Jump to content

tobi_1985

Members
  • Gesamte Inhalte

    13
  • Registriert seit

  • Letzter Besuch

Alle erstellten Inhalte von tobi_1985

  1. Hi, danke für deinen Tipp mit der Site! Problem nur ich habe es fast so ähnlich wie auf der cisco site! Sonstige tipp´s
  2. Cisco Systems VPN Client Version 4.6.03.0021 Copyright © 1998-2005 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Programme\Cisco Systems\VPN Client\ 1 17:46:49.781 09/21/05 Sev=Info/4 CM/0x63100002 Begin connection process 2 17:46:49.828 09/21/05 Sev=Info/4 CVPND/0xE3400001 Microsoft IPSec Policy Agent service stopped successfully 3 17:46:49.828 09/21/05 Sev=Info/4 CM/0x63100004 Establish secure connection using Ethernet 4 17:46:49.828 09/21/05 Sev=Info/4 CM/0x63100024 Attempt connection with server "xxxxxxxxx" 5 17:46:50.109 09/21/05 Sev=Info/6 IKE/0x6300003B Attempting to establish a connection with 80.145.198.18. 6 17:46:50.171 09/21/05 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to xxxxxxxxx 7 17:46:50.187 09/21/05 Sev=Info/4 IPSEC/0x63700008 IPSec driver successfully started 8 17:46:50.187 09/21/05 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 9 17:46:55.640 09/21/05 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 10 17:46:55.640 09/21/05 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (Retransmission) to XXXXXX 11 17:47:00.640 09/21/05 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 12 17:47:00.640 09/21/05 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (Retransmission) to XXXXXXX 13 17:47:05.640 09/21/05 Sev=Info/4 IKE/0x63000021 Retransmitting last packet! 14 17:47:05.640 09/21/05 Sev=Info/4 IKE/0x63000013 SENDING >>> ISAKMP OAK AG (Retransmission) to XXXXXXXXXXXXXXXXXXXXXXXxx 15 17:47:10.640 09/21/05 Sev=Info/4 IKE/0x63000017 Marking IKE SA for deletion (I_Cookie=2FF8DFF4FDEE0544 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING 16 17:47:11.140 09/21/05 Sev=Info/4 IKE/0x6300004B Discarding IKE SA negotiation (I_Cookie=2FF8DFF4FDEE0544 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING 17 17:47:11.156 09/21/05 Sev=Info/4 CM/0x63100014 Unable to establish Phase 1 SA with server "xxxxx" because of "DEL_REASON_PEER_NOT_RESPONDING" 18 17:47:11.156 09/21/05 Sev=Info/5 CM/0x63100025 Initializing CVPNDrv 19 17:47:11.171 09/21/05 Sev=Info/4 IKE/0x63000001 IKE received signal to terminate VPN connection 20 17:47:11.187 09/21/05 Sev=Info/4 IKE/0x63000086 Microsoft IPSec Policy Agent service started successfully 21 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 22 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 23 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x63700014 Deleted all keys 24 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x6370000A IPSec driver successfully stopped habe alles auf high stehen, und siehe da...
  3. Cisco Systems VPN Client Version 4.6.03.0021 Copyright © 1998-2005 Cisco Systems, Inc. All Rights Reserved. Client Type(s): Windows, WinNT Running on: 5.1.2600 Service Pack 2 Config file directory: C:\Programme\Cisco Systems\VPN Client\ Hatte ich vorher schon an, hatte mich schon gewundert?! edit/ so es taucht das gleiche, bzw. es passiert weiterhin nichts. in der log steht auch nicht mehr drin!
  4. lol, habe den Fehler berichtigt... Beim VPN CLient sagt er Contacting the securtiy gateway xxx.xxx.xxx.xxx not connected Ist das schlimm das beim VPN Client bei Transprot IPSec/UDP steht? Funktioniert leider "noch" nicht!
  5. so habe es jetzt getestet, aber leider funktioniert es immer noch nicht, ich weis aber auch erlich gesagt nicht was ich in diesem cisco vpn client einrichten muss! Bitte nochmals um Hilfe! Bis jetzt stelle in im VPN client ein Connection entry ist ja egal bei description ist ja egal unter host die ip adresse unter authentication group authentication name "vpn" unter password das password Schon mal ein rechthezliches Dankeschön!
