Remote access vpn using PPTP

Hi,

I have a PIX 515e version 6.3 (5).The PIX is front end firewall with the ISA2004 connected to the inside interface of the PIX. However,

I want to use the ISA as VPN server. Thus, I need the PIX to allow the

VPN traffic through to the ISA Server so that it can authenticate and created the tunnel.

Refer attached pix config and setup diagram.Here is my config Internet

- PIX - ISA Server - LAN (DHCP,AD,Exchange 2003) PIX external: x.x.x.166 PIX Internal

172.17.0.2 ISA external: 172.17.0.1 ISA Internal 172.16.0.253 Pls provide steps to allow the PIX to pass the vpn traffic to ISA. The DHCP in inside network of ISA will allocate IP for Remote VPN clients

PPTP is enabled on ISA 2004 and MSCHAP-2 as authentication

Without PIX firewall, remote access VPN using pptp worked fine.

Building configuration... : Saved : PIX Version 6.3(5) interface ethernet0 auto interface ethernet1 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password ************* encrypted passwd ************* encrypted hostname pixfirewall domain-name ciscopix.com clock timezone BNT 8 fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol pptp 1723 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names access-list inside_access_in permit tcp 172.17.0.0 255.255.0.0 any eq www access-list inside_access_in permit tcp 172.17.0.0 255.255.0.0 any eq https access-list inside_access_in permit udp 172.17.0.0 255.255.0.0 any eq domain access-list inside_access_in permit tcp 172.17.0.0 255.255.0.0 any eq ftp access-list inside_access_in permit tcp 172.17.0.0 255.255.0.0 any eq smtp access-list inside_access_in permit tcp 172.17.0.0 255.255.0.0 any eq pop3 access-list outside_access_in permit udp any eq domain any access-list inside_outbound_nat0_acl permit ip any 172.17.0.0

255.255.255.0 pager lines 24 logging on mtu outside 1500 mtu inside 1500 ip address outside 202.93.208.45 255.255.255.128 ip address inside 172.17.0.2 255.255.0.0 ip audit info action alarm ip audit attack action alarm ip local pool remote-vpn-clients 172.17.0.100-172.17.0.200 no failover failover timeout 0:00:00 failover poll 15 no failover ip address outside no failover ip address inside pdm location 172.17.0.0 255.255.0.0 inside pdm location 172.17.0.0 255.255.252.0 outside pdm location 172.17.0.0 255.255.255.0 outside pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 10 interface nat (inside) 0 access-list inside_outbound_nat0_acl nat (inside) 10 0.0.0.0 0.0.0.0 0 0 access-group outside_access_in in interface outside access-group inside_access_in in interface inside route outside 0.0.0.0 0.0.0.0 202.93.208.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout sip-disconnect 0:02:00 sip-invite 0:03:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local http server enable http 172.17.0.0 255.255.0.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-pptp telnet timeout 5 ssh timeout 5 console timeout 0 vpdn group PPTP-VPDN-GROUP accept dialin pptp vpdn group PPTP-VPDN-GROUP ppp authentication mschap vpdn group PPTP-VPDN-GROUP ppp encryption mppe 40 vpdn group PPTP-VPDN-GROUP client configuration address local remote-vpn-clients vpdn group PPTP-VPDN-GROUP client configuration dns 172.16.0.1 202.160.8.2 vpdn group PPTP-VPDN-GROUP pptp echo 60 vpdn group PPTP-VPDN-GROUP client authentication local vpdn username administrator password ********* vpdn username mohtest password ********* vpdn enable outside dhcpd lease 3600 dhcpd ping_timeout 750 terminal width 80 Cryptochecksum:349c039c3609522f4ea26172cb7faa9e : end [OK]

Regards,

Prashanth

Reply to
Puchu
Loading thread data ...

asking this again?

not a good idea to post your public IP and firewall config.

the vpn clients will connect to 202.93.208.166.

add these lines: access-list outside_access_in permit gre any host 202.93.208.166 access-list outside_access_in permit udp any host 202.93.208.166 eq 1723

fixup protocol pptp 1723

no sysopt connection permit-pptp

static (inside,outside) 202.93.208.166 172.17.0.1

Reply to
uNiXpSyChO

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.