Question : Pix 501 site to site configuration issus.

I have an interesting problem with a site to site vpn configuration.  On "my" side there is a Pix 501.   On the "other" side there is a watchguard firebox.  For some reason on my configration I am unable to establish the phase 1 config . To establish the communication to the other side I start a ping from a computer on my  lan to a computer on the other lan.   I run the "debug crypto isakmp" command and I would expect to see the negotiations from my end to the other for the different phases.  I have attached the config the A.B.C is the adddress for the my side outside interface.  X.Y.Z. is the address for the other side outside.  Here is the config.  Thanks for any advice in advance
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password mfaQF/BNUQlUjFmk encrypted
passwd mfaQF/BNUQlUjFmk encrypted
hostname FM-Pix501
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
no fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 172.31.41.0 max
access-list 101 permit icmp any any
access-list 101 permit udp any any eq isakmp
access-list 101 permit udp any any eq 4500
access-list 101 permit esp any any
access-list outside_cryptomap_30 permit ip 172.16.0.0 255.255.255.0 max 255.255.255.0
access-list outside_cryptomap_30 permit ip any 10.1.1.0 255.255.255.192
access-list fmTunnelAcl permit ip 172.16.0.0 255.255.255.0 any
pager lines 24
logging console debugging
icmp permit any outside
icmp permit any inside
mtu outside 1500
mtu inside 1500
ip address outside A.B.C.54 255.255.255.0
ip address inside 172.16.0.2 255.255.252.0
ip audit info action alarm
ip audit attack action alarm
ip local pool FM 10.1.1.1-10.1.1.50
pdm location 172.16.0.0 255.255.255.0 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list outside_cryptomap_30
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group 101 in interface outside
route outside 0.0.0.0 0.0.0.0 69.95.78.1 1
route inside 172.16.1.0 255.255.255.0 172.16.0.254 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 172.16.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
crypto map outside-map 30 ipsec-isakmp
crypto map outside-map 30 match address outside_cryptomap_30
crypto map outside-map 30 set peer 216.117.10.2
crypto map outside-map 30 set transform-set ESP-3DES-SHA
isakmp enable outside
isakmp key ******** address X.Y.Z.2 netmask 255.255.255.255 no-xauth no-config-mode
isakmp identity address
isakmp nat-traversal 10
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 1
isakmp policy 10 lifetime 86400
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup fmv address-pool FMP
vpngroup fmv dns-server 172.16.0.253
vpngroup fmv default-domain familymed.local
vpngroup fmv split-tunnel fmvpn_splitTunnelAcl
vpngroup fmv idle-time 1800
vpngroup fmv password ********
telnet 172.16.0.0 255.255.255.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh 172.16.0.0 255.255.255.255 inside
ssh timeout 5
console timeout 0
dhcpd ping_timeout 750
dhcpd auto_config outside
username Bobb password oigZIdYXVh9Vg/i/p encrypted privilege 2

terminal width 80
Cryptochecksum:5e986a2f416d4cfb0df259412c4e0c7d
: end

Answer : Pix 501 site to site configuration issus.

First, assuming that the LAN on the remote side of the tunnel is 172.31.41.0/24, you shouldn't have this ACL statement that defines your remote access VPN pool as the destination in your site-to-site crypto ACL and it should be removed:

access-list outside_cryptomap_30 permit ip any 10.1.1.0 255.255.255.192

Are you not receiving any messages from the debug?  You should if you are trying to ping across the tunnel.

Have you verified the Phase I parameters that are running on the WG FW?  You will have to get these from the remote firewall administrator.  If you are unable to verify the settings, then I would add a few more Phase I policies to the PIX config just to see if any of them connect.  See the example isakmp policies below to add to your PIX configuration:

isakmp policy 30 authentication pre-share
isakmp policy 30 encryption 3des
isakmp policy 30 hash md5
isakmp policy 30 group 2
isakmp policy 30 lifetime 86400
isakmp policy 40 authentication pre-share
isakmp policy 40 encryption 3des
isakmp policy 40 hash sha
isakmp policy 40 group 1
isakmp policy 40 lifetime 86400
isakmp policy 50 authentication pre-share
isakmp policy 50 encryption 3des
isakmp policy 50 hash sha
isakmp policy 50 group 2
isakmp policy 50 lifetime 86400
isakmp policy 60 authentication pre-share
isakmp policy 60 encryption des
isakmp policy 60 hash md5
isakmp policy 60 group 1
isakmp policy 60 lifetime 86400
isakmp policy 70 authentication pre-share
isakmp policy 70 encryption des
isakmp policy 70 hash sha
isakmp policy 70 group 1
isakmp policy 70 lifetime 86400
isakmp policy 80 authentication pre-share
isakmp policy 80 encryption des
isakmp policy 80 hash sha
isakmp policy 80 group 2
isakmp policy 80 lifetime 86400

All I've done is vary the 3 Phase I parameters of encryption, hash and DH group number so that you have all combinations of either 3des or des encryption, md5 or sha hashing, and DH group 1 or DH group 2 for the key exchange.  In the absence of knowing the specific policy that is setup on the WG FW, one of these may work.
Random Solutions  
 
programming4us programming4us