<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX PPTP Server: Clients fails to login on windows domain in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-pptp-server-clients-fails-to-login-on-windows-domain/m-p/120258#M605312</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a connection-related message. This message occurs when a packet is sent to the&lt;/P&gt;&lt;P&gt;same interface that it arrived on. This usually indicates that a security breach is occurring. When&lt;/P&gt;&lt;P&gt;the PIX Firewall receives a packet, it tries to establish a translation slot based on the security&lt;/P&gt;&lt;P&gt;policy you set with the global and ACL commands, and your routing policy set with the route&lt;/P&gt;&lt;P&gt;command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Failing both policies, PIX Firewall allows the packet to flow from the higher priority network to a&lt;/P&gt;&lt;P&gt;lower priority network, if it is consistent with the security policy. If a packet comes from a lower&lt;/P&gt;&lt;P&gt;priority network and the security policy does not allow it, PIX Firewall routes the packet back to&lt;/P&gt;&lt;P&gt;the same interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To provide access from an interface with a higher security to a lower security, use the nat and&lt;/P&gt;&lt;P&gt;global commands. For example, use the nat command to let inside users access outside servers, to let&lt;/P&gt;&lt;P&gt;inside users access perimeter servers, and to let perimeter users access outside servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To provide access from an interface with a lower security to higher security, use the static and&lt;/P&gt;&lt;P&gt;ACL commands. For example, use the static and  commands to let outside users access&lt;/P&gt;&lt;P&gt;inside servers, outside users access perimeter servers, or perimeter servers access inside servers. &lt;/P&gt;&lt;P&gt;Action Fix your configuration to reflect your security policy for handling these attack events. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Jun 2003 13:55:30 GMT</pubDate>
    <dc:creator>hadbou</dc:creator>
    <dc:date>2003-06-10T13:55:30Z</dc:date>
    <item>
      <title>PIX PPTP Server: Clients fails to login on windows domain</title>
      <link>https://community.cisco.com/t5/network-security/pix-pptp-server-clients-fails-to-login-on-windows-domain/m-p/120257#M605311</link>
      <description>&lt;P&gt;--begin ciscomoderator note-- The following post has been edited to remove potentially confidential information. Please refrain from posting confidential information on the site to reduce security risks to your network. -- end ciscomoderator note -- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;I've followed all steps described in the document "How to Configure the Cisco Secure PIX Firewall to Use PPTP" and I've the pix accepting pptp connections and doing authentication via radius. The problem is that client PCs can't log into the windows NT domain. My local test network is 192.168.30.0/24 and the PIX enters pptp users to network 172.16.30.0/16. I get the following debug when the client tries to log in the windows domain: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jun 02 2003 16:08:35: %PIX-6-603102: PPP virtual interface 1 - user: ING\test aaa authentication started &lt;/P&gt;&lt;P&gt;Jun 02 2003 16:08:41: %PIX-6-603103: PPP virtual interface 1 - user: ING\test aaa authentication succeed &lt;/P&gt;&lt;P&gt;Jun 02 2003 16:08:45: %PIX-6-603104: PPTP Tunnel created, tunnel_id is 2, remote_peer_ip is 200.43.250.112, ppp_virtual_interface_id is 1, client_dynamic_ip is 172.16.30.10, username is ING\test, MPPE_key_strength is 40 bits &lt;/P&gt;&lt;P&gt;Jun 02 2003 16:08:45: %PIX-2-109011: Authen Session Start: user 'ING\test', sid 1 &lt;/P&gt;&lt;P&gt;Jun 02 2003 16:08:49: %PIX-6-302015: Built inbound UDP connection 1 for outside:172.16.30.10/137 (172.16.30.10/137) to inside:192.168.30.1/137 (192.168.30.1/137) (ING\test) &lt;/P&gt;&lt;P&gt;Jun 02 2003 16:08:49: %PIX-6-609001: Built local-host inside:192.168.30.1 &lt;/P&gt;&lt;P&gt;Jun 02 2003 16:08:53: %PIX-3-106011: Deny inbound (No xlate) udp src outside:172.16.30.10/138 dst outside:172.16.255.255/138 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following is the PIX configuration for reference: &lt;/P&gt;&lt;P&gt;PIX Version 6.2(2) &lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;enable password -- moderator edit-- encrypted &lt;/P&gt;&lt;P&gt;passwd -- moderator edit-- encrypted &lt;/P&gt;&lt;P&gt;hostname pixfirewall &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21 &lt;/P&gt;&lt;P&gt;fixup protocol http 80 &lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720 &lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719 &lt;/P&gt;&lt;P&gt;fixup protocol ils 389 &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514 &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554 &lt;/P&gt;&lt;P&gt;fixup protocol smtp 25 &lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521 &lt;/P&gt;&lt;P&gt;fixup protocol sip 5060 &lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000 &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.30.0 255.255.255.0 172.16.30.