Hello,
I upgraded from PIX 506e 6.5 OS to PIX 515E 7.2 OS. When I had PIX 506 everything worked, but since I upgrade I have the following issue.
I have a VoIP PBX (Asterisk) on the inside, and a clients registers with it through our external IP using SPA2102.
The connection is made without a prob, we can initiate a call from inside or outside. BUT we cannot hear the client. The client can hear us! Is this a NAT issue?
I have tried to remove inspect on all protocols, also tryed allowing any any traffic from outside but no luck.
I have included my config. Thanks in advance.
:
PIX Version 7.2(2)
!
hostname pix
domain-name dnshq1
enable password <removed>
names
name x.x.17.234 IDC-firewall
!
interface Ethernet0
nameif outside
security-level 0
ip address x.x.42.66 255.255.255.240 standby x.x.42.71
!
interface Ethernet1
nameif inside
security-level 100
ip address 192.168.201.1 255.255.255.0 standby 192.168.201.2
!
passwd <removed>
ftp mode passive
dns server-group DefaultDNS
domain-name flshq
access-list no_nat extended permit ip any 192.168.0.0 255.255.0.0
access-list no_nat extended permit ip any 10.0.0.0 255.0.0.0
access-list no_nat extended permit ip any 172.16.0.0 255.240.0.0
access-list no_nat extended permit ip any 142.148.10.0 255.255.255.0
access-list no_nat extended permit ip any 205.1.1.0 255.255.255.0
access-list no_nat extended permit ip 192.168.201.0 255.255.255.0 192.168.0.0 255.255.255.0
access-list no_nat extended permit ip 192.168.201.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list no_nat extended permit ip 192.168.201.0 255.255.255.0 192.168.202.0 255.255.255.0
access-list inside extended permit ip any any
access-list outside extended permit tcp any host y.y.42.67 eq smtp
access-list outside extended permit tcp any host y.y.42.68 eq smtp
access-list outside extended permit tcp any host y.y.42.69 eq sip
access-list outside extended permit udp any host y.y.42.69 eq sip
access-list outside extended permit udp any host y.y.42.69 eq 5036
access-list outside extended permit tcp x.x.90.0 255.255.255.0 host y.y.42.69 eq 5901
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.69 eq ssh
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.69 eq ftp
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.69 eq 3306
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.70 eq sip
access-list outside extended permit udp x.x..90.0 255.255.255.0 host y.y.42.70 eq sip
access-list outside extended permit udp x.x..90.0 255.255.255.0 host y.y.42.70 eq 5036
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.70 eq 5901
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.70 eq ssh
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.70 eq ftp
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.70 eq 3306
access-list outside extended permit icmp any any
access-list pensonacl extended permit ip 192.168.201.0 255.255.255.0 host 192.168.1.11
access-list pensonacl extended permit ip 192.168.201.0 255.255.255.0 host 192.168.1.80
access-list pensonacl extended permit ip host 192.168.1.11 192.168.201.0 255.255.255.0
access-list pensonacl extended permit ip host 192.168.1.80 192.168.201.0 255.255.255.0
access-list VPN-IDC extended permit ip 192.168.201.0 255.255.255.0 192.168.0.0 255.255.255.0
access-list SPLITTUNNEL extended permit ip 192.168.201.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list pixtoswallacl extended permit ip 192.168.201.0 255.255.255.0 192.168.202.0 255.255.255.0
pager lines 24
logging buffered debugging
mtu outside 1500
mtu inside 1500
ip local pool VPN-POOL 192.168.200.1-192.168.200.254
