PIX 501 and Connection to Company VPN.

Hi everyone,

I have pretty new to PIX, and have been beating my head trying to get my VPN connection to my employer working again. My network consists of a single PC behind a PIX 501. The PIX gets it IP address via DHCP and is PAT configured. I use a Nortel Client app with RSA to connect. When I try, I get a message saying "Checking for banner text from:". This article describes this error and references opening AH and ESP on the outside interface. So far, I have not had any luck getting this resolved. I am familiar with Access Lists, but seem to be getting lost on the translation rules.

Can anyone point me in the right direction? I would appreciate it greatly!

Thanks, Michael

Nortel Document.

formatting link

Reply to
Loading thread data ...

upon executing the commands "debug crypto isakmp" and "debug crypto ipsec", I get nothing returned. Last night I did a "config factory-default" so all of the stuff I had been trying is gone.

This is a show config:

PIX Version 6.3(3)109 interface ethernet0 auto interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names pager lines 24 mtu outside 1500 mtu inside 1500 ip address outside dhcp setroute ip address inside ip audit info action alarm ip audit attack action alarm pdm location inside pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 0 0 timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225

1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local http server enable http inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable telnet inside telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd address inside dhcpd lease 3600 dhcpd ping_timeout 750 terminal width 80

Reply to


Drop us the output of

debug crypto isakmp debug crypto ipsec

We'll try to help you.


Reply to

show crypto isakmp sa


clear crypto isakmp sa

having the same debug in background + make sure you should have vpn traffic


Reply to

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.