cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1627
Views
0
Helpful
24
Replies

SSH Sentinel through pix 506 to Zyxel

sgozio
Level 1
Level 1

Hi all,

I have one PIX 506e, on inside lan there is one PC client, on this client there is SSH Sentinel VPN Client software for connect this PC to a Remote lan protected by Zyxel Router/firewall.

When I activate Sentinel software,

VPN Tunnel goes ON but the taffic doesn't work, for example is not possible to ping any host.

If I remove PIX 506 and I connect PC directly to the Router, VPN Tunnel goes ON and any host of remote Lan respond to Ping. Zyxel support suggest to verify Port 500 and port 68.

Cisco PIX log say:

305006: portmap translation creation failed for protocol 50 src inside:192.168.2.169 dst outside:88.xx.123.zz

24 Replies 24

PIX Version 6.3(5)

interface ethernet0 auto

interface ethernet1 auto

nameif ethernet0 outside security0

nameif ethernet1 inside security100

hostname PIX

domain-name intranet.xxxxx.it

fixup protocol dns maximum-length 512

fixup protocol ftp 21

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol http 80

fixup protocol ils 389

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol sip 5060

fixup protocol sip udp 5060

fixup protocol skinny 2000

fixup protocol smtp 25

fixup protocol sqlnet 1521

fixup protocol tftp 69

names

access-list outside_access_in permit icmp any any echo-reply

access-list nonat permit ip any 10.0.1.0 255.255.255.0

access-list nonat permit ip any 10.0.2.0 255.255.255.0

access-list nonat permit ip any 10.0.3.0 255.255.255.0

pager lines 24

logging on

logging buffered notifications

logging trap notifications

mtu outside 1500

mtu inside 1500

ip address outside xxx.xxx.xxx.157 255.255.255.248

ip address inside 192.168.2.101 255.255.255.0

ip audit info action alarm

ip audit attack action alarm

ip local pool Networking 10.0.1.1-10.0.1.10

ip local pool Mobile 10.0.2.1-10.0.2.10

ip local pool Comm 10.0.3.1-10.0.3.10

pdm location 192.168.2.0 255.255.255.0 inside

pdm location 10.0.1.0 255.255.255.0 outside

pdm location 10.0.1.0 255.255.255.0 inside

pdm location 10.0.2.0 255.255.255.0 outside

pdm location 10.0.3.0 255.255.255.0 outside

pdm location 192.168.2.169 255.255.255.255 inside

pdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 0 access-list nonat

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

static (inside,outside) xxx.xxx.xxx.156 192.168.2.169 netmask 255.255.255.255 0 0

access-group outside_access_in in interface outside

route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.158 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout sip-disconnect 0:02:00 sip-invite 0:03:00

timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+

aaa-server TACACS+ max-failed-attempts 3

aaa-server TACACS+ deadtime 10

aaa-server RADIUS protocol radius

aaa-server RADIUS max-failed-attempts 3

aaa-server RADIUS deadtime 10

aaa-server LOCAL protocol local

http server enable

http 192.168.2.0 255.255.255.0 inside

http 10.0.1.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server community public

no snmp-server enable traps

floodguard enable

sysopt connection permit-ipsec

crypto ipsec transform-set TRSET esp-3des esp-sha-hmac

crypto dynamic-map dynmap 10 set transform-set TRSET

crypto map VPN 10 ipsec-isakmp dynamic dynmap

crypto map VPN interface outside

isakmp enable outside

isakmp identity address

isakmp policy 10 authentication pre-share

isakmp policy 10 encryption 3des

isakmp policy 10 hash sha

isakmp policy 10 group 2

isakmp policy 10 lifetime 86400

vpngroup Networking address-pool Networking

vpngroup Networking dns-server 192.168.2.1

vpngroup Networking wins-server 192.168.2.1

vpngroup Networking default-domain intranet.xxxxx.it

vpngroup Networking idle-time 1800

vpngroup Networking password ZZZZZZZZZZZZZZZZZZ

-------

other VPN groups

-------

telnet 192.168.2.0 255.255.255.0 inside

telnet 10.0.1.0 255.255.255.0 inside

telnet timeout 5

ssh timeout 5

management-access inside

console timeout 0

Done it, you can see configuration and the specified line

static (inside,outside) xxx.xxx.xxx.156 192.168.2.169 netmask 255.255.255.255 0 0

192.168.2.169 is the ip address of the client.

but doesn't work, I am still not able to communicate.

Finally is not a NAT problem?

Don't fault me for being thorough..it is best to be able to completely rule one thing out before worrying about anything else. Are you still getting the same error on the pix? isakmp nat-traversal is missing from your pix, it was in your first config, you want to put that back for your vpn clients.

Dear Acomiskey,

I'm sorry but it was my fault (I missed a line with the "copy+paste")

I can confirm you that there is the isakmp command as the last configuration:

isakmp enable outside

isakmp identity address

isakmp nat-traversal 20

I'm sorry, thank you for your patience.

No problems, so it still doesn't work?

When you added the static command and tested the vpn, were you receiving the same error on the pix?

Ok. I don't have any message with the static command.

If the VPN with the zyxel is up I cannot see any traffic of my public IP xxx.xxx.xxx.156 with my log sets.

If the VPN is down I see the traffic in the show log.

I went to myip.dk and I checked that my I changed my IP to the new static IP xxx.xxx.xxx.156

Dear Acomiskey

what do you think of my case?

Definitely is not a NAT problem?

what can I do?

Thak you for your support.

I'm running out of ideas here. Could you explain what you mean here..particularly "if the vpn with the zyxel is up"...

If the VPN with the zyxel is up I cannot see any traffic of my public IP xxx.xxx.xxx.156 with my log sets.

If the VPN is down I see the traffic in the show log.

I went to myip.dk and I checked that my I changed my IP to the new static IP xxx.xxx.xxx.156

If I'm connected to the zywall, if I establish the connection

I don't see the traffic of my pc in the show log (192.168.2.169 that now have the static xxx.xxx.xxx.156)

maybe I can change my logging in orde to see if I have the same error, but I don't know how.

Hi,

hope you had a nice w/e.

Was I clear enought for the explanations?

Still running out of ideas?

I don't see this as being a problem with your pix. It still seems to me like you are having a problem with udp 4500 nat-traversal. This could be a problem on the client or on the remote peer device. That's about it..sorry.

Review Cisco Networking for a $25 gift card