VPN Setup on Cisco PIX Firewall

Posted on 2002-04-18
Last Modified: 2008-03-17
We are going to setup Cisco PIX 515E as our firewall and VPN box as well.

How can I setup/enable VPN support on PIX box (using IPSec), and configure the client software on Windows to access it?

I searched Cisco web site, and found something, but I am still very confusing... Need help!

Thanks in advance

Question by:robert100
  • 4
  • 4

Expert Comment

ID: 6951812
Is this what you are trying to achieve?
Configuring Cisco Secure PIX Firewall 6.0 and Cisco VPN 3000 Client Using IPSec:

If so, where are you stuck?
If not, then please tell more.
LVL 79

Expert Comment

ID: 6955437
This will explain how to setup for both VPN3000 client or for Windows PPTP:

If you want practical example:

ip local pool IPSEC
ip local pool PPTP

access-list NO_NAT permit ip <internal network>

nat (inside) 0 access-list NO_NAT
sysopt connection permit-ipsec
sysopt ipsec pl-compatible
no sysopt route dnat
crypto ipsec transform-set LAB esp-des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set LAB
crypto map CRYMAP 10 ipsec-isakmp dynamic dynmap
crypto map CRYMAP interface outside
isakmp enable outside
isakmp key <password> address netmask
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
# setup for VPN3000 client:
# client setup username: LABVPN password: <password>
vpngroup LABVPN address-pool ippool
vpngroup LABVPN dns-server <DNS IP>
vpngroup LABVPN wins-server <WINS IP1> <WINS IP2>
vpngroup LABVPN idle-time 1800
vpngroup LABVPN password <password>

# setup for PPTP clients:
vpdn group PPTP accept dialin pptp
vpdn group PPTP ppp authentication mschap
vpdn group PPTP ppp encryption mppe 40
vpdn group PPTP client configuration address local PPTP
vpdn group PPTP client configuration dns <dns server IP>
vpdn group PPTP client configuration wins <WINS IP1> <WINS IP2>
vpdn group PPTP pptp echo 60
vpdn group PPTP client authentication local
vpdn username <username> password <password>
vpdn username <user2> password <password2>
vpdn enable outside

LVL 79

Expert Comment

ID: 6955442
oops, change this:
vpngroup LABVPN address-pool ippool

to this:
vpngroup LABVPN address-pool IPSEC
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!


Author Comment

ID: 6964078
Thanks for the detailed help.

Author Comment

ID: 6964079
Thanks for the detailed help.

Author Comment

ID: 6972338
More questions on Cisco PIX VPN.

I am going to setup a VPN conncetion using IPSec to connect another host in another private network for a group of our users from one of our subnets. I don't know what platform of firewall or VPN server the other end use, most likely a hardware based. What I know is only a host IP address and they IPSec, not PPTP or L2TP. How could I do that? I read the article form Cisco web site, which deals with PIX-to-PIX situation.

1. Does PIX work with other firewall or hardware based VPN server? If yes, what informaiton about the other end I have to know?
2.Any client software must be installed on our internal clients to connect to the remote host?
3. I don't know very clearly that how host-to-host VPN works? Any source of information.

Thanks so much

LVL 79

Expert Comment

ID: 6972366
Just so you know, I get $175 per hour to help folks like yourself set up VPN's on PIX and Cisco routers.

The short answer, is yes, you can setup a site-to-site VPN between the PIX and virtually any IPSEC VPN capable device (checkpoint FW, Nokia, etc).

I would recommend a site-to-site VPN, with an access-list that restricts the access to specified IP addresses on both sides.

No additional software should be required anywhere.


Author Comment

ID: 6984785
Thanks so much.

One more question, to setup IPSec on PIX , there is a bunch of settings, such as preshared key, access list, etc. to setup, do I need to know anything on the other side about these settings, except for the IP of the access point? This IP is that of the firewall of the other side, or the host to be reached on the internal network of the other side?

I know it maybe too detail, but it is important.

Thanks in advance.

LVL 79

Accepted Solution

lrmoore earned 200 total points
ID: 6984811
You will have to work with the firewall administrator on the other side. You both have to setup the same policies, agree on shared secret keys, hash algorithm, etc.
In this example:
crypto isakmp key cisco1234 address

"cisco1234" is a passphrase or password, and the ip address is the outside interface of the remote firewall.

This example:
crypto ipsec transform-set strong  esp-des esp-sha-hmac

"strong" is a name for this transform-set and can be anything you want. The combination of "esp-des esp-sha-hmac" is the encryption type you have to agree on.

You must define an access-list the enables the "interesting traffic" that triggers the VPN tunnel to be built, and a mirror-image on the remote site:
access-list 90 permit ip

The syntax is:
access-list [number or name] permit ip <your IP address range> <your subnet mask> <remote ip address range> <remote netmask>

You also have to agree on lifetimes,

Then you have to define crypto maps, and then apply the map to an interface. Step-by-step:


Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Stuck in INIT/DROTHER 2 76
Destination host unreachable 12 194
TL-R470T+ and Cisco ASA 2 35
Cisco router is restricting wireless bandwidth download and upload speed 38 51
We've been using the Cisco/Linksys RV042 for years as: - an internet Gateway - a site-to-site VPN device - a leased line site-to-site subnet-to-subnet interface (And, here I'm assuming that any RV0xx behaves the same way as an RV042.  So that's …
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question