I am working with another office trying to setup a VPN connection between our PIX firewalls. Could someone give me an example of the entries that would be needed? I know there's a lot, but I am not too familiar with doing this. Any help would be greatly appreciated. Thanks.
Thanks for the link! It's very helpful! Could you please explain this section to me?
Crypto maps set up IPSec SAs for the encrypted traffic. To create a crypto map, you must assign a map name and a sequence number, and define the crypto map parameters. The crypto map "transam" shown below uses IKE to establish IPSec SAs, encrypts anything that matches access-list 101, has a set peer, and uses the chevelle transform-set to enact its security policy for traffic.
crypto map transam 1 ipsec-isakmp
crypto map transam 1 match address 101
crypto map transam 1 set peer 172.22.112.12
crypto map transam 1 set transform-set chevelle
The part that is kind of "hanging me up" is <crypto map transam 1 set peer 172.22.112.12>
What is that ip address? It's specific, so is that supposed to be the actual Outside address for the PIX you're trying to connect to?
Thanks.
Mark
mark-wa
ASKER
Actually, there's this part that was given before that section I just gave you:
Finally, configure the preshared key and assign a peer address by using the isakmp key command. The same preshared key must match on the IPSec peers when using preshared keys. The address will differ depending on the IP address of the remote peer.
Each PIX will consider the outside public IP address of the other PIX as its peer, and the same IP is used in both the crypto map peer statement and the isakmp shared key definition...the "key" is a password - use whatever you like..
Perfect! Thank you! I'll let you know how it goes.
Thanks again!
Mark
mark-wa
ASKER
Hi Irmoore,
I have posted another question in the TA while I'm waiting to hear back from the other office about this issue. You have been very helpful! Thanks again!
Mark
periferral
mark. download and load PIX Device Manager (PDM) on both 515's. free download.
PDM connects to the pix using https on a browser.
There is a wizard in PDM that lets you configure VPN with ease. and error free :)
Ok, we're also in the middle of implementing a new RS6000. Our application vendor now wants a "site to site" VPN connection, also. Is it possible to setup 2 "site to site" VPN connections at the same time? Is it advisable? Thanks.
Mark
Les Moore
Not a problem at all....
You can setup 100 site-site connections if you want...
However, I would question how the application vendor proposes to secure this site-site VPN connection, and be sure to lock down your acls that define the traffic to be as specific as possible.
mark-wa
ASKER
Ok, I'm almost done with this. I apologize because I know I've way over-used the point value on this (wish I could give more).
Can someone look at these lines and tell me what the "20" and "30" values mean (after outside_map)? Are they just a way of differentiating between the 2 different site connections or is there a significant meaning to those?
crypto ipsec transform-set esp-3des-md5 esp-3des esp-md5-hmac
crypto ipsec transform-set standard esp-3des esp-md5-hmac
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address inland_match
crypto map outside_map 20 set peer 63.149.220.10
crypto map outside_map 20 set transform-set standard
crypto map outside_map 30 ipsec-isakmp
crypto map outside_map 30 match address PAML_match
crypto map outside_map 30 set peer 205.158.190.162
crypto map outside_map 30 set transform-set esp-3des-md5
crypto map outside_map interface outside
isakmp enable outside
20 and 30 are the priorities of the crypto maps. Higher priorities are tried first. If successful, the connection is established. If the parameters dont match, it moves on to the next priority and tries to connect.
mark-wa
ASKER
is a priority setting required?
Thanks.
Mark
periferral
Not really. Its useful for large corporations to set up priorities in which users will login and access information.
I'm guessing you dont really need. it 20 and 30 is fine the way it is.
Also, I'd recommend you download and install PIX Device Manager. Its a free download from cisco and will help you manage your box using a browser on your machine. It will help you configure everything on the PIX with relative easy compared to the CLI
Is the "1" after "policy" also just a priority number?
Mark
Les Moore
You only need as many policies as you have unique requirements.
You can create multiple policies to match remote ends, i.e.
des/sha/group 1
3des/sha/group 1
3des/md5/group 2
aes/sha/group 5
<etc>
Each policy gets a different priority number. Hopefully, one of the policies will match the remote end (and the transform-set on your own end)
For the individual maps, you do have to have a priority number
mark-wa
ASKER
Ok, here's one of the other office's isakmp stuff:
So their encryption is 3des and mine is des. Would I create another group for this site-to-site connection or would I just change the encryption to 3des? Would that then affect the vpn clients and they too would need to be changed?
and make sure your transform set matches in the crypto map statements..
i.e.
crypto ipsec transform-set esp-3des-md5 esp-3des esp-md5-hmac
crypto ipsec transform-set standard esp-des esp-md5-hmac
crypto ipsec transform-set AES-SHA esp-aes-256 esp-sha-hmac
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address inland_match
crypto map outside_map 20 set peer 63.149.220.10 <== peer #1
crypto map outside_map 20 set transform-set standard <== DES
You just have to make sure that you have a policy on your end that will match the transform-set that you have identified for that peer....
mark-wa
ASKER
Thank you so much for all of the info! Looks like my client at the other office has left for the day, but we should be able to finish this up tomorrow. Thanks again.
