Re: L2TP/IPSec Remote Access Problem on PIX V8

From: Alexei Monastyrnyi (alexeim@orcsoftware.com)
Date: Mon Apr 28 2008 - 11:20:43 ART


Hi.

Here is a config which worked for me pm ASA 7.2(4).

Note that for Windows XP VPN clients you have to stick to DefaultRAGroup
tunnel-group whilst for MAC OSX you can have a different name;
group-policy may have a non-default name in both cases.

ip local pool vpn_clients x.x.x.x-x.x.x.y mask z.z.z.z

crypto ipsec transform-set l2tp3desmd5 esp-3des esp-md5-hmac
crypto ipsec transform-set l2tp3desmd5 mode transport
crypto ipsec transform-set l2tp3des esp-3des esp-sha-hmac
crypto ipsec transform-set l2tp3des mode transport
crypto dynamic-map mymap_l2tp_dyn 12 set transform-set l2tp3desmd5 l2tp3des

crypto map mymap 65535 ipsec-isakmp dynamic mymap_l2tp_dyn
crypto map mymap interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp nat-traversal 20

group-policy l2tp_policy internal
group-policy l2tp_policy attributes
 wins-server value x.x.x.x
 dns-server value y.y.y.y
 vpn-tunnel-protocol IPSec l2tp-ipsec
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value ipsec-my-stunnel
 default-domain value mydomain.com

group-policy DefaultRAGroup internal
group-policy DefaultRAGroup attributes
 wins-server value x.x.x.x
 dns-server value y.y.y.y
 vpn-tunnel-protocol IPSec l2tp-ipsec
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value ipsec-my-stunnel
 default-domain value mydomain.com

username myuser password ****== nt-encrypted

tunnel-group DefaultRAGroup general-attributes
 address-pool vpn_clients
 default-group-policy DefaultRAGroup
tunnel-group DefaultRAGroup ipsec-attributes
 pre-shared-key *
 isakmp keepalive disable
 isakmp ikev1-user-authentication xauth
tunnel-group DefaultRAGroup ppp-attributes
 no authentication chap
 authentication ms-chap-v2

HTH
A.

eman mansouri said the following on 4/28/2008 5:28 AM:
> HI everybody
> I do have a PIX 525 with PIX v8 IOS which I am intending to configure it for my Remote users inorder to enable them to connect through the Internet to coprporate LAN and make use of services provided. I have usef my own knowledge , Cisco site Configuration guidlines and asdm 6.3 tool .But the problem is I get the below message using either Windows VPN Connection.
>
> Jan 01 00:02:09 [IKEv1]: IP = x.x.x.x, Removing peer from peer table failed, no match!
> Jan 01 00:02:09 [IKEv1]: IP = x.x.x.x, Error: Unable to remove PeerTblEntry
>
> this is the configuration I have done with ASDM. Please help me with it.
> I will be happy if you help me with it.
>
> PIX Version 8.0(3)
> !
> hostname pixfirewall
> enable password 8Ry2YjIyt7RRXU24 encrypted
> names
> !
> interface Ethernet0
> nameif inside
> security-level 100
> ip address 10.1.1.1 255.255.255.0
> !
> interface Ethernet1
> nameif outside
> security-level 0
> ip address 85.x.x.x 255.255.255.224
> !
> access-list OUT-ACCESS extended permit ip any interface outside
> access-list inside_nat0_outbound extended permit ip 10.1.1.0 255.255.255.0 10.1.1.0 255.255.255.224
>
> ip local pool VPN-POOL 10.1.1.10-10.1.1.20 mask 255.255.255.0
>
> asdm image flash:/asdm-603.bin
>
> global (outside) 1 interface
> nat (inside) 0 access-list inside_nat0_outbound
> nat (inside) 1 10.1.1.0 255.255.255.0
> access-group OUT-ACCESS in interface outside
> route outside 0.0.0.0 0.0.0.0 85.15.52.1 1
>
> dynamic-access-policy-record DfltAccessPolicy
>
> crypto ipsec transform-set TRANS_ESP_DES_SHA esp-des esp-sha-hmac
> crypto ipsec transform-set TRANS_ESP_DES_SHA mode transport
> crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
> crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
> crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs
> crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-DES-SHA ESP-DES-MD5 TRANS_ESP_DES_SHA
> crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
> crypto map outside_map interface outside
> crypto isakmp enable outside
> crypto isakmp policy 10
> authentication pre-share
> encryption des
> hash sha
> group 2
> lifetime 86400
>
> group-policy VPN-Group internal
> group-policy VPN-Group attributes
> vpn-tunnel-protocol l2tp-ipsec
> default-domain value ibto.ir
> username iman password I02l0vJPx1MGTuzMwdwezg== nt-encrypted privilege 0
> username iman attributes
> vpn-group-policy VPN-Group
> tunnel-group DefaultRAGroup ipsec-attributes
> pre-shared-key *
> tunnel-group DefaultRAGroup ppp-attributes
> authentication pap
> no authentication chap
> authentication ms-chap-v2
> tunnel-group VPN-Group type remote-access
> tunnel-group VPN-Group general-attributes
> address-pool VPN-POOL
> default-group-policy VPN-Group
> tunnel-group VPN-Group ipsec-attributes
> pre-shared-key *
> isakmp ikev1-user-authentication none
> tunnel-group VPN-Group ppp-attributes
> authentication pap
> no authentication chap
> authentication ms-chap-v2
>
>
>
>
> _________________________________________________________________
> Invite your mail contacts to join your friends list with Windows Live Spaces. It's easy!
> http://spaces.live.com/spacesapi.aspx?wx_action=create&wx_url=/friends.aspx&mkt=en-us
>
>
> Pass the CCIE in six weeks, Guaranteed!
> http://www.certscience.com/CCIE
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html

Pass the CCIE in six weeks, Guaranteed!
http://www.certscience.com/CCIE



This archive was generated by hypermail 2.1.4 : Thu May 01 2008 - 08:25:52 ART