  6. Hi Jungs, @ Zodiac habe jetzt alles gemacht wie du es mir gesagt hast, aber leider funktioniert es immer noch nicht! Habe mmir den VPN client von cisco runtergeladen v. 4.6.03.0021 - ich teste es immer von meinen rechner aus, im prinzip schalte ich ein schleife! Bitte um Hilfe! PIX Version 6.3(3) interface ethernet0 auto interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password XXXXXXXXXXXXXXXXXXXXx encrypted passwd XXXXXXXXXXXXXXXXXXXXXXXXXXx encrypted hostname pixfirewall domain-name ciscopix.com fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names name 192.168.1.9 Tobias object-group service BitTorrent tcp description BitTorrent port-object range 6881 6889 port-object eq 6969 access-list 100 permit tcp any host Tobias object-group BitTorrent access-list 100 deny icmp any any echo-reply access-list 100 deny icmp any any unreachable access-list 100 deny icmp any any time-exceeded access-list 100 deny icmp any any traceroute access-list outside_access_in permit tcp any interface outside eq 6881 access-list 80 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 pager lines 24 logging on mtu outside 1500 mtu inside 1500 ip address outside pppoe setroute ip address inside 192.168.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool vpn_ip_pool 192.168.2.1-192.168.2.10 pdm location Tobias 255.255.255.255 inside pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list 80 nat (inside) 1 192.168.1.0 255.255.255.0 0 0 static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0 static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0 access-group outside_access_in in interface outside timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable crypto ipsec transform-set strong-des esp-3des esp-sha-hmac crypto dynamic-map vpn-dyn-map 1 set transform-set strong-des crypto map vpn-map 20 ipsec-isakmp dynamic vpn-dyn-map crypto map vpn-map interface outside isakmp key xxxxxxxxxxxxxxxxx address 0.0.0.0 netmask 0.0.0.0 isakmp policy 8 authentication pre-share isakmp policy 8 encryption 3des isakmp policy 8 hash md5 isakmp policy 8 group 2 isakmp policy 8 lifetime 86400 vpngroup vpn address-pool vpn_ip_pool vpngroup vpn idle-time 1800 vpngroup vpn password xxxxxxxxxx vpngroup bittz dns-server 194.25.2.129 vpngroup bittz split-tunnel 80 vpngroup bittz idle-time 1800 telnet 192.168.1.0 255.255.255.0 inside telnet timeout 5 ssh timeout 5 console timeout 0 vpdn group pppoe_group request dialout pppoe vpdn group pppoe_group localname xxxx@t-online.de vpdn group pppoe_group ppp authentication pap vpdn username xxxxxxxxxxxxxxx@t-online.de password xxxxxxx dhcpd address 192.168.1.100-192.168.1.130 inside dhcpd dns 194.25.2.129 dhcpd lease 3600 dhcpd ping_timeout 750 dhcpd auto_config outside username tobi password xxxxxxxx/ encrypted privilege 15 terminal width 80 pixfirewall(config)#
  7. Building configuration... : Saved : PIX Version 6.3(3) interface ethernet0 auto interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password ***** encrypted passwd ***** encrypted hostname pixfirewall domain-name ciscopix.com fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names name 192.168.1.9 Tobias object-group service BitTorrent tcp description BitTorrent port-object range 6881 6889 port-object eq 6969 access-list 100 permit tcp any host Tobias object-group BitTorrent access-list 100 deny icmp any any echo-reply access-list 100 deny icmp any any unreachable access-list 100 deny icmp any any time-exceeded access-list 100 deny icmp any any traceroute access-list outside_access_in permit tcp any interface outside eq 6881 access-list 80 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 pager lines 24 logging on mtu outside 1500 mtu inside 1500 ip address outside pppoe setroute ip address inside 192.168.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool vpn_ip_pool 192.168.2.1-192.168.2.10 pdm location Tobias 255.255.255.255 inside pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list 80 nat (inside) 1 192.168.1.0 255.255.255.0 0 0 static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0 static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0 access-group outside_access_in in interface outside timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local http server enable http 192.168.