Jump to content

tobi_1985

Members
  • Gesamte Inhalte

    13
  • Registriert seit

  • Letzter Besuch

Beiträge erstellt von tobi_1985

  1. Cisco Systems VPN Client Version 4.6.03.0021

    Copyright © 1998-2005 Cisco Systems, Inc. All Rights Reserved.

    Client Type(s): Windows, WinNT

    Running on: 5.1.2600 Service Pack 2

    Config file directory: C:\Programme\Cisco Systems\VPN Client\

     

    1 17:46:49.781 09/21/05 Sev=Info/4 CM/0x63100002

    Begin connection process

     

    2 17:46:49.828 09/21/05 Sev=Info/4 CVPND/0xE3400001

    Microsoft IPSec Policy Agent service stopped successfully

     

    3 17:46:49.828 09/21/05 Sev=Info/4 CM/0x63100004

    Establish secure connection using Ethernet

     

    4 17:46:49.828 09/21/05 Sev=Info/4 CM/0x63100024

    Attempt connection with server "xxxxxxxxx"

     

    5 17:46:50.109 09/21/05 Sev=Info/6 IKE/0x6300003B

    Attempting to establish a connection with 80.145.198.18.

     

    6 17:46:50.171 09/21/05 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Nat-T), VID(Frag), VID(Unity)) to xxxxxxxxx

     

    7 17:46:50.187 09/21/05 Sev=Info/4 IPSEC/0x63700008

    IPSec driver successfully started

     

    8 17:46:50.187 09/21/05 Sev=Info/4 IPSEC/0x63700014

    Deleted all keys

     

    9 17:46:55.640 09/21/05 Sev=Info/4 IKE/0x63000021

    Retransmitting last packet!

     

    10 17:46:55.640 09/21/05 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK AG (Retransmission) to XXXXXX

     

    11 17:47:00.640 09/21/05 Sev=Info/4 IKE/0x63000021

    Retransmitting last packet!

     

    12 17:47:00.640 09/21/05 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK AG (Retransmission) to XXXXXXX

     

    13 17:47:05.640 09/21/05 Sev=Info/4 IKE/0x63000021

    Retransmitting last packet!

     

    14 17:47:05.640 09/21/05 Sev=Info/4 IKE/0x63000013

    SENDING >>> ISAKMP OAK AG (Retransmission) to XXXXXXXXXXXXXXXXXXXXXXXxx

     

    15 17:47:10.640 09/21/05 Sev=Info/4 IKE/0x63000017

    Marking IKE SA for deletion (I_Cookie=2FF8DFF4FDEE0544 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

     

    16 17:47:11.140 09/21/05 Sev=Info/4 IKE/0x6300004B

    Discarding IKE SA negotiation (I_Cookie=2FF8DFF4FDEE0544 R_Cookie=0000000000000000) reason = DEL_REASON_PEER_NOT_RESPONDING

     

    17 17:47:11.156 09/21/05 Sev=Info/4 CM/0x63100014

    Unable to establish Phase 1 SA with server "xxxxx" because of "DEL_REASON_PEER_NOT_RESPONDING"

     

    18 17:47:11.156 09/21/05 Sev=Info/5 CM/0x63100025

    Initializing CVPNDrv

     

    19 17:47:11.171 09/21/05 Sev=Info/4 IKE/0x63000001

    IKE received signal to terminate VPN connection

     

    20 17:47:11.187 09/21/05 Sev=Info/4 IKE/0x63000086

    Microsoft IPSec Policy Agent service started successfully

     

    21 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x63700014

    Deleted all keys

     

    22 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x63700014

    Deleted all keys

     

    23 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x63700014

    Deleted all keys

     

    24 17:47:11.187 09/21/05 Sev=Info/4 IPSEC/0x6370000A

    IPSec driver successfully stopped

     

     

     

    habe alles auf high stehen, und siehe da...

  2. Cisco Systems VPN Client Version 4.6.03.0021

    Copyright © 1998-2005 Cisco Systems, Inc. All Rights Reserved.

    Client Type(s): Windows, WinNT

    Running on: 5.1.2600 Service Pack 2

    Config file directory: C:\Programme\Cisco Systems\VPN Client\

     

    Hatte ich vorher schon an, hatte mich schon gewundert?!

     

    edit/

     

    so es taucht das gleiche, bzw. es passiert weiterhin nichts. in der log steht auch nicht mehr drin!

  3. so habe es jetzt getestet, aber leider funktioniert es immer noch nicht, ich weis aber auch erlich gesagt nicht was ich in diesem cisco vpn client einrichten muss!

    Bitte nochmals um Hilfe!

    Bis jetzt stelle in im VPN client ein Connection entry ist ja egal

    bei description ist ja egal

    unter host die ip adresse

    unter authentication

    group authentication

    name "vpn"

    unter password das password

     

    Schon mal ein rechthezliches Dankeschön!

  4. Hi Jungs,

    @ Zodiac habe jetzt alles gemacht wie du es mir gesagt hast, aber leider funktioniert es immer noch nicht! Habe mmir den VPN client von cisco runtergeladen v. 4.6.03.0021 - ich teste es immer von meinen rechner aus, im prinzip schalte ich ein schleife! Bitte um Hilfe!

     

    PIX Version 6.3(3)

    interface ethernet0 auto

    interface ethernet1 100full

    nameif ethernet0 outside security0

    nameif ethernet1 inside security100

    enable password XXXXXXXXXXXXXXXXXXXXx encrypted

    passwd XXXXXXXXXXXXXXXXXXXXXXXXXXx encrypted

    hostname pixfirewall

    domain-name ciscopix.com

    fixup protocol dns maximum-length 512

    fixup protocol ftp 21

    fixup protocol h323 h225 1720

    fixup protocol h323 ras 1718-1719

    fixup protocol http 80

    fixup protocol rsh 514

    fixup protocol rtsp 554

    fixup protocol sip 5060

    fixup protocol sip udp 5060

    fixup protocol skinny 2000

    fixup protocol smtp 25

    fixup protocol sqlnet 1521

    fixup protocol tftp 69

    names

    name 192.168.1.9 Tobias

    object-group service BitTorrent tcp

    description BitTorrent

    port-object range 6881 6889

    port-object eq 6969

    access-list 100 permit tcp any host Tobias object-group BitTorrent

    access-list 100 deny icmp any any echo-reply

    access-list 100 deny icmp any any unreachable

    access-list 100 deny icmp any any time-exceeded

    access-list 100 deny icmp any any traceroute

    access-list outside_access_in permit tcp any interface outside eq 6881

    access-list 80 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0

    pager lines 24

    logging on

    mtu outside 1500

    mtu inside 1500

    ip address outside pppoe setroute

    ip address inside 192.168.1.1 255.255.255.0

    ip audit info action alarm

    ip audit attack action alarm

    ip local pool vpn_ip_pool 192.168.2.1-192.168.2.10

    pdm location Tobias 255.255.255.255 inside

    pdm logging informational 100

    pdm history enable

    arp timeout 14400

    global (outside) 1 interface

    nat (inside) 0 access-list 80

    nat (inside) 1 192.168.1.0 255.255.255.0 0 0

    static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0

    static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0

    access-group outside_access_in in interface outside

    timeout xlate 0:05:00

    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

    timeout uauth 0:05:00 absolute

    aaa-server TACACS+ protocol tacacs+

    aaa-server RADIUS protocol radius

    aaa-server LOCAL protocol local

    no snmp-server location

    no snmp-server contact

    snmp-server community public

    no snmp-server enable traps

    floodguard enable

    crypto ipsec transform-set strong-des esp-3des esp-sha-hmac

    crypto dynamic-map vpn-dyn-map 1 set transform-set strong-des

    crypto map vpn-map 20 ipsec-isakmp dynamic vpn-dyn-map

    crypto map vpn-map interface outside

    isakmp key xxxxxxxxxxxxxxxxx address 0.0.0.0 netmask 0.0.0.0

    isakmp policy 8 authentication pre-share

    isakmp policy 8 encryption 3des

    isakmp policy 8 hash md5

    isakmp policy 8 group 2

    isakmp policy 8 lifetime 86400

    vpngroup vpn address-pool vpn_ip_pool

    vpngroup vpn idle-time 1800

    vpngroup vpn password xxxxxxxxxx

    vpngroup bittz dns-server 194.25.2.129

    vpngroup bittz split-tunnel 80

    vpngroup bittz idle-time 1800

    telnet 192.168.1.0 255.255.255.0 inside

    telnet timeout 5

    ssh timeout 5

    console timeout 0

    vpdn group pppoe_group request dialout pppoe

    vpdn group pppoe_group localname xxxx@t-online.de

    vpdn group pppoe_group ppp authentication pap

    vpdn username xxxxxxxxxxxxxxx@t-online.de password xxxxxxx

    dhcpd address 192.168.1.100-192.168.1.130 inside

    dhcpd dns 194.25.2.129

    dhcpd lease 3600

    dhcpd ping_timeout 750

    dhcpd auto_config outside

    username tobi password xxxxxxxx/ encrypted privilege 15

    terminal width 80

     

    pixfirewall(config)#

  5. Building configuration...

    : Saved

    :

    PIX Version 6.3(3)

    interface ethernet0 auto

    interface ethernet1 100full

    nameif ethernet0 outside security0

    nameif ethernet1 inside security100

    enable password ***** encrypted

    passwd ***** encrypted

    hostname pixfirewall

    domain-name ciscopix.com

    fixup protocol dns maximum-length 512

    fixup protocol ftp 21

    fixup protocol h323 h225 1720

    fixup protocol h323 ras 1718-1719

    fixup protocol http 80

    fixup protocol rsh 514

    fixup protocol rtsp 554

    fixup protocol sip 5060

    fixup protocol sip udp 5060

    fixup protocol skinny 2000

    fixup protocol smtp 25

    fixup protocol sqlnet 1521

    fixup protocol tftp 69

    names

    name 192.168.1.9 Tobias

    object-group service BitTorrent tcp

    description BitTorrent

    port-object range 6881 6889

    port-object eq 6969

    access-list 100 permit tcp any host Tobias object-group BitTorrent

    access-list 100 deny icmp any any echo-reply

    access-list 100 deny icmp any any unreachable

    access-list 100 deny icmp any any time-exceeded

    access-list 100 deny icmp any any traceroute

    access-list outside_access_in permit tcp any interface outside eq 6881

    access-list 80 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0

    pager lines 24

    logging on

    mtu outside 1500

    mtu inside 1500

    ip address outside pppoe setroute

    ip address inside 192.168.1.1 255.255.255.0

    ip audit info action alarm

    ip audit attack action alarm

    ip local pool vpn_ip_pool 192.168.2.1-192.168.2.10

    pdm location Tobias 255.255.255.255 inside

    pdm logging informational 100

    pdm history enable

    arp timeout 14400

    global (outside) 1 interface

    nat (inside) 0 access-list 80

    nat (inside) 1 192.168.1.0 255.255.255.0 0 0

    static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0

    static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0

    access-group outside_access_in in interface outside

    timeout xlate 0:05:00

    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

    timeout uauth 0:05:00 absolute

    aaa-server TACACS+ protocol tacacs+

    aaa-server RADIUS protocol radius

    aaa-server LOCAL protocol local

    http server enable

    http 192.168.1.0 255.255.255.0 inside

    no snmp-server location

    no snmp-server contact

    snmp-server community public

    no snmp-server enable traps

    floodguard enable

    sysopt connection permit-ipsec

    crypto ipsec transform-set strong-des esp-3des esp-sha-hmac

    crypto dynamic-map vpn-dyn-map 1 set transform-set strong-des

    crypto map vpn-map 20 ipsec-isakmp dynamic vpn-dyn-map

    crypto map vpn-map interface outside

    isakmp enable outside

    isakmp key ******** address 0.0.0.0 netmask 0.0.0.0

    isakmp policy 8 authentication pre-share

    isakmp policy 8 encryption 3des

    isakmp policy 8 hash md5

    isakmp policy 8 group 2

    isakmp policy 8 lifetime 86400

    vpngroup vpn address-pool vpn_ip_pool

    vpngroup vpn idle-time 1800

    vpngroup superteam dns-server 194.25.2.129

    vpngroup superteam split-tunnel 80

    vpngroup superteam idle-time 1800

    telnet 192.168.1.0 255.255.255.0 inside

    telnet timeout 5

    ssh timeout 5

    console timeout 0

    vpdn group pppoe_group request dialout pppoe

    vpdn group pppoe_group localname ****@t-online.de

    vpdn group pppoe_group ppp authentication pap

    vpdn username ****@t-online.de password *********

    dhcpd address 192.168.1.100-192.168.1.130 inside

    dhcpd dns 194.25.2.129

    dhcpd lease 3600

    dhcpd ping_timeout 750

    dhcpd auto_config outside

    username tobi password ****/ encrypted privilege 15

    terminal width 80

    Cryptochecksum:lalalala

    : end

    [OK]

  6. Danke für die zügige Antwort! ;) :D :p

    So ich habe ein paar fragen dazu

    isakmp key cisco1234 address 0.0.0.0 netmask 0.0.0.0

    "cisco1234" ist das Passwort? Und was ist der Benutzername? :(

     

    Habe es erstmal soweit wie du gesag hast gemacht bekomme nur Fehler 8000 (Benutze den VPN Client von Microsoft)

    VPN Server ist eventuell nicht erreichbar oder die Sicherheitsparameter sind für diese Verbindung nicht korrekt konfiguriert.

