PIX 501 with Actiontec Q1000 in Bridge mode

I have an Actiontec Q1000 Qwest racetrack with 8 static IP addresses.  I want to put the Actiontec in bridge mode and connect the PIX.  I have configured the PIX as follows, but there are some things that are unclear to me:

IP address outside pppoe setroute

VPDN group chi request dialout pppoe

VPDN group chi localname xxxxx

VPDN group chi ppp authentication pap

VPDN username password xxxxx xxxxx

Qwest gave me a block of 8 IP, and they either of them specified as a gateway address.

This IP will get the external interface?

Can I use setroute with Qwest, or I need to specify a default route instead?

Can I assign the gateway address to the external interface of the PIX?

My ultimate goal is to be able to configure the PIX to allow client software Cisco VPN incoming connections.

Thank you very much for all your comments.

P.S. I can't just try, because I am in California and I need to set it up and send it to Utah, where I there will have access via SSH.

The ip address will be given by provide it during the negotiation of PPPoE.

You should be able to use the road together, I would expect Qwest provide the default route in PPPoE.

I should get it by the ISP automatically.

Please evaluate the useful messages.

PK

Tags: Cisco Security

Similar Questions

  • VPN site-to-site between two PIX 501 with Client VPN access

    Site A and site B are connected with VPN Site to Site between two PIX 501.

    Also, site A is configured for remote access VPN client. If a remote client connects to Site A, it can only get access to the LAN of Site A, it cannot access anything whatsoever behind PIX on Site B.

    How is that possible for a VPN client connected to Site A to Site B?

    Thank you very much.

    Alex

    Bad and worse news:

    Bad: Not running the 7.0 series PIX cannot route traffic on the same interface, the traffic is recived. Version 7.0 solves this ipsec traffic.

    Even worse: PIX 501 can not be upgraded to 7.0...

    A couple of things to think about would be the upgrade to hardware that can run the new IOS or allowing a VPN R.A. on site B.

    HTH Please assess whether this is the case.

    Thank you

  • How can I configure my Airport Express to mesh with new cable modem bridge mode?

    Time Warner sent me a new cable modem and my Airport express still flashing orange light. How can I configure the Airport express in bridge mode?

    You can simply do using AirPort Utility on your iMac or iPhone, as follows:

    • Run the AirPort Utility.
    • Select the AirPort Express Terminal and then, select change.
    • For a Mac:
      • On the network tab, change the router Mode to: Off (bridge Mode)
      • Select to update and allow the base station restart.
    • For an iOS device:
      • Select Advanced > DHCP and NAT
      • Change the router Mode to: Off (bridge Mode)
      • Select done and allow the base station restart.

  • PIX 501 with public several IP addresses

    Hi all

    I have the following configuration:

    audience of 6 IP addresses, for example: 123.123.123.1 - 6 255.255.255.248

    My provider, I have a Zyxel modem which has the 123.123.123.1 IP address, which is also the default gateway for my PIX.

    The PIX is connected to a modem Zyxel.

    The external interface of the PIX, 123.123.123.2 and the inside interface 192.168.1.1 255.255.255.0

    At my home I have several client computers and network servers 3.

    Client computers must be able to connect to the internet.

    Server should have the public IP 123.123.123.3 and 192.168.52.3 inside

    Server B must have public IP 123.123.123.4 and 192.168.52.4 inside

    Server C must have public IP 123.123.123.5 and 192.168.52.5 inside

    Server 3 are Web servers and should be accessible from the outside on ports 80 and 443.

    My current setup is:

    See the pixfirewall (config) # executes
    : Saved
    :
    6.3 (5) PIX version
    interface ethernet0 car
    interface ethernet1 100full
    ethernet0 nameif outside security0
    nameif ethernet1 inside the security100
    activate the encrypted password
    encrypted passwd
    pixfirewall hostname
    domain ciscopix.com
    fixup protocol dns-length maximum 512
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol 2000 skinny
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    names of
    object-group service tcp web
    port-object eq www
    EQ object of the https port
    OUTSIDE of the ip access list allow any host 123.123.123.3
    pager lines 24
    Outside 1500 MTU
    Within 1500 MTU
    IP outdoor 123.123.123.2 255.255.255.248
    IP address inside 192.168.1.1 255.255.255.0
    alarm action IP verification of information
    alarm action attack IP audit
    location of PDM 192.168.1.0 255.255.255.0 inside
    history of PDM activate
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 1 192.168.1.0 255.255.255.0 0 0
    static (inside, outside) tcp 123.123.123.3 www 192.168.1.3 www netmask 255.255.255.255 0 0
    Access-group OUTSIDE in interface outside
    Route outside 0.0.0.0 0.0.0.0 123.123.123.1 1
    Timeout xlate 0:05:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
    H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
    Sip timeout - disconnect 0:02:00 prompt Protocol sip-0: 03:00
    Timeout, uauth 0:05:00 absolute
    GANYMEDE + Protocol Ganymede + AAA-server
    AAA-server GANYMEDE + 3 max-failed-attempts
    AAA-server GANYMEDE + deadtime 10
    RADIUS Protocol RADIUS AAA server
    AAA-server RADIUS 3 max-failed-attempts
    AAA-RADIUS deadtime 10 Server
    AAA-server local LOCAL Protocol
    Enable http server
    http 192.168.1.0 255.255.255.0 inside
    http 192.168.2.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    SNMP-Server Community public
    No trap to activate snmp Server
    enable floodguard
    Telnet 192.168.1.0 255.255.255.0 inside
    Telnet 192.168.2.0 255.255.255.0 inside
    Telnet timeout 5
    SSH timeout 5
    Console timeout 0
    Terminal width 80
    : end
    pixfirewall (config) #.