failover
failover polltime unit 3 holdtime 9
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list no_nat
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) y.y.42.69 192.168.201.20 netmask 255.255.255.255
static (inside,outside) y.y.42.68 192.168.201.16 netmask 255.255.255.255
static (inside,outside) y.y.42.67 192.168.201.17 netmask 255.255.255.255
static (inside,outside) y.y.42.70 192.168.201.21 netmask 255.255.255.255
access-group outside in interface outside
access-group inside in interface inside
route outside 0.0.0.0 0.0.0.0 y.y.42.65 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
group-policy remote.vpn internal
group-policy remote.vpn attributes
vpn-idle-timeout 120
split-tunnel-policy tunnelspecified
split-tunnel-network-list value SPLITTUNNEL
default-domain value flshq.vpn
username xxxx password <removed>
http server enable
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set nsontset esp-3des esp-sha-hmac
crypto ipsec transform-set STRONG2 esp-3des esp-sha-hmac
crypto ipsec transform-set swalltset esp-3des esp-sha-hmac
crypto dynamic-map dynmap 10 set transform-set STRONG2
crypto map penson 1 match address pensonacl
crypto map penson 1 set peer n.n.69.132
crypto map penson 1 set transform-set pensontset
crypto map penson 10 match address VPN-IDC
crypto map penson 10 set peer IDC-firewall
crypto map penson 10 set transform-set STRONG2
crypto map penson 20 match address pixtoswallacl
crypto map penson 20 set peer n.n.124.82
crypto map penson 20 set transform-set swalltset
crypto map penson 90 ipsec-isakmp dynamic dynmap
crypto map penson interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption 3des
hash sha
group 1
lifetime 86400
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto isakmp policy 20
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 28800
tunnel-group n.n.17.234 type ipsec-l2l
tunnel-group n.n.17.234 ipsec-attributes
pre-shared-key *
tunnel-group n.n.69.132 type ipsec-l2l
tunnel-group n.n.69.132 ipsec-attributes
pre-shared-key *
tunnel-group n.n.124.82 type ipsec-l2l
tunnel-group n.n.124.82 ipsec-attributes
pre-shared-key *
tunnel-group remote.vpn type ipsec-ra
tunnel-group remote.vpn general-attributes
address-pool VPN-POOL
default-group-policy remote.vpn
tunnel-group remote.vpn ipsec-attributes
pre-shared-key *
telnet 192.168.201.0 255.255.255.0 inside
telnet timeout 30
ssh 192.168.201.0 255.255.255.0 inside
ssh timeout 30
console timeout 0
!
class-map class_sip_tcp
match port tcp eq sip
class-map class_sip_udp
match port udp eq sip
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:xxxxxxxxxxxxxxxxxxxx
: end
I upgraded from PIX 506e 6.5 OS to PIX 515E 7.2 OS. When I had PIX 506 everything worked, but since I upgrade I have the following issue.
I have a VoIP PBX (Asterisk) on the inside, and a clients registers with it through our external IP using SPA2102.
The connection is made without a prob, we can initiate a call from inside or outside. BUT we cannot hear the client. The client can hear us! Is this a NAT issue?
I have tried to remove inspect on all protocols, also tryed allowing any any traffic from outside but no luck.
I have included my config. Thanks in advance.
:
PIX Version 7.2(2)
!
hostname pix
domain-name dnshq1
enable password <removed>
names
name x.x.17.234 IDC-firewall
!
interface Ethernet0
nameif outside
security-level 0
ip address x.x.42.66 255.255.255.240 standby x.x.42.71
!
interface Ethernet1
nameif inside
security-level 100
ip address 192.168.201.1 255.255.255.0 standby 192.168.201.2
!
