Link to home
Start Free TrialLog in
Avatar of mark-wa
mark-wa

asked on

PIX515E to PIX515E VPN connection....

Hello,

I am working with another office trying to setup a VPN connection between our PIX firewalls.  Could someone give me an example of the entries that would be needed?  I know there's a lot, but I am not too familiar with doing this.  Any help would be greatly appreciated.  Thanks.

Mark
ASKER CERTIFIED SOLUTION
Avatar of Les Moore
Les Moore
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of mark-wa
mark-wa

ASKER

Hi Irmoore,

Thanks for the link!  It's very helpful!  Could you please explain this section to me?

Crypto maps set up IPSec SAs for the encrypted traffic. To create a crypto map, you must assign a map name and a sequence number, and define the crypto map parameters. The crypto map "transam" shown below uses IKE to establish IPSec SAs, encrypts anything that matches access-list 101, has a set peer, and uses the chevelle transform-set to enact its security policy for traffic.

crypto map transam 1 ipsec-isakmp
crypto map transam 1 match address 101
crypto map transam 1 set peer 172.22.112.12
crypto map transam 1 set transform-set chevelle

The part that is kind of "hanging me up" is   <crypto map transam 1 set peer 172.22.112.12>

What is that ip address?  It's specific, so is that supposed to be the actual Outside address for the PIX you're trying to connect to?

Thanks.

Mark
Avatar of mark-wa

ASKER

Actually, there's this part that was given before that section I just gave you:

Finally, configure the preshared key and assign a peer address by using the isakmp key command. The same preshared key must match on the IPSec peers when using preshared keys. The address will differ depending on the IP address of the remote peer.

isakmp key ********** address 172.22.112.12 netmask 255.255.255.255

Thanks.

Mark
><crypto map transam 1 set peer 172.22.112.12>
>isakmp key ********** address 172.22.112.12 netmask 255.255.255.255

Each PIX will consider the outside public IP address of the other PIX as its peer, and the same IP is used in both the crypto map peer statement and the isakmp shared key definition...the "key" is a password - use whatever you like..

ie. PIX#1 outside IP = 12.34.56.7, PIX#2 = 56.78.9.9
PIX#1
   crypto map transam 1 set peer 56.78.9.9
   isakmp key <your secret key> address 56.78.9.9 netmask 255.255.255.255

PIX#2
   crypto map transam 1 set peer 12.34.56.7
   isakmp key <your secret key> address 12.34.56.7 netmask 255.255.255.255
Avatar of mark-wa

ASKER

Perfect!  Thank you!  I'll let you know how it goes.

Thanks again!

Mark
Avatar of mark-wa

ASKER

Hi Irmoore,

I have posted another question in the TA while I'm waiting to hear back from the other office about this issue.  You have been very helpful!  Thanks again!

Mark
mark. download and load PIX Device Manager (PDM) on both 515's. free download.
PDM connects to the pix using https on a browser.
There is a wizard in PDM that lets you configure VPN with ease. and error free :)
Avatar of mark-wa

ASKER

Ok, we're also in the middle of implementing a new RS6000.  Our application vendor now wants a "site to site" VPN connection, also.  Is it possible to setup 2 "site to site" VPN connections at the same time?  Is it advisable?  Thanks.

Mark
Not a problem at all....
You can setup 100 site-site connections if you want...
However, I would question how the application vendor proposes to secure this site-site VPN connection, and be sure to lock down your acls that define the traffic to be as specific as possible.
Avatar of mark-wa

ASKER

Ok, I'm almost done with this.  I apologize because I know I've way over-used the point value on this (wish I could give more).

Can someone look at these lines and tell me what the "20" and "30" values mean (after outside_map)?  Are they just a way of differentiating between the 2 different site connections or is there a significant meaning to those?

crypto ipsec transform-set esp-3des-md5 esp-3des esp-md5-hmac
crypto ipsec transform-set standard esp-3des esp-md5-hmac
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address inland_match
crypto map outside_map 20 set peer 63.149.220.10
crypto map outside_map 20 set transform-set standard
crypto map outside_map 30 ipsec-isakmp
crypto map outside_map 30 match address PAML_match
crypto map outside_map 30 set peer 205.158.190.162
crypto map outside_map 30 set transform-set esp-3des-md5
crypto map outside_map interface outside
isakmp enable outside

Thanks.

Mark
20 and 30 are the priorities of the crypto maps. Higher priorities are tried first. If successful, the connection is established. If the parameters dont match, it moves on to the next priority and tries to connect.
Avatar of mark-wa

ASKER

is a priority setting required?