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec crypto ipsec transform-set strong-des esp-3des esp-sha-hmac crypto dynamic-map vpn-dyn-map 1 set transform-set strong-des crypto map vpn-map 20 ipsec-isakmp dynamic vpn-dyn-map crypto map vpn-map interface outside isakmp enable outside isakmp key ******** address 0.0.0.0 netmask 0.0.0.0 isakmp policy 8 authentication pre-share isakmp policy 8 encryption 3des isakmp policy 8 hash md5 isakmp policy 8 group 2 isakmp policy 8 lifetime 86400 vpngroup vpn address-pool vpn_ip_pool vpngroup vpn idle-time 1800 vpngroup superteam dns-server 194.25.2.129 vpngroup superteam split-tunnel 80 vpngroup superteam idle-time 1800 telnet 192.168.1.0 255.255.255.0 inside telnet timeout 5 ssh timeout 5 console timeout 0 vpdn group pppoe_group request dialout pppoe vpdn group pppoe_group localname ****@t-online.de vpdn group pppoe_group ppp authentication pap vpdn username ****@t-online.de password ********* dhcpd address 192.168.1.100-192.168.1.130 inside dhcpd dns 194.25.2.129 dhcpd lease 3600 dhcpd ping_timeout 750 dhcpd auto_config outside username tobi password ****/ encrypted privilege 15 terminal width 80 Cryptochecksum:lalalala : end [OK]
  8. Danke für die zügige Antwort! ;) :D :p So ich habe ein paar fragen dazu isakmp key cisco1234 address 0.0.0.0 netmask 0.0.0.0 "cisco1234" ist das Passwort? Und was ist der Benutzername? :( Habe es erstmal soweit wie du gesag hast gemacht bekomme nur Fehler 8000 (Benutze den VPN Client von Microsoft) VPN Server ist eventuell nicht erreichbar oder die Sicherheitsparameter sind für diese Verbindung nicht korrekt konfiguriert. Mag wahrscheinlich daran liegen, das ich den falschen Benutzername eingebe. Oder ich habe Falsche Einstellungen im Client getroffen.. Bei mir im Netz habe ich einen Server stehen (192.168.1.XXX) und wenn ich mich mit vpn einwähle bekomme ich ja eine IP aus dem Pool 192.168.2.XX! Kann ich dann auf den Server drauf zu greifen? Wenn ihr mir noch mal helfen könnt?! Gruss Tobias PS: Mein conf zurzeit
  9. Möchte VPN nutzen, damit wenn ich wo anders bin auf einen Server in meinem Netz drauf zu greifen kann, sprich über einen VPN Client von Microsoft. Mit dem Befehl: static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0 static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0 leite ich die ports 6881 udp und tcp auf die Adresse von meinem Rechner 192.168.1.9 (richtig?)!
  10. Hi ich brauche wieder einmal Hilfe! Habe eine Cisco PIX 501 üder einen ADSL Anschluss angebunden. Nun möchte ich mich an VPN rantrauen. Könnt ihr mir sagen wie ich das einrichte, über die Suchfunktion habe ich nichts gefunden. Poste schonmal meine Config PIX Version 6.3(3) interface ethernet0 auto interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password ******** encrypted passwd ******* encrypted hostname pixfirewall domain-name ciscopix.com fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names name 192.168.1.9 Tobias object-group service BitTorrent tcp description BitTorrent port-object range 6881 6889 port-object eq 6969 access-list 100 permit tcp any host Tobias object-group BitTorrent access-list 100 permit icmp any any echo-reply access-list 100 permit icmp any any unreachable access-list 100 permit icmp any any time-exceeded access-list 100 permit icmp any any traceroute access-list outside_access_in permit tcp any interface outside eq 6881 pager lines 24 logging on mtu outside 1500 mtu inside 1500 ip address outside pppoe setroute ip address inside 192.168.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 192.168.1.0 255.255.255.0 0 0 static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0 static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0 access-group outside_access_in in interface outside timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local http server enable http 192.168.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable telnet 192.168.1.0 255.255.255.0 inside telnet timeout 5 ssh timeout 5 console timeout 0 vpdn group pppoe_group request dialout pppoe vpdn group pppoe_group localname ******@t-online.de vpdn group pppoe_group ppp authentication pap vpdn username ***************@t-online.de password ********* dhcpd address 192.168.1.100-192.168.1.130 inside dhcpd dns 194.25.2.129 dhcpd lease 3600 dhcpd ping_timeout 750 dhcpd auto_config outside terminal width 80 : end [OK]
  11. wenn ich das versuche geht das nicht wirklich! Kannst du mir den genauen Wortlaut sagen?
