cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
607
Views
0
Helpful
6
Replies

can't load config in to PDM

gdextensis
Level 1
Level 1

I've recently set up an IPsec tunnel between my PIX and a SonicWall at a remote office. Since then, I'm only able to monitor the firewall from the PDM. Any suggestions? I can sanitize my config to post if that would help identify the specific rules.

1 Accepted Solution

Accepted Solutions

What Robert said is correct,

PDM will do this if you use one access-list in two separate locations

(http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pdm/v_30/pdmrn30.htm#94255).

I'm assuming you have something like the following in your config:

access-list nonat permit ip 10.x.x.x 192.168.x.x

nat (inside) 0 access-list nonat

crypto map 10 mymap match address nonat

PDM will not allow this and put you into monitor mode. What you need to do (which is a better configuration method anyway), is separate the ACL's with the following:

access-list nonat permit ip 10.x.x.x 192.168.x.x

nat (inside) 0 access-list nonat

access-list 100 permit ip 10.x.x.x 192.168.x.x

crypto map 10 mymap match address 100

This separates your crypto and your nonat ACL's. When you only have one IPSec peer then a lot of people do use the same ACL for both, which is fine, but as you've seen it makes PDM barf. Separating the two ACL's is much better because if at some point later you add a second, third, etc IPSec peer, you simply add a new encryption ACL for the new traffic, and add that to your existing nonat ACL.

Hope this helps,

Jay

View solution in original post

6 Replies 6

didyap
Level 6
Level 6

jmia
Level 7
Level 7

I can't think why you should be having this problem, as I've got site-to-site IPSec vpn between PIX and SonicWall and all is working correctly.

Can you post up your PIX config (take out any sensitive info). Can you not telnet onto the PIX? Can you connect to the PIX via console? or even SSH?

Jay

I followed the steps outline here and since then I haven't been able to load the config in to the PDM. The tunnels are functioning perfectly and I can log in via SSH. Can anyone see any steps in this PDF that might have a rule that PDM is unfamiliar with? Thank you.

http://www.sonicwall.com/support/pdfs/technotes/vpn_interoperability_between_sonicos30e_and_cisco_pix_firewall.pdf

Hello,

The PDM does not like that you have the access-list referenced for both NAT 0 and in the cryptomap. You have to configure another access-list with a different name. So the first access-list should be referenced to NAT 0 and the second access-list to the "match" statement under the crypto map command.

Best Regards

Robert Maras

What Robert said is correct,

PDM will do this if you use one access-list in two separate locations

(http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pdm/v_30/pdmrn30.htm#94255).

I'm assuming you have something like the following in your config:

access-list nonat permit ip 10.x.x.x 192.168.x.x

nat (inside) 0 access-list nonat

crypto map 10 mymap match address nonat

PDM will not allow this and put you into monitor mode. What you need to do (which is a better configuration method anyway), is separate the ACL's with the following:

access-list nonat permit ip 10.x.x.x 192.168.x.x

nat (inside) 0 access-list nonat

access-list 100 permit ip 10.x.x.x 192.168.x.x

crypto map 10 mymap match address 100

This separates your crypto and your nonat ACL's. When you only have one IPSec peer then a lot of people do use the same ACL for both, which is fine, but as you've seen it makes PDM barf. Separating the two ACL's is much better because if at some point later you add a second, third, etc IPSec peer, you simply add a new encryption ACL for the new traffic, and add that to your existing nonat ACL.

Hope this helps,

Jay

With a little fidding, that fixed my problem. Thanks for getting me on the right track, guys!