cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1334
Views
5
Helpful
4
Replies

Can't access internal network from VPN using PIX 506E

BJ.Kline2003
Level 1
Level 1

Hello,

I seem to be having an issue with my PIX configuration. I can ping the VPN client from the the internal network, but can cannot access any resources from the vpn client. My running configuration is as follows:

Building configuration...

: Saved

:

PIX Version 6.3(5)

interface ethernet0 auto

interface ethernet1 auto

nameif ethernet0 outside security0

nameif ethernet1 inside security100

enable password N/JZnmeC2l5j3YTN encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

hostname SwantonFw2

domain-name *****.com

fixup protocol dns maximum-length 512

fixup protocol ftp 21

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol http 80

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol sip 5060

fixup protocol sip udp 5060

fixup protocol skinny 2000

fixup protocol smtp 25

fixup protocol sqlnet 1521

fixup protocol tftp 69

names

access-list outside_access_in permit icmp any any

access-list allow_ping permit icmp any any echo-reply

access-list allow_ping permit icmp any any unreachable

access-list allow_ping permit icmp any any time-exceeded

access-list INSIDE-IN permit tcp interface inside interface outside

access-list INSIDE-IN permit udp any any eq domain

access-list INSIDE-IN permit tcp any any eq www

access-list INSIDE-IN permit tcp any any eq ftp

access-list INSIDE-IN permit icmp any any echo

access-list INSIDE-IN permit tcp any any eq https

access-list inside_outbound_nat0_acl permit ip 192.168.0.0 255.255.255.0 192.168.240.0 255.255.255.0

access-list swanton_splitTunnelAcl permit ip any any

access-list outside_cryptomap_dyn_20 permit ip any 192.168.240.0 255.255.255.0

no pager

mtu outside 1500

mtu inside 1500

ip address outside 192.168.1.150 255.255.255.0

ip address inside 192.168.0.35 255.255.255.0

ip audit info action alarm

ip audit attack action alarm

ip local pool VPN_Pool 192.168.240.1-192.168.240.254

pdm location 0.0.0.0 255.255.255.0 outside

pdm location 192.168.1.26 255.255.255.255 outside

pdm location 192.168.240.0 255.255.255.0 outside

pdm logging informational 100

pdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 0 access-list inside_outbound_nat0_acl

nat (inside) 1 192.168.0.0 255.255.255.0 0 0

access-group outside_access_in in interface outside

access-group INSIDE-IN in interface inside

route outside 0.0.0.0 0.0.0.0 192.168.1.1 1

timeout xlate 0:05:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout sip-disconnect 0:02:00 sip-invite 0:03:00

timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+

aaa-server TACACS+ max-failed-attempts 3

aaa-server TACACS+ deadtime 10

aaa-server RADIUS protocol radius

aaa-server RADIUS max-failed-attempts 3

aaa-server RADIUS deadtime 10

aaa-server LOCAL protocol local

http server enable

http 192.168.0.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server community public

no snmp-server enable traps

floodguard enable

sysopt connection permit-ipsec

crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac

crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac

crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20

crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5

crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map

crypto map outside_map client authentication LOCAL

crypto map outside_map interface outside

isakmp enable outside

isakmp identity address

isakmp policy 20 authentication pre-share

isakmp policy 20 encryption des

isakmp policy 20 hash md5

isakmp policy 20 group 2

isakmp policy 20 lifetime 86400

vpngroup swanton address-pool VPN_Pool

vpngroup swanton dns-server 192.168.1.1

vpngroup swanton split-tunnel swanton_splitTunnelAcl

vpngroup swanton idle-time 1800

vpngroup swanton password ********

telnet timeout 5

ssh timeout 5

console timeout 0

dhcpd address 192.168.0.36-192.168.0.254 inside

dhcpd dns 8.8.8.8 8.8.4.4

dhcpd lease 3600

dhcpd ping_timeout 750

dhcpd auto_config outside

dhcpd enable inside

username scott password hwDnqhIenLiwIr9B encrypted privilege 15

username norm password ET3skotcnISwb3MV encrypted privilege 2

username tarmbrecht password Zre8euXN6HxXaSdE encrypted privilege 2

username jlillevik password 9JMTvNZm3dLhQM/W encrypted privilege 2

username ruralogic password 49ikl05C8VE6k1jG encrypted privilege 15

username bzeiter password 1XjpdpkwnSENzfQ0 encrypted privilege 2

username mwalla password l5frk9obrNMGOiOD encrypted privilege 2

username heavyfab1 password 6.yy0ys7BifWsa9k encrypted privilege 2

username heavyfab3 password 6.yy0ys7BifWsa9k encrypted privilege 2

username heavyfab2 password 6.yy0ys7BifWsa9k encrypted privilege 2

username djet password wj13fSF4BPQzUzB8 encrypted privilege 2

username cmorgan password y/NeUfNKehh/Vzj6 encrypted privilege 2

username cmayfield password Pe/felGx7VQ3I7ls encrypted privilege 2

username jeffg password zQEQceRITRrO4wJa encrypted privilege 2

terminal width 80

Cryptochecksum:9005f35a85fa5fe31dab579bbb1428c8

: end

[OK]

Any help will be greatly appreciated

1 Accepted Solution

Accepted Solutions

Bj,

Are you trying to access network resources behind the inside interface?

ip address inside 192.168.0.35 255.255.255.0

If so, please make the following changes:

1- access-list SWANTON_VPN_SPLIT permit ip 192.168.0.0 255.255.255.0 192.168.240.0 255.255.255.0

2- no vpngroup swanton split-tunnel swanton_splitTunnelAcl

        vpngroup swanton split-tunnel SWANTON_VPN_SPLIT

3- no access-list outside_cryptomap_dyn_20 permit ip any 192.168.240.0 255.255.255.0

4- isakmp nat-traversal 30

Let me know how it goes.

Portu.

Please rate any helpful posts   

View solution in original post

4 Replies 4

Bj,

Are you trying to access network resources behind the inside interface?

ip address inside 192.168.0.35 255.255.255.0

If so, please make the following changes:

1- access-list SWANTON_VPN_SPLIT permit ip 192.168.0.0 255.255.255.0 192.168.240.0 255.255.255.0

2- no vpngroup swanton split-tunnel swanton_splitTunnelAcl

        vpngroup swanton split-tunnel SWANTON_VPN_SPLIT

3- no access-list outside_cryptomap_dyn_20 permit ip any 192.168.240.0 255.255.255.0

4- isakmp nat-traversal 30

Let me know how it goes.

Portu.

Please rate any helpful posts   

Portu,

I have made those changes, but still cannot ping from the VPN client (192.168.240.0) to the internal network (192.168.0.0)

BJ

Thanks for the input.

Please try:

management-access inside

Then try to ping the IP 192.168.0.35 from the client.

Does it work?

Portu.

Please rate any helpful posts

Portu,

Management-acess inside did not work.. However I can access an internal webserver by using the vpn. After consulting with my manager, we have decided that pinging isn't needed. Now I'm off to see if I can get it configred to access a Windows share.

BJ