  12. Ich möchte die Ports von 6881 bis 6889 und port nummer 6969 weiterleiten auf die interne IP 192.168.1.9!!! Diese Ports brauche ich um bei bittorrent keine "low id" zu bekommen, ähnlich wie bei emule etc... :p eine Access - list ist schon drin! Habe auch schon etwas probiert (siehe Config) aber funktionieren tut es nicht! Gruß Tobi
  13. Hi, ich bin neu hier! Habe folgendes Probelm, ich möchte bei meiner PIX 501 ports für Bittorrent freischalten, nur ich weiß nicht wie das geht! Habe schon in der Suchfunktion nachgeschaut aber ich habe das nicht so richtig verstanden!!! :suspect: :suspect: :suspect: Meine Config.. pixfirewall# sh conf : Saved : Written by enable_15 at 14:07:14.090 UTC Wed Jan 19 2005 PIX Version 6.3(3) interface ethernet0 auto interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password xxxxxxxxxxxxxx encrypted passwd xxxxxxxxxxxxxxxx encrypted hostname pixfirewall domain-name ciscopix.com fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names object-group service Bit_Torrent tcp port-object eq 6969 port-object range 6881 6889 access-list outside_access_in permit tcp interface outside object-group Bit_Torrent host 192.168.1.9 object-group Bit_Torrent pager lines 24 logging on mtu outside 1500 mtu inside 1500 ip address outside pppoe setroute ip address inside 192.168.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm pdm location xx.xx.xx.xx 255.255.255.255 outside pdm location xx.xx.xx.xx 255.255.255.255 outside pdm location xx.xx.xx.xx 255.255.255.255 outside pdm location xx.xx.xx.xx 255.255.255.255 outside pdm location xx.xx.xx.xx 255.255.255.255 outside pdm location xx.xx.xx.xx 255.255.255.255 outside pdm location xx.xx.xx.xx 255.255.255.255 inside pdm location xx.xx.xx.xx 255.255.255.255 outside pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 192.168.1.0 255.255.255.0 0 0 static (inside,outside) tcp interface 6881 192.168.1.9 6881 netmask 255.255.255.255 0 0 static (inside,outside) tcp interface 6882 192.168.1.9 6882 netmask 255.255.255.255 0 0 static (inside,outside) tcp interface 6883 192.168.1.9 6883 netmask 255.255.255.255 0 0 static (inside,outside) tcp interface 6884 192.168.1.9 6884 netmask 255.255.255.255 0 0 static (inside,outside) tcp interface 6885 192.168.1.9 6885 netmask 255.255.255.255 0 0 static (inside,outside) tcp interface 6886 192.168.1.9 6886 netmask 255.255.255.255 0 0 static (inside,outside) tcp interface 6887 192.168.1.9 6887 netmask 255.255.255.255 0 0 static (inside,outside) tcp interface 6888 192.168.1.9 6888 netmask 255.255.255.255 0 0 static (inside,outside) tcp interface 6889 192.168.1.9 6889 netmask 255.255.255.255 0 0 static (inside,outside) tcp interface 6969 192.168.1.9 6969 netmask 255.255.255.255 0 0 access-group outside_access_in in interface outside timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local http server enable http 192.168.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable telnet 192.168.1.0 255.255.255.0 inside telnet timeout 5 ssh timeout 5 console timeout 0 bitte um hilfe.... thx :suspect:
×
×
  • Neu erstellen...