VPN Connection Problems between Cisco PIX 506E and Cisco VPN Concentrator 3005

VPN Connection Problems between Cisco PIX 506E and Cisco VPN Concentrator 3005

Post by boverman » Wed, 16 Feb 2005 23:03:55


ello all,

I got a problem with a vpn connection from a cisco pix 506E to a cisco
3005 concentrator. The problem is that the lan on the pix is also used
to another remote side. so I tried to activate NAT on the pix to
translate the ip adresses of the network. after that I entered the
information at the concentrator which are nessassray for the
lan-to-lan connection.
But I did not get a connection. I tried to ping the outside address of
the pix but I did not get a reply.

I post the output of the logfile for that connection below:



29437 02/15/2005 14:25:21.890 SEV=4 IKE/41 RPT=43758 213.183.66.179
IKE Initiator: New Phase 1, Intf 2, IKE Peer 213.183.66.179
local Proxy Address 192.168.0.0, remote Proxy Address 213.183.66.179,
SA (L2L: to PIX)

29507 02/15/2005 14:26:02.300 SEV=4 IKEDBG/65 RPT=36896 213.183.66.179
Group [213.183.66.179]
IKE MM Initiator FSM error history (struct &0x3b7510c)
<state>, <event>:
MM_DONE, EV_ERROR
MM_WAIT_MSG6, EV_TIMEOUT
MM_WAIT_MSG6, NullEvent
MM_SND_MSG5, EV_SND_MSG



and here is the config of the pix:

PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname Cisco-Firewall-VPN
domain-name pk-intern.de
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list ipsec permit ip host 2xx.1xx.6x.1xx 192.168.8.224
255.255.255.224
access-list ipsec permit ip 192.168.41.0 255.255.255.0 192.168.4.0
255.255.255.0

access-list ipsec permit ip 192.168.41.0 255.255.255.0 192.168.8.224
255.255.255
.224
access-list nonat permit ip any host 192.168.14.1
access-list nonat permit ip any 192.168.14.0 255.255.255.192
access-list nonat permit ip host 2xx.1xx.6x.1xx 192.168.8.xxx
255.255.255.224
access-list nonat permit ip 192.168.4.0 255.255.255.0 192.168.8.xxx
255.255.255.
224
access-list outside_cryptomap_dyn_20 permit ip any host 192.168.14.1
access-list outside_cryptomap_dyn_20 permit ip any 192.168.14.0
255.255.255.192
access-list outside_cryptomap_30 permit ip 192.168.4.0 255.255.255.0
192.168.8.xxx 255.255.255.224
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 2xx.1xx.6x.1xx 255.255.255.248
ip address inside 192.168.4.xx 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool EDV 192.168.14.1-192.168.14.32 mask 255.255.255.0
pdm location 192.168.4.xx 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 2xx.1xx.6x.1xx
nat (inside) 0 access-list nonat
static (inside,outside) 192.168.41.0 192.168.4.0 netmask 255.255.255.0
0 0
route outside 0.0.0.0 0.0.0.0 2xx.1xx.6x.1xx 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225
1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server T
 
 
 

1. VPN connection to Cisco 3005 VPN Concentrator

2. W2K vpn client to Cisco 3005 VPN concentrator

I've got a project to configure a Cisco 3005 vpn concentrator to allow
connections from the w2k builtin vpn client.

The concentrator currently has users connecting via the Cisco client
using IPSec, and authenticating against an Active Directory server.

The way I understand things is, PPTP is supported, but only without
encryption when authentication against Active Directory. And the only
other option is L2TP/IPSec, which is mutually exclusive with the
IPsec-only that's currently in use. (Have I got this all correct?)

So, the only option open here is PPTP without encryption, correct?

Is there any way to get the w2k client to do l2tp without ipsec?

Thanks!

3. Re[2]: W2K vpn client to Cisco 3005 VPN concentrator

4. ISA to Cisco VPN 3005 using Cisco VPN Client 4.0.3

5. Cisco VPN 3005 concentrator and MS IAS

6. CISCO VPN client -> ISA 2000 -> CISCO VPN Concentrator

7. Enable a Cisco IPSec VPN Client to Connect to a Cisco VPN Concentrator Through I

8. USB Keys and Cisco VPN Concentrator / Cisco VPN Client ?

9. Cisco ASA 5510 to Cisco PIX 506E VPN Tunnel, Dropping RDP

10. Cisco Pix 506E VPN to Win XP using Microsoft built in VPN

11. PPTP VPN Connection to Cisco 3005

12. CISCO PIX 506E REMOTE TO SITE VPN PROBLEM

13. cisco VPN 3005 L2TP problems

14. Cisco VPN Client - wireless AP - Cisco 3000 concentrator

15. Comparing Cisco VPN concentrator and a Cisco 2800 router with SDM