Go Premium for a chance to win a PS4. Enter to Win


Having Trouble with Cisco Pix 501 VPN

Posted on 2013-05-14
Medium Priority
Last Modified: 2013-05-14
Hello, i'm having trouble setting up a vpn for the Pix 501.  I've set up the preshared keys and all the information but its not connecting to the other site and also the VPN light isn't showing up.
Question by:Tmhoang21
  • 3
  • 2
LVL 25

Expert Comment

ID: 39166350
you may need to post the configs from both devices for verification, but here are the items that need to be checked

1) traffic expecting to go thru vpn tunnel needs to be added to nat 0 statement (nat exemption)
2) acl used to identify "interesting" traffic that will go thru the vpn (used in vpn config) needs to be mirror images of one another when looking at each device
3) isakmp (phase 1) settings need to be the same.  only difference is the connection peer specfied of course
4) ipsec (phase 2) settings need to be the same.

if after checking that, run
debug crypto isakmp  
debug crypto ipsec

verifying some stuff
show crypto isakmp sa
show crypto ipsec sa
show crypto engine connection active

those should help show where along the negotiation process the vpn tunnel is failing.  post the results by attaching a text file if it comes to running the debug process. and another text file with the output of the show commands.

Author Comment

ID: 39166378
I just looked at the sites 501 Pix PDM

it says its ignoring the following commands

fixup protocol dns maximum-length 512
fixup Protocol tftp 69
timeout -sip-disconnect 0:02:00 sip-invite 0:03:00
aaa-server TACAS+ max-failed-attempts 3
aaa-server TACAS+ deadtime 10
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10

ill add the show run in a bit going to the site right now.

Author Comment

ID: 39166392
Building configuration...
: Saved
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname CiscoPix501
domain-name KCSCINC.ORG
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
access-list inside_nat0_outbound permit ip
access-list outside_cryptomap_40 permit ip
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside
ip address inside
ip audit info action alarm
ip audit attack action alarm
pdm location inside
pdm location outside
pdm history enable
arp timeout 14400
global (outside) 10 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 10 0 0
route outside 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto map outside_map 40 ipsec-isakmp
crypto map outside_map 40 match address outside_cryptomap_40
crypto map outside_map 40 set pfs group2
crypto map outside_map 40 set peer
crypto map outside_map 40 set transform-set ESP-3DES-MD5
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address netmask no-xauth no-config-mode
isakmp policy 40 authentication pre-share
isakmp policy 40 encryption 3des
isakmp policy 40 hash md5
isakmp policy 40 group 2
isakmp policy 40 lifetime 28800
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
: end
LVL 25

Accepted Solution

Cyclops3590 earned 2000 total points
ID: 39166423
that looks right.  would need to see the other side device.  if you don't have access to it, i'd need to see the outputs of the show and debug commands I gave you.

also, those commands it says its ignoring is not big deal.

Author Closing Comment

ID: 39166451
Actually, i got it working.. coworker told me the wrong preshared key Thanks alot though!!

Featured Post

WatchGuard Case Study: NCR

With business operations for thousands of customers largely depending on the internal systems they support, NCR can’t afford to waste time or money on security products that are anything less than exceptional. That’s why they chose WatchGuard.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Juniper VPN devices are a popular alternative to using Cisco products. Last year I needed to set up an international site-to-site VPN over the Internet, but the client had high security requirements -- FIPS 140. What and Why of FIPS 140 Federa…
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Suggested Courses

927 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question