<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with Cisco PIX 515E in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823796#M957241</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And what do the logs say?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They are usually your best and quickest help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Jan 2008 14:41:13 GMT</pubDate>
    <dc:creator>pjhenriqs</dc:creator>
    <dc:date>2008-01-11T14:41:13Z</dc:date>
    <item>
      <title>Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823793#M957235</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want my Remote Access VPN to work to our new PIX firewall Cisco PIX 515E. With AAA to a radius server.&lt;/P&gt;&lt;P&gt;I want the Cisco VPN client to come with a popup which in I can fill in my details coming from the radius server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured the AAA server by hand a run the VPN wizard in ASDM.&lt;/P&gt;&lt;P&gt;After I done this I can't log in with the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it has something to do with the vpngroup commando but the wizard didn't create anything for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can somebody help me checking the config and see if anything need to be modified?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 7.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address [External IP]&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.1.1.7 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 10.248.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip local pool ClientPool 10.248.2.0-10.248.2.255 mask 255.255.0.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server vpn protocol radius&lt;/P&gt;&lt;P&gt;aaa-server vpn host [Radius server]&lt;/P&gt;&lt;P&gt; key [Radius secret]&lt;/P&gt;&lt;P&gt;group-policy [Name] internal&lt;/P&gt;&lt;P&gt;group-policy [Name] attributes&lt;/P&gt;&lt;P&gt; dns-server value 10.1.3.100 10.1.3.101&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt; default-domain value intranet.[Name].nl&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.1.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set pfs&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication crack&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group [Name] type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group [Name] general-attributes&lt;/P&gt;&lt;P&gt; address-pool ClientPool&lt;/P&gt;&lt;P&gt; authentication-server-group vpn&lt;/P&gt;&lt;P&gt; default-group-policy [Name]&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 10.1.1.8-10.1.2.7 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:46:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823793#M957235</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2019-03-11T11:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823794#M957238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you get a prompt to put in your login details or you don't even get that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do get a prompt and you put in your login details, do you see anything on the log of the RADIUS server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are you using? PAP, CHAP, MS-CHAP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paulo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 14:07:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823794#M957238</guid>
      <dc:creator>pjhenriqs</dc:creator>
      <dc:date>2008-01-11T14:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823795#M957239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No I do not get a prompt to put in my login details. Suppose to use CHAP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 14:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823795#M957239</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2008-01-11T14:10:26Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823796#M957241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And what do the logs say?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They are usually your best and quickest help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 14:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823796#M957241</guid>
      <dc:creator>pjhenriqs</dc:creator>
      <dc:date>2008-01-11T14:41:13Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823797#M957243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;client:&lt;/P&gt;&lt;P&gt;Cisco Systems VPN Client Version 4.6.02.0011&lt;/P&gt;&lt;P&gt;Copyright (C) 1998-2004 Cisco Systems, Inc. All Rights Reserved.&lt;/P&gt;&lt;P&gt;Client Type(s): Windows, WinNT&lt;/P&gt;&lt;P&gt;Running on: 5.1.2600 Service Pack 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;69     15:52:27.853  01/11/08  Sev=Warning/2	IKE/0xE3000099&lt;/P&gt;&lt;P&gt;Invalid SPI size (PayloadNotify:116)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;70     15:52:27.853  01/11/08  Sev=Warning/3	IKE/0xA3000058&lt;/P&gt;&lt;P&gt;Received malformed message or negotiation no longer active (message id: 0x00000000)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix&lt;/P&gt;&lt;P&gt;4	Jan 11 2008	14:51:59	713903			 Group = DefaultRAGroup, IP = 213.126.129.250, Error: Unable to remove PeerTblEntry&lt;/P&gt;&lt;P&gt;3	Jan 11 2008	14:51:59	713902			 Group = DefaultRAGroup, IP = 213.126.129.250, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 14:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823797#M957243</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2008-01-11T14:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823798#M957244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey where is your pre-shared key?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group remote ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And what is this?&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10 &lt;/P&gt;&lt;P&gt; authentication crack (crack?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps,&lt;/P&gt;&lt;P&gt;Paulo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 16:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823798#M957244</guid>
      <dc:creator>pjhenriqs</dc:creator>
      <dc:date>2008-01-11T16:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823799#M957246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also I think you are missing NAT-T&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal  20&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 16:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823799#M957246</guid>
      <dc:creator>pjhenriqs</dc:creator>
