speedingwolf
IS-IT--Management
Greetings all,
I'm trying to vpn into the corpnet using the Cisco Client version 4.x. I can establish a tunnel; however, I can't seem to access any inside machine. Please point some lights. Here is the config. I have a feeling it is access-list issues or outbound restriction. Thanks
PIX Version 6.1(4)
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
names
'Notes: Access-list 102 is outbound
access-list 102 permit tcp any any eq www
access-list 102 permit tcp any any eq smtp
access-list 102 permit tcp any any eq pop3
access-list 102 permit tcp any any eq 1494
access-list 102 permit tcp any any eq 3389
access-list 102 permit tcp any any eq ftp
access-list 102 permit tcp any any eq nntp
access-list 102 permit tcp host 192.168.100.130 any eq domain
access-list 102 permit udp host 192.168.100.130 any eq domain
access-list 102 permit tcp host 192.168.100.130 any eq telnet
access-list 102 permit tcp host 192.168.100.250 any eq telnet
access-list 102 permit gre any any
access-list 102 permit tcp any any eq 1723
access-list 102 permit tcp any any eq 990
access-list 102 permit tcp any any eq 443
access-list 102 permit tcp any any range 8880 8910
access-list 102 permit tcp any any eq 5900
access-list 102 permit tcp any any eq 5800
access-list 102 permit tcp host 192.168.100.172 any eq domain
access-list 102 permit udp host 192.168.100.172 any eq domain
access-list 102 permit tcp host 192.168.100.172 any eq telnet
access-list 102 permit udp any host 192.168.100.106 eq domain
access-list 102 permit tcp any host 192.168.100.106 eq domain
access-list 102 permit tcp host 192.168.100.131 any
access-list 102 permit ip host 192.168.100.118 any
access-list 103 permit ip 192.168.103.0 255.255.255.0 192.168.100.0 255.255.255.0
interface ethernet0 10baset
interface ethernet1 100basetx
interface ethernet2 100basetx
mtu outside 1500
mtu dmz 1500
mtu inside 1500
ip address outside x.x.x.x
ip address dmz 192.168.1.2 255.255.255.0
ip address inside 192.168.100.1 255.255.255.0
ip verify reverse-path interface outside
ip audit name attackout info action alarm
ip audit name attackin info action alarm
ip audit interface outside attackout
ip audit interface inside attackin
ip audit info action alarm
ip audit attack action alarm
ip local pool IPPOOL 192.168.103.200-192.168.103.210
global (outside) 1 x.x.x.x-x.x.x.x
global (outside) 1 x.x.x.x
nat (inside) 0 access-list 103
nat (inside) 1 192.168.100.0 255.255.255.0 0 0
nat (inside) 1 192.168.200.0 255.255.255.0 0 0
access-group 101 in interface outside
access-group 102 in interface inside
route outside 0.0.0.0 0.0.0.0 x.x.x.x
route inside 192.168.103.0 255.255.255.0 192.168.100.1 1
route inside 192.168.200.0 255.255.255.0 192.168.100.210 1
snmp-server enable traps
floodguard enable
sysopt security fragguard
sysopt connection permit-ipsec
sysopt route dnat
crypto ipsec transform-set SET esp-des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set SET
crypto map MAP 10 ipsec-isakmp dynamic dynmap
crypto map MAP client configuration address initiate
crypto map MAP client configuration address respond
crypto map MAP interface outside
isakmp enable outside
isakmp key ******** address 0.0.0.0 netmask 0.0.0.0
isakmp identity address
isakmp client configuration address-pool local IPPOOL outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup IVPN address-pool IPPOOL
vpngroup VPN dns-server 192.168.100.172
vpngroup VPN default-domain password
vpngroup VPN split-tunnel 103
vpngroup VPN idle-time 1800
vpngroup VPN password ********
I'm trying to vpn into the corpnet using the Cisco Client version 4.x. I can establish a tunnel; however, I can't seem to access any inside machine. Please point some lights. Here is the config. I have a feeling it is access-list issues or outbound restriction. Thanks
PIX Version 6.1(4)
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
names
'Notes: Access-list 102 is outbound
access-list 102 permit tcp any any eq www
access-list 102 permit tcp any any eq smtp
access-list 102 permit tcp any any eq pop3
access-list 102 permit tcp any any eq 1494
access-list 102 permit tcp any any eq 3389
access-list 102 permit tcp any any eq ftp
access-list 102 permit tcp any any eq nntp
access-list 102 permit tcp host 192.168.100.130 any eq domain
access-list 102 permit udp host 192.168.100.130 any eq domain
access-list 102 permit tcp host 192.168.100.130 any eq telnet
access-list 102 permit tcp host 192.168.100.250 any eq telnet
access-list 102 permit gre any any
access-list 102 permit tcp any any eq 1723
access-list 102 permit tcp any any eq 990
access-list 102 permit tcp any any eq 443
access-list 102 permit tcp any any range 8880 8910
access-list 102 permit tcp any any eq 5900
access-list 102 permit tcp any any eq 5800
access-list 102 permit tcp host 192.168.100.172 any eq domain
access-list 102 permit udp host 192.168.100.172 any eq domain
access-list 102 permit tcp host 192.168.100.172 any eq telnet
access-list 102 permit udp any host 192.168.100.106 eq domain
access-list 102 permit tcp any host 192.168.100.106 eq domain
access-list 102 permit tcp host 192.168.100.131 any
access-list 102 permit ip host 192.168.100.118 any
access-list 103 permit ip 192.168.103.0 255.255.255.0 192.168.100.0 255.255.255.0
interface ethernet0 10baset
interface ethernet1 100basetx
interface ethernet2 100basetx
mtu outside 1500
mtu dmz 1500
mtu inside 1500
ip address outside x.x.x.x
ip address dmz 192.168.1.2 255.255.255.0
ip address inside 192.168.100.1 255.255.255.0
ip verify reverse-path interface outside
ip audit name attackout info action alarm
ip audit name attackin info action alarm
ip audit interface outside attackout
ip audit interface inside attackin
ip audit info action alarm
ip audit attack action alarm
ip local pool IPPOOL 192.168.103.200-192.168.103.210
global (outside) 1 x.x.x.x-x.x.x.x
global (outside) 1 x.x.x.x
nat (inside) 0 access-list 103
nat (inside) 1 192.168.100.0 255.255.255.0 0 0
nat (inside) 1 192.168.200.0 255.255.255.0 0 0
access-group 101 in interface outside
access-group 102 in interface inside
route outside 0.0.0.0 0.0.0.0 x.x.x.x
route inside 192.168.103.0 255.255.255.0 192.168.100.1 1
route inside 192.168.200.0 255.255.255.0 192.168.100.210 1
snmp-server enable traps
floodguard enable
sysopt security fragguard
sysopt connection permit-ipsec
sysopt route dnat
crypto ipsec transform-set SET esp-des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set SET
crypto map MAP 10 ipsec-isakmp dynamic dynmap
crypto map MAP client configuration address initiate
crypto map MAP client configuration address respond
crypto map MAP interface outside
isakmp enable outside
isakmp key ******** address 0.0.0.0 netmask 0.0.0.0
isakmp identity address
isakmp client configuration address-pool local IPPOOL outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup IVPN address-pool IPPOOL
vpngroup VPN dns-server 192.168.100.172
vpngroup VPN default-domain password
vpngroup VPN split-tunnel 103
vpngroup VPN idle-time 1800
vpngroup VPN password ********