Thanks.

Mark
Not really. Its useful for large corporations to set up priorities in which users will login and access information.
I'm guessing you dont really need. it 20 and 30 is fine the way it is.

Also, I'd recommend you download and install PIX Device Manager. Its a free download from cisco and will help you manage your box using a browser on your machine. It will help you configure everything on the PIX with relative easy compared to the CLI
Avatar of mark-wa

ASKER

when having multiple site-to-site vpn's setup, do any of the following lines need to be duplicated or matched with anything in the crypto commands?

isakmp enable outside
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000

Is the "1" after "policy" also just a priority number?

Mark
You only need as many policies as you have unique requirements.
You can create multiple policies to match remote ends, i.e.
  des/sha/group 1
  3des/sha/group 1
  3des/md5/group 2
  aes/sha/group 5
 <etc>

Each policy gets a different priority number. Hopefully, one of the policies will match the remote end (and the transform-set on your own end)

For the individual maps, you do have to have a priority number
Avatar of mark-wa

ASKER

Ok, here's one of the other office's isakmp stuff:

isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 1
isakmp policy 20 lifetime 86400

Here's my isakmp stuff for a vpn setup I did a while back that's for connecting via a vpn client:

isakmp enable outside
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000

So their encryption is 3des and mine is des.  Would I create another group for this site-to-site connection or would I just change the encryption to 3des?  Would that then affect the vpn clients and they too would need to be changed?

Mark
Avatar of mark-wa

ASKER

Oops, actually, my isakmp lines are as follows for the vpn config for a client:

isakmp enable outside
isakmp nat-traversal 20
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400

The one's above are the ones I was going to enter based on that link Irmoore gave me on the site-to-site vpn stuff.

Mark
You can just create another group

isakmp policy 2 authentication pre-share
isakmp policy 2 encryption 3des
isakmp policy 2 hash md5
isakmp policy 2 group 1
isakmp policy 2 lifetime 1000

and make sure your transform set matches in the crypto map statements..
i.e.
crypto ipsec transform-set esp-3des-md5 esp-3des esp-md5-hmac
crypto ipsec transform-set standard esp-des esp-md5-hmac
crypto ipsec transform-set AES-SHA esp-aes-256 esp-sha-hmac
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address inland_match
crypto map outside_map 20 set peer 63.149.220.10  <== peer #1
crypto map outside_map 20 set transform-set standard  <== DES

crypto map outside_map 30 ipsec-isakmp
crypto map outside_map 30 match address <acl>
crypto map outside_map 30 set peer 163.19.22.65  <== peer #2
crypto map outside_map 30 set transform-set esp-3des-md5   <== 3DES

crypto map outside_map 40 ipsec-isakmp
crypto map outside_map 40 match address <acl>
crypto map outside_map 40 set peer 13.191.2.5  <== peer #3
crypto map outside_map 40 set transform-set AES-SHA   <== AES
 
You just have to make sure that you have a policy on your end that will match the transform-set that you have identified for that peer....


Avatar of mark-wa

ASKER

Thank you so much for all of the info!  Looks like my client at the other office has left for the day, but we should be able to finish this up tomorrow.  Thanks again.

Mark
Avatar of mark-wa

ASKER

I was starting to enter the configuration into my PIX and got this:

pixfirewall(config)# isakmp policy 1 encryption 3des
VPN-3DES-AES is not enabled with current activation key.
Usage:  isakmp policy <priority> authen <pre-share|rsa-sig>
        isakmp policy <priority> encrypt <aes|aes-192|aes-256|des|3des>
        isakmp policy <priority> hash <md5|sha>
        isakmp policy <priority> group <1|2|5>
        isakmp policy <priority> lifetime <seconds>
        isakmp key <key-string> address <ip> [netmask <mask>] [no-xauth] [no-con
fig-mode]
        isakmp enable <if_name>
        isakmp identity <address|hostname|key-id> [<key-id-string>]
        isakmp keepalive <seconds> [<retry seconds>]
        isakmp nat-traversal [<natkeepalive>]
        isakmp client configuration address-pool local <poolname> [<pif_name>]
        isakmp peer fqdn|ip <fqdn|ip> [no-xauth] [no-config-mode]
pixfirewall(config)#

What does that mean?  Can I use 3des?  Thanks.

Mark
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of mark-wa

ASKER

Thanks periferral!  I appreciate it.

