 group 1
> isakmp policy 20 lifetime 86400
> vpngroup vpn3000 address-pool ippool
> vpngroup vpn3000 dns-server 24.28.192.64
> vpngroup vpn3000 default-domain micronet.com
> vpngroup vpn3000 split-tunnel 80
> vpngroup vpn3000 idle-time 18000
> vpngroup vpn3000 password ********
> telnet 172.16.1.0 255.255.255.0 inside
> telnet timeout 5
> ssh 206.173.0.0 255.255.0.0 outside
> ssh 172.16.1.0 255.255.255.0 dmz
> ssh timeout 5
> terminal width 80
> Cryptochecksum:3def8b1379394ad2a3ef1b3909576fea
> : end
> [OK]
>
>
>
> _________________________________________________________________
> Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=23738&t=23695
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to