    This acutally configuration only allows connections from the inside to the outside but not from the outside to connect to the server.

    I'm sure miss me something stupid, maybe someone could give me a hint?

    Mike

    Setup looks quite right, assuming that you only test connectivity to Server A (123.123.123.3) as it is the only one configured.

    I suggest that you make 'clear xlate' and 'clear the arp' and test again. I would check to see if your modem has the ARP entry for 123.123.123.3 and it should point to the ethernet0 PIX MAC address.

  • PIX 501 Logging

    I would like to open a session of hacking and intrusion of the attacks through a PIX 501 with a connection to broadband in a Home Office Setup. I have the camera upwards and the race and I am currently Setup with the Kiwi Syslog Dameon. What would be my best approach Logging all relevant information with the load to the bottom of the unit? Any suggestions / tips would be appreciated.

    Thank you

    It is a common logging configuration that I use:

    opening of session

    timestamp of the record

    logging trap information

    host of logging inside x.x.x.x

    No registration message 106015

    No message logging 106007

    No message logging 105003

    No registration message 105004

    No message recording 309002

    No message logging 305012

    No registration message 305011

    No message logging 303002

    No message logging 111008

    No message logging 302015

    No message recording 302014

    No message logging 302013

    No registration message 304001

    No message logging 111005

    No message logging 609002

    No message recording 609001

    No message logging 302016

    I usually do not enable the logging buffer (never use connection console it will affect performance) because it's not the messages timestamp (it only timestamps in the syslog). But the PIX loaded down with the load, you and Kiwi you before the PIX don't.

    Also turn on the IDs on the PIX.

    It will be useful.

    Steve

  • Configure the PIX 501 for IDS

    I have a PIX 501 with wired high-speed LAN headquarters inside and outside. Which would be a solid policy IDS to enable and what interfaces it must be applied to? There will be other measures necessary to enable IDS?

    IDS on the PIX itself is very limited, it checks only 59 signatures listed here (http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_62/cmdref/gl.htm#xtocid9 under the section of signatures supported IDS). The signatures themselves are pretty basic.

    If you do not want to activate this, then for the signatures of attacks I would fix for drop/alarm/reset action, which is the default anyway.

    You will also need to set the logging to a syslog server and monitoring for any 4000nn messages in syslog, cause it event IDS.

  • VPN PPTP and PPPOE CLIENT ON PIX 501

    Hello

    Can I create a PPTP VPN and a client connection on a PIX 501 with a client to my ISP PPPOE connection. The PPPOE ip is dynamic and the VPN will be a static IP address. They gave me a username and password for VPN and PPPOE. Him also gave me an ip address for the VPN server.

    Should that happen, it's that the PPPOE should connect to the VPN to work.

    I can only get the PPPOE, but I don't know how to do this with a PPTP VPN set.

    Here is my config:

