Hi Everyone,

Perhaps someone in the group can help me with this problem.
I have Cisco Pix515-UR (128MB RAM/16MB Flash) running PIX
code 6.1(1) with Pix Device Manager (PDM) version 1.1(2).  This
PIX is connected to my cable modem with STATIC IP address
129.174.1.13 on the outside interface.  The inside interface
(which is my internal network) has an IP of 192.168.1.1
with a netmask of 255.255.255.0.  On the internal network, I have
a BSD box (IP 192.168.1.10), a Linux box (192.168.1.20), a
Solarisx86 (IP 192.168.1.30) and a SCO Unix with IP 192.168.1.40

I have successfully implemented VPN connection for remote users
using Cisco VPN client 3.1.1 running on Win98, NT, 2000 and Linux
to connect to the internal network.  Once these remote users are
successfully connected, they can access all the devices on the
internal network.

I have 2 questions:

1) Let say that I just want remote users to access just the BSD box
and the Linux box but not the Solaris and SCO, how can I make this
happen?  I know how to do that with Checkpoint Secure Remote
(Checkpoint use Encryption domain which specify which devices
remote user is allowed to access).  How can I accomplish this
in PIX?  For example, I just want remote users to ping the BSD
and Linux boxes but not Solaris and SCO boxes.

2) I have 4 different remote users who connect to the internal network
via VPN IPSec connection.  All of these users are using the same account
(vpn3000) to connect back to the network.  From a Security stand point, this
is
bad practices.  How can I assign each of these users different account in
the configuration?  Again, I know how to do this with Checkpoint; however,
I don't know how to get it done in PIX.

Below is the configuration.  Please help.  thanks.

PIX Version 6.1(1)
 nameif ethernet0 outside security0
 nameif ethernet1 inside security100
 enable password OnTrBUG1Tp0edmkr encrypted
 passwd 2KFQnbNIdI.2KYOU encrypted
 hostname goss-d3-pix515b
 domain-name micronetsolution.com
 fixup protocol ftp 21
 fixup protocol http 80
 fixup protocol h323 1720
 fixup protocol rsh 514
 fixup protocol smtp 25
 fixup protocol sqlnet 1521
 fixup protocol sip 5060
 fixup protocol skinny 2000
 names
 !
 !--- Access-list to avoid Network Address Translation (NAT) on the IPSec
packets
 access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.2.0
255.255.255.0
 pager lines 24
 interface ethernet0 auto
 interface ethernet1 auto
 mtu outside 1500
 mtu inside 1500
 !
 !--- IP addresses on the interfaces
 ip address outside 129.174.1.13 255.255.240.0
 ip address inside 192.168.1.1 255.255.255.0
 ip audit info action alarm
 ip audit attack action alarm
 ip local pool ippool 192.168.2.1-192.168.2.254
 no failover
 failover timeout 0:00:00
 failover poll 15
 failover ip address outside 0.0.0.0
 failover ip address inside 0.0.0.0
 pdm history enable
 arp timeout 14400
 !
 !--- Binding ACL 101 to the NAT statement to avoid NAT on the IPSec packets
 nat (inside) 0 access-list 101
 !
 !--- Default route to the Internet
 route outside 0.0.0.0 0.0.0.0 129.174.1.1 1
 timeout xlate 3:00:00
 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323
0:05:00 sip 0:30:00 sip_media 0:02:00
 timeout uauth 0:05:00 absolute
 aaa-server TACACS+ protocol tacacs+
 aaa-server RADIUS protocol radius
 http server enable
 http 192.168.1.0 255.255.255.0 inside
 no snmp-server location
 no snmp-server contact
 snmp-server community public
 no snmp-server enable traps
 floodguard enable
 !
 !--- The sysopt command avoids conduit on the IPSec encrypted traffic
 sysopt connection permit-ipsec
 no sysopt route dnat
 !
 !--- Phase 2 encryption type
 crypto ipsec transform-set myset esp-des esp-md5-hmac
 crypto dynamic-map dynmap 10 set transform-set myset
 crypto map mymap 10 ipsec-isakmp dynamic dynmap
 !
 !--- Binding the IPSec engine on the outside interface
 crypto map mymap interface outside
 !
 !--- Enabling ISAKMP key-exchange
 isakmp enable outside
 isakmp identity address
 !
 !--- ISAKMP Policy for 3000 VPN client running 3.0 or higher code
 isakmp policy 10 authentication pre-share
 isakmp policy 10 encryption des
 isakmp policy 10 hash md5
 isakmp policy 10 group 2
 isakmp policy 10 lifetime 86400
 !
  !--- IPSec group configuration for either VPN client
 vpngroup vpn3000 address-pool ippool
 vpngroup vpn3000 dns-server 192.168.1.10
 vpngroup vpn3000 default-domain micronetsolution.com
 vpngroup vpn3000 idle-time 1800
 vpngroup vpn3000 password ********
 telnet timeout 5
 ssh timeout 5
 terminal width 80




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=27759&t=27759
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to