tobi_1985
-
Gesamte Inhalte
13 -
Registriert seit
-
Letzter Besuch
Beiträge erstellt von tobi_1985
-
-
Cisco Systems VPN Client Version 4.6.03.0021
Copyright © 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2
Config file directory: C:\Programme\Cisco Systems\VPN Client\
1 17:46:49.781 09/21/05 Sev=Info/4 CM/0x63100002
Begin connection process
2 17:46:49.828 09/21/05 Sev=Info/4 CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully
3 17:46:49.828 09/21/05 Sev=Info/4 CM/0x63100004
Establish secure connection using Ethernet
4 17:46:49.828 09/21/05 Sev=Info/4 CM/0x63100024
Attempt connection with server "xxxxxxxxx"
5 17:46:50.109 09/21/05 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 80.145.198.18.
6 17:46:50.171 09/21/05 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to xxxxxxxxx
7 17:46:50.187 09/21/05 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
8 17:46:50.187 09/21/05 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
9 17:46:55.640 09/21/05 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
10 17:46:55.640 09/21/05 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to XXXXXX
11 17:47:00.640 09/21/05 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
12 17:47:00.640 09/21/05 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to XXXXXXX
13 17:47:05.640 09/21/05 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
14 17:47:05.640 09/21/05 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to XXXXXXXXXXXXXXXXXXXXXXXxx
15 17:47:10.640 09/21/05 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=2FF8DFF4FDEE0544 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
16 17:47:11.140 09/21/05 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=2FF8DFF4FDEE0544 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING
17 17:47:11.156 09/21/05 Sev=Info/4 CM/0x63100014
Unable to establish Phase 1 SA with server "xxxxx" because of "DEL_REASON_PEER_NOT_RESPONDING"
18 17:47:11.156 09/21/05 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
19 17:47:11.171 09/21/05 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
20 17:47:11.187 09/21/05 Sev=Info/4 IKE/0x63000086
Microsoft IPSec Policy Agent service started successfully
21 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
22 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
23 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
24 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped
habe alles auf high stehen, und siehe da...
-
Cisco Systems VPN Client Version 4.6.03.0021
Copyright © 1998-2005 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 2
Config file directory: C:\Programme\Cisco Systems\VPN Client\
Hatte ich vorher schon an, hatte mich schon gewundert?!
edit/
so es taucht das gleiche, bzw. es passiert weiterhin nichts. in der log steht auch nicht mehr drin!
-
lol, habe den Fehler berichtigt...
Beim VPN CLient sagt er
Contacting the securtiy gateway xxx.xxx.xxx.xxx
not connected
Ist das schlimm das beim VPN Client bei Transprot IPSec/UDP steht?
Funktioniert leider "noch" nicht!
-
so habe es jetzt getestet, aber leider funktioniert es immer noch nicht, ich weis aber auch erlich gesagt nicht was ich in diesem cisco vpn client einrichten muss!
Bitte nochmals um Hilfe!
Bis jetzt stelle in im VPN client ein Connection entry ist ja egal
bei description ist ja egal
unter host die ip adresse
unter authentication
group authentication
name "vpn"
unter password das password
Schon mal ein rechthezliches Dankeschön!
-
Hi Jungs,
@ Zodiac habe jetzt alles gemacht wie du es mir gesagt hast, aber leider funktioniert es immer noch nicht! Habe mmir den VPN client von cisco runtergeladen v. 4.6.03.0021 - ich teste es immer von meinen rechner aus, im prinzip schalte ich ein schleife! Bitte um Hilfe!
