RE: PIX VPN client remote access question

From: Charles Church (cchurch@wamnet.com)
Date: Wed Jun 11 2003 - 10:26:05 GMT-3


Daniel,

        The access-list won't do anything. Your problem is the
"sysopt connection permit-ipsec" line. It allows (I think) both ESP and IKE
(UDP 500, and IP protocol 50) to always connect TO the PIX. It will not
allow those THROUGH the PIX however. I don't think there are any options on
the PIX to limit connection source addresses. But between shared keys,
certificates, and extended authentication using local accounts or TACACS, it
should be pretty secure being open to anyone. Of course, you could always
block the IPSec on a router outside of the PIX...

Chuck Church
CCIE #8776, MCNE, MCSE
Wam!Net Government Services
13665 Dulles Technology Dr. Ste 250
Herndon, VA 20171
Office: 703-480-2569
Cell: 585-233-2706
cchurch@wamnet.com
PGP key: http://pgp.mit.edu:11371/pks/lookup?search=chuck+church&op=index

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com]On Behalf Of
Ji, Daniel
Sent: Tuesday, June 10, 2003 8:18 PM
To: security@groupstudy.com
Cc: ccielab@groupstudy.com
Subject: PIX VPN client remote access question

Hi folks,
I am working on setting up a PIX 501 to do VPN client remote access.
Everything works fine except that the requirement is to have VPN client
SOURCE IP ADDRESS checked for access. In other words, only VPN clients
with specific IP addresses will be allowed to connect to PIX to setup
VPN tunnel. How do I accomplish this? I've tried AccessGroup on the
outside interface but didn't work. Any PIX/VPN guru help me out here?
Thanks a million!

Daniel Ji
------------------------------------------------------------------------
PIX Config fllows:

PIX Version 6.2(2)

nameif ethernet0 outside security0

nameif ethernet1 inside security100

enable password tVS.P/in/fhLI0xc encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

hostname PIX

domain-name xxxx

fixup protocol ftp 21

fixup protocol http 80

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol ils 389

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol smtp 25

fixup protocol sqlnet 1521

fixup protocol sip 5060

fixup protocol skinny 2000

names

access-list 101 permit ip 192.168.0.0 255.255.255.0 192.168.0.0
255.255.255.0

access-list 10 permit ip host 10.251.31.25 any

pager lines 24

interface ethernet0 10baset

interface ethernet1 10full

mtu outside 1500

mtu inside 1500

ip address outside 10.251.31.190 255.255.255.0

ip address inside 192.168.0.1 255.255.255.0

ip audit info action alarm

ip audit attack action alarm

ip local pool medipool 192.168.0.10-192.168.0.15

pdm history enable

arp timeout 14400

nat (inside) 0 access-list 101

access-group 10 in interface outside

route outside 0.0.0.0 0.0.0.0 10.251.31.190 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323
0:05:00 sip 0:30:00 sip_media 0:02:00

timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+

aaa-server RADIUS protocol radius

aaa-server LOCAL protocol local

aaa-server partnerauth protocol radius

aaa-server partnerauth (inside) host 192.168.0.8 cisco123 timeout 5

aaa-server partnerauth (inside) host 143.197.69.113 cisco123 timeout 5
 no snmp-server location

no snmp-server contact

snmp-server community public

no snmp-server enable traps

floodguard enable

sysopt connection permit-ipsec

no sysopt route dnat

crypto ipsec transform-set mediset esp-3des esp-md5-hmac

crypto dynamic-map dynmap 10 set transform-set mediset

crypto map medimap 10 ipsec-isakmp dynamic dynmap

crypto map medimap client configuration address initiate

crypto map medimap client configuration address respond

crypto map medimap interface outside

isakmp enable outside

isakmp key ******** address 10.251.31.25 netmask 255.255.255.255

isakmp identity address

isakmp policy 10 authentication pre-share

isakmp policy 10 encryption 3des

isakmp policy 10 hash md5

isakmp policy 10 group 2

isakmp policy 10 lifetime 86400

vpngroup medigroup address-pool medipool

vpngroup medigroup dns-server 143.197.69.194

vpngroup medigroup wins-server 143.197.69.194

vpngroup medigroup default-domain xxxxx

vpngroup medigroup split-tunnel 101

vpngroup medigroup idle-time 1800

vpngroup medigroup password ********

telnet timeout 5

ssh timeout 5

terminal width 80

Cryptochecksum:448418097fa51752de762f0c0f02d55c

: end

[OK]

Confidentiality Note:

The preceding e-mail message (including any attachments) contains
information that may be confidential, protected by applicable legal
privileges, or constitute non-public information. It is intended to be
conveyed only to the designated recipient(s). If you are not an intended
recipient of this message, please notify the sender by replying to this
message and then delete it from your system. Use, dissemination,
distribution or reproduction of this message by unintended recipients is not
authorized and may be unlawful.



This archive was generated by hypermail 2.1.4 : Fri Jul 04 2003 - 11:10:56 GMT-3