[Webinar] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 497
  • Last Modified:

Cannot ping LAN using Cisco vpn client

I have PIX 501 with vpn clients connecting via the cisco vpn client ver 4. I can access email, network resources and able to use rdp. There is one problem though - I am not able to ping anything on the LAN behind the firewall, or visa versa. I have worked on this for a while now with no resolution to the problem.
I have pasted my PIX config below. Any help is greatly appreciated.

fixup protocol dns
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
access-list VPN permit ip 10.175.1.0 255.255.255.0 any
access-list VPN permit ip 10.179.1.0 255.255.255.128 any
access-list in_ou_nat0 permit ip 10.175.1.0 255.255.255.0 10.179.1.0 255.255.255.128
access-list outside_cryptomap_dyn_20 permit ip any 10.179.1.0 255.255.255.128
pager lines 24
logging on
logging timestamp
logging trap informational
logging device-id ipaddress outside
mtu outside 1500
mtu inside 1500
ip address outside 72.54.xxx,xxx 255.255.255.248
ip address inside 10.175.1.1 255.255.255.0
ip verify reverse-path interface outside
ip audit name attack-policy info action alarm drop reset
ip audit name info-policy info action alarm drop reset
ip audit interface outside attack-policy
ip audit info action alarm
ip audit attack action alarm
ip local pool VPN 10.179.1.1-10.179.1.10
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list in_ou_nat0
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 72.54.xxx.xxx 10.175.1.2  netmask 255.255.255.255 0 0
access-group 202 in interface outside
route outside 0.0.0.0 0.0.0.0 72.54.xxx.xxx 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 10.175.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
sysopt connection permit-pptp
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5 ESP-DES-MD5 ESP-AES-128-SHA ESP-3DES-SHA ESP-DES-SHA ESP-AES-256-MD5 ESP-AES-256-SHA ESP-AES-192-MD5 ESP-AES-192-SHA ESP-AES-128-MD5
crypto map outside_map_1 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map_1 client configuration address respond
crypto map outside_map_1 client authentication LOCAL
crypto map outside_map_1 interface outside
isakmp enable outside
isakmp nat-traversal 20
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup vpn address-pool VPN
vpngroup vpn dns-server 10.175.1.2
vpngroup vpn wins-server 10.175.1.2
vpngroup vpn default-domain xxx.local
vpngroup vpn split-tunnel VPN
vpngroup vpn idle-time 1800
vpngroup vpn password ********
telnet 10.175.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
management-access inside
console timeout 5
0
jbaxley2
Asked:
jbaxley2
  • 5
  • 4
  • 2
1 Solution
 
Alan Huseyin KayahanCommented:
access-list 202 permit icmp any any
access-group 202 in interface outside

access-list 201 permit icmp any any
access-group 201 in interface inside
0
 
Alan Huseyin KayahanCommented:
access-list VPN permit icmp any any
0
 
lrmooreCommented:
Caution - do not apply acl 201 to the inside interface. Due to the implicit "deny all" at the end of the acl, you will block ALL outbound traffic except icmp.
You do need to explicitly permit the icmp echo-replies back in the outside interface since ICMP is a stateless protocol.

I suggest limiting to only the specific icmp types you want to allow:
 access-list 202 permit icmp any any echo-reply
 access-list 202 permit icmp any any unreachable

>access-group 202 in interface outside
I see that you have ACL 202 applied to the interface, but I don't see acl 202 defined in your configuration. We're just assuming that you have it defined somewhere and you can simply add these lines to it.

0
A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

 
lrmooreCommented:
>I am not able to ping anything on the LAN behind the firewall
Of course not, because you're using dynamic NAT. I don't think you want to allow pings from outside to inside, unless you want to be able to ping the one host that you have a static xlate for...
0
 
jbaxley2Author Commented:
MrHusy -
>access-list 202 permit icmp any any
>access-group 202 in interface outside
>access-list 201 permit icmp any any
>access-group 201 in interface inside
>access-list VPN permit icmp any any

Thank you for the suggestions, but i applied these commands with no success. Can you think of anything else.
0
 
lrmooreCommented:
Please read my posts above..
0
 
jbaxley2Author Commented:
lrmoore -
Thank you for the suggestions

>access-list 202 permit icmp any any echo-reply
>access-list 202 permit icmp any any unreachable
I tried this and it didn't work either.

