Recently at work I was handed an old Cisco PIX 501 and was told to get a VPN working with our PIX 515 for a remote office location. The 501 had been set up for a VPN 3 years ago with the 515 so I thought that this would be easy, as the config information on both ends has not changed. Obivously, I was mistaken and no matter what I try I cannot get the VPN tunnel to work. Any help would be greatly appreciated. I'm sorry if this is long winded but here are the configs for the 501 and 515:
PIX 501 PIX Version 6.3(3) interface ethernet0 10baset interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password *** encrypted passwd *** encrypted hostname example501 domain-name example.net fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 access-list example permit ip 10.10.20.0 255.255.255.0 10.10.10.0
255.255.255.0 access-list acl_out permit icmp any any pager lines 24 logging on logging timestamp logging buffered warnings mtu outside 1500 mtu inside 1500 ip address outside dhcp setroute ip address inside 10.10.20.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list example nat (inside) 1 0.0.0.0 0.0.0.0 0 0 access-group acl_out in interface outside timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server LOCAL protocol local http server enable http 10.10.10.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec crypto ipsec transform-set exampledyn esp-3des esp-md5-hmac crypto map example 10 ipsec-isakmp crypto map example 10 match address example crypto map example 10 set peer #.#.#.162 crypto map example 10 set transform-set exampledyn crypto map example interface outside isakmp enable outside isakmp key *** address #.#.#.162 netmask 255.255.255.255 no-xauth no-co nfig-mode isakmp policy 10 authentication pre-share isakmp policy 10 encryption des isakmp policy 10 hash md5 isakmp policy 10 group 1 isakmp policy 10 lifetime 86400 telnet 10.10.20.0 255.255.255.0 inside telnet 10.10.10.0 255.255.255.0 inside telnet timeout 5 ssh 10.10.10.0 255.255.255.0 inside ssh 10.10.20.0 255.255.255.0 inside ssh timeout 60 console timeout 0 dhcpd address 10.10.20.100-10.10.20.131 inside dhcpd dns 10.10.10.3 10.10.10.6 dhcpd lease 86400 dhcpd ping_timeout 750 dhcpd domain example.net dhcpd auto_config outside dhcpd enable inside terminal width 80 Cryptochecksum:***-------------------------------------------
PIX 515 PIX Version 6.3(4) interface ethernet0 auto interface ethernet1 auto interface ethernet2 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif ethernet2 dmz security50 enable password *** encrypted passwd *** encrypted hostname example515 domain-name example.net clock timezone EST -5 clock summer-time EDT recurring fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 no fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names access-list vpn permit ip 10.10.10.0 255.255.255.0 10.10.20.0
255.255.255.0 access-list vpn permit ip 10.10.10.0 255.255.255.0 10.10.30.0 255.255.255.0 access-list vpn permit ip 10.10.10.0 255.255.255.0 10.10.40.0 255.255.255.0 access-list acl_out permit icmp any any access-list acl_out permit tcp any host #.#.#.163 eq ftp access-list acl_out permit tcp any host #.#.#.163 eq ftp-data access-list acl_out permit tcp any host #.#.#.163 eq www access-list acl_out permit tcp any host #.#.#.163 eq smtp access-list acl_out permit tcp any host #.#.#.163 eq pop3 access-list acl_out permit tcp any host #.#.#.163 range 5500 5700 pager lines 24 logging on logging timestamp logging buffered debugging mtu outside 1500 mtu inside 1500 mtu dmz 1500 ip address outside #.#.#.162 255.255.255.248 ip address inside 10.10.10.10 255.255.255.0 ip address dmz 10.10.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool vpnpool 10.10.30.1-10.10.30.254 ip local pool vpnpool1 10.10.40.1-10.10.40.254 pdm location 10.10.10.0 255.255.255.0 inside pdm logging warnings 200 pdm history enable arp timeout 14400 global (outside) 1 #.#.#.164-#.#.#.165 global (outside) 1 #.#.#.166 netmask 255.255.255.248 global (dmz) 1 10.10.1.50-10.10.1.100 netmask 255.255.255.0 nat (inside) 0 access-list vpn nat (inside) 1 0.0.0.0 0.0.0.0 0 0 nat (dmz) 1 10.10.1.0 255.255.255.0 0 0 static (dmz,outside) #.#.#.163 10.10.1.25 netmask 255.255.255.255 0 0 access-group acl_out in interface outside route outside 0.0.0.0 0.0.0.0 #.#.#.161 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local http server enable http 10.10.10.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec crypto ipsec transform-set exampledyn esp-3des esp-md5-hmac crypto dynamic-map cisco 1 set transform-set exampledyn crypto map example 10 ipsec-isakmp dynamic cisco crypto map example interface outside isakmp enable outside isakmp key *** address 0.0.0.0 netmask 0.0.0.0 no-xauth no-config-mode isakmp identity address isakmp policy 1 authentication pre-share isakmp policy 1 encryption des isakmp policy 1 hash md5 isakmp policy 1 group 1 isakmp policy 1 lifetime 86400 isakmp policy 20 authentication pre-share isakmp policy 20 encryption 3des isakmp policy 20 hash md5 isakmp policy 20 group 2 isakmp policy 20 lifetime 86400 vpngroup examplevpn address-pool vpnpool vpngroup examplevpn dns-server 10.10.10.19 10.10.10.6 vpngroup examplevpn wins-server 10.10.10.19 vpngroup examplevpn default-domain example.net vpngroup examplevpn idle-time 1800 vpngroup examplevpn password *** vpngroup examplenet address-pool vpnpool vpngroup examplenet dns-server 10.10.10.19 10.10.10.6 vpngroup examplenet wins-server 10.10.10.19 vpngroup examplenet default-domain example.net vpngroup examplenet idle-time 1800 vpngroup examplenet password *** telnet 10.10.10.0 255.255.255.0 inside telnet timeout 5 ssh 10.10.10.0 255.255.255.0 inside ssh timeout 60 console timeout 0 terminal width 80 Cryptochecksum:***