Avatar of arron9112003
arron9112003Flag for United States of America

asked on 

PIX 501 configuration check


I'm configuring my pix 501 to connect to other pix (I don't know the model), all I have is parameter sheet from other end.

ISAKMP Protocol:
Encryption algorithm: AES256
Hash algorithm: SHA-1
Authentication method: pre-shared secret
Diffie hellmann group: Group2
Lifetime: 86400 sec
IKE keepalives: Interval = 30 sec, retry=5sec

Mode: Tunnel Mode
Encryption algorithm: ESP-AES256
MAC algorithm for authentication: ESP-SHA-HMAC
Perfect forward secrecy (PFS): Yes, Group2
SA Lifetyp: 28800 sec

Those are parameters I need to configure for my pix501, but after I confiugred them and try to establish the tunnel but nothing happend. I think my config file must be wrong, so I'm kindly ask for your expertise to help me check out my config file. I already change the IP to be fake, so those are not real IP ;-)

Thank you for your help, and best regards.

PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
access-list acl_out permit ip any any log
access-list 101 permit ip host host
access-list ethernet0 permit tcp any interface outside eq ssh
pager lines 24
logging on
icmp permit any outside
mtu outside 1500
mtu inside 1500
ip address outside
ip address inside
ip audit info action alarm
ip audit attack action alarm
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0 0
access-group acl_out in interface outside
route outside 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authentication ssh console LOCAL
aaa authorization command LOCAL
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set chevelle esp-aes-256 esp-sha-hmac
crypto map transam 1 ipsec-isakmp
crypto map transam 1 match address 101
crypto map transam 1 set pfs group2
crypto map transam 1 set peer
crypto map transam 1 set transform-set chevelle
crypto map transam interface outside
isakmp enable outside
isakmp key ******** address netmask
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption aes-256
isakmp policy 1 hash sha
isakmp policy 1 group 2
isakmp policy 1 lifetime 86400
telnet timeout 5
ssh outside
ssh timeout 30

Avatar of undefined
Last Comment
Avatar of JFrederick29
Flag of United States of America image

Blurred text
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of arron9112003
Flag of United States of America image


Thank you very much. I did what you said and I got a login prompt. Thank you for your fast reply.
Avatar of arron9112003
Flag of United States of America image


Great support !!

A router is a networking device that forwards data packets between computer networks. Routers perform the "traffic directing" functions on the Internet. The most familiar type of routers are home and small office cable or DSL routers that simply pass data, such as web pages, email, IM, and videos between computers and the Internet. More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone. Though routers are typically dedicated hardware devices, use of software-based routers has grown increasingly common.

Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews


IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo