|
Question : Cisco PIX 501: VPN Tunnel doesn't reconnect after PIX reboot
|
|
I have a 501 PIX running a VPN to another 501 though the internet at another location. I had to shut down the PIX on one end so I could move some equipment. After I boot it back up, the VPN tunnel doesn't reconnect. Before the shut down, everything was working fine, so I don't believe it is a configuration error.
I had this problem once before, quite a while ago, and, like an idiot, I didn't write down the fix. I believe it has something to do with resetting the VPN is some way so it can reconnect. Let me know...
High points are due to the urgency of the fix. Just in case, here is the config...
PIX Version 6.3(4) interface ethernet0 auto interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password c.WQcaqN2RaDxaDI encrypted passwd c.WQcaqN2RaDxaDI encrypted hostname xxx domain-name xxx.com fixup protocol dns maximum-length 1024 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names access-list out permit icmp any any access-list out permit tcp any host 64.207.xxx.xxx eq smtp access-list out permit tcp any host 64.207.xxx.xxx eq www access-list out permit tcp any host 64.207.xxx.xxx eq 3389 access-list out permit tcp any host 64.207.xxx.xxx eq 3389 access-list out permit tcp any host 64.207.xxx.xxx eq pop3 access-list out permit tcp any host 64.207.xxx.xxx eq 4662 access-list VPN-nonat permit ip 10.0.1.0 255.255.255.0 10.1.1.0 255.255.255.0 access-list VPN_Trenton permit ip 10.0.1.0 255.255.255.0 10.1.1.0 255.255.255.0
pager lines 24 mtu outside 1500 mtu inside 1500 ip address outside 64.207.xxx.xxx 255.255.255.248 ip address inside 10.0.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface global (outside) 10 64.207.xxx.xxx global (outside) 2 64.207.xxx.xxx nat (inside) 0 access-list VPN-nonat nat (inside) 10 10.0.1.11 255.255.255.255 0 0 nat (inside) 2 10.0.1.101 255.255.255.255 0 0 nat (inside) 1 0.0.0.0 0.0.0.0 0 0 static (inside,outside) tcp 64.207.xxx.xxx 3389 10.0.1.10 3389 netmask 255.255.25 5.255 0 0 static (inside,outside) tcp 64.207.xxx.xxx www 10.0.1.11 www netmask 255.255.255. 255 0 0 static (inside,outside) tcp 64.207.xxx.xxx smtp 10.0.1.11 smtp netmask 255.255.25 5.255 0 0 static (inside,outside) tcp 64.207.xxx.xxx 3389 10.0.1.11 3389 netmask 255.255.25 5.255 0 0 static (inside,outside) tcp 64.207.xxx.xxx pop3 10.0.1.11 pop3 netmask 255.255.25 5.255 0 0 static (inside,outside) tcp 64.207.xxx.xxx 3389 10.0.1.101 3389 netmask 255.255.2 55.255 0 0 static (inside,outside) tcp 64.207.xxx.xxx 4662 10.0.1.101 4662 netmask 255.255.2 55.255 0 0 static (inside,outside) tcp 64.207.xxx.xxx www 10.0.1.101 www netmask 255.255.255 .255 0 0 access-group out in interface outside route outside 0.0.0.0 0.0.0.0 64.207.xxx.xxx 1 timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec crypto ipsec transform-set strong esp-3des esp-sha-hmac crypto map VPN_xxx 20 ipsec-isakmp crypto map VPN_xxx 20 match address VPN_Trenton crypto map VPN_xxx 20 set peer 12.39.xxx.xxx crypto map VPN_xxx 20 set transform-set strong crypto map VPN_xxx interface outside isakmp enable outside isakmp key ******** address 12.39.xxx.xxx netmask 255.255.255.255 isakmp policy 9 authentication pre-share isakmp policy 9 encryption 3des isakmp policy 9 hash sha isakmp policy 9 group 1 isakmp policy 9 lifetime 86400 telnet 10.0.1.0 255.255.255.0 inside telnet timeout 5 ssh timeout 5 console timeout 0 terminal width 80 Cryptochecksum:f0bb64437dad130767bb4439c02bb3fe : end
|
Answer : Cisco PIX 501: VPN Tunnel doesn't reconnect after PIX reboot
|
|
Is the other PIX also running 6.3 series? And if the other PIX has either of the following lines, you'll need to add them to the PIX above: isakmp identity address isakmp nat-traversal
I see above that you have the following: >isakmp policy 9 encryption 3des >isakmp policy 9 hash sha >isakmp policy 9 group 1 Is the other side set up identically?? If using "3des" & "sha" you should instead use "group 2" to avoid problems.
Also, just be aware that even if both sides are properly configured with identical ipsec & isakmp parameters, the tunnel won't come up until you start sending traffic from one network to the other.
cheers
|
|
|
|