07-30-2009 10:03 AM - edited 02-21-2020 04:18 PM
Hi, hope someone can help with this. I am trying to establish a site to site tunnel between an ios router and a PIX 7.0(1). The ios router is 12.4(15)T7. At the IOS router side I have configured a static 1 to 1 NAT to translate the 172.31.x.x source address to 172.30.x.x, the crypto's at both sides of the tunnel are configured for 172.30.x.x subnet. What I can see happening is the tunnel being established, the IOS router encaps/decaps packets, but the counter on the PIX side is only encapsulating packets, absolutely none are being decapsulated. So it looks like the pix is sending packets, the ios router is sending and receiving themâ¦â¦
The relevant info in the configs is below, any suggestions would be welcome.
IOS Router
ip access-list extended CRYPTO
permit ip 172.30.0.0 0.0.255.255 192.168.0.0 0.0.255.255
permit ip 172.30.0.0 0.0.255.255 10.0.0.0 0.255.255.255
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp key xxxxx address xxxxxx
!
!
crypto ipsec transform-set 3DES-MD5 esp-3des esp-md5-hmac
!
crypto map VPN 10 ipsec-isakmp
set peer x.x.x.x
set transform-set 3DES-MD5
match address CRYPTO
ip nat inside source static network 172.31.0.0 172.30.0.0 /16
I can see the NAT translations occuring when I put in the sh ip nat translations. IP NAT inside is applied to the internal LAN interface, IP NAT outside is applied to the dialer interface.
PIX
access-list crypto extended permit ip 10.0.0.0 255.0.0.0 172.30.0.0 255.255.0.0
access-list crypto extended permit ip 192.168.0.0 255.255.0.0 172.30.0.0 255.255.0.0
access-list 102 extended permit ip 10.0.0.0 255.0.0.0 172.30.0.0 255.255.0.0
access-list 102 extended permit ip 192.168.0.0 255.255.0.0 172.30.0.0 255.255.0.0
nat (inside) 0 access-list 102
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto map outside_map 200 match address crypto
crypto map outside_map 200 set peer x.x.x.x
crypto map outside_map 200 set transform-set ESP-3DES-MD5
crypto map outside_map interface outside
07-30-2009 10:38 AM
Here's an excellent troubleshooting guide. It should help you resolve your issue.
http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml
08-02-2009 01:00 PM
Since the pix is encapsulating and the IOS is encapsulating and decapsulating traffic then it suggests to be that there may be a firewall blocking esp over udp traffic(inbound on the filtering device in the transit path ) from the ios back to the pix hence the pix has no packets to deencapsulate
HTH
08-04-2009 12:51 AM
Thanks for getting back to me. I've checked the config of the internet facing router and there is no port filtering. At present, I have VPN clients that can connect to the PIX for remote access. I still cannot see how the PIX is either not receiving packets from the ios router, or is receiving them and not identifying them as being to/from an established VPN tunnel...
08-19-2009 01:53 PM
Hi
Maybe you have solved this, but if you still are looking for an answer I think you might be hitting this bug.
And you might need an upgrade to your pix version.
Regars
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide