05-27-2010 11:53 AM
i can't get a vpn tunnel established between a wrvs4400n and a pix 506e. the pix has another tunnel configured and runs (with a linksys befvp41).
from the logs:
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 172.16.1.0 site1
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 site1 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 10.10.10.0 255.255.255.0 site1 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 10.10.11.0 255.255.255.0 site1 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 10.10.100.0 255.255.255.0
access-list outside_cryptomap_20 permit ip 192.168.1.0 255.255.255.0 site1 255.255.255.0
access-list outside_cryptomap_20 permit ip 10.10.10.0 255.255.255.0 site1 255.255.255.0
access-list outside_cryptomap_20 permit ip 10.10.11.0 255.255.255.0 site1 255.255.255.0
access-list outside_cryptomap_30 permit ip 192.168.1.0 255.255.255.0 10.10.100.0 255.255.255.0
mtu outside 1500
mtu inside 1500
ip address outside 654.321.80.66 255.255.255.240
ip address inside 192.168.1.1 255.255.255.0
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 654.321.80.67 192.168.1.10 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 654.321.80.65 1
route inside 10.10.10.0 255.255.255.0 192.168.1.250 1
route inside 10.10.11.0 255.255.255.0 192.168.1.250 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 456.789.223.90
crypto map outside_map 20 set transform-set ESP-DES-MD5
crypto map outside_map 30 ipsec-isakmp
crypto map outside_map 30 match address outside_cryptomap_30
crypto map outside_map 30 set peer 123.456.2.214
crypto map outside_map 30 set transform-set ESP-3DES-MD5
crypto map outside_map 30 set security-association lifetime seconds 14400 kilobytes 4608000
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address 456.789.223.90 netmask 255.255.255.255 no-xauth no-config-mode
isakmp key ******** address 123.456.2.214 netmask 255.255.255.255 no-xauth no-config-mode
isakmp identity address
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
isakmp policy 30 authentication pre-share
isakmp policy 30 encryption 3des
isakmp policy 30 hash md5
isakmp policy 30 group 2
isakmp policy 30 lifetime 43200
i notice in the crypto map for 30 there is a KB defined as part of the lifetime, but no such setting in the wrvs4400. i removed it at one point manually in the pix and rebuilt the crypto map, but that did not affect things.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide