08-16-2004 09:55 AM - edited 02-21-2020 01:18 PM
i,
I've got a problem wrt site2site & remote-access VPNs on a PIX:
My setup is as follows: PIX (6.3) terminates both a site2-site VPN and should also service remote-access clients using the Cisco VPN-client (4.0.x).
The problem is with the VPN-Remote-access clients get an IP-address on their VPN-interface but the clients cannot reach anything. (Please note that the site2site VPN runs without problems)
To be specific (see config-excerpts below):
The client, having 212.138.109.20 as its IP-address gets an IP-address 10.0.100.1 on its VPN-adapter which comes from the "pool vpnpool"
configured on the PIX. This client ties to reach a servers on the "inside" interface of the PIX like 10.0.1.28.
However the client can't reach *anything* - neither a server on the inside nor anything on the outside (i.e. the Internet)!
Using ethereal traces I found out that the packets arrive at the inside interface coming from 10.0.100.1 (the IP-address of the
VPN-client). I also see the reply of the server (10.0.1.28) to 10.0.100.1. However for some reason the packet doesn't make it through
the PIX to the client. The PIX-logs also show packets to/from the VPN-client on the inside interface - and *no* drops. So to my understanding the packets from the server(s) to the VPN-client really should make it through the PIX.
I'm attaching the following as separate files:
o) Relevant parts of the PIX-config
o) PIX-log showing packets between the VPN-client and the server(s) on the inside-interface
o) ethereal-trace done on the inside interface that also shows the packets between the VPN-client and server(s)
I've really scratched my head quite a while over this one, tested a lot of things but I really don't know what could be wrong with my
config.
After all, it really should be possible to run site2site- and remote-access VPNs on the same PIX, shouldn't it?
Thanks alot in advance for your help,
-ewald
Solved! Go to Solution.
08-16-2004 10:35 AM
I think your problem is in your ACLs and your crypto map:
access-list 101 permit ip 10.0.1.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 101 permit ip 10.0.0.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 101 permit ip 10.0.3.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 101 permit ip 10.0.1.0 255.255.255.0 10.0.100.0 255.255.255.0
crypto map loc2rem 1 match address 101
This means this map wants to match those addresses. But your dynamic map is the one that should match traffic from 10.0.1.0 to 10.0.100.0, because your ip local pool is 10.0.100.x. I think what happens is that the return traffic from the lan to the vpn clients is trying to go out the static tunnel, which likely does not exist (for those netblocks - you likely have a Security association for each pair of netblocks, but not one for the vpn clients), and thus fails .
I would recommend adding these lines:
access-list 105 permit ip 10.0.1.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 105 permit ip 10.0.0.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 105 permit ip 10.0.3.0 255.255.255.0 10.0.2.0 255.255.255.0
no crypto map loc2rem 1 match address 101
crypto map loc2rem 1 match address 105
Then reapply :
crypto map loc2rem interface outside
09-01-2004 02:30 AM
Hi!!
I just met quite the simular case a couple of weeks ago!! (and I finally resolved it!!)
This case maybe a problem of the ACL.
Now you're using the same ACL (101) for "Site-to-Site crypto map" and "nat command".
This may cause the packet to remote-client transported to the "Site-to-Site VPN".
So I suppose to creat another ACL(102) for "Site-to-Site crypto map" like the following:
access-list 102 permit ip 10.0.1.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 102 permit ip 10.0.0.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 102 permit ip 10.0.3.0 255.255.255.0 10.0.2.0 255.255.255.0
Good Luck!!
Y.Harada
08-16-2004 10:35 AM
I think your problem is in your ACLs and your crypto map:
access-list 101 permit ip 10.0.1.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 101 permit ip 10.0.0.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 101 permit ip 10.0.3.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 101 permit ip 10.0.1.0 255.255.255.0 10.0.100.0 255.255.255.0
crypto map loc2rem 1 match address 101
This means this map wants to match those addresses. But your dynamic map is the one that should match traffic from 10.0.1.0 to 10.0.100.0, because your ip local pool is 10.0.100.x. I think what happens is that the return traffic from the lan to the vpn clients is trying to go out the static tunnel, which likely does not exist (for those netblocks - you likely have a Security association for each pair of netblocks, but not one for the vpn clients), and thus fails .
I would recommend adding these lines:
access-list 105 permit ip 10.0.1.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 105 permit ip 10.0.0.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 105 permit ip 10.0.3.0 255.255.255.0 10.0.2.0 255.255.255.0
no crypto map loc2rem 1 match address 101
crypto map loc2rem 1 match address 105
Then reapply :
crypto map loc2rem interface outside
08-22-2004 06:25 PM
Just in case the remote clients are accessing the Internet through a NAT device, make sure you turn on NAT Traversal on your PIX.
"isakmp nat-traversal 20" should do...
09-01-2004 02:30 AM
Hi!!
I just met quite the simular case a couple of weeks ago!! (and I finally resolved it!!)
This case maybe a problem of the ACL.
Now you're using the same ACL (101) for "Site-to-Site crypto map" and "nat command".
This may cause the packet to remote-client transported to the "Site-to-Site VPN".
So I suppose to creat another ACL(102) for "Site-to-Site crypto map" like the following:
access-list 102 permit ip 10.0.1.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 102 permit ip 10.0.0.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list 102 permit ip 10.0.3.0 255.255.255.0 10.0.2.0 255.255.255.0
Good Luck!!
Y.Harada
10-02-2004 04:06 AM
Hi,
Sorry for being a little late with this - but your
suggestion removing the "remote-access VPN-network" from the access-list steering the site2site-VPN definitely helped!
Thanks much to all of you who helped me out with this one!
-ewald
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide