Hi,
wen I attmpt to open ftp from outside host to inside the log of Secure
VPN Client show this:
12:08:36.478 Topixfirewall - Initiating IKE Phase 1 (IP
ADDR=192.168.50.1)
12:08:36.578 Topixfirewall - SENDING>>>> ISAKMP OAK MM (SA)
12:08:36.778 Topixfirewall - RECEIVED<<< ISAKMP OAK MM (SA)
12:08:36.919 Topixfirewall - SENDING>>>> ISAKMP OAK MM (KE, NON, VID,
VID)
12:08:37.119 Topixfirewall - RECEIVED<<< ISAKMP OAK MM (KE, NON, VID)
12:08:37.239 Topixfirewall - SENDING>>>> ISAKMP OAK MM *(ID, HASH,
NOTIFY:STATUS_INITIAL_CONTACT)
12:08:37.339 Topixfirewall - RECEIVED<<< ISAKMP OAK MM *(ID, HASH)
12:08:37.439 Topixfirewall - Established IKE SA
12:08:37.539 Topixfirewall - Initiating IKE Phase 2 with Client IDs
(message id: A4561253)
12:08:37.640 Initiator = IP ADDR=192.168.20.2, prot = 0 port = 0
12:08:37.740 Responder = IP ADDR=192.168.50.5, prot = 0 port = 0
12:08:37.840 Topixfirewall - SENDING>>>> ISAKMP OAK QM *(HASH, SA, NON,
ID, ID)
12:08:37.940 Topixfirewall - RECEIVED<<< ISAKMP OAK INFO *(HASH,
NOTIFY:NO_PROPOSAL_CHOSEN)
12:08:38.040 Topixfirewall - Discarding IPSec SA negotiation
The topology is:
192.168.201.31---(192.168.201.200 192.168.50.1)---(192.168.50.2
192.168.20.1)---192.168.20.2
internal host Eth 1 inside :PIX: Eth 0
outside router ext
host-VPNClient
Her is the config of PIX:
PIX Version 5.0(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password otf0ZholSsu4cuaN encrypted
passwd otf0ZholSsu4cuaN encrypted
hostname pixfirewall
fixup protocol ftp 21
fixup protocol http 80
fixup protocol smtp 25
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol sqlnet 1521
names
pager lines 24
no logging timestamp
no logging standby
no logging console
no logging monitor
logging buffered debugging
no logging trap
logging facility 20
logging queue 512
interface ethernet0 auto
interface ethernet1 auto
mtu outside 1500
mtu inside 1500
ip address outside 192.168.50.1 255.255.255.0
ip address inside 192.168.201.200 255.255.248.0
no failover
failover timeout 0:00:00
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
arp timeout 14400
global (outside) 1 192.168.50.10 netmask 255.255.255.0
global (outside) 1 192.168.50.11-192.168.50.20 netmask 255.255.255.0
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 192.168.50.5 192.168.201.31 netmask
255.255.255.255 0 0
access-list 80 permit ip host 192.168.20.2 host 192.168.50.2
conduit permit icmp any any
conduit permit tcp host 192.168.50.5 eq ftp any
no rip outside passive
no rip outside default
no rip inside passive
no rip inside default
route outside 0.0.0.0 0.0.0.0 192.168.50.2 1
timeout xlate 3:00:00 conn 1:00:00 half-closed 0:10:00 udp 0:02:00
timeout rpc 0:10:00 h323 0:05:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
sysopt connection permit-ipsec
crypto ipsec transform-set transfset1 esp-des
crypto dynamic-map cisco 4 set transform-set transfset1
crypto map mymap1 20 ipsec-isakmp dynamic cisco
crypto map mymap1 interface outside
isakmp enable outside
isakmp key cisco1234 address 0.0.0.0 netmask 0.0.0.0
isakmp policy 8 authentication pre-share
isakmp policy 8 encryption des
isakmp policy 8 hash md5
isakmp policy 8 group 1
isakmp policy 8 lifetime 86400
telnet 192.168.207.33 255.255.255.255 inside
telnet 192.168.201.31 255.255.255.255 inside
telnet timeout 5
terminal width 80
The ftp say "Connection timed out". I think ther's not a DNS problem.
>From log it can create a SA, is present a isakmp sa:
dst src state pending created
192.168.50.1 192.168.20.2 QM_IDLE 0 0
and a ipsec sa:
interface: outside
Crypto map tag: mymap1, local addr. 192.168.50.1
The VPN Client is version 1.1 on NT Server, PIX is 515.
Thanks for any help,
DAVIDE
--
=========================================
Davide Zari
Security Consultant - Customer Connect
Cybernet Ita, S.p.A.
Viale Verona, 190 - 38100 Trento - ITALY
Phone :+39 461 373111
Fax :+39 461 373110
=========================================
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]