04-29-2010 07:55 AM
I am set up a site-to-site vpn with an ASA 5505 at one end and a PIX 501 at the other.
I followed the section titled Configuring LAN-to-LAN IPsec VPNs from the Command Line Configuration Guide and added these line to the ASA config:
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 43200
isakmp enable outside
crypto ipsec transform-set TRANSFORM_SET esp-3des esp-sha-hmac
access-list l2l_list extended permit ip 10.0.1.0 255.255.255.0 192.168.1.0 255.255.255.0
tunnel-group yyy.yyy.yyy.yyy type ipsec-l2l
tunnel-group yyy.yyy.yyy.yyy ipsec-attributes
pre-shared-key ****
crypto map CRYPTO_MAP 10 match address l2l_list
crypto map CRYPTO_MAP 10 set peer yyy.yyy.yyy.yyy
crypto map CRYPTO_MAP 10 set transform-set TRANSFORM_SET
crypto map CRYPTO_MAP interface outside
For the PIX I followed the example config in Richard Deal's book Cisco PIX Firewalls and added these lines to the PIX config:
access-list l2l_list permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.0
nat (inside) 0 access-list l2l_list
access-list IPSEC permit udp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.xxx eq isakmp
access-list IPSEC permit ah host yyy.yyy.yyy.yyy host xxx.xxx.xxx.xxx
access-list IPSEC permit esp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.xxx
access-group IPSEC in interface outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 group 2
isakmp policy 10 hash sha
isakmp key **** address xxx.xxx.xxx.xxx
crypto ipsec transform-set TRANSFORM_SET esp-3des esp-sha-hmac
crypto map GHA_CRYPTO_MAP 10 ipsec-isakmp
crypto map GHA_CRYPTO_MAP 10 set peer xxx.xxx.xxx.xxx
crypto map GHA_CRYPTO_MAP 10 match address l2l_list
crypto map GHA_CRYPTO_MAP 10 set transform-set TRANSFORM_SET
crypto map GHA_CRYPTO_MAP interface outside
I have not been able to establish a connection between the two devices. I just don't see what I am missing. Maybe it is not even possible with these two devices. The ASA has version is 7.2(4) and I believe the PIX is running version 6.3 (I will have to double check later).
Thanks for your help.
04-30-2010 10:09 AM
I don't think he needs dynamic-to-static because he has the peer explicitly defined, he'd just have to change it.... when the lease expires . Can both the crypto map & nonat call upon the same list? I'm wondering if that might be an issue.
04-30-2010 10:15 AM
I don't think you want to be changing the VPN peer configuration everytime the lease expires ;-)
That's exactly the reason of being able to configure a static-to-dynamic VPN.
Both crypto ACL and nonat ACL can be called the same as long as you have a single tunnel.
When you have more than one tunnel, there has to be different ACLs.
Federico.
04-30-2010 10:38 AM
I agree, I'm just saying that there's no reason why it shouldn't work the way it is (even though it doesn't make the most sense). He can then also initiate traffic from both sides instead of just the dynamic. It would be nice if you could define peer using dynamic dns.
04-30-2010 11:51 AM
I've removed both of those lines from the ASA and still cannot access anything on the other side. I have talked to the ISP that the PIX is attached to and they say that incoming VPNs are not blocked. When I do the debug cry is 127 and debug cry ip 127 now nothing shows up at all when I ping the other network.
04-30-2010 03:52 PM
Since PIX is the dynamic site, you would need to ping from the PIX LAN towards the ASA LAN. If you try to ping from ASA towards the PIX, it will not initiate the VPN tunnel as you can only initiate the tunnel from the dynamic end towards the static end.
Base on the output of the first debug you posted, it's waiting for Phase 1 message 2, but that was when ping was initiated from the ASA end, instead of PIX end. However, it's worth to double check if UDP/500 is being blocked on either the router in front of your PIX or ASA.
05-01-2010 05:24 AM
This is the output from the PIX when I try to ping the ASA.
PIX# sh cry isa sa
Total : 1
Embryonic : 1
dst src state pending created
xxx.xxx.xxx.xxx yyy.yyy.yyy.yyy MM_NO_STATE 0 0
PIX# sh cry ip sa
interface: outside
Crypto map tag: CRYPTO_MAP, local addr. yyy,yyy,yyy,yyy
local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (10.0.1.0/255.255.255.0/0/0)
current_peer: xxx.xxx.xxx.xxx:0
PERMIT, flags={origin_is_acl,}
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
#send errors 91, #recv errors 0
local crypto endpt.: yyy.yyy.yyy.yyy, remote crypto endpt.: xxx.xxx.xxx.xxx
path mtu 1500, ipsec overhead 0, media mtu 1500
current outbound spi: 0
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
05-01-2010 05:30 AM
Did you try to ping from the PIX or from LAN behind the PIX?
If you tried to ping from the PIX, please try to ping as follows: ping inside 10.0.1.1
Also try to remove the static crypto map completely from the ASA as follows:
no crypto map CRYPTO_MAP 10 match address l2l_list
no crypto map CRYPTO_MAP 10 set transform-set TRANSFORM_SET
no crypto dynamic-map DYN_MAP 10 match address l2l_list
05-01-2010 06:31 AM
I've removed those three lines from the ASA and then tried pinging the ASA from the PIX and these are the response I get.
PIX# ping inside 10.0.1.1
10.0.1.1 NO response received -- 1000ms
10.0.1.1 NO response received -- 1000ms
10.0.1.1 NO response received -- 1000ms
PIX# ping outside 10.0.1.1
10.0.1.1 response received -- 10ms
10.0.1.1 response received -- 10ms
10.0.1.1 response received -- 10ms
05-01-2010 06:03 PM
Not too sure how you are getting a response when ping is initiated from the outside interface of the PIX.
After you tried to ping from the PIX, is the tunnel up? what is the status of "show crypto isa sa" and "show crypto ipsec sa"?
05-02-2010 06:20 AM
PIX# sh cry isa sa
Total : 1
Embryonic : 1
dst src state pending created
xxx.xxx.xxx.xxx yyy.yyy.yyy.yyy MM_NO_STATE 0 0
PIX# sh cry ip sa
interface: outside
Crypto map tag: CRYPTO_MAP, local addr. yyy,yyy,yyy,yyy
local ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (10.0.1.0/255.255.255.0/0/0)
current_peer: xxx.xxx.xxx.xxx:0
PERMIT, flags={origin_is_acl,}
#pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0
#pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
#send errors 91, #recv errors 0
local crypto endpt.: yyy.yyy.yyy.yyy, remote crypto endpt.: xxx.xxx.xxx.xxx
path mtu 1500, ipsec overhead 0, media mtu 1500
current outbound spi: 0
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
05-02-2010 06:39 AM
I added isakmp enable outside to both devices and now I can ping and browse the systems on the 10.0.1.0 network from the PIX side.
I still don't receive a response when I try to ping the ASA which is 10.0.1.1, but when I ping the other address I get a response. I cannot browse the computer's on the ASA side by name but I can get to them by their ip addresses.
05-02-2010 06:21 PM
OK, great, now the VPN tunnel is up and running.
To ping the ASA inside interface, you would need to add "management-access inside" on the ASA.
If you can't browse the computer by name on the ASA side from the PIX side, you would need to configure either the ASA side DNS or WINS server on the PIX hosts so it can resolve the name.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide