<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 515E in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515e/m-p/666200#M1031486</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello philips,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to see any traffic hitting your PIX , when they initiate the traffic ?? run some debugs, given above and see what exactly is happening.. you can also ask the remote guys to run some debugs and see what happens... the configs on your end PIX, looks fine... make sure of the following from your end:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) hope you are able to ping and reach 47.234.0.60&lt;/P&gt;&lt;P&gt;2) Be very sure of the parameters configured on the Nortel box . they should have configured DES encryption, md5 hash, group 1, lifetime 86400, the same ISAKMP key, transform sets etc.. even if one of these parameters dont match, it is going to be an issue...&lt;/P&gt;&lt;P&gt;3) default gateway on DMS100 will point to the local DMZ ip address of the PIX..&lt;/P&gt;&lt;P&gt;4) Just to be sure, make sure you see the NAT translation on the show xlate &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try these and give us more info on the issue..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Jan 2007 00:46:07 GMT</pubDate>
    <dc:creator>sachinraja</dc:creator>
    <dc:date>2007-01-24T00:46:07Z</dc:date>
    <item>
      <title>PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e/m-p/666197#M1031480</link>
      <description>&lt;P&gt;I configure a IPSec Tunnel to Nortel Contivity switch out of my network. The problem is: when I use "show crypto ipsec sa" and "show crypto isakmp sa" commands, the outfut is as following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall# show crypto ipsec sa  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface: outside&lt;/P&gt;&lt;P&gt;    Crypto map tag: outside_map, local addr. OutsideInterface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   local  ident (addr/mask/prot/port): (DMS100/255.255.255.255/0/0)&lt;/P&gt;&lt;P&gt;   remote ident (addr/mask/prot/port): (198.206.164.1/255.255.255.255/0/0)&lt;/P&gt;&lt;P&gt;   current_peer: 47.234.0.60&lt;/P&gt;&lt;P&gt;     PERMIT, flags={origin_is_acl,}&lt;/P&gt;&lt;P&gt;    #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0&lt;/P&gt;&lt;P&gt;    #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0&lt;/P&gt;&lt;P&gt;    #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;    #pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0&lt;/P&gt;&lt;P&gt;    #send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     local crypto endpt.: OutsideInterface, remote crypto endpt.: 47.234.0.60&lt;/P&gt;&lt;P&gt;     path mtu 1500, ipsec overhead 0, media mtu 1500&lt;/P&gt;&lt;P&gt;     current outbound spi: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     inbound esp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     inbound ah sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;              &lt;/P&gt;&lt;P&gt;     inbound pcp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     outbound esp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     outbound ah sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     outbound pcp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall# show crypto isakmp sa&lt;/P&gt;&lt;P&gt;Total     : 0&lt;/P&gt;&lt;P&gt;Embryonic : 0&lt;/P&gt;&lt;P&gt;        dst             src          state       pending    created&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems that the negotiation process is not initiated from my side. Is there any trigger I have to pull?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration I had is this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip host DMS100 host 198.206.164.1 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit ip host DMS100 host 198.206.164.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto map outside_map 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address outside_cryptomap_20&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set peer 47.234.0.60&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set security-association lifetime seconds 86400 kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 47.234.0.60 netmask 255.255.255.255 no-xauth no-config-mode &lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 30 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 30 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 30 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 30 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 30 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW: As my understanding, the crpyto sequence number and isakmp priority number is NOT necessary to be the same at the both side, am I right?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e/m-p/666197#M1031480</guid>
      <dc:creator>philipsyao</dc:creator>
      <dc:date>2019-03-11T09:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e/m-p/666198#M1031482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello philips..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IPSEC tunnel will not be initiated, unless you force an interesting traffic to flow on the PIX. Try to initiate a traffic from host DMS100 to host 198.206.164.1 &amp;amp; then see the show commands given above. You can also do some debugs... debug crypto isakmp sa, ipsec and see if there any errors.. sequence no need not match, but make sure you match the other things like encryption, authentication, pfs, lifetime, crypto ACL etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.. let us know the results ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jan 2007 00:10:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e/m-p/666198#M1031482</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2007-01-23T00:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e/m-p/666199#M1031483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;due to some reason, we cannot trigger a traffic on the DMS100, but it's able to recieve traffic. People on the 198.206.164.1 said they initiated traffic towards DMS100, but there is no response from our side. What could be the reason? They can ping my outside public IP address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jan 2007 13:31:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e/m-p/666199#M1031483</guid>
      <dc:creator>philipsyao</dc:creator>
      <dc:date>2007-01-23T13:31:18Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e/m-p/666200#M1031486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello philips,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to see any traffic hitting your PIX , when they initiate the traffic ?? run some debugs, given above and see what exactly is happening.. you can also ask the remote guys to run some debugs and see what happens... the configs on your end PIX, looks fine... make sure of the following from your end:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) hope you are able to ping and reach 47.234.0.60&lt;/P&gt;&lt;P&gt;2) Be very sure of the parameters configured on the Nortel box . they should have configured DES encryption, md5 hash, group 1, lifetime 86400, the same ISAKMP key, transform sets etc.. even if one of these parameters dont match, it is going to be an issue...&lt;/P&gt;&lt;P&gt;3) default gateway on DMS100 will point to the local DMZ ip address of the PIX..&lt;/P&gt;&lt;P&gt;4) Just to be sure, make sure you see the NAT translation on the show xlate &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try these and give us more info on the issue..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2007 00:46:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e/m-p/666200#M1031486</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2007-01-24T00:46:07Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e/m-p/666201#M1031488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The problem has been solved. I feel so embarrassed because it's a very silly mistake---They gave me the wrong key. Later when I use debug and show logging command, I saw the "CRYPTO-4-IKMP_BAD_MESSAGE", then I knew the point. Since I double-checked every parameter with them and they said yes, so I didn't pay much attention to it. Sorry for the silly mistake and thank you very much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2007 14:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e/m-p/666201#M1031488</guid>
      <dc:creator>philipsyao</dc:creator>
      <dc:date>2007-01-24T14:16:06Z</dc:date>
    </item>
  </channel>
</rss>

