Cisco pix 506e

Posted on 2006-04-26
Last Modified: 2013-11-16
I am assisting withg a cisco pix506e that currently is setup to connect two vpn tunnels. We have to now also allow for connectivity via a vpn client from anywhere. Inorder to enable the vpn client in the configuration, it appears we have to remove the " nat (inside) 0 nonat " command . Does the cisco pix506e support concurrently vpn tunnels as well as vpn client connects? if so, how is this handled?
Question by:dseli
    LVL 9

    Accepted Solution

    Sure does. Here's a sample configuration:

    Configuring IPSec Between Two PIXes With VPN Client 4.x Access

    Look at PIX 1 configuration from the link above, that's what you need.

    If you have any questions about the config, don't hesitate to ask.
    LVL 20

    Expert Comment

    > appears we have to remove the " nat (inside) 0 nonat " command...
      Don't delete your 'nat (inside) 0...' statement.  You can add to/modify what the 'nonat' ACL references, but you must have a 'nat (inside) 0 <ACL_name>' statement for both site-to-site & client VPN to work.

    >Does the cisco pix506e support concurrently vpn tunnels as well as vpn client connects?
      Certainly, as stressedout2004 mentioned.  Both site-to-site & client VPN connections can co-exist nicely.

    Good URL provided by stressedout2004.  As you can see in the example, your client VPN pool IP range ("ip local pool") must be different than the LAN behind the PIX 506e, as well as different from the LAN where the remote VPN client resides, or you'll run into a "routing loop."

    Also be sure to add this on any PIX running 6.3:
      isakmp nat-t

    Highly suggest you use the latest 4.8 series of Cisco VPN client software.


    Author Comment

    Good information provided. This config is 6.2 and the client is 4.8. I know I need to modify the ' nat (inside) 0...' statement- (by the way- this was very helpful to know). I was not sure if I need to create an additional access list. Here is the current config:
    PIX Version 6.2(2)
    nameif ethernet0 outside security0
    nameif ethernet1 inside security100
    enable password 6GdrbAhENbpr1YbB encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    hostname SMC
    fixup protocol ftp 21
    fixup protocol http 80
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol ils 389
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol sip 5060
    fixup protocol skinny 2000
    access-list nonat permit ip
    access-list nonat permit ip
    access-list nonat permit ip
    access-list nonat permit ip
    pager lines 24
    interface ethernet0 auto
    interface ethernet1 auto
    mtu outside 1500
    mtu inside 1500
    ip address outside
    ip address inside
    ip audit info action alarm
    ip audit attack action alarm
    pdm history enable
    arp timeout 14400
    global (outside) 1
    nat (inside) 0 access-list nonat
    nat (inside) 1 0 0
    static (inside,outside) tcp smtp smtp netmask 0 0
    static (inside,outside) tcp www www netmask 0 0
    static (inside,outside) tcp 3389 3389 netmask 0 0
    conduit permit icmp any any
    conduit permit tcp host eq smtp any
    conduit permit tcp host eq www any
    conduit permit tcp host eq 3389 any
    route outside 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
    timeout uauth 0:05:00 absolute
    aaa-server TACACS+ protocol tacacs+
    aaa-server RADIUS protocol radius
    aaa-server LOCAL protocol local
    no snmp-server location
    no snmp-server contact
    snmp-server community public
    no snmp-server enable traps
    floodguard enable
    sysopt connection permit-ipsec
    no sysopt route dnat
    crypto ipsec transform-set myset esp-3des esp-sha-hmac
    crypto dynamic-map cisco 1 set transform-set myset
    crypto map dyn-map 65000 ipsec-isakmp dynamic cisco
    crypto map dyn-map interface outside
    isakmp enable outside
    isakmp key ******** address netmask no-xauth no-config-mode
    isakmp identity address
    isakmp policy 10 authentication pre-share
    isakmp policy 10 encryption des
    isakmp policy 10 hash md5
    isakmp policy 10 group 1
    isakmp policy 10 lifetime 3600
    telnet inside
    telnet timeout 5
    ssh outside
    ssh timeout 60
    vpnclient vpngroup smgvpn password ********
    vpnclient username test password ********
    vpnclient server
    vpnclient mode client-mode
    terminal width 80
    : end

    Also- how do you account for the  VPN pool IP range on the LAN where the VPNclient resides, if it is potemtially mobil?

    Thanks to stressedout2004 & calvinetter

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
    This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
    This video discusses moving either the default database or any database to a new volume.
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now