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;logging on &lt;/P&gt;&lt;P&gt;logging timestamp &lt;/P&gt;&lt;P&gt;logging trap informational &lt;/P&gt;&lt;P&gt;logging facility 22 &lt;/P&gt;&lt;P&gt;logging host inside 192.168.30.5 &lt;/P&gt;&lt;P&gt;interface ethernet0 10baset &lt;/P&gt;&lt;P&gt;interface ethernet1 10full &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;ip address outside -- moderator edit-- nnn.nn.nnn.225 255.255.255.192 &lt;/P&gt;&lt;P&gt;ip address inside 192.168.30.7 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip audit info action alarm &lt;/P&gt;&lt;P&gt;ip audit attack action alarm &lt;/P&gt;&lt;P&gt;ip local pool pptp-users 172.16.30.10-172.16.30.20 &lt;/P&gt;&lt;P&gt;pdm logging informational 100 &lt;/P&gt;&lt;P&gt;pdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101 &lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.30.0 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 -- moderator edit-- nnn.nn.nnn.225 1 &lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si &lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;aaa-server AuthInbound protocol radius &lt;/P&gt;&lt;P&gt;aaa-server AuthInbound (inside) host 192.168.30.3 cisco timeout 10 &lt;/P&gt;&lt;P&gt;http server enable &lt;/P&gt;&lt;P&gt;http 192.168.30.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community public &lt;/P&gt;&lt;P&gt;no snmp-server enable traps &lt;/P&gt;&lt;P&gt;floodguard enable &lt;/P&gt;&lt;P&gt;sysopt connection permit-pptp &lt;/P&gt;&lt;P&gt;no sysopt route dnat &lt;/P&gt;&lt;P&gt;telnet timeout 5 &lt;/P&gt;&lt;P&gt;ssh timeout 5 &lt;/P&gt;&lt;P&gt;vpdn group 1 accept dialin pptp &lt;/P&gt;&lt;P&gt;vpdn group 1 ppp authentication pap &lt;/P&gt;&lt;P&gt;vpdn group 1 ppp authentication chap &lt;/P&gt;&lt;P&gt;vpdn group 1 ppp authentication mschap &lt;/P&gt;&lt;P&gt;vpdn group 1 ppp encryption mppe auto &lt;/P&gt;&lt;P&gt;vpdn group 1 client configuration address local pptp-users &lt;/P&gt;&lt;P&gt;vpdn group 1 client configuration wins 192.168.30.1 &lt;/P&gt;&lt;P&gt;vpdn group 1 client authentication aaa AuthInbound &lt;/P&gt;&lt;P&gt;vpdn group 1 pptp echo 60 &lt;/P&gt;&lt;P&gt;vpdn enable outside &lt;/P&gt;&lt;P&gt;dhcpd auto_config outside &lt;/P&gt;&lt;P&gt;terminal width 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll appreciate your help. Thanks in advance, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:46:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-pptp-server-clients-fails-to-login-on-windows-domain/m-p/120257#M605311</guid>
      <dc:creator>l.cabral</dc:creator>
      <dc:date>2020-02-21T06:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: PIX PPTP Server: Clients fails to login on windows domain</title>
      <link>https://community.cisco.com/t5/network-security/pix-pptp-server-clients-fails-to-login-on-windows-domain/m-p/120258#M605312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a connection-related message. This message occurs when a packet is sent to the&lt;/P&gt;&lt;P&gt;same interface that it arrived on. This usually indicates that a security breach is occurring. When&lt;/P&gt;&lt;P&gt;the PIX Firewall receives a packet, it tries to establish a translation slot based on the security&lt;/P&gt;&lt;P&gt;policy you set with the global and ACL commands, and your routing policy set with the route&lt;/P&gt;&lt;P&gt;command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Failing both policies, PIX Firewall allows the packet to flow from the higher priority network to a&lt;/P&gt;&lt;P&gt;lower priority network, if it is consistent with the security policy. If a packet comes from a lower&lt;/P&gt;&lt;P&gt;priority network and the security policy does not allow it, PIX Firewall routes the packet back to&lt;/P&gt;&lt;P&gt;the same interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To provide access from an interface with a higher security to a lower security, use the nat and&lt;/P&gt;&lt;P&gt;global commands. For example, use the nat command to let inside users access outside servers, to let&lt;/P&gt;&lt;P&gt;inside users access perimeter servers, and to let perimeter users access outside servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To provide access from an interface with a lower security to higher security, use the static and&lt;/P&gt;&lt;P&gt;ACL commands. For example, use the static and  commands to let outside users access&lt;/P&gt;&lt;P&gt;inside servers, outside users access perimeter servers, or perimeter servers access inside servers. &lt;/P&gt;&lt;P&gt;Action Fix your configuration to reflect your security policy for handling these attack events. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2003 13:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-pptp-server-clients-fails-to-login-on-windows-domain/m-p/120258#M605312</guid>
      <dc:creator>hadbou</dc:creator>
      <dc:date>2003-06-10T13:55:30Z</dc:date>
    </item>
  </channel>
</rss>