    PIX Version 6.3(3)
    interface ethernet0 auto
    interface ethernet1 100full
    nameif ethernet0 outside security0
    nameif ethernet1 inside security100
    enable password xxxxxxxx encrypted
    passwd xxxxxxx encrypted
    hostname neveroff
    domain-name neveroff.com
    fixup protocol dns maximum-length 512
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol skinny 2000
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    names
    access-list incoming permit icmp any any echo-reply
    access-list incoming permit icmp any any source-quench
    access-list incoming permit icmp any any unreachable
    access-list incoming permit icmp any any time-exceeded
    pager lines 24
    icmp permit any echo outside
    icmp permit any unreachable outside
    icmp permit any time-exceeded outside
    icmp permit any source-quench outside
    icmp permit any echo-reply outside
    icmp permit any information-reply outside
    icmp permit any mask-reply outside
    icmp permit any timestamp-reply outside
    mtu outside 1500
    mtu inside 1500
    ip address outside pppoe setroute
    ip address inside 192.168.1.1 255.255.255.0
    ip audit info action alarm
    ip audit attack action alarm
    pdm logging informational 100
    pdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 1 192.168.1.0 255.255.255.0 0 0
    static (inside,outside) tcp interface smtp 192.168.1.201 smtp netmask 255.255.255.255 0 0
    access-group incoming in interface outside
    timeout xlate 0:05:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
    timeout uauth 0:05:00 absolute
    aaa-server TACACS+ protocol tacacs+
    aaa-server RADIUS protocol radius
    aaa-server LOCAL protocol local
    http server enable
    no snmp-server location
    no snmp-server contact
    snmp-server community public
    no snmp-server enable traps
    floodguard enable
    telnet timeout 5
    ssh 0.0.0.0 0.0.0.0 outside
    ssh 0.0.0.0 0.0.0.0 inside
    ssh timeout 5
    console timeout 0
    vpdn group pppoex request dialout pppoe
    vpdn group pppoex localname xxxxxxxxx
    vpdn group pppoex ppp authentication chap
    vpdn username xxxxxxxx password xxxxxxxx
    dhcpd address 192.168.1.10-192.168.1.41 inside
    dhcpd dns 192.168.1.1 168.210.2.2
    dhcpd lease 3600
    dhcpd ping_timeout 750
    dhcpd auto_config outside
    dhcpd enable inside
    username neveroff password TEnlGTQMwqamBzMn encrypted privilege 2
    terminal width 80
    Cryptochecksum:c5bfafa70f21ed55cc1b3df377e110bf
    : end

    Thank you

    Etienne

    Happy to help and please kindly mark the message as answered if you have not more than other questions. Thank you.

  • PIX 501 PPPoE w / static NAT loss of connectivity

    I have a {should} installation very simple. PIX 501 with PPPoE on the external interface, 3 inside customers using PAT and 1 inside the client I am trying to use an address mapping static on permit communications with this host from the outside using a particular service. I did a lot of these before where there was an ADSL router in front of the PIX, but this is the first where I've used the PIX as the PPPoE client. When I use the static NAT for the single host it loses all connectivity beyond the PIX outside interface. When I get rid of the static mapping, through PAT very well. I spent many hours troubleshooting and control a lot of obvious things, but I am at a loss right now... unless it could be a problem with the IP address that has been assigned by the ISP for use with static NAT. Any thoughts on this would be greatly appreciated.

    Thank you

    Sorry, in your case that static would look like this because of the dynamic IP.

    static (inside, outside) 23 interface 10.1.1.1 23 netmask 255.255.255.255

    Daniel

  • E8350 in Bridge mode allow me access to the router with 192.168.1.1

    I have a small home network with the E8350 (AC2400) and a PK5001A of Qwest ActionTec modem.  I needed to put the router in Bridge mode to enable NAT in the modem works properly.  By simply disabling the NAT in the E8350 network broe. Once I placed the E8350 in bridge mode, I lost connectivity via 192.168.1.1.  The network seems to work correctly, I can't access the router remotely.  Is this normal or is it a different setting I'm missing?

    When you have done this, you probably have a new ip address of the primary router. See what she is looking at the main router connections or by manually adjusting it 192.168.1.2 or some other ip that is in your network. If the primary router uses a different subnet as 192.168.0.x, then you must use an IP also in this same range.

  • Configure BEFSR41 V.2.1. to use as switch with ADSL ZTE Modem in Bridged mode

    I found a thread of 2009 who has a link that could help me with this configuration, but the link does not work.

    I have a Linksys BEFSR41 V.2.1 and need to set it up, so I can use it as a switch with our ZTE 831 ADSL Modem, which is in bridged Mode.

    The IP address of the BEFSR41 changed to avoid a conflict with the address IP of Modem ZTE ADSL, which is 192.168.1.1 to 192.168.2.1.

    If the PC is connected directly to the ZTE ADSL Modem, I can access the Internet and I can access the Menu of Configuration of Modem ZTE.

    If the PC is directly connected to the Linksys BEFSR41, I can access the Menu of Configuration Linksys.

    If the PC is connected to the Linksys BEFSR41, and which is connected to the ZTE ADSL Modem, I can't access the Internet, and I cannot Ping the ZTE ADSL Modem.

    Please give me a URL that indicates how the Linksys BEFSR41 should be configured to use as a switch with my ADSL Modem from ZTE in bridged Mode.

    My belief is that after I have the Linksys set up, I then plug the ZTE ADSL modem in the Linksys unit and use it to DHCP.

    DRM for your time and help! Lanny

    1. I never told of any change on the Advanced Routing page.

    2 do not connect the internet port for ZTE with this kind of configuration. You cannot use the internet port.

