Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations wOOdy-Soft on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Pix to Vigor VPN Problem

Status
Not open for further replies.
Sep 6, 2000
183
Firstly I apologise if the answer to my question is already in an existing thread, the search facility aint working.

I'm trying to connect ba draytek vigor dsl router to a cisco pix. Drayteks site recons its easy but I can get it to work. Our current pix config allows us to vpn using the cisco software with no problems.

Hope someone can help.

Ta

Draytek's recommended config is below followed by our current config. I can't see any major differences.

draytek.

Configuring IPSec with IKE Create a new access list "222" to define the traffic to protect from Head Office's LAN to Branch Office's LAN.

nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pixfirewall
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list 222 permit ip 172.16.2.0 255.255.255.0 192.168.2.0 255.255.255.0
pager lines 24
logging on
interface ethernet0 10baset
interface ethernet1 10baset
mtu outside 1500
mtu inside 1500
ip address outside 210.243.151.181 255.255.255.192
ip address inside 172.16.2.1 55.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
nat (inside) 0 access-list 222
static (inside,outside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0 0 0
conduit permit icmp any any
route outside 0.0.0.0 0.0.0.0 210.243.151.190 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
no floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set Tunnel-ESPDES-MD5 esp-des esp-md5-hmac
crypto map ForInternet 222 ipsec-isakmp
crypto map ForInternet 222 match address 222
crypto map ForInternet 222 set peer 203.69.175.53
crypto map ForInternet 222 set transform-set Tunnel-ESPDES-MD5
crypto map ForInternet interface outside
isakmp enable outside
isakmp key ******** address 203.69.175.53 netmask 255.255.255.255
isakmp policy 22 authentication pre-share
isakmp policy 22 encryption des
isakmp policy 22 hash md5
isakmp policy 22 group 1
isakmp policy 22 lifetime 28800
telnet 172.16.2.10 255.255.255.255 inside
telnet timeout 5
ssh timeout 5
terminal width 80


Our config..

PIX Version 6.1(1)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
...Truncated
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
names
..Truncated

access-list acl_inside permit ..Truncated
access-list acl_outside permit ..Truncated
access-list acl_vpn permit ip 172.30.0.0 255.255.0.0 192.168.253.0 255.255.255.0
access-list acl_vpn permit ip 172.40.0.0 255.255.0.0 192.168.253.0 255.255.255.0
access-list acl_vpn permit ip 172.50.0.0 255.255.0.0 192.168.253.0 255.255.255.0
access-list dmz_access_in permit ..Truncated
pager lines 24
logging on
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip address outside ..Truncated
ip address inside 172.30.1.34 255.255.0.0
ip address dmz 192.168.100.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool ippool 192.168.253.1-192.168.253.254
no failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
failover ip address dmz 0.0.0.0
pdm location ..Truncated
pdm history enable
arp timeout 14400
global (outside) 1 ..Truncated
nat (inside) 1 172.30.0.0 255.255.0.0 0 0
nat (inside) 1 172.40.0.0 255.255.0.0 0 0
nat (inside) 1 172.50.0.0 255.255.0.0 0 0
nat (dmz) 1 192.168.100.0 255.255.255.0 0 0
..Truncated
access-group acl_outside in interface outside
access-group acl_inside in interface inside
access-group dmz_access_in in interface dmz
route outside 0.0.0.0 0.0.0.0 ..Truncated
route inside 172.40.0.0 255.255.0.0 172.40.1.254 1
route inside 172.50.0.0 255.255.0.0 172.50.1.254 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 172.30.1.53 255.255.255.255 inside
http 172.30.110.2 255.255.255.255 inside
http 172.30.110.13 255.255.255.255 inside
http 172.30.110.52 255.255.255.255 inside
http 172.30.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
sysopt ipsec pl-compatible
no sysopt route dnat
crypto ipsec transform-set myset esp-3des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynamic dynmap
crypto map mymap interface outside
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup vpn3000 address-pool ippool
vpngroup vpn3000 dns-server ..Truncated
vpngroup vpn3000 default-domain ..Truncated
vpngroup vpn3000 idle-time 1800
vpngroup vpn3000 password ********
vpngroup dwoodward address-pool ippool
vpngroup dwoodward dns-server ..Truncated
vpngroup dwoodward default-domain ..Truncated
vpngroup dwoodward idle-time 1800
vpngroup dwoodward password ********
vpngroup firewall address-pool ippool
vpngroup firewall dns-server ..Truncated
vpngroup firewall default-domain ..Truncated
vpngroup firewall idle-time 1800
vpngroup firewall password ********
vpngroup firwall idle-time 1800
vpngroup firwall password ********
telnet 172.30.0.0 255.255.0.0 inside
telnet 172.40.0.0 255.255.0.0 inside
telnet 172.50.0.0 255.255.0.0 inside
telnet 192.168.253.0 255.255.255.0 inside
telnet timeout 5
ssh 172.30.0.0 255.255.0.0 inside
ssh 172.40.0.0 255.255.0.0 inside
ssh 172.50.0.0 255.255.0.0 inside
ssh timeout 60
terminal width 80
Cryptochecksum:..Truncated

Chris Styles

NT4/2000 MCSE
 
Well, the basic problem here is that the config from draytek needs to be merged with yours :

This part :
crypto map ForInternet 222 ipsec-isakmp
crypto map ForInternet 222 match address 222
crypto map ForInternet 222 set peer 203.69.175.53
crypto map ForInternet 222 set transform-set Tunnel-ESPDES-MD5

needs to be :

crypto map mymap 222 ipsec-isakmp
crypto map mymap 222 match address 222
crypto map mymap 222 set peer 203.69.175.53
crypto map mymap 222 set transform-set Tunnel-ESPDES-MD5

So that it will be bound to the outside interface

Also the key needs to be changed from :
isakmp key ******** address 203.69.175.53 netmask 255.255.255.255

to :
isakmp key ******** address 203.69.175.53 netmask 255.255.255.255 no-xauth no-config-mode

Also you need an nat (inside) 0 access-list xxx line
the acl should define the traffic that should not be nat'ed ie. the traffic from your network the network behind your draytek router.

Hope this clears it up for you.

Oh and also check with "debug crypto isa" that your tranform-set/isakmp policy is accepted.

Jan



Network Systems Engineer
CCNA/CQS/CCSP/Infosec
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top