Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Modify Pix VPN for windows domain authentication.

Posted on 2007-04-07
Medium Priority
Last Modified: 2010-04-09
I've got a number of people that VPN into our PIX firewall to get to our local network.  Below is a sample of my VPN setup.  Right now you can see that everyone connects to the VPN using the same username and password.  I need to change this config so that the users must have a valid username and password on our windows domain controller ( in order to create the VPN tunnel.  Can you tell me how to modify my config?  Is it possible to use windows domain authentication before creating the tunnel?

sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-3des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynamic dynmap
crypto map mymap interface outside
isakmp enable outside
isakmp nat-traversal 20
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup brasslanvpn address-pool vpnpool
vpngroup brasslanvpn dns-server
vpngroup brasslanvpn default-domain domain.com
vpngroup brasslanvpn split-tunnel allow-internet
vpngroup brasslanvpn idle-time 1800
vpngroup brasslanvpn password ******
Question by:brasslan
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
LVL 28

Accepted Solution

batry_boy earned 1600 total points
ID: 18870040
PIX 6.x code will not natively support NT domain authentication for your VPN users, but the new 7.x code will.  What version are you running on your PIX?

Version 6.x only supports TACACS+ and RADIUS for authentication protocols.  If you're running 6.x, then see the following example for setting up IAS to use as a RADIUS server which will give you what you're looking for:


Author Comment

ID: 18870242
Unfortunately it is the PIX 6.x code, and the budget wont allow for a pix upgrade, or a RADIUS server purchase.  

I think I can also setup a list of user names and passwords inside of the pix, can't I?  Then if I want to remove vpn access, I can remove their username from the config.  Probably not as nice as a Radius setup but still doable on my scale.  Right now we will only have 3 to 5 people with VPN access.

Do you know the code for that?
LVL 28

Expert Comment

ID: 18870721
Assuming you already have the crypto and isakmp stuff set up in the configuration, here are the commands for local VPN user authentication:

aaa-server LOCAL protocol local
ip local pool ippool
vpngroup vpnusers address-pool ippool
vpngroup vpnusers dns-server
vpngroup vpnusers wins-server
vpngroup vpnusers default-domain yourdomain.com
vpngroup vpnusers split-tunnel splitTunnelAcl
vpngroup vpnusers idle-time 86400
vpngroup vpnusers password <group_password>
username johndoe password <whatever> privilege 2
access-list splitTunnelAcl permit ip any

The two lines with the references to split tunneling are optional if you want your users to be cut off from the Internet when they are in a VPN session.  However, because the 6.x code doesn't support "hairpinning", you will need to implement split tunneling if you want your VPN users to get to the Internet while in a tunnel.  In the split tunnel ACL, you specify the network(s) behind as the source of the ACL when you want those networks to be encrypted and sent down the tunnel.  Always seemed backwards to me, but that's the way it is...

You can add as many usernames as you like (privilege level 2 is a default).  You can just put in:

username johndoe password mypassword

The VPN users will be assigned an IP address from "ippool" and be assigned the specified dns and wins server entries.
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!


Author Comment

ID: 18872528
You can see my crypto and ISAKMP setup in the original question.  The only thing that I didn't have that you mentioned was a username and password listed in the pix.  I added this and it still let me create the tunnel without knowing the username and password.  With further research on the net I found that I also needed to add this line.

crypto map mymap client authentication LOCAL

The only question that I have left is for lrmoore, I got an e-mail saying that you posted to this question about 45 min after batry_boy's last post, but I don't see anything here.  Did you post something?  Did it disappear?  
LVL 79

Assisted Solution

lrmoore earned 400 total points
ID: 18872619
I posted the same link that batry_boy posted for an example to use Windows IAS. I didn't realize that he had already provided that link and I didn't want to confuse matters so I had my comment deleted.
If you follow the directions in the link it will be as good a solution as you can get and users can use their regular domain username/passwords and you don't have to maintain duplicate usernames on the pix itself

Author Comment

ID: 19027321
I won't have time to set this up for a couple of weeks, but with the link that batry provided I shouldn't have a problem.

To tell you the truth, I didn't read that link until lrmoore posted and deleted and reposted his comment :-).  I didn't click the link because the RADIUS software that I've used in the past had to be purchased and the tech budget is too tight for more software.  But after lrmoore's posting the exact same link (almost) I figured it would be worth a read.  I'm glad I did, now I know that I don't have to purchase anything else.

100 pts for lrmoore for telling me that batry was right. (sorry batry) :-) hehe
LVL 79

Expert Comment

ID: 19027974
You are too kind, sir, but have learned a valuable lesson - follow the links...you never know what's on the other side!


Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You deserve ‘straight talk’ from your cloud provider about your risk, your costs, security, uptime and the processes that are in place to protect your mission-critical applications.
Considering cloud tradeoffs and determining the right mix for your organization.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Suggested Courses

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question