08-03-2004 05:17 PM - edited 02-21-2020 10:10 AM
Hi All,
we have a PIX 515E which I did not realise was already authenticating users for VPN (my previous post). Anyways, it turns out that the VPN configuration on the PIX is configured to authenticate against a Windows 2003 IAS server, and this works fine, with users authenticating sucessfully and getting an IP address from the appropriate range.
However these users can then only ping the PIX and things external to the PIX, they cant ping anything on the other side of the PIX (being the whole network).
I have had a look at the configuration, but cant see any obvious faults.. I am just wondering is there anything specific that I should look for. Also, are there parts of the config it would be helpful to put here for review?
Thanks in advance for your help.
Luke
08-04-2004 03:19 AM
Luke,
Sounds like it might be a crypto ACL issue. Can your Dial-Up vpn users ping a server on the inside LAN when they have been authenticated?
Can you post your full pix config here (takeout any sensitive info)
Thnaks -
Jay
08-04-2004 04:29 AM
Hi Luke
I've had something similar to your problem. Make sure you can ping the internal networks from the PIX console.
Remember that you need to route traffic from your internal users to the network assigned to the VPN clients.
Hope you get sorted.
Byron
08-04-2004 05:01 AM
It is possible that there is something that prevents packets from the VPN clients getting to the inside network. But I would look more closely at whether responses from devices inside the network get back to the PIX. Are there entries for the pool of addresses of the PIX in the routing tables of the inside network?
I might also suggest that you run debug ip icmp on one of the routers in the inside network and then attempt to ping that router from one of the VPN client machines. This will show whether the ping is getting to the router or not. Or alternatively I might run debug ip packet
HTH
Rick
08-04-2004 10:03 PM
Thankyou all for your responses.
I have some of the configuration concerning the VPN configuration of the PIX. I have just verified that there is a route from the core LAN router to the PIX (default route, so any traffic from the vpn subnet should be able to get back to the pix).
Please let me know if anything looks amiss in the below.
Thanks again,
Luke Cassar
access-list vpngrp1_splitTunnelAcl permit ip 172.16.0.0 255.255.0.0 any
access-list inside_outbound_nat0_acl permit ip 172.16.0.0 255.255.0.0 vpnpool 255.255.255.0
access-list outside_cryptomap_dyn_20 permit ip any vpnpool 255.255.255.0
route outside 0.0.0.0 0.0.0.0 *Internet Router LAN* 1 (*Internet Router LAN* is next hop before ISP - public IP)
route inside 172.16.0.0 255.255.0.0 192.168.5.1 1 (192.168.5.1 is the core LAN router)
route inside vpnpool 255.255.255.0 192.168.5.1 1 (192.168.5.1 is the core LAN router)
route inside 192.168.0.0 255.255.0.0 192.168.5.1 1 (192.168.5.1 is the core LAN router)
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 2 vpnpool 255.255.255.0 0 0
nat (inside) 1 172.16.0.0 255.255.0.0 0 0
nat (inside) 1 192.168.0.0 255.255.0.0 0 0
static (inside,outside) *Mail Server Public* *Mail Server Private* netmask 255.255.255.255 0 0
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication partnerauth
crypto map outside_map interface outside
isakmp enable outside
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup vpngrp1 address-pool vpnpool1
vpngroup vpngrp1 dns-server *LAN DNS SERVERS*
vpngroup vpngrp1 wins-server *LAN WINS SERVERS*
vpngroup vpngrp1 default-domain *domain name*
vpngroup vpngrp1 split-tunnel vpngrp1_splitTunnelAcl
vpngroup vpngrp1 idle-time 1800
vpngroup vpngrp1 password ********
08-04-2004 11:11 PM
Luke,
Here's a config I've just compiled and tested and it works fine. Also, as a reference check this URL:
http://www.cisco.com/warp/public/110/pix3000.html
access-list nonat permit ip 10.0.1.0 255.255.255.0 10.0.8.0 255.255.255.0
ip local pool VPN_DIAL 10.0.8.1-10.0.8.254
nat (inside) 0 access-list nonat
sysopt connection permit-ipsec
crypto ipsec transform-set vpndial esp-3des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set vpndial
crypto map VPDN_ACCESS 10 ipsec-isakmp dynamic dynmap
crypto map VPDN_ACCESS interface outside
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup VPDN_IN address-pool VPN_DIAL
vpngroup VPDN_IN dns-server
vpngroup VPDN_IN wins-server
vpngroup VPDN_IN default-domain
vpngroup VPDN_IN split-tunnel nonat
vpngroup VPDN_IN idle-time 1800
vpngroup VPDN_IN password
vpngroup VPND_IN idle-time 1800
Hope this helps and let me know how you get on.
Jay
08-08-2004 03:57 PM
Thanks Jay,
this has provided a good reference to compare the current config against.
One thing that has been brought to my attention though is that the VPN pool in our setup is 172.16.75.1-172.26.75.254, and this is meant to be a class C subnet, however clients connecting to the VPN are recieving a 255.255.0.0 subnet mask instead of 255.255.255.0 subnet mask.
We could not find anywhere to specify a subnet mask for the client pool, and looking at the access list rules to stop putting NAT on traffic headed to the VPN pool, it reads as follows:
access-list inside_outbound_nat0_acl permit ip 172.16.0.0 255.255.0.0 vpnpool 255.255.255.0
The source part of that ACL is fine as the lan spans a lot of the 172.16.X.X ranges (most lan subnets are 255.255.252.0), but the vpnpool part has the wrong mask. Is that part relevant at all?
Also, is there any way to specify what subnet mask a VPN client recieves, or should we change the pool to something which will default to a proper class C subnet mask?
Thanks again for your help in relation to this matter.
Regards,
Luke
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide