My config of the PIX515 is attached. When I try to authenticate to the Novell BMAS Radius Server 2.0 It fails to authenticate. Am I missing something in the config? Will The PIX talk well with the Novell Radius Server or should I look into some other way to authenticate? If I was able to authenticate would I be able to browse the inside LAN based on this config? All help is appreciated.
PIX Version 6.1(1)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security10
!
hostname ctvpnfirewall
domain-name domain.com
!
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
!
names
name 192.168.101.5 webserver
!
access-list nonatinside permit ip 0.0.0.0 255.255.255.0 192.168.105.0 255.255.255.0
access-list localtovpnclient permit ip 0.0.0.0 255.255.255.0 192.168.105.0 255.255.255.0
!
pager lines 24
logging buffered debugging
!
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
mtu outside 1500
mtu inside 1500
mtu dmz 1500
!
ip address outside 192.168.100.1 255.255.255.0
ip address inside 10.10.1.225 255.255.255.0
ip address dmz 192.168.101.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
!
ip local pool vpnpool 192.168.105.1-192.168.105.254
!
pdm history enable
arp timeout 14400
!
nat (inside) 0 access-list nonatinside
conduit permit icmp any any
route outside 0.0.0.0 0.0.0.0 192.168.100.1 1
route inside 10.0.0.0 255.0.0.0 10.10.1.225 1
!
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
!
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server authinbound protocol radius
aaa-server authinbound (inside) host 10.12.76.10 password timeout 10
!
http server enable
http 10.10.68.101 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
!
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynamic dynmap
crypto map mymap client configuration address initiate
crypto map mymap client configuration address respond
crypto map mymap client authentication authinbound
crypto map mymap interface outside
!
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
!
vpngroup ctvpn address-pool vpnpool
vpngroup ctvpn dns-server 10.10.14.4 10.10.8.12
vpngroup ctvpn wins-server 10.12.44.5
vpngroup ctvpn default-domain domain.com
vpngroup ctvpn split-tunnel localtovpnclient
vpngroup ctvpn idle-time 3600
vpngroup ctvpn password password
!
telnet timeout 30
ssh timeout 5
terminal width 80
Cryptochecksum:a545c9953ff15156c91b8311375895d3
: end
PIX Version 6.1(1)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security10
!
hostname ctvpnfirewall
domain-name domain.com
!
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
!
names
name 192.168.101.5 webserver
!
access-list nonatinside permit ip 0.0.0.0 255.255.255.0 192.168.105.0 255.255.255.0
access-list localtovpnclient permit ip 0.0.0.0 255.255.255.0 192.168.105.0 255.255.255.0
!
pager lines 24
logging buffered debugging
!
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
mtu outside 1500
mtu inside 1500
mtu dmz 1500
!
ip address outside 192.168.100.1 255.255.255.0
ip address inside 10.10.1.225 255.255.255.0
ip address dmz 192.168.101.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
!
ip local pool vpnpool 192.168.105.1-192.168.105.254
!
pdm history enable
arp timeout 14400
!
nat (inside) 0 access-list nonatinside
conduit permit icmp any any
route outside 0.0.0.0 0.0.0.0 192.168.100.1 1
route inside 10.0.0.0 255.0.0.0 10.10.1.225 1
!
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
!
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server authinbound protocol radius
aaa-server authinbound (inside) host 10.12.76.10 password timeout 10
!
http server enable
http 10.10.68.101 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
!
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynamic dynmap
crypto map mymap client configuration address initiate
crypto map mymap client configuration address respond
crypto map mymap client authentication authinbound
crypto map mymap interface outside
!
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
!
vpngroup ctvpn address-pool vpnpool
vpngroup ctvpn dns-server 10.10.14.4 10.10.8.12
vpngroup ctvpn wins-server 10.12.44.5
vpngroup ctvpn default-domain domain.com
vpngroup ctvpn split-tunnel localtovpnclient
vpngroup ctvpn idle-time 3600
vpngroup ctvpn password password
!
telnet timeout 30
ssh timeout 5
terminal width 80
Cryptochecksum:a545c9953ff15156c91b8311375895d3
: end