remote access pix config


I have the following config below working perfectly on about 5 or 6 pix 506E's, however, on 2 others (same hardware, same FOS version)

I have heard people say that using same netblock for inside ip and the ip pool can cause problems, and suspect this could be the cause. Is there anything else wrong here I'm missing?

using cisco vpn client on mac os x, version 4.6.04, I can connect fine and ping machines, but nothing else. pix behaves as if the nat traversal line is missing.

Any help is appreciated.



PIX Version 6.3(4) interface ethernet0 auto interface ethernet1 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password XXXXXXXXXXXX encrypted passwd XXXXXXXXXXX encrypted hostname company-pix domain-name fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names access-list NONATREMOTE permit ip access-list splittunnelACL permit ip pager lines 24 mtu outside 1500 mtu inside 1500 ip address outside ip address inside ip audit info action alarm ip audit attack action alarm ip local pool remotepool pdm history enable arp timeout 14400 nat (inside) 0 access-list NONATREMOTE route outside 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec crypto ipsec transform-set mytrans esp-aes esp-sha-hmac crypto dynamic-map dynmap 10 set transform-set mytrans crypto map statmap 999 ipsec-isakmp dynamic dynmap crypto map statmap client configuration address initiate crypto map statmap client configuration address respond crypto map statmap client authentication LOCAL crypto map statmap interface outside isakmp enable outside isakmp nat-traversal 20 isakmp policy 10 authentication pre-share isakmp policy 10 encryption aes isakmp policy 10 hash sha isakmp policy 10 group 2 isakmp policy 10 lifetime 86400 vpngroup company address-pool remotepool vpngroup company dns-server vpngroup company default-domain vpngroup company split-tunnel splittunnelACL vpngroup company split-dns vpngroup company idle-time 600 vpngroup company password ******** vpngroup idle-time idle-time 1800 telnet timeout 5 management-access outside console timeout 0 terminal width 80 : end
Reply to
Loading thread data ... Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.