     

    Mag wahrscheinlich daran liegen, das ich den falschen Benutzername eingebe.

    Oder ich habe Falsche Einstellungen im Client getroffen..

     

    Bei mir im Netz habe ich einen Server stehen (192.168.1.XXX) und wenn ich mich mit vpn einwähle bekomme ich ja eine IP aus dem Pool 192.168.2.XX! Kann ich dann auf den Server drauf zu greifen?

     

    Wenn ihr mir noch mal helfen könnt?!

     

    Gruss Tobias :confused:

     

    PS: Mein conf zurzeit

  7. Möchte VPN nutzen, damit wenn ich wo anders bin auf einen Server in meinem Netz drauf zu greifen kann, sprich über einen VPN Client von Microsoft.

     

    Mit dem Befehl:

    static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0

    static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0

    leite ich die ports 6881 udp und tcp auf die Adresse von meinem Rechner 192.168.1.9 (richtig?)!

  8. Hi ich brauche wieder einmal Hilfe!

    Habe eine Cisco PIX 501 üder einen ADSL Anschluss angebunden.

     

    Nun möchte ich mich an VPN rantrauen.

    Könnt ihr mir sagen wie ich das einrichte, über die Suchfunktion habe ich nichts gefunden.

     

    Poste schonmal meine Config

     

    PIX Version 6.3(3)

    interface ethernet0 auto

    interface ethernet1 100full

    nameif ethernet0 outside security0

    nameif ethernet1 inside security100

    enable password ******** encrypted

    passwd ******* encrypted

    hostname pixfirewall

    domain-name ciscopix.com

    fixup protocol dns maximum-length 512

    fixup protocol ftp 21

    fixup protocol h323 h225 1720

    fixup protocol h323 ras 1718-1719

    fixup protocol http 80

    fixup protocol rsh 514

    fixup protocol rtsp 554

    fixup protocol sip 5060

    fixup protocol sip udp 5060

    fixup protocol skinny 2000

    fixup protocol smtp 25

    fixup protocol sqlnet 1521

    fixup protocol tftp 69

    names

    name 192.168.1.9 Tobias

    object-group service BitTorrent tcp

    description BitTorrent

    port-object range 6881 6889

    port-object eq 6969

    access-list 100 permit tcp any host Tobias object-group BitTorrent

    access-list 100 permit icmp any any echo-reply

    access-list 100 permit icmp any any unreachable

    access-list 100 permit icmp any any time-exceeded

    access-list 100 permit icmp any any traceroute

    access-list outside_access_in permit tcp any interface outside eq 6881

    pager lines 24

    logging on

    mtu outside 1500

    mtu inside 1500

    ip address outside pppoe setroute

    ip address inside 192.168.1.1 255.255.255.0

    ip audit info action alarm

    ip audit attack action alarm

     

    pdm logging informational 100

    pdm history enable

    arp timeout 14400

    global (outside) 1 interface

    nat (inside) 1 192.168.1.0 255.255.255.0 0 0

    static (inside,outside) tcp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0

    static (inside,outside) udp interface 6881 Tobias 6881 netmask 255.255.255.255 0 0

    access-group outside_access_in in interface outside

    timeout xlate 0:05:00

    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

    timeout uauth 0:05:00 absolute

    aaa-server TACACS+ protocol tacacs+

    aaa-server RADIUS protocol radius

    aaa-server LOCAL protocol local

    http server enable

    http 192.168.1.0 255.255.255.0 inside

    no snmp-server location

    no snmp-server contact

    snmp-server community public

    no snmp-server enable traps

    floodguard enable

    telnet 192.168.1.0 255.255.255.0 inside

    telnet timeout 5

    ssh timeout 5

    console timeout 0

    vpdn group pppoe_group request dialout pppoe

    vpdn group pppoe_group localname ******@t-online.de

    vpdn group pppoe_group ppp authentication pap

    vpdn username ***************@t-online.de password *********

    dhcpd address 192.168.1.100-192.168.1.130 inside

    dhcpd dns 194.25.2.129

    dhcpd lease 3600

    dhcpd ping_timeout 750

    dhcpd auto_config outside

     

    terminal width 80

     

    : end

    [OK]

  9. Ich möchte die Ports von 6881 bis 6889 und port nummer 6969 weiterleiten auf die interne IP 192.168.1.9!!! Diese Ports brauche ich um bei bittorrent keine "low id" zu bekommen, ähnlich wie bei emule etc... :p eine Access - list ist schon drin! Habe auch schon etwas probiert (siehe Config) aber funktionieren tut es nicht!

     

    Gruß Tobi

  10. Hi,

    ich bin neu hier! Habe folgendes Probelm, ich möchte bei meiner PIX 501 ports für Bittorrent freischalten, nur ich weiß nicht wie das geht!

     

    Habe schon in der Suchfunktion nachgeschaut aber ich habe das nicht so richtig verstanden!!! :suspect: :suspect: :suspect:

     

    Meine Config..

    pixfirewall# sh conf

    : Saved

    : Written by enable_15 at 14:07:14.090 UTC Wed Jan 19 2005

    PIX Version 6.3(3)

    interface ethernet0 auto

    interface ethernet1 100full

    nameif ethernet0 outside security0

    nameif ethernet1 inside security100

    enable password xxxxxxxxxxxxxx encrypted

    passwd xxxxxxxxxxxxxxxx encrypted

    hostname pixfirewall

    domain-name ciscopix.com

    fixup protocol dns maximum-length 512

    fixup protocol ftp 21

    fixup protocol h323 h225 1720

    fixup protocol h323 ras 1718-1719

    fixup protocol http 80

    fixup protocol rsh 514

    fixup protocol rtsp 554

    fixup protocol sip 5060

    fixup protocol sip udp 5060

    fixup protocol skinny 2000

    fixup protocol smtp 25

    fixup protocol sqlnet 1521

    fixup protocol tftp 69

    names

    object-group service Bit_Torrent tcp

    port-object eq 6969

    port-object range 6881 6889

    access-list outside_access_in permit tcp interface outside object-group Bit_Torrent host 192.168.1.9 object-group Bit_Torrent

    pager lines 24

    logging on

    mtu outside 1500

    mtu inside 1500

    ip address outside pppoe setroute

    ip address inside 192.168.1.1 255.255.255.0

    ip audit info action alarm

    ip audit attack action alarm

    pdm location xx.xx.xx.xx 255.255.255.255 outside

    pdm location xx.xx.xx.xx 255.255.255.255 outside

    pdm location xx.xx.xx.xx 255.255.255.255 outside

    pdm location xx.xx.xx.xx 255.255.255.255 outside

    pdm location xx.xx.xx.xx 255.255.255.255 outside

    pdm location xx.xx.xx.xx 255.255.255.255 outside

    pdm location xx.xx.xx.xx 255.255.255.255 inside

    pdm location xx.xx.xx.xx 255.255.255.255 outside

    pdm logging informational 100

    pdm history enable

    arp timeout 14400

    global (outside) 1 interface

    nat (inside) 1 192.168.1.0 255.255.255.0 0 0

    static (inside,outside) tcp interface 6881 192.168.1.9 6881 netmask 255.255.255.255 0 0

    static (inside,outside) tcp interface 6882 192.168.1.9 6882 netmask 255.255.255.255 0 0

    static (inside,outside) tcp interface 6883 192.168.1.9 6883 netmask 255.255.255.255 0 0

    static (inside,outside) tcp interface 6884 192.168.1.9 6884 netmask 255.255.255.255 0 0

    static (inside,outside) tcp interface 6885 192.168.1.9 6885 netmask 255.255.255.255 0 0

    static (inside,outside) tcp interface 6886 192.168.1.9 6886 netmask 255.255.255.255 0 0

    static (inside,outside) tcp interface 6887 192.168.1.9 6887 netmask 255.255.255.255 0 0

    static (inside,outside) tcp interface 6888 192.168.1.9 6888 netmask 255.255.255.255 0 0

    static (inside,outside) tcp interface 6889 192.168.1.9 6889 netmask 255.255.255.255 0 0

    static (inside,outside) tcp interface 6969 192.168.1.9 6969 netmask 255.255.255.255 0 0

    access-group outside_access_in in interface outside

    timeout xlate 0:05:00

    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

    timeout uauth 0:05:00 absolute

    aaa-server TACACS+ protocol tacacs+

    aaa-server RADIUS protocol radius

    aaa-server LOCAL protocol local

    http server enable

    http 192.168.1.0 255.255.255.0 inside

    no snmp-server location

    no snmp-server contact

    snmp-server community public

    no snmp-server enable traps

    floodguard enable

    telnet 192.168.1.0 255.255.255.0 inside

    telnet timeout 5

    ssh timeout 5

    console timeout 0

     

     

    bitte um hilfe.... thx :suspect:

×
×
  • Neu erstellen...