[Webinar] Streamline your web hosting managementRegister Today

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 2015
  • Last Modified:

Cisco PIX 501 IKE Aggressive mode problem

We are trying to get PCI Certified and we're running into a problem with the PIX 501s we still have deployed as VPN endpoints at remote offices.  One requirement of the PCIDSS is that IKE Aggressive mode must be disabled, but that is not possible on the PIX platform.  I was thinking I could achieve the same result by putting access lists in place to only allow only the main firewall where the tunnels terminate to talk to the PIX on udp/500 and IP Protocol 50(esp).  Here are the commands I tried to use to implement this:

access-list outin permit esp host 1.1.1.1 host 2.2.2.2
access-list outin permit udp host 1.1.1.1 eq isakmp host 2.2.2.2
access-list outin deny ip any any
access-group outin in interface outside

but they didn't seem to have the effect I was hoping they would.  Am I just going down the wrong path completely?  Is it even possible to achieve what I want to?
0
ruffalocody
Asked:
ruffalocody
  • 4
  • 4
1 Solution
 
ngravattCommented:
is it possible to upgrade your PIX to a later version?  
http://www.experts-exchange.com/Networking/Security/IPSec/Q_23301217.html

i believe that once the PIX is upgraded to v7, you can disable the aggressive mode.
0
 
ruffalocodyAuthor Commented:
the PIX 501 is not able to be upgraded to version 7 because it doesn't meet the memory requirements.
0
 
ngravattCommented:
you should be able to apply an access list that will block isakmp traffic and ipsec traffic to the outside interface.  Check out this document:

http://www.ernw.de/download/pskattack.pdf

0
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

 
ruffalocodyAuthor Commented:
I've looked at that document in the past, and in the environment they describe the vpn is terminating at a router or some other device behind the PIX.  My VPN tunnel is terminating at the PIX.  The question then becomes are access-lists applied before or after the point at which the IKE handshaking takes place?
0
 
ngravattCommented:
the access list will be applied to all traffic that comes into the interface.

traffic 'inside' the tunnel, or encrypted traffic will not be 'processed' by the access list.

traffic that is trying to establish a VPN tunnel will be processed by the access list.
0
 
ruffalocodyAuthor Commented:
I've conversed with a Cisco rep and it was determined that it is impossible to do what I need to do without another device in front of the PIX doing the filtering.  VPN negation takes place before traffic passes through any access-lists on the PIX 501 platform.
0
 
ngravattCommented:
well, thank you for that bit of information.  You may have already considered this, but the memory upgrade for the PIX is only about $100 and is pretty simple to do.  I have done this to several of my old firewalls.
0
 
ruffalocodyAuthor Commented:
PIX 501 can't be upgraded as far as I am aware.  If you know something I don't please let me know.  I was under the impression that only PIX 515 and higher were upgradeable to the version 7 firmware.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

  • 4
  • 4
Tackle projects and never again get stuck behind a technical roadblock.
Join Now