Solved

cisco pix vpn route issue - multiple subnets

Posted on 2010-08-21
6
592 Views
Last Modified: 2012-05-10
Hi Experts,

I've got a problem that I'm trying to work out and I'm stuck.

I have a working VPN tunnel between Office A and Office B.

Office A-net is x.x.30.0/24 and Office B-net is x.x.31.0/24

At both offices, there is an out-of-band set of addresses for remote access to the hardware that I'd like to have transit over the VPN tunnel as well.  These are on the same physical devices and there is no vlan in operation.

These are A-net-oob = x.x.32.0/24 and B-net-oob = x.x.33.0/24.

Currently I'm trying to get A-net to speak to B-net-oob over the VPN tunnel (remember A-net speaks to B-net just fine).  I can ping the out-of-band addresses inside the same segment so I know that it will respond if it gets a request.

Office PIX-A:
! Don't NAT these
access-list inside_outbound_nat0_acl permit ip A-net 255.255.255.0 B-net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip A-net 255.255.255.0 B-net-oob 255.255.255.0
! These are going from here to Office B
access-list outside_cryptomap_20 permit ip A-net 255.255.255.0 B-net 255.255.255.0
access-list outside_cryptomap_20 permit ip A-net 255.255.255.0 B-net-oob 255.255.255.0
! Showing I'm using the "outside_cryptomap_20" ACL for selection
crypto map outside_map 20 match address outside_cryptomap_20

Office PIX-B:
! Don't NAT these
access-list inside_outbound_nat0_acl permit ip B-net 255.255.255.0 A-net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip B-net 255.255.255.0 A-net-oob 255.255.255.0
! These are going from here to Office A
access-list outside_cryptomap_20 permit ip B-net 255.255.255.0 A-net 255.255.255.0
access-list outside_cryptomap_20 permit ip B-net 255.255.255.0 A-net-oob 255.255.255.0
! Showing I'm using the "outside_cryptomap_20" ACL for selection
crypto map outside_map 20 match address outside_cryptomap_20

I can turn on debug icmp trace on both PIXes and when I ping an address from A-net to B-net I can see the trace on both PIXes.  However, when I ping from A-net to B-net-oob I only see the Ping-request on PIX-A and not on PIX-B.  No responses at all.  Traffic for B-net-oob does not appear to be going over to PIX-B.

Of Note:  If the Crypto map statement for B-net-oob is removed from PIX-A, then I get a traceroute that goes off into the internet someplace and gets lost (appropriately, it's not supposed to be routeable).  When I put the statement back in, I get solid timeouts.  This means to me that the Crypto map is capturing the traffic to send over the VPN, but it's failing or not going or some-such-thing.  I can't see anything beyond what the icmp trace showed even if I turn on the most liberal packet tracing.  The debug crypto statements don't show much at all (other traffic makes it tough to determine that it's nothing, but I don't see anything that I can identify).

I'm hoping you experts can help me through this thing.  I need to be able to access the Office B out-of-band addresses from Office A (and vice-versa).

-greg
0
Comment
Question by:OuttaCyTE
  • 5
6 Comments
 
LVL 18

Accepted Solution

by:
jmeggers earned 500 total points
ID: 33495414
I think you need to include A-net-oob and B-net-oob to the other destinations as do not NAT.  So:

Office PIX-A:
! Don't NAT these
access-list inside_outbound_nat0_acl permit ip A-net 255.255.255.0 B-net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip A-net 255.255.255.0 B-net-oob 255.255.255.0

Add:
access-list inside_outbound_nat0_acl permit ip A-net-oob 255.255.255.0 B-net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip A-net-oob 255.255.255.0 B-net-oob 255.255.255.0


! These are going from here to Office B
access-list outside_cryptomap_20 permit ip A-net 255.255.255.0 B-net 255.255.255.0
access-list outside_cryptomap_20 permit ip A-net 255.255.255.0 B-net-oob 255.255.255.0

Add:
access-list outside_cryptomap_20 permit ip A-net-oob 255.255.255.0 B-net 255.255.255.0
access-list outside_cryptomap_20 permit ip A-net-oob 255.255.255.0 B-net-oob 255.255.255.0


Office PIX-B:
! Don't NAT these
access-list inside_outbound_nat0_acl permit ip B-net 255.255.255.0 A-net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip B-net 255.255.255.0 A-net-oob 255.255.255.0

Add:
access-list inside_outbound_nat0_acl permit ip B-net-oob 255.255.255.0 A-net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip B-net-oob 255.255.255.0 A-net-oob 255.255.255.0


! These are going from here to Office A
access-list outside_cryptomap_20 permit ip B-net 255.255.255.0 A-net 255.255.255.0
access-list outside_cryptomap_20 permit ip B-net 255.255.255.0 A-net-oob 255.255.255.0

Add:
access-list outside_cryptomap_20 permit ip B-net-oob 255.255.255.0 A-net 255.255.255.0
access-list outside_cryptomap_20 permit ip B-net-oob 255.255.255.0 A-net-oob 255.255.255.0

Let me know if this helps.





0
 

Author Comment

by:OuttaCyTE
ID: 33524381
@jmeggers,

Thank you for your reply and my apologies for taking so long to get back.  Been snowed under since I posted.

I'll give this a try but first a couple of questions

1) Since Office A-net to Office B-net tunnel works and does not have the "reverse" entries you are suggesting, why should adding these reverse entries help for Office A-net to Office B-net-oob ?

2) I was holding off expanding any other direction (such as B-net-oob to A-net) until I got the first working to minimize the number of changes to be made.  Is there some specific reason that I should put in all of them at once?

I really only get to play on this on the weekend.

-greg
0
 

Author Comment

by:OuttaCyTE
ID: 33524762
Hi again,

I looked at this again and think I spotted the mistake that jmeggers was trying to get at.

In the Office B setup:

! Don't NAT these
access-list inside_outbound_nat0_acl permit ip B-net 255.255.255.0 A-net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip B-net 255.255.255.0 A-net-oob 255.255.255.0


I don't have B-net-oob to A-net for NoNat, and in:

! These are going from here to Office A
access-list outside_cryptomap_20 permit ip B-net 255.255.255.0 A-net 255.255.255.0
access-list outside_cryptomap_20 permit ip B-net 255.255.255.0 A-net-oob 255.255.255.0


I don't have the B-net-oob to A-net for routing.

jmegger's updates include these (and more)

I will give these a try when I get a chance either late at night or the weekend (as I can't afford to kill the client during the day with a typo...).


Thanks,
-greg
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 

Author Comment

by:OuttaCyTE
ID: 33527338
I can report improvement.  I now see the ping request on Office PIX-B.

I suspect the rest of the problem is the lack of a secondary address on the inside of the pix.  I seem to remember some cheats for that so I'm going to look into them.  I can't believe the PIX doesn't support a secondary IP address.

-g
0
 

Author Comment

by:OuttaCyTE
ID: 33527442
Frump...

Vlan not supported at all in Pix 501, even at version 6.3.  Can't use the vlan trick to convince the pix to take a secondary address.

I'm open to suggestions not involving new/replacement equipment.

Otherwise I'll close this with points to jmegger

-g
0
 

Author Closing Comment

by:OuttaCyTE
ID: 33572613
Thank you for responding.  The main answer is that the PIX/ASA firewalls don't have a secondary IP address, and the 501's in particular don't even have VLAN so you can 'Fake' a secondary IP.

I'm going to look at other vendors as I'm tired of Cisco almost-but-not-quite implementations and nickle-dime thinking when it comes to the very smallest of shops.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Have you experienced traffic destined through a Cisco ASA firewall disappears and you do not know if the traffic stops in the firewall or somewhere else? The solution is the capture feature. This feature was released in 6.2(1) and works in all firew…
This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now