passwd <removed>
ftp mode passive
dns server-group DefaultDNS
domain-name flshq
access-list no_nat extended permit ip any 192.168.0.0 255.255.0.0
access-list no_nat extended permit ip any 10.0.0.0 255.0.0.0
access-list no_nat extended permit ip any 172.16.0.0 255.240.0.0
access-list no_nat extended permit ip any 142.148.10.0 255.255.255.0
access-list no_nat extended permit ip any 205.1.1.0 255.255.255.0
access-list no_nat extended permit ip 192.168.201.0 255.255.255.0 192.168.0.0 255.255.255.0
access-list no_nat extended permit ip 192.168.201.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list no_nat extended permit ip 192.168.201.0 255.255.255.0 192.168.202.0 255.255.255.0
access-list inside extended permit ip any any
access-list outside extended permit tcp any host y.y.42.67 eq smtp
access-list outside extended permit tcp any host y.y.42.68 eq smtp
access-list outside extended permit tcp any host y.y.42.69 eq sip
access-list outside extended permit udp any host y.y.42.69 eq sip
access-list outside extended permit udp any host y.y.42.69 eq 5036
access-list outside extended permit tcp x.x.90.0 255.255.255.0 host y.y.42.69 eq 5901
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.69 eq ssh
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.69 eq ftp
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.69 eq 3306
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.70 eq sip
access-list outside extended permit udp x.x..90.0 255.255.255.0 host y.y.42.70 eq sip
access-list outside extended permit udp x.x..90.0 255.255.255.0 host y.y.42.70 eq 5036
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.70 eq 5901
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.70 eq ssh
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.70 eq ftp
access-list outside extended permit tcp x.x..90.0 255.255.255.0 host y.y.42.70 eq 3306
access-list outside extended permit icmp any any
access-list pensonacl extended permit ip 192.168.201.0 255.255.255.0 host 192.168.1.11
access-list pensonacl extended permit ip 192.168.201.0 255.255.255.0 host 192.168.1.80
access-list pensonacl extended permit ip host 192.168.1.11 192.168.201.0 255.255.255.0
access-list pensonacl extended permit ip host 192.168.1.80 192.168.201.0 255.255.255.0
access-list VPN-IDC extended permit ip 192.168.201.0 255.255.255.0 192.168.0.0 255.255.255.0
access-list SPLITTUNNEL extended permit ip 192.168.201.0 255.255.255.0 192.168.200.0 255.255.255.0
access-list pixtoswallacl extended permit ip 192.168.201.0 255.255.255.0 192.168.202.0 255.255.255.0
pager lines 24
logging buffered debugging
mtu outside 1500
mtu inside 1500
ip local pool VPN-POOL 192.168.200.1-192.168.200.254
failover
failover polltime unit 3 holdtime 9
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list no_nat
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) y.y.42.69 192.168.201.20 netmask 255.255.255.255
static (inside,outside) y.y.42.68 192.168.201.16 netmask 255.255.255.255
static (inside,outside) y.y.42.67 192.168.201.17 netmask 255.255.255.255
static (inside,outside) y.y.42.70 192.168.201.21 netmask 255.255.255.255
access-group outside in interface outside
access-group inside in interface inside
route outside 0.0.0.0 0.0.0.0 y.y.42.65 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
group-policy remote.vpn internal
group-policy remote.vpn attributes
vpn-idle-timeout 120
split-tunnel-policy tunnelspecified
split-tunnel-network-list value SPLITTUNNEL
default-domain value flshq.vpn
username xxxx password <removed>
http server enable
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set nsontset esp-3des esp-sha-hmac
crypto ipsec transform-set STRONG2 esp-3des esp-sha-hmac
crypto ipsec transform-set swalltset esp-3des esp-sha-hmac
crypto dynamic-map dynmap 10 set transform-set STRONG2
crypto map penson 1 match address pensonacl
crypto map penson 1 set peer n.n.69.132
crypto map penson 1 set transform-set pensontset
crypto map penson 10 match address VPN-IDC
crypto map penson 10 set peer IDC-firewall
crypto map penson 10 set transform-set STRONG2
crypto map penson 20 match address pixtoswallacl
crypto map penson 20 set peer n.n.124.82
crypto map penson 20 set transform-set swalltset
crypto map penson 90 ipsec-isakmp dynamic dynmap
crypto map penson interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption 3des
hash sha
group 1
lifetime 86400
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto isakmp policy 20
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 28800
tunnel-group n.n.17.234 type ipsec-l2l
tunnel-group n.n.17.234 ipsec-attributes
pre-shared-key *
tunnel-group n.n.69.132 type ipsec-l2l
tunnel-group n.n.69.132 ipsec-attributes
pre-shared-key *
tunnel-group n.n.124.82 type ipsec-l2l
tunnel-group n.n.124.82 ipsec-attributes
pre-shared-key *
tunnel-group remote.vpn type ipsec-ra
tunnel-group remote.vpn general-attributes
address-pool VPN-POOL
default-group-policy remote.vpn
tunnel-group remote.vpn ipsec-attributes
pre-shared-key *
telnet 192.168.201.0 255.255.255.0 inside
telnet timeout 30
ssh 192.168.201.0 255.255.255.0 inside
ssh timeout 30
console timeout 0
!
class-map class_sip_tcp
match port tcp eq sip
class-map class_sip_udp
match port udp eq sip
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:xxxxxxxxxxxxxxxxxxxx
: end