Hello David You'll need to make use AAA in your configuration.
Refer to http://www.cisco.com/warp/customer/707/index.shtml ( CCO login required ) ./bosire -- _______________________________________________ +$;%+$;'+$;%+$;'+$;%+$;'+$;%+$;'+$;%+$;'+$;%+$ richard bosire ccn[ap], ccd[ap], ccs[ae] David Tran wrote: > Hi Everyone, > > Perhaps someone in the group can help me with this problem. > I have Cisco Pix515-UR (128MB RAM/16MB Flash) running PIX > code 6.1(1) with Pix Device Manager (PDM) version 1.1(2). This > PIX is connected to my cable modem with STATIC IP address > 129.174.1.13 on the outside interface. The inside interface > (which is my internal network) has an IP of 192.168.1.1 > with a netmask of 255.255.255.0. On the internal network, I have > a BSD box (IP 192.168.1.10), a Linux box (192.168.1.20), a > Solarisx86 (IP 192.168.1.30) and a SCO Unix with IP 192.168.1.40 > > I have successfully implemented VPN connection for remote users > using Cisco VPN client 3.1.1 running on Win98, NT, 2000 and Linux > to connect to the internal network. Once these remote users are > successfully connected, they can access all the devices on the > internal network. > > I have 2 questions: > > 1) Let say that I just want remote users to access just the BSD box > and the Linux box but not the Solaris and SCO, how can I make this > happen? I know how to do that with Checkpoint Secure Remote > (Checkpoint use Encryption domain which specify which devices > remote user is allowed to access). How can I accomplish this > in PIX? For example, I just want remote users to ping the BSD > and Linux boxes but not Solaris and SCO boxes. > > 2) I have 4 different remote users who connect to the internal network > via VPN IPSec connection. All of these users are using the same account > (vpn3000) to connect back to the network. From a Security stand point, this > is > bad practices. How can I assign each of these users different account in > the configuration? Again, I know how to do this with Checkpoint; however, > I don't know how to get it done in PIX. > > Below is the configuration. Please help. thanks. > > PIX Version 6.1(1) > nameif ethernet0 outside security0 > nameif ethernet1 inside security100 > enable password OnTrBUG1Tp0edmkr encrypted > passwd 2KFQnbNIdI.2KYOU encrypted > hostname goss-d3-pix515b > domain-name micronetsolution.com > fixup protocol ftp 21 > fixup protocol http 80 > fixup protocol h323 1720 > fixup protocol rsh 514 > fixup protocol smtp 25 > fixup protocol sqlnet 1521 > fixup protocol sip 5060 > fixup protocol skinny 2000 > names > ! > !--- Access-list to avoid Network Address Translation (NAT) on the IPSec > packets > access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 > 255.255.255.0 > pager lines 24 > interface ethernet0 auto > interface ethernet1 auto > mtu outside 1500 > mtu inside 1500 > ! > !--- IP addresses on the interfaces > ip address outside 129.174.1.13 255.255.240.0 > ip address inside 192.168.1.1 255.255.255.0 > ip audit info action alarm > ip audit attack action alarm > ip local pool ippool 192.168.2.1-192.168.2.254 > no failover > failover timeout 0:00:00 > failover poll 15 > failover ip address outside 0.0.0.0 > failover ip address inside 0.0.0.0 > pdm history enable > arp timeout 14400 > ! > !--- Binding ACL 101 to the NAT statement to avoid NAT on the IPSec packets > nat (inside) 0 access-list 101 > ! > !--- Default route to the Internet > route outside 0.0.0.0 0.0.0.0 129.174.1.1 1 > timeout xlate 3:00:00 > timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 > 0:05:00 sip 0:30:00 sip_media 0:02:00 > timeout uauth 0:05:00 absolute > aaa-server TACACS+ protocol tacacs+ > aaa-server RADIUS protocol radius > http server enable > http 192.168.1.0 255.255.255.0 inside > no snmp-server location > no snmp-server contact > snmp-server community public > no snmp-server enable traps > floodguard enable > ! > !--- The sysopt command avoids conduit on the IPSec encrypted traffic > sysopt connection permit-ipsec > no sysopt route dnat > ! > !--- Phase 2 encryption type > crypto ipsec transform-set myset esp-des esp-md5-hmac > crypto dynamic-map dynmap 10 set transform-set myset > crypto map mymap 10 ipsec-isakmp dynamic dynmap > ! > !--- Binding the IPSec engine on the outside interface > crypto map mymap interface outside > ! > !--- Enabling ISAKMP key-exchange > isakmp enable outside > isakmp identity address > ! > !--- ISAKMP Policy for 3000 VPN client running 3.0 or higher code > isakmp policy 10 authentication pre-share > isakmp policy 10 encryption des > isakmp policy 10 hash md5 > isakmp policy 10 group 2 > isakmp policy 10 lifetime 86400 > ! > !--- IPSec group configuration for either VPN client > vpngroup vpn3000 address-pool ippool > vpngroup vpn3000 dns-server 192.168.1.10 > vpngroup vpn3000 default-domain micronetsolution.com > vpngroup vpn3000 idle-time 1800 > vpngroup vpn3000 password ******** > telnet timeout 5 > ssh timeout 5 > terminal width 80 Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=27785&t=27759 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

