Question : How to configure Cisco PIX VPN Configuration And IAS Integration?

Hi Everyone,

I have a problem with the configuration of a Cisco PIX 515e firewall. The Cisco VPN client is used by mobile users to establish connectivity with the corporate network. The PIX has been configured so that the users connection requests are authenticated against the IAS service running on the Windows domain controllers. If the users active directory accounts are members of a particular active directory group then the IAS policy authenticates them and allows access to the corporate network.

The problem i have is that i now have to create some site to site VPN connections with the PIX firewall, i have found that the IAS server is interfering with users connecting via the site to site VPNs. I need to alter the configuration so that the users connecting via site to site VPNs dont have to be associated with any IAS policies. The mobile users still need to authenticate against using the IAS policies. I have copied what i believe to be the relevant section of the PIX configuration below.

Can you please confirm that this is possbile? and if it is what changes to the PIX configuration would be required?

Thanks for your assistance with this, as it is an urgent problem (arent they always!) i have assigned this 500 points.

aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
aaa-server MYIAS protocol radius
aaa-server MYIAS  max-failed-attempts 3
aaa-server MYIAS  deadtime 10
aaa-server MYIAS  (inside) host 10.0.0.4 c1sc0p1x timeout 10
aaa-server MYIAS  (inside) host 10.0.0.5 c1sc0p1x timeout 10
sysopt connection permit-ipsec
sysopt connection permit-pptp
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA
crypto map ExternalMap 50 ipsec-isakmp
crypto map ExternalMap 50 match address VPN-Traffic
crypto map ExternalMap 50 set peer 22.89.161.103
crypto map ExternalMap 50 set transform-set ESP-3DES-SHA
crypto map ExternalMap 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map ExternalMap client configuration address initiate
crypto map ExternalMap client configuration address respond
crypto map ExternalMap client authentication MYIAS
crypto map ExternalMap interface outside
isakmp enable outside
isakmp key ******** address 22.89.161.103 netmask 255.255.255.255 no-xauth no-config-mode
isakmp identity address
isakmp nat-traversal 20
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup VPNGroup address-pool VPNIPPool-temp
vpngroup VPNGroup dns-server 10.0.0.4 10.0.0.5
vpngroup VPNGroup default-domain my.local
vpngroup VPNGroup split-tunnel VPNGroup_splitTunnelAcl
vpngroup VPNGroup idle-time 1800
vpngroup VPNGroup password ********

Answer : How to configure Cisco PIX VPN Configuration And IAS Integration?

I gotta believe this is possible to fix this, however just to clarify a bit.  Lets say we have a user at site A and a server at site B.

When the user pings the server, it refuses to connect, correct?  Do you have any logs that could help.

Also, is the vpn tunnel built, in pre-7.x the SAs are always up. run the following
sh crypto sa
do you get an SA at each site that properly corresponds to the acl for that site

Also, since its a site to site, what does the other end look like.  We just need more information to go off of.  Also, the IP layout could be helpful as sometimes its a simple acl mixup as well
Random Solutions  
 
programming4us programming4us