error "PDM does not support multiple...access list"

Hi All: I thought I had this straightened out, but I'm getting the "PDM does not support multiple use of access list" error. Can someone point out where the error is?

Result of firewall command: "show config"

: Saved : Written by enable_15 at 06:33:53.689 PST Wed Feb 21 2007 PIX Version 6.3(4) interface ethernet0 auto interface ethernet1 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password [redacted] encrypted passwd [redacted] encrypted hostname [redacted] domain-name [redacted] clock timezone PST -8 clock summer-time PDT recurring fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 no fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names name 192.168.1.2 [redacted] name 192.168.1.20 [redacted] name 192.168.1.21 [redacted] ... access-list outside_access_in permit tcp any object-group webservices_ref object-group webservers access-list inside_access_in permit ip any any access-list inside_outbound_nat0_acl permit ip any 192.168.10.32

255.255.255.224 access-list 130 permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0 pager lines 24 mtu outside 1500 mtu inside 1500 ip address outside [redacted] 255.255.255.248 ip address inside 192.168.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm ... arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list 130 nat (inside) 0 [redacted] 255.255.255.255 0 0 nat (inside) 1 0.0.0.0 0.0.0.0 0 0 static (outside,inside) 192.168.1.6 [redacted] netmask 255.255.255.255 0 0 static (outside,inside) 192.168.1.7 [redacted] netmask 255.255.255.255 0 0 static (outside,inside) 192.168.1.10 [redacted] netmask 255.255.255.255 0 0 static (inside,outside) [redacted] 192.168.1.6 netmask 255.255.255.255 0 0 static (inside,outside) [redacted] 192.168.1.7 netmask 255.255.255.255 0 0 static (inside,outside) [redacted] 192.168.1.10 netmask 255.255.255.255 0 0 access-group outside_access_in in interface outside access-group inside_access_in in interface inside route outside 0.0.0.0 0.0.0.0 [redacted] 1 route outside [redacted] 255.255.255.255 192.168.1.6 1 route outside [redacted] 255.255.255.255 192.168.1.7 1 route outside [redacted] 255.255.255.255 192.168.1.10 1 timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local http server enable http 0.0.0.0 0.0.0.0 outside http 192.168.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec sysopt noproxyarp inside crypto ipsec transform-set strong esp-3des esp-sha-hmac crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map crypto map [redacted] 50 ipsec-isakmp crypto map [redacted] 50 match address 130 crypto map [redacted] 50 set peer [redacted] crypto map [redacted] 50 set transform-set strong crypto map [redacted] interface outside isakmp enable outside isakmp key ******** address [redacted] netmask 255.255.255.255 isakmp policy 8 authentication rsa-sig isakmp policy 8 encryption des isakmp policy 8 hash sha isakmp policy 8 group 1 isakmp policy 8 lifetime 86400 isakmp policy 25 authentication pre-share isakmp policy 25 encryption 3des isakmp policy 25 hash sha isakmp policy 25 group 1 isakmp policy 25 lifetime 86400 telnet timeout 5 ssh 68.161.247.47 255.255.255.255 outside ssh timeout 5 console timeout 0 dhcpd address [redacted] inside dhcpd lease 3600 dhcpd ping_timeout 750 dhcpd auto_config outside terminal width 80 Cryptochecksum:17f4d5d8f590fe13be00de5d721a5dec
Reply to
cisco
Loading thread data ...

Reply to
Walter Roberson

thanks...i was working straight from a cisco example setup

formatting link
...their example has:

access-list 90 permit ip 192.168.12.0 255.255.255.0 10.0.0.0 255.0.0.0nat 0 access-list 90

crypto map toSanJose 20 ipsec-isakmp crypto map toSanJose 20 match address 90 crypto map toSanJose 20 set transform-set strong crypto map toSanJose 20 set peer 209.165.200.229Is that second crypto line a typo, and should it instead say:crypto map toSanJose 20 match access-list 90 ???Otherwise I don't see what's wrong...i'm just copying their example?

Reply to
cisco

...so is the problem

"nat 0 access-list 130" conflicts with "crypto map [redacted] 50 match address 130"?

If so, can I delete the "nat 0 access-list 130" line and still have the VPN work?

The example notes that my config above excludes traffic between the two intranets from NAT...I'm not sure I understand what would happen if they were included or excluded from NAT...does it have an impact on the VPN tunnel?

TIA

Reply to
cisco

Just create two different access lists with the same names.

# acl for matching no-nat traffic access-list 130 permit ip 192.168.1.0 255.255.255.0 192.168.0.0

255.255.255.0 nat (inside) 0 access-list 130

# acl for matching interesting traffic access-list crypto50 permit ip 192.168.1.0 255.255.255.0 192.168.0.0

255.255.255.0 cryptomap myvpn 50 match address crypto50

Chris.

Reply to
chris

Of course, I meant create two access lists with different names but the same source/destination.

;-)

Reply to
chris

Thanks so much, Chris...that was the piece of the puzzle I didn't get! It's working now.

Reply to
cisco

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.