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password XXXXXXXXXXXXXXXXXXXXx encrypted
passwd XXXXXXXXXXXXXXXXXXXXXXXXXXx encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 192.168.1.9 Tobias
object-group service BitTorrent tcp
description BitTorrent
port-object range 6881 6889
port-object eq 6969
access-list 100 permit tcp any host Tobias object-group BitTorrent
access-list 100 deny icmp any any echo-reply
access-list 100 deny icmp any any unreachable
access-list 100 deny icmp any any time-exceeded
access-list 100 deny icmp any any traceroute
access-list outside_access_in permit tcp any interface outside eq 6881
access-list 80 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
pager lines 24
logging on
mtu outside 1500
mtu inside 1500
ip address outside pppoe setroute
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool vpn_ip_pool 192.168.2.1-192.168.2.10
pdm location Tobias 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list 80
nat (inside) 1 192.168.1.0 255.255.255.0 0 0
static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0
static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
crypto ipsec transform-set strong-des esp-3des esp-sha-hmac
crypto dynamic-map vpn-dyn-map 1 set transform-set strong-des
crypto map vpn-map 20 ipsec-isakmp dynamic vpn-dyn-map
crypto map vpn-map interface outside
isakmp key xxxxxxxxxxxxxxxxx address 0.0.0.0 netmask 0.0.0.0
isakmp policy 8 authentication pre-share
isakmp policy 8 encryption 3des
isakmp policy 8 hash md5
isakmp policy 8 group 2
isakmp policy 8 lifetime 86400
vpngroup vpn address-pool vpn_ip_pool
vpngroup vpn idle-time 1800
vpngroup vpn password xxxxxxxxxx
vpngroup bittz dns-server 194.25.2.129
vpngroup bittz split-tunnel 80
vpngroup bittz idle-time 1800
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn group pppoe_group request dialout pppoe
vpdn group pppoe_group localname xxxx@t-online.de
vpdn group pppoe_group ppp authentication pap
vpdn username xxxxxxxxxxxxxxx@t-online.de password xxxxxxx
dhcpd address 192.168.1.100-192.168.1.130 inside
dhcpd dns 194.25.2.129
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
username tobi password xxxxxxxx/ encrypted privilege 15
terminal width 80
pixfirewall(config)#
-
Building configuration...
: Saved
:
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ***** encrypted
passwd ***** encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 192.168.1.9 Tobias
object-group service BitTorrent tcp
description BitTorrent
port-object range 6881 6889
port-object eq 6969
access-list 100 permit tcp any host Tobias object-group BitTorrent
access-list 100 deny icmp any any echo-reply
access-list 100 deny icmp any any unreachable
access-list 100 deny icmp any any time-exceeded
access-list 100 deny icmp any any traceroute
access-list outside_access_in permit tcp any interface outside eq 6881
access-list 80 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
pager lines 24
logging on
mtu outside 1500
mtu inside 1500
ip address outside pppoe setroute
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool vpn_ip_pool 192.168.2.1-192.168.2.10
pdm location Tobias 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list 80
nat (inside) 1 192.168.1.0 255.255.255.0 0 0
static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0
static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set strong-des esp-3des esp-sha-hmac
crypto dynamic-map vpn-dyn-map 1 set transform-set strong-des
crypto map vpn-map 20 ipsec-isakmp dynamic vpn-dyn-map
crypto map vpn-map interface outside
isakmp enable outside
isakmp key ******** address 0.0.0.0 netmask 0.0.0.0
isakmp policy 8 authentication pre-share
isakmp policy 8 encryption 3des
isakmp policy 8 hash md5
isakmp policy 8 group 2
isakmp policy 8 lifetime 86400
vpngroup vpn address-pool vpn_ip_pool
vpngroup vpn idle-time 1800
vpngroup superteam dns-server 194.25.2.129
vpngroup superteam split-tunnel 80
vpngroup superteam idle-time 1800
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn group pppoe_group request dialout pppoe
vpdn group pppoe_group localname ****@t-online.de
vpdn group pppoe_group ppp authentication pap
vpdn username ****@t-online.de password *********
dhcpd address 192.168.1.100-192.168.1.130 inside
dhcpd dns 194.25.2.129
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
username tobi password ****/ encrypted privilege 15
terminal width 80
Cryptochecksum:lalalala
: end
[OK]
-
Danke für die zügige Antwort! ;) :D :p
So ich habe ein paar fragen dazu
isakmp key cisco1234 address 0.0.0.0 netmask 0.0.0.0
"cisco1234" ist das Passwort? Und was ist der Benutzername? :(
Habe es erstmal soweit wie du gesag hast gemacht bekomme nur Fehler 8000 (Benutze den VPN Client von Microsoft)
VPN Server ist eventuell nicht erreichbar oder die Sicherheitsparameter sind für diese Verbindung nicht korrekt konfiguriert.
Mag wahrscheinlich daran liegen, das ich den falschen Benutzername eingebe.
Oder ich habe Falsche Einstellungen im Client getroffen..
Bei mir im Netz habe ich einen Server stehen (192.168.1.XXX) und wenn ich mich mit vpn einwähle bekomme ich ja eine IP aus dem Pool 192.168.2.XX! Kann ich dann auf den Server drauf zu greifen?
Wenn ihr mir noch mal helfen könnt?!
