PIX 501 - Can't VPN Outbound

Posted on 2005-05-13
Last Modified: 2013-11-16
I have a PIX 501, PIX A we'll call it, (see config below) and am having problems with a VPN session to a  remote PIX 501 , PIX B we'll call this one, from a VPN client behind PIX A.

VPN client ------> PIX A ------> Internet ------> PIX B

From a third location I can independantly VPN to either PIX A or B via the Cisco VPN Client and access all resources on those networks..  On PIX A's network I can establish the VPN Session to PIX B, but I cannot access any resources on PIX B's network.

Here's my config for PIX A:  (I created this config based on Cisco examples and another working config I have access to.  I'm no very experienced with the PIX OS and would welcome any and all suggestions.)

PIX Version 6.3(1)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password mw0ZSV9DB/0f9A60 encrypted
passwd mw0ZSV9DB/0f9A60 encrypted
hostname Pix
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
no fixup protocol sqlnet 1521
access-list 101 permit ip
access-list allow-in permit tcp any host x.x.x.x eq https
access-list allow-in permit tcp any host x.x.x.x eq 444
access-list allow-in permit icmp any any echo-reply
access-list allow-in permit icmp any any time-exceeded
access-list allow-in permit icmp any any unreachable
access-list allow-in permit icmp any any source-quench
access-list allow-in permit tcp any host x.x.x.x eq smtp
access-list allow-in permit tcp any host x.x.x.x eq pop3
pager lines 24
icmp permit any echo-reply outside
icmp permit any echo inside
mtu outside 1500
mtu inside 1500
ip address outside x.x.x.x
ip address inside
ip audit info action alarm
ip audit attack action alarm
ip local pool ippool
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list 101
nat (inside) 1 0 0
static (inside,outside) tcp interface 444 444 netmask 0 0
static (inside,outside) tcp interface https https netmask 0 0
static (inside,outside) tcp interface smtp smtp netmask 0 0
static (inside,outside) tcp interface pop3 pop3 netmask 0 0
access-group allow-in in interface outside
route outside 1
route inside 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server source inside prefer
ntp server source outside
http server enable
http inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynamic dynmap
crypto map mymap interface outside
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup vpn3000 address-pool ippool
vpngroup vpn3000 dns-server
vpngroup vpn3000 wins-server
vpngroup vpn3000 default-domain
vpngroup vpn3000 split-tunnel 101
vpngroup vpn3000 idle-time 1800
vpngroup vpn3000 password ********
telnet inside
telnet timeout 10
ssh timeout 5
console timeout 0
terminal width 80


Question by:jamie177
    LVL 79

    Accepted Solution

    Make sure all pix's have this command added:

     isakmp nat-traversal 20


    Author Comment

    Excellent!  Worked like a champ!!!  Thanks for you help lrmoore.



    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
    This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now