      <dc:date>2008-01-11T16:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823800#M957247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tristan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your VPN IP pol and exempt nat rule do not match on netmask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 10.248.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool ClientPool 10.248.2.0-10.248.2.255 mask 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make the following change&lt;/P&gt;&lt;P&gt;no access-list inside_nat0_outbound extended permit ip any 10.248.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 10.248.2.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group [Name] general-attributes &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 16:37:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823800#M957247</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-01-11T16:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823801#M957248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I use the crack because I dont think I can use preshared key as I cannot configure that in the cisco VPN client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The split-tunnel-policy tunnelall commando doesnt work.&lt;/P&gt;&lt;P&gt;Did configure the nat-t commando.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still same errors&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2008 11:36:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823801#M957248</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2008-01-17T11:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823802#M957249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You configure a pre-shared key on the profile you create on the Cisco VPN Client. Are you not able to do this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And this would be enough reason for it not to work, if you have not configured the pre-shared key on your PIX/ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2008 14:22:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823802#M957249</guid>
      <dc:creator>pjhenriqs</dc:creator>
      <dc:date>2008-01-17T14:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823803#M957250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still nothing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My current config: (removed not needed lines)&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 10.248.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip local pool Clientpool 10.248.2.0-10.248.2.255 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;monitor-interface outside&lt;/P&gt;&lt;P&gt;monitor-interface inside&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server vpn protocol radius&lt;/P&gt;&lt;P&gt;aaa-server vpn host [Radius server]&lt;/P&gt;&lt;P&gt; key [Radius secret]&lt;/P&gt;&lt;P&gt;group-policy [Name] internal&lt;/P&gt;&lt;P&gt;group-policy [Name] attributes&lt;/P&gt;&lt;P&gt; dns-server value 10.1.3.100 10.1.3.101&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; default-domain value intranet.[Name].nl&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.1.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication crack&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal  20&lt;/P&gt;&lt;P&gt;tunnel-group [Name] type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group [Name] general-attributes&lt;/P&gt;&lt;P&gt; address-pool Clientpool&lt;/P&gt;&lt;P&gt; authentication-server-group vpn&lt;/P&gt;&lt;P&gt; default-group-policy [Name]&lt;/P&gt;&lt;P&gt;tunnel-group [Name] ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Logs&lt;/P&gt;&lt;P&gt;3	Jan 17 2008	15:44:45	713902	 Group = DefaultRAGroup, IP = x.x.x.x, Removing peer from peer table failed, no match!&lt;/P&gt;&lt;P&gt;4	Jan 17 2008	15:44:45	713903	 Group = DefaultRAGroup, IP = x.x.x.x, Error: Unable to remove PeerTblEntry&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;110    16:45:37.619  01/17/08  Sev=Warning/2	IKE/0xE3000099&lt;/P&gt;&lt;P&gt;Fragmented msg rcvd with no associated SA (PacketReceiver:133)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2008 15:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823803#M957250</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2008-01-17T15:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823804#M957251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to add the "interesting traffic". Create your crypto map access-list and assign it to the dynamic crypto map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like so...&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_20 permit ip any 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also add:&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So that the IPSEC traffic bypasses the access-lists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps,&lt;/P&gt;&lt;P&gt;Paulo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2008 15:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823804#M957251</guid>
      <dc:creator>pjhenriqs</dc:creator>
      <dc:date>2008-01-17T15:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823805#M957252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the interesting traffic not only for when I use a site-to-site VPN connection. When I use the Cisco client I wouldnt need to use it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2008 12:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823805#M957252</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2008-01-18T12:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823806#M957253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The interesting traffic is the traffic that will get encrypted in the VPN. Whether that VPN is a site-to-site, remote, DMVPN or whatever, the same principle is applied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you use the Cisco client you are using a remote access VPN. How does the firewall know what traffic to encrypt to send the user, if the interesting traffic is not defined?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2008 12:16:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823806#M957253</guid>
      <dc:creator>pjhenriqs</dc:creator>
      <dc:date>2008-01-18T12:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823807#M957254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;192.168.2.0 255.255.255.0 is the range of my VPN Clients?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2008 12:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823807#M957254</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2008-01-18T12:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823808#M957255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to your configuration:&lt;/P&gt;&lt;P&gt;ip local pool Clientpool 10.248.2.0-10.248.2.255 mask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Paulo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2008 14:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823808#M957255</guid>
      <dc:creator>pjhenriqs</dc:creator>
      <dc:date>2008-01-18T14:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: Help with Cisco PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823809#M957256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did put the following lines in it:&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_20 permit ip any 10.248.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still nothing...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2008 14:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-cisco-pix-515e/m-p/823809#M957256</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2008-01-18T14:26:20Z</dc:date>
    </item>
  </channel>
</rss>

