Problemi VPN Client e NAT statici

Virtual private networks e affini

Moderatore: Federico.Lagni

Rispondi
Avatar utente
Wizard
Intergalactic subspace network admin
Messaggi: 3441
Iscritto il: ven 03 feb , 2006 10:04 am
Località: Emilia Romagna
Contatta:

Ciao bella gente...
Ho un problemino che mi affligge...
Da un po' di tempo, se natto staticamente (su un PIX) un ip interno su un ip pubblico funziona tutto tranne il vpn client, cioè sembra che il pacchetto parta ma non torni indietro.
Ho anche provato a creare una ACL che permettesse tutto in entrata ma niente...
Avete qualche idea?
Grazie mille!
Avatar utente
MaiO
Messianic Network master
Messaggi: 1083
Iscritto il: sab 15 ott , 2005 10:55 am
Località: Milano
Contatta:

PPTP?


Abilita il GRE in entrata.

Ciao
-=] MaiO [=-
Avatar utente
Wizard
Intergalactic subspace network admin
Messaggi: 3441
Iscritto il: ven 03 feb , 2006 10:04 am
Località: Emilia Romagna
Contatta:

No, non è PPTP ma IPSec e per accedere uno il Cisco VPN Client versione 4.8.
Questa è la configurazione:

PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password *****
passwd *****
hostname ****
domain-name ***
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69

access-list inside_access_in remark *** ACL in uscita ***
access-list inside_access_in permit ip LAN_Wizard 255.255.255.0 any
access-list outside_access_in remark *** ACL per VPN Client ***
access-list outside_access_in permit udp any any eq isakmp
access-list outside_access_in permit esp any any
access-list outside_access_in permit ip 10.0.1.144 255.255.255.240 any
access-list outside_access_in remark *** ACL in entrata per PC_Silver ***
access-list outside_access_in permit tcp any host 10.0.0.250 eq 3389
access-list outside_access_in permit tcp any host 10.0.0.250 eq ftp
access-list outside_access_in permit tcp any host 10.0.0.250 eq ftp-data
access-list outside_access_in permit tcp any host 10.0.0.250 eq 4652
access-list outside_access_in permit udp any host 10.0.0.250 eq 4642
access-list outside_access_in permit udp any host 10.0.0.250 eq 14762
access-list outside_access_in permit tcp any host 10.0.0.250 eq 14762
access-list outside_access_in remark *** ACL in entrata per SRV_Crash ***
access-list outside_access_in permit tcp any host 10.0.0.251 eq 3388
access-list outside_access_in permit tcp any host 10.0.0.251 eq ftp
access-list outside_access_in permit tcp any host 10.0.0.251 eq ftp-data
access-list outside_access_in permit tcp any host 10.0.0.251 eq 4682
access-list outside_access_in permit udp any host 10.0.0.251 eq 4692
access-list outside_access_in permit udp any host 10.0.0.251 eq 14762
access-list outside_access_in permit tcp any host 10.0.0.251 eq 14762
access-list outside_access_in remark *** ACL per controllo ICMP verso LAN ***
access-list outside_access_in permit icmp any LAN_Router 255.255.255.0 echo-reply
access-list outside_access_in permit icmp any LAN_Router 255.255.255.0 unreachable
access-list outside_access_in permit icmp any LAN_Router 255.255.255.0 echo
access-list outside_access_in permit icmp any LAN_Router 255.255.255.0 time-exceeded
access-list outside_access_in permit icmp any LAN_Router 255.255.255.0 traceroute
access-list outside_access_in remark *** ACL per bloccare accessi non autorizzati ***
access-list outside_access_in deny ip any LAN_Router 255.255.255.0
access-list remote-wizard_splitTunnelAcl permit ip LAN_Wizard 255.255.255.0 any
access-list remote-wizard_splitTunnelAcl permit ip LAN_Router 255.255.255.0 any
access-list inside_outbound_nat0_acl permit ip LAN_Wizard 255.255.255.0 10.0.1.144 255.255.255.240
access-list inside_outbound_nat0_acl permit ip LAN_Router 255.255.255.0 10.0.1.144 255.255.255.240
access-list outside_cryptomap_dyn_20 permit ip any 10.0.1.144 255.255.255.240
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.0.0.253 255.255.255.0
ip address inside 10.0.1.254 255.255.255.0
ip verify reverse-path interface outside
ip verify reverse-path interface inside
ip audit info action alarm drop
ip audit attack action alarm drop
ip local pool VPN-POOL 10.0.1.150-10.0.1.153
pdm location PC_Silver 255.255.255.255 inside
pdm location Router 255.255.255.255 outside
pdm location SRV_Crash 255.255.255.255 inside
pdm location Cris_SEDOC 255.255.255.255 outside
pdm location LAN_Router 255.255.255.0 inside
pdm history enable
arp timeout 14400
global (outside) 10 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 10 LAN_Wizard 255.255.255.0 0 0
static (inside,outside) 10.0.0.250 PC_Silver netmask 255.255.255.255 0 0
static (inside,outside) 10.0.0.251 SRV_Crash netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 Router 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authentication serial console LOCAL
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
http server enable
http LAN_Router 255.255.255.0 outside
http Cris_SEDOC 255.255.255.255 outside
http LAN_Wizard 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community wizard
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp nat-traversal 20
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup remote-wizard address-pool VPN-POOL
vpngroup remote-wizard split-tunnel remote-wizard_splitTunnelAcl
vpngroup remote-wizard idle-time 1800
vpngroup remote-wizard password ********
telnet Router 255.255.255.255 outside
telnet LAN_Wizard 255.255.255.0 inside
telnet timeout 50
ssh LAN_Router 255.255.255.0 outside
ssh Cris_SEDOC 255.255.255.255 outside
ssh LAN_Wizard 255.255.255.0 inside
ssh timeout 50
console timeout 0
dhcpd address 10.0.1.5-10.0.1.32 inside
dhcpd dns 151.99.125.1 151.99.125.2
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd enable inside
username admin password .Da0BrwN9x8E.VbG encrypted privilege 15
terminal width 80
banner login
banner login ****************************************************************
banner login * *
banner login * WARNING: System is RESTRICTED to authorized personnel ONLY! *
banner login * Unauthorized use of this system will be logged and *
banner login * prosecuted to the fullest extent of the law. *
banner login * *
banner login * If you are NOT authorized to use this system, LOG OFF NOW! *
banner login * *
banner login ****************************************************************
Cryptochecksum:ed5003a9bcf189fc71a21c22416f9e79
: end
Avatar utente
MaiO
Messianic Network master
Messaggi: 1083
Iscritto il: sab 15 ott , 2005 10:55 am
Località: Milano
Contatta:

Non ho capito bene la domanda, questo è il PIX che fa da "VPN server" e hai dei problemi a raggiungere dei host via VPN, o da dietro questo PIX i host staticamente nattati hanno problemi nel fare un tunnel IPSec verso un'altro PIX???


Ciao
-=] MaiO [=-
Avatar utente
Wizard
Intergalactic subspace network admin
Messaggi: 3441
Iscritto il: ven 03 feb , 2006 10:04 am
Località: Emilia Romagna
Contatta:

Io sono dietro a quel PIX (ma mi succede anche con altri da un po' di tempo) e, da quei pc che sono nattati statici fuori non si riesce a connettersi in vpn con il cisco vpn client. In sostanza, quando clicco sul nome della vpn cerca di connettersi ma non ce la fa, non arriva neanche a chiedermi utente e password.
Avatar utente
MaiO
Messianic Network master
Messaggi: 1083
Iscritto il: sab 15 ott , 2005 10:55 am
Località: Milano
Contatta:

Il log (in modalità debug) del Cisco VPN Client che dice?

Ciao
-=] MaiO [=-
Avatar utente
Wizard
Intergalactic subspace network admin
Messaggi: 3441
Iscritto il: ven 03 feb , 2006 10:04 am
Località: Emilia Romagna
Contatta:

Se faccio un "sh conn" vedo che la connessione in uscita va ma sembra non tornare indietro...
Avatar utente
MaiO
Messianic Network master
Messaggi: 1083
Iscritto il: sab 15 ott , 2005 10:55 am
Località: Milano
Contatta:

Guarda (ed eventualmente abilita) il log del Cisco VPN Client. Posta il risultato.

Ciao
-=] MaiO [=-
Avatar utente
Wizard
Intergalactic subspace network admin
Messaggi: 3441
Iscritto il: ven 03 feb , 2006 10:04 am
Località: Emilia Romagna
Contatta:

Purtroppo non da nessun log.
Avatar utente
MaiO
Messianic Network master
Messaggi: 1083
Iscritto il: sab 15 ott , 2005 10:55 am
Località: Milano
Contatta:

Impossibile!

Ciao
-=] MaiO [=-
Avatar utente
Wizard
Intergalactic subspace network admin
Messaggi: 3441
Iscritto il: ven 03 feb , 2006 10:04 am
Località: Emilia Romagna
Contatta:

Non chiedeti come ma ora va (dietro ad un PIX 515 con IOS v 7.1); stasera provo con 501 con la 6.35.
Grazie per l' interessamento.
Rispondi