Gruss Tobias
PS: Mein conf zurzeit
-
Möchte VPN nutzen, damit wenn ich wo anders bin auf einen Server in meinem Netz drauf zu greifen kann, sprich über einen VPN Client von Microsoft.
Mit dem Befehl:
static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0
static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0
leite ich die ports 6881 udp und tcp auf die Adresse von meinem Rechner 192.168.1.9 (richtig?)!
-
Hi ich brauche wieder einmal Hilfe!
Habe eine Cisco PIX 501 üder einen ADSL Anschluss angebunden.
Nun möchte ich mich an VPN rantrauen.
Könnt ihr mir sagen wie ich das einrichte, über die Suchfunktion habe ich nichts gefunden.
Poste schonmal meine Config
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ******** encrypted
passwd ******* encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 192.168.1.9 Tobias
object-group service BitTorrent tcp
description BitTorrent
port-object range 6881 6889
port-object eq 6969
access-list 100 permit tcp any host Tobias object-group BitTorrent
access-list 100 permit icmp any any echo-reply
access-list 100 permit icmp any any unreachable
access-list 100 permit icmp any any time-exceeded
access-list 100 permit icmp any any traceroute
access-list outside_access_in permit tcp any interface outside eq 6881
pager lines 24
logging on
mtu outside 1500
mtu inside 1500
ip address outside pppoe setroute
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 192.168.1.0 255.255.255.0 0 0
static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0
static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn group pppoe_group request dialout pppoe
vpdn group pppoe_group localname ******@t-online.de
vpdn group pppoe_group ppp authentication pap
vpdn username ***************@t-online.de password *********
dhcpd address 192.168.1.100-192.168.1.130 inside
dhcpd dns 194.25.2.129
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
terminal width 80
: end
[OK]
-
wenn ich das versuche geht das nicht wirklich! Kannst du mir den genauen Wortlaut sagen?
-
Ich möchte die Ports von 6881 bis 6889 und port nummer 6969 weiterleiten auf die interne IP 192.168.1.9!!! Diese Ports brauche ich um bei bittorrent keine "low id" zu bekommen, ähnlich wie bei emule etc... :p eine Access - list ist schon drin! Habe auch schon etwas probiert (siehe Config) aber funktionieren tut es nicht!
Gruß Tobi
-
Hi,
ich bin neu hier! Habe folgendes Probelm, ich möchte bei meiner PIX 501 ports für Bittorrent freischalten, nur ich weiß nicht wie das geht!
Habe schon in der Suchfunktion nachgeschaut aber ich habe das nicht so richtig verstanden!!! :suspect: :suspect: :suspect:
Meine Config..
pixfirewall# sh conf
: Saved
: Written by enable_15 at 14:07:14.090 UTC Wed Jan 19 2005
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxxxxxxxxxxxxx encrypted
passwd xxxxxxxxxxxxxxxx encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
object-group service Bit_Torrent tcp
port-object eq 6969
port-object range 6881 6889
access-list outside_access_in permit tcp interface outside object-group Bit_Torrent host 192.168.1.9 object-group Bit_Torrent
pager lines 24
logging on
mtu outside 1500
mtu inside 1500
ip address outside pppoe setroute
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location xx.xx.xx.xx 255.255.255.255 outside
pdm location xx.xx.xx.xx 255.255.255.255 outside
pdm location xx.xx.xx.xx 255.255.255.255 outside
pdm location xx.xx.xx.xx 255.255.255.255 outside
pdm location xx.xx.xx.xx 255.255.255.255 outside
pdm location xx.xx.xx.xx 255.255.255.255 outside
pdm location xx.xx.xx.xx 255.255.255.255 inside
pdm location xx.xx.xx.xx 255.255.255.255 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 192.168.1.0 255.255.255.0 0 0
static (inside,outside) tcp interface 6881 192.168.1.9 6881 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 6882 192.168.1.9 6882 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 6883 192.168.1.9 6883 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 6884 192.168.1.9 6884 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 6885 192.168.1.9 6885 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 6886 192.168.1.9 6886 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 6887 192.168.1.9 6887 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 6888 192.168.1.9 6888 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 6889 192.168.1.9 6889 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 6969 192.168.1.9 6969 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
bitte um hilfe.... thx :suspect:
Cisco PIX 501 VPN einrichten
in Cisco Forum — Allgemein
Geschrieben
Hi, danke für deinen Tipp mit der Site! Problem nur ich habe es fast so ähnlich wie auf der cisco site! Sonstige tipp´s