>Of course not, because you're using dynamic NAT. I don't think you want to allow pings from outside to inside, unless you want to be able to ping the one host that you have a static xlate for...
How do i fix this?

>I see that you have ACL 202 applied to the interface, but I don't see acl 202 defined in your configuration. We're just assuming that you have it defined somewhere and you can simply add these lines to it
See below a complete sanitized config:
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 0MEz1s2qhcUYG/py encrypted
passwd f78hjgEhJ54gH84X encrypted
hostname PIX
domain-name xxx.xxx
clock timezone EST -5
clock summer-time EDT recurring
fixup protocol dns
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
access-list 202 permit tcp any host 72.54.xxx.xxx eq https
access-list 202 permit tcp any host 72.54.xxx.xxx eq smtp
access-list VPN permit ip 10.175.1.0 255.255.255.0 any
access-list VPN permit ip 10.179.1.0 255.255.255.128 any
access-list in_ou_nat0 permit ip 10.175.1.0 255.255.255.0 10.179.1.0 255.255.255.128
access-list outside_cryptomap_dyn_20 permit ip any 10.179.1.0 255.255.255.128
pager lines 24
logging on
logging timestamp
logging trap informational
logging device-id ipaddress outside
mtu outside 1500
mtu inside 1500
ip address outside 72.54.xxx.xxx 255.255.xxx.xxx
ip address inside 10.175.1.1 255.255.255.0
ip verify reverse-path interface outside
ip audit name attack-policy info action alarm drop reset
ip audit name info-policy info action alarm drop reset
ip audit interface outside attack-policy
ip audit info action alarm
ip audit attack action alarm
ip local pool VPN 10.179.1.1-10.179.1.10
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list in_ou_nat0
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 72.54.xxx.xxx 10.175.1.2 netmask 255.255.255.255 0 0
access-group 202 in interface outside
route outside 0.0.0.0 0.0.0.0 72.54.xxx.xxx 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 10.175.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
sysopt connection permit-pptp
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5 ESP-DES-MD5
crypto map outside_map_1 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map_1 client configuration address respond
crypto map outside_map_1 client authentication LOCAL
crypto map outside_map_1 interface outside
isakmp enable outside
isakmp nat-traversal 20
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup vpn address-pool VPN
vpngroup vpn dns-server 10.175.1.2
vpngroup vpn wins-server 10.175.1.2
vpngroup vpn default-domain xxx.xxx
vpngroup vpn split-tunnel VPN
vpngroup vpn idle-time 1800
vpngroup vpn password ********
telnet 10.175.1.0 255.255.255.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 5
management-access inside
console timeout 5
terminal width 80
: end
0
 
lrmooreCommented:
access-list 202 permit icmp any any echo-reply
access-list 202 permit icmp any any unreachable
access-list 202 permit icmp any host 72.54.xxx.xxx echo

Re-apply the acl to the interface
 access-group 202 in interface outside

Done.
Some rules of icmp and PIX:
* You cannot ping the outside interface IP from inside hosts. Ever.
* You must explicitly permit the icmp types via acl (or conduit)
* "icmp" commands only affect how the referenced interface itself responds to icmp
0
 
Alan Huseyin KayahanCommented:
          What info appear in your syslog when you try to ping inside?
0
 
Alan Huseyin KayahanCommented:
               *Did you try disabling the windows firewall of the client you are pinging?
0
 
Alan Huseyin KayahanCommented:
           Hi keith
                  I recommend
                      Accept: lrmoore {http:#18815601}

Regards
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

  • 5
  • 4
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now