    3. Once you set that you can use the remaining LAN for ethernet devices ports in your local network.

  • PIX 501 will ios ver 6.2 come to him, with only 16ram 8flash? Thank you

    Wanted to load pdm 2.1.1 firewall and VPN. Found 501 takes ver 6.2 but not to enother ram.

    Thank you

    Phil

    From http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_62/relnotes/pixrn622.htm#xtocid4 :

    "The PIX 501 has 16 MB of RAM and will work correctly with Version 6.2, while all other PIX firewall platforms continue to require at least 32 MB of RAM (and are therefore also compatible with Version 6.2 or newer).

    In addition, all units except the PIX 501 and PIX 506/506E require 16 MB of Flash memory to boot. (The 501 PIX and PIX 506/506E have 8 MB of Flash memory, which works correctly with Version 6.2) »

    PIX firewall model... Flash memory required in point 6.2

    PIX 501 .......................... 8 MB

    Steve

  • VPN between cisco unified customer 3.6.3 and Pix 501 6.2 (1) with the MS CA server

    Hello

    I have Microsoft CA server with the latest support CEP and pix 501 that gets the digital certificate. I also have the client certificate of Cisco, but VPN doesn't work

    In the IPSec Log Viewer, I constantly "CM_IKE_ESTABLISH_FAIL."

    It worked well prior to Win2k server has been completely updated with the latest patches.

    The pix configuration is identical to that of article http://www.cisco.com/warp/public/471/configipsecsmart.html

    I reinstall the stand-alone CA and support CEP server but not had any luck.

    What could be wrong?

    It looks like IKE implementation problem. Make DH group 2 policy ISAKMP.

    Visit this link:

    http://www.Cisco.com/univercd/CC/TD/doc/product/iaabu/PIX/pix_v53/IPSec/exvpncl.htm

  • Problems with PIX 501 and Server MS Cert

    Hi all

    I have two problems with my PIX 501:

    1. registration works well. The pix has a certificate and use it with SSL and VPN connections. But after a refill, the pix certificate is lost and it has regenerated again self-signed certificate!

    Yes, I wrote mem and ca records all!

    2. at the request of ca CRL , I get the following debugging:

    Crypto CA thread wakes!

    CRYPTO_PKI: Cannot be named County ava

    CRYPTO_PKI: transaction GetCRL completed

    Crypto CA thread sleeps!

    CI thread wakes!

    And the CRL is empty.

    Does anyone have any idea?

    Bert Koelewijn

    Not sure about 1, but 2 is usually caused by the COP (Point of Distribution of CRL, basically the situation where the PIX can download the Revocation list from) listed in cert CA is in a format the PIX does not, generally an LDAP URL.

    Check the following prayer:

    Open the administration tool of CA (Certification Authority) then

    (1) right click on the name of CA and choose 'properties '.

    2) click on the tab "Policy Module".

    3) click on the button "configure."

    4) click on the tab "X.509 extensions".

    > From there, it can display the list of the "CRL Distribution Points".

    Turn off everything that isn't HTTP.

    You need to reinstall the CERT in the PIX, I think, but then it should be able to download the CRL through HTTP instead of LDAP.

  • Port forwarding with PIX 501

    I try to get my PIX 501 to forward traffic on port 1412 with TCP and UDP to use Direct Connect, and the problem I have is I can connect to a DC hub, but cannot establish connections with users.

    I added the following to the default configuration from the factory with a partial success:

    outside access list permit tcp any host 192.168.100.20 eq 1412

    access-list outside permit udp any host 192.168.100.20 eq 1412

    public static tcp (indoor, outdoor) interface 1412 192.168.100.20 1412 netmask 255.255.255.255 0 0

    public static tcp (indoor, outdoor) interface 1412 192.168.100.20 1412 netmask 255.255.255.255 0 0

    In the debug log set to the access list I rule this type of errors:

    Deny tcp src outside other.users.ip.addr/3099 dst within the my.public.ip.addr/1412 by access-group "access_outside_in".

    TCP request discarded outside my.public.ip.addr/45961 other.users.ip.addr/2362

    I'm quite lost as to why it does not work when I think it should. I tried several ways, opening of port ranges and no chance for a transfer of the port sucsessful.

    You can change you, outside the ACL to the following:

    outside access list permit tcp any host eq 1412

    access-list outside permit udp any host eq 1412

    outside access-group in external interface

    Save again with: write mem and also issue: clear xlate

    I would like to know if it works.

    Jay

  • Bridged mode gives ip-conflict with the host country

    I'm having a problem with my vmware. I tried to reinstall but still the same.

    I want my vmware to have its own IP address, but when the bridge mode option I get "IP conflict" on the vmware.

    What have I done wrong?

    The PC is connected to a router?

    You have Hamachi on the PC? If so, disable Hamachi in network connections.

Maybe you are looking for