Solved

Configure site-to-site VPN connection between ASA 5505 and Pix 506

Posted on 2008-10-15
8
972 Views
Last Modified: 2010-05-05
   

Outside ip add  y.y.y.y                                                                    Outside ip add k.k.k.k
                               ASA (//////).....................ISP......................(//////) pix
Inside ip add     x.x.x.x       .                                                       .    Inside ip add  r.r.r.r
                                           .                                                       .
                                           .                                                       .
                                          C1                                                     C2
Hi everyone,

In the top is the diagram about the network, and I like to configur the pix and the ASA firwalls. Can anyone help me here with the confguration for both pix and ASA?
0
Comment
Question by:AL-Faide
  • 4
  • 3
8 Comments
 
LVL 8

Assisted Solution

by:Jay_Gridley
Jay_Gridley earned 75 total points
ID: 22719203
Here you can find detailed instrutions to configure a site to site tunnel on an ASA:
http://www.cisco.com/en/US/docs/security/asa/asa80/getting_started/asa5505/quick/guide/sitesite.html

Here you can find detailed instructions to configure a site to site tunnel on a PIX:
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008055bd85.shtml

I hope this helps.
If you have specific questions don't hesitate to ask.

JG
0
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 125 total points
ID: 22719912
Heres some more info from my website http://www.petenetlive.com/Tech/Firewalls/Cisco/s2svpn.htm

If I were you Id configure the PIX first then configure the ASA
the pix will default to DES with MD5 change it to 3DES and SHA1
Then when you configure the ASA lease it all on its defaults
Then Disable PFS (perfect forward Secrecy) on the ASA for this tunnel and it should come up fine and dandy

on a PIX (v6, which yours will be) PFS is turned off by default on an ASA its turned on (thats why it said do it in this order - Ive done a few hundred of them by now :)

Pete
0
 

Author Comment

by:AL-Faide
ID: 22719977
Jay Gridley,
The links which you sent to me seems helpfull thanks, but I do not wana configure the site-to-site through the wizerd I like to confgure the ASA and pix through the command line (CLS). Can you help me with that? And I changed the points to 200
0
 

Author Comment

by:AL-Faide
ID: 22720066
and I'm trying to configure the telnet on the ASA but it's not working. Can you help me on this please?
                                                                                                                                                                                                                  ASA 5505 (//////).....................ISP
inside ip add          172.16.177.1               .                                                      
                                                                  .                                                      
                                                                  .
PC ip add                172.16.177.2             C1  
mask                       255.255.255.0
Defult                      172.16.177.1
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 
LVL 57

Accepted Solution

by:
Pete Long earned 125 total points
ID: 22720956
>>I like to confgure the ASA and pix through the command line (CLS). Can you help me with that?

where
10.0.2.0 is behind the pix
10.0.1.0 is behind the ASA
123.123.123.123 is the ASA
234.234.234.234 is the pix

pix

access-list inside_outbound_nat0_acl permit ip any 10.0.1.0 255.255.255.0
access-list outside_cryptomap_20 permit ip 10.0.2.0  255.255.255.0 10.0.1.0  255.255.255.0
nat (inside) 0 access-list inside_outbound_nat0_acl
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 123.123.123.123
crypto map outside_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map interface outside
isakmp enable outside
isakmp key 123abc address 123.123.123.123 netmask 255.255.255.255 no-xauth no-conf
ig-mode
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400


ASA

access-list outside_1_cryptomap extended permit ip 10.0.1.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list nonat extended permit ip 10.0.1.0 255.255.255.0 10.0.2.0 255.255.255.0
nat (inside) 0 access-list nonat
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-m5-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set peer 234.234.234.234
crypto map outside_map 1 set transform-set ESP-3DES-MD5
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
crypto isakmp nat-traversal
tunnel-group 234.234.234.234 type ipsec-l2l
tunnel-group 234.234.234.234 ipsec-attributes
 pre-shared-key 123abc




0
 

Author Comment

by:AL-Faide
ID: 22721927
Pete Thanks for your help
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 22722025
No probs
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 32644789
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Stack Switches in IOU  web V22 6 63
cisco 2911 8 34
Cost effective dual wan w/ qos 5 27
Some help with Network Design 4 25
Juniper VPN devices are a popular alternative to using Cisco products. Last year I needed to set up an international site-to-site VPN over the Internet, but the client had high security requirements -- FIPS 140. What and Why of FIPS 140 Federa…
OpenVPN is a great open source VPN server that is capable of providing quick and easy VPN access to your network on the cheap.  By default the software is configured to allow open access to your network.  But what if you want to restrict users to on…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now