Mark
Avatar of mark-wa

ASKER

Ok, I received a 3des activation key.  It says that I'll need to reboot the PIX after I've entered the key.  By 'reboot', do they mean just shut it off and turn it back on?  Or is there a 'reboot' type command that reboots the OS?  Thanks.

Mark
both work. Type 'wr mem' and reload on the box and it will reboot.
Avatar of mark-wa

ASKER

Thank you both so much for all of your help!

One last question if I may...

I have now entered everything into my PIX and into the PIX at the other site.  Now I need to test the connection.  Once the config is entered on both sides, does the PIX just automatically connect to the other PIX or is there something you have to do to initiate it?

Thanks.

Mark
There must be actual traffic between the sites to "trigger" the VPN.
Just try pinging a remote host and that's all it should take.
On the PIX, you can see if it is established with "sho cry is sa" and you should see the remote IP and QM_IDLE if it's good.
"sho cry ip sa" will show you packets encrypted/decrypted and the access-list applied. Good troubleshooting tool...
Traffic through the VPN tunnel will initiate the tunnel. A simple ping from inside to remote inside to do the trick.
show isakmp sa will show you if isakmp was successful. You should see QM_IDLE state.
show ipsec sa will show ipsec tunnel information.
Avatar of mark-wa

ASKER

Ok, here's what I'm getting.  Something must not be configured right:

pixfirewall(config)# show cry is sa
Total     : 0
Embryonic : 0
        dst               src        state     pending     created
pixfirewall(config)# show cry ip sa


interface: outside
    Crypto map tag: mustang, local addr. 64.106.169.161

   local  ident (addr/mask/prot/port): (172.28.228.0/255.255.255.0/0/0)
   remote ident (addr/mask/prot/port): (192.168.0.0/255.255.255.0/0/0)
   current_peer: 207.162.188.202:0
     PERMIT, flags={origin_is_acl,}
    #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0
    #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
    #pkts compressed: 0, #pkts decompressed: 0
    #pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
    #send errors 0, #recv errors 0

     local crypto endpt.: 64.106.169.161, remote crypto endpt.: 207.162.188.202
     path mtu 1500, ipsec overhead 0, media mtu 1500
     current outbound spi: 0

     inbound esp sas:


     inbound ah sas:


     inbound pcp sas:


     outbound esp sas:


     outbound ah sas:


     outbound pcp sas:


pixfirewall(config)# ping 207.162.188.202
        207.162.188.202 response received -- 80ms
        207.162.188.202 response received -- 80ms
        207.162.188.202 response received -- 220ms
pixfirewall(config)# ping 192.168.0.4
        192.168.0.4 NO response received -- 1000ms
        192.168.0.4 NO response received -- 1000ms
        192.168.0.4 NO response received -- 1000ms
pixfirewall(config)# show isakmp sa
Total     : 0
Embryonic : 0
        dst               src        state     pending     created
pixfirewall(config)# show ipsec sa


interface: outside
    Crypto map tag: mustang, local addr. 64.106.169.161

   local  ident (addr/mask/prot/port): (172.27.227.0/255.255.255.0/0/0)
   remote ident (addr/mask/prot/port): (192.168.0.0/255.255.255.0/0/0)
   current_peer: 207.162.188.202:0
     PERMIT, flags={origin_is_acl,}
    #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0
    #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0
    #pkts compressed: 0, #pkts decompressed: 0
    #pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress failed: 0
    #send errors 0, #recv errors 0

     local crypto endpt.: 64.106.169.161, remote crypto endpt.: 207.162.188.202
     path mtu 1500, ipsec overhead 0, media mtu 1500
     current outbound spi: 0

     inbound esp sas:


     inbound ah sas:


     inbound pcp sas:


     outbound esp sas:


     outbound ah sas:


     outbound pcp sas:

Mark
You isakmp connection isnt going through. If successful you will see state Qm_IDLE.
You can do debug crypto isakmp and send the logs.
Confirm that the isakmp preshared key is the same on both sides.
The host >192.168.0.4
What is it's default gatway?

>pixfirewall(config)# ping 192.168.0.4
Can't do it from the firewall console, you must do it from a 172.27.227.x host. That host must have the local PIX as its default gateway...or at least routing to 192.168.0.x subnet that ends up at the pix.
Avatar of mark-wa

ASKER

Hi,

I've accepted your answers because this is dragging out way too far for one question.

I've created another question at:

https://www.experts-exchange.com/questions/21310124/PIX-to-PIX-site-vpn-connection-continued.html

Please continue to help!  I really appreciate it.  You've been outstanding!

Mark