Ok, I received a 3des activation key. It says that I'll need to reboot the PIX after I've entered the key. By 'reboot', do they mean just shut it off and turn it back on? Or is there a 'reboot' type command that reboots the OS? Thanks.
both work. Type 'wr mem' and reload on the box and it will reboot.
mark-wa
ASKER
Thank you both so much for all of your help!
One last question if I may...
I have now entered everything into my PIX and into the PIX at the other site. Now I need to test the connection. Once the config is entered on both sides, does the PIX just automatically connect to the other PIX or is there something you have to do to initiate it?
Thanks.
Mark
Les Moore
There must be actual traffic between the sites to "trigger" the VPN.
Just try pinging a remote host and that's all it should take.
On the PIX, you can see if it is established with "sho cry is sa" and you should see the remote IP and QM_IDLE if it's good.
"sho cry ip sa" will show you packets encrypted/decrypted and the access-list applied. Good troubleshooting tool...
Traffic through the VPN tunnel will initiate the tunnel. A simple ping from inside to remote inside to do the trick.
show isakmp sa will show you if isakmp was successful. You should see QM_IDLE state.
show ipsec sa will show ipsec tunnel information.
mark-wa
ASKER
Ok, here's what I'm getting. Something must not be configured right:
pixfirewall(config)# show cry is sa
Total : 0
Embryonic : 0
dst src state pending created
pixfirewall(config)# show cry ip sa
interface: outside
Crypto map tag: mustang, local addr. 64.106.169.161
local crypto endpt.: 64.106.169.161, remote crypto endpt.: 207.162.188.202
path mtu 1500, ipsec overhead 0, media mtu 1500
current outbound spi: 0
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
pixfirewall(config)# ping 207.162.188.202
207.162.188.202 response received -- 80ms
207.162.188.202 response received -- 80ms
207.162.188.202 response received -- 220ms
pixfirewall(config)# ping 192.168.0.4
192.168.0.4 NO response received -- 1000ms
192.168.0.4 NO response received -- 1000ms
192.168.0.4 NO response received -- 1000ms
pixfirewall(config)# show isakmp sa
Total : 0
Embryonic : 0
dst src state pending created
pixfirewall(config)# show ipsec sa
interface: outside
Crypto map tag: mustang, local addr. 64.106.169.161
local crypto endpt.: 64.106.169.161, remote crypto endpt.: 207.162.188.202
path mtu 1500, ipsec overhead 0, media mtu 1500
current outbound spi: 0
inbound esp sas:
inbound ah sas:
inbound pcp sas:
outbound esp sas:
outbound ah sas:
outbound pcp sas:
Mark
periferral
You isakmp connection isnt going through. If successful you will see state Qm_IDLE.
You can do debug crypto isakmp and send the logs.
Confirm that the isakmp preshared key is the same on both sides.
The host >192.168.0.4
What is it's default gatway?
>pixfirewall(config)# ping 192.168.0.4
Can't do it from the firewall console, you must do it from a 172.27.227.x host. That host must have the local PIX as its default gateway...or at least routing to 192.168.0.x subnet that ends up at the pix.
mark-wa
ASKER
Hi,
I've accepted your answers because this is dragging out way too far for one question.
Thanks for the link! It's very helpful! Could you please explain this section to me?
Crypto maps set up IPSec SAs for the encrypted traffic. To create a crypto map, you must assign a map name and a sequence number, and define the crypto map parameters. The crypto map "transam" shown below uses IKE to establish IPSec SAs, encrypts anything that matches access-list 101, has a set peer, and uses the chevelle transform-set to enact its security policy for traffic.
crypto map transam 1 ipsec-isakmp
crypto map transam 1 match address 101
crypto map transam 1 set peer 172.22.112.12
crypto map transam 1 set transform-set chevelle
The part that is kind of "hanging me up" is <crypto map transam 1 set peer 172.22.112.12>
What is that ip address? It's specific, so is that supposed to be the actual Outside address for the PIX you're trying to connect to?
Thanks.
Mark