cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1776
Views
0
Helpful
16
Replies

Help with Cisco PIX 515E

tbrinkma
Level 1
Level 1

Hi,

I want my Remote Access VPN to work to our new PIX firewall Cisco PIX 515E. With AAA to a radius server.

I want the Cisco VPN client to come with a popup which in I can fill in my details coming from the radius server.

I configured the AAA server by hand a run the VPN wizard in ASDM.

After I done this I can't log in with the client.

I think it has something to do with the vpngroup commando but the wizard didn't create anything for this.

Can somebody help me checking the config and see if anything need to be modified?

pixfirewall# sh run

: Saved

:

PIX Version 7.2(2)

!

hostname pixfirewall

domain-name default.domain.invalid

enable password xxxxxxxxxxxx encrypted

names

!

interface Ethernet0

nameif outside

security-level 0

ip address [External IP]

!

interface Ethernet1

nameif inside

security-level 100

ip address 10.1.1.7 255.255.0.0

!

interface Ethernet2

shutdown

no nameif

no security-level

no ip address

!

interface Ethernet3

shutdown

no nameif

no security-level

no ip address

!

interface Ethernet4

shutdown

no nameif

no security-level

no ip address

!

interface Ethernet5

shutdown

no nameif

no security-level

no ip address

!

passwd xxx

ftp mode passive

dns server-group DefaultDNS

domain-name default.domain.invalid

access-list inside_nat0_outbound extended permit ip any 10.248.2.0 255.255.255.0

pager lines 24

logging enable

logging asdm informational

mtu outside 1500

mtu inside 1500

ip local pool ClientPool 10.248.2.0-10.248.2.255 mask 255.255.0.0

no failover

icmp unreachable rate-limit 1 burst-size 1

asdm image flash:/asdm-522.bin

no asdm history enable

arp timeout 14400

nat (inside) 0 access-list inside_nat0_outbound

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout uauth 0:05:00 absolute

aaa-server vpn protocol radius

aaa-server vpn host [Radius server]

key [Radius secret]

group-policy [Name] internal

group-policy [Name] attributes

dns-server value 10.1.3.100 10.1.3.101

vpn-tunnel-protocol IPSec

default-domain value intranet.[Name].nl

http server enable

http 10.1.0.0 255.255.0.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto dynamic-map outside_dyn_map 20 set pfs

crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA

crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map

crypto map outside_map interface outside

crypto isakmp enable outside

crypto isakmp policy 10

authentication crack

encryption 3des

hash sha

group 2

lifetime 86400

tunnel-group [Name] type ipsec-ra

tunnel-group [Name] general-attributes

address-pool ClientPool

authentication-server-group vpn

default-group-policy [Name]

telnet 10.0.0.0 255.0.0.0 inside

telnet timeout 5

ssh timeout 5

console timeout 0

dhcpd address 10.1.1.8-10.1.2.7 inside

dhcpd enable inside

!

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

message-length maximum 512

policy-map global_policy

class inspection_default

inspect dns preset_dns_map

inspect ftp

inspect h323 h225

inspect h323 ras

inspect rsh

inspect rtsp

inspect esmtp

inspect sqlnet

inspect skinny

inspect sunrpc

inspect xdmcp

inspect sip

inspect netbios

inspect tftp

!

service-policy global_policy global

prompt hostname context

Cryptochecksum:xxx

: end

16 Replies 16

Yes.

According to your configuration:

ip local pool Clientpool 10.248.2.0-10.248.2.255 mask 255.255.255.0

HTH,

Paulo

Did put the following lines in it:

access-list outside_cryptomap_dyn_20 permit ip any 10.248.2.0 255.255.255.0

crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20

Still nothing...

Review Cisco Networking for a $25 gift card