Modify Pix VPN for windows domain authentication.

I've got a number of people that VPN into our PIX firewall to get to our local network.  Below is a sample of my VPN setup.  Right now you can see that everyone connects to the VPN using the same username and password.  I need to change this config so that the users must have a valid username and password on our windows domain controller ( in order to create the VPN tunnel.  Can you tell me how to modify my config?  Is it possible to use windows domain authentication before creating the tunnel?

sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-3des esp-md5-hmac
crypto dynamic-map dynmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynamic dynmap
crypto map mymap interface outside
isakmp enable outside
isakmp nat-traversal 20
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup brasslanvpn address-pool vpnpool
vpngroup brasslanvpn dns-server
vpngroup brasslanvpn default-domain
vpngroup brasslanvpn split-tunnel allow-internet
vpngroup brasslanvpn idle-time 1800
vpngroup brasslanvpn password ******
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

PIX 6.x code will not natively support NT domain authentication for your VPN users, but the new 7.x code will.  What version are you running on your PIX?

Version 6.x only supports TACACS+ and RADIUS for authentication protocols.  If you're running 6.x, then see the following example for setting up IAS to use as a RADIUS server which will give you what you're looking for:

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
brasslanAuthor Commented:
Unfortunately it is the PIX 6.x code, and the budget wont allow for a pix upgrade, or a RADIUS server purchase.  

I think I can also setup a list of user names and passwords inside of the pix, can't I?  Then if I want to remove vpn access, I can remove their username from the config.  Probably not as nice as a Radius setup but still doable on my scale.  Right now we will only have 3 to 5 people with VPN access.

Do you know the code for that?
Assuming you already have the crypto and isakmp stuff set up in the configuration, here are the commands for local VPN user authentication:

aaa-server LOCAL protocol local
ip local pool ippool
vpngroup vpnusers address-pool ippool
vpngroup vpnusers dns-server
vpngroup vpnusers wins-server
vpngroup vpnusers default-domain
vpngroup vpnusers split-tunnel splitTunnelAcl
vpngroup vpnusers idle-time 86400
vpngroup vpnusers password <group_password>
username johndoe password <whatever> privilege 2
access-list splitTunnelAcl permit ip any

The two lines with the references to split tunneling are optional if you want your users to be cut off from the Internet when they are in a VPN session.  However, because the 6.x code doesn't support "hairpinning", you will need to implement split tunneling if you want your VPN users to get to the Internet while in a tunnel.  In the split tunnel ACL, you specify the network(s) behind as the source of the ACL when you want those networks to be encrypted and sent down the tunnel.  Always seemed backwards to me, but that's the way it is...

You can add as many usernames as you like (privilege level 2 is a default).  You can just put in:

username johndoe password mypassword

The VPN users will be assigned an IP address from "ippool" and be assigned the specified dns and wins server entries.
Introducing the "443 Security Simplified" Podcast

This new podcast puts you inside the minds of leading white-hat hackers and security researchers. Hosts Marc Laliberte and Corey Nachreiner turn complex security concepts into easily understood and actionable insights on the latest cyber security headlines and trends.

brasslanAuthor Commented:
You can see my crypto and ISAKMP setup in the original question.  The only thing that I didn't have that you mentioned was a username and password listed in the pix.  I added this and it still let me create the tunnel without knowing the username and password.  With further research on the net I found that I also needed to add this line.

crypto map mymap client authentication LOCAL

The only question that I have left is for lrmoore, I got an e-mail saying that you posted to this question about 45 min after batry_boy's last post, but I don't see anything here.  Did you post something?  Did it disappear?  
I posted the same link that batry_boy posted for an example to use Windows IAS. I didn't realize that he had already provided that link and I didn't want to confuse matters so I had my comment deleted.
If you follow the directions in the link it will be as good a solution as you can get and users can use their regular domain username/passwords and you don't have to maintain duplicate usernames on the pix itself
brasslanAuthor Commented:
I won't have time to set this up for a couple of weeks, but with the link that batry provided I shouldn't have a problem.

To tell you the truth, I didn't read that link until lrmoore posted and deleted and reposted his comment :-).  I didn't click the link because the RADIUS software that I've used in the past had to be purchased and the tech budget is too tight for more software.  But after lrmoore's posting the exact same link (almost) I figured it would be worth a read.  I'm glad I did, now I know that I don't have to purchase anything else.

100 pts for lrmoore for telling me that batry was right. (sorry batry) :-) hehe
You are too kind, sir, but have learned a valuable lesson - follow the never know what's on the other side!

It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Hardware Firewalls

From novice to tech pro — start learning today.