Please note that traffic appears to be going smoothly,
it is just that I get the translation errors now,
and my Cisco Trust Agent on my VPN client can no longer
authenticate. Once again, before going to 7.0(1), my
config worked fine at 6.3(4).
Here it is:
PIX Version 7.0(1)
names
name 216.x.x.3 host3
name 216.x.x.4 host4
name 216.x.x.5 host5
name 216.x.x.6 host6
name 216.x.x.8 host8
name 216.x.x.7 host7
name 216.x.x.48 host48
name 216.x.x.47 host47
name 216.x.x.45 host45
name 216.x.x.46 host46
!
interface Ethernet0
nameif outside
security-level 0
ip address 216.x.x.2 255.255.255.0
!
interface Ethernet1
nameif inside
security-level 100
ip address 10.1.0.1 255.255.255.0
!
interface Ethernet2
shutdown
no nameif
no security-level
no ip address
!
enable password lalalalalala encrypted
passwd lalalalalalalala encrypted
hostname pixfw
domain-name somedomain.name
ftp mode passive
clock timezone CST -6
clock summer-time CDT recurring
access-list inboundtraffic <hidden... allows proper inbound requests>
access-list bypassnat extended permit ip 10.0.0.0 255.255.255.0 10.1.0.0 255.255.255.0
access-list bypassnat extended permit ip host 10.1.0.2 10.1.0.0 255.255.255.0
access-list outboundtraffic <hidden... allows proper outbound traffic>
access-list 6 standard permit 10.0.0.0 255.255.255.0
pager lines 24
logging enable
logging trap warnings
logging host inside 10.0.0.x
no logging message 106012
no logging message 106021
mtu outside 1500
mtu inside 1500
ip audit name Inbound-Attack attack action alarm drop reset
ip audit name Outbound-Attack attack action alarm drop
ip audit interface outside Inbound-Attack
ip audit interface inside Outbound-Attack
ip local pool dealer 10.1.0.101-10.1.0.108
ip local pool shark 10.1.0.100
no failover
monitor-interface outside
monitor-interface inside
arp timeout 14400
nat-control
global (outside) 1 216.x.x.49-216.x.x.243 netmask 255.255.255.0
nat (inside) 0 access-list bypassnat
nat (inside) 1 10.0.0.0 255.255.255.0
nat (inside) 2 10.1.0.0 255.255.255.0
static (inside,outside) host5 10.0.0.5 netmask 255.255.255.255
static (inside,outside) host6 10.0.0.6 netmask 255.255.255.255
static (inside,outside) host7 10.0.0.7 netmask 255.255.255.255
static (inside,outside) host8 10.0.0.8 netmask 255.255.255.255
static (inside,outside) host3 10.0.0.3 netmask 255.255.255.255
static (inside,outside) host48 10.0.0.48 netmask 255.255.255.255
static (inside,outside) host45 10.0.0.45 netmask 255.255.255.255
static (inside,outside) host46 10.0.0.46 netmask 255.255.255.255
static (inside,outside) host47 10.0.0.71 netmask 255.255.255.255
access-group inboundtraffic in interface outside
access-group outboundtraffic in interface inside
route outside 0.0.0.0 0.0.0.0 216.x.x.1 1
route inside 10.0.0.0 255.255.255.0 10.1.0.2 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
group-policy admin7777 internal
group-policy admin7777 attributes
wins-server value 10.0.0.13
dns-server value 10.0.0.4
vpn-idle-timeout 30
split-tunnel-policy tunnelspecified
split-tunnel-network-list value 6
default-domain value somedomain.name
username testuser password lalalalala encrypted
url-server (inside) vendor websense host 10.0.0.32 timeout 10 protocol TCP version 4 connections 5
filter url except 10.0.0.0 255.255.255.224 0.0.0.0 0.0.0.0
filter url except 10.0.0.32 255.255.255.240 0.0.0.0 0.0.0.0
filter https 443 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow
filter ftp 21 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow
filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow proxy-block longurl-deny
http server enable
http 10.0.0.x 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community lalalalalalala
snmp-server enable traps snmp
service resetinbound
crypto ipsec transform-set FirstSet esp-3des esp-md5-hmac
crypto dynamic-map dyn1 1 set transform-set FirstSet
crypto dynamic-map dyn1 1 set reverse-route
crypto map mymap 1 ipsec-isakmp dynamic dyn1
crypto map mymap interface outside
isakmp identity address
isakmp enable outside
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash sha
isakmp policy 1 group 2
isakmp policy 1 lifetime 43200
telnet timeout 60
ssh 10.0.0.x 255.255.255.255 inside
ssh 10.0.0.x 255.255.255.255 inside
ssh timeout 6
ssh version 2
console timeout 0
tunnel-group adminuser type ipsec-ra
tunnel-group adminuser general-attributes
address-pool shark
default-group-policy admin7777
tunnel-group adminuser ipsec-attributes
pre-shared-key *
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect http
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect netbios
!
url-block url-mempool 1500
url-block url-size 4
service-policy global_policy global