Hi,
Any help would be appreciated. I am having no joy setting up a VPN tunnel between a PIX 506 and a Linksys WRV54G.
On the linksys side I have encrytion set to DES with MD5 authen. The local network is 192.168.1.0/24 and the remote pix network is 192.168.0.0/24.
Basically looks pretty simple on the linksys side.
My pix config (done through the PDM) looks like this. if you can see my obvious mistake please let me know.
thanks,
PIX Version 6.3(4)
interface ethernet0 10baset
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname pixfirewall
domain-name ciscopix.com
access-list outside_cryptomap_20 permit ip Chicago 255.255.255.0 192.168.1.0 255.255.255.0
access-list outside_cryptomap_dyn_40 permit ip any 192.168.0.192 255.255.255.192
ip address outside 66.222.222.22 255.255.255.248
ip address inside 192.168.0.1 255.255.255.0
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
access-group outside-in in interface outside
route outside 0.0.0.0 0.0.0.0 66.222.222.21 1
route inside 192.168.1.0 255.255.255.0 192.168.0.200 1
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5
crypto dynamic-map outside_dyn_map_1 40 match address outside_cryptomap_dyn_40
crypto dynamic-map outside_dyn_map_1 40 set transform-set ESP-DES-MD5
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 64.222.2.222
crypto map outside_map 20 set transform-set ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map_1
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address 64.222.2.222 netmask 255.255.255.255 no-xauth no-config-mode
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup CAB address-pool CAB
vpngroup CAB split-tunnel CAB_splitTunnelAcl
vpngroup CAB idle-time 600
vpngroup CAB password ********
telnet timeout 5
ssh Chicago 255.255.255.0 inside
Any help would be appreciated. I am having no joy setting up a VPN tunnel between a PIX 506 and a Linksys WRV54G.
On the linksys side I have encrytion set to DES with MD5 authen. The local network is 192.168.1.0/24 and the remote pix network is 192.168.0.0/24.
Basically looks pretty simple on the linksys side.
My pix config (done through the PDM) looks like this. if you can see my obvious mistake please let me know.
thanks,
PIX Version 6.3(4)
interface ethernet0 10baset
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname pixfirewall
domain-name ciscopix.com
access-list outside_cryptomap_20 permit ip Chicago 255.255.255.0 192.168.1.0 255.255.255.0
access-list outside_cryptomap_dyn_40 permit ip any 192.168.0.192 255.255.255.192
ip address outside 66.222.222.22 255.255.255.248
ip address inside 192.168.0.1 255.255.255.0
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
access-group outside-in in interface outside
route outside 0.0.0.0 0.0.0.0 66.222.222.21 1
route inside 192.168.1.0 255.255.255.0 192.168.0.200 1
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5
crypto dynamic-map outside_dyn_map_1 40 match address outside_cryptomap_dyn_40
crypto dynamic-map outside_dyn_map_1 40 set transform-set ESP-DES-MD5
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 64.222.2.222
crypto map outside_map 20 set transform-set ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map_1
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address 64.222.2.222 netmask 255.255.255.255 no-xauth no-config-mode
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup CAB address-pool CAB
vpngroup CAB split-tunnel CAB_splitTunnelAcl
vpngroup CAB idle-time 600
vpngroup CAB password ********
telnet timeout 5
ssh Chicago 255.255.255.0 inside