From: soup_or_power on
Also are there any other VPN clients to connect to a fairly old PIX? I
tried the network wizard on Windows XP and it didn't do the connection.
If you know of any 3rd party VPN clients kindly drop me a word.
Thanks
soup_or_power(a)yahoo.com wrote:
> I downloaded the GreenBow VPN client and tested the encryption. The PIX
> expects DES and MD5 for encryption and authentication respectively. The
> GreenBow VPN client passed the phase 1 and phase 2 but alas, it doesn't
> connect when a password is challenged. I have to make extensive changes
> on the PIX to make the GreenBow VPN client work. It is not a viable
> option to me. Also the GreenBow VPN client is not free. Now if I can
> replicate the limited success I had with GreenBow VPN client using
> Cisco VPN Client 4.0.5 that will be great. Can anyone please tell me
> what are the encryption and authentication schemes for the Cisco 4.0.5
> VPN client? How can I set the options on Cisco 4.0.5. VPN client?
> Kindly note that the PIX firewall is very old and there is no way to
> change the encryption and authentication schemes.
>
> Many thanks for your kind help.
>
> soup_or_power(a)yahoo.com wrote:
> > Here is the debug from the PIX. I'd appreciate if Walter or someone
> > can comment.
> >
> > Thanks
> >
> >
> > crypto_isakmp_process_block: src 72.79.125.235, dest 209.178.198.242
> > VPN Peer: ISAKMP: Added new peer: ip:72.79.125.235 Total VPN Peers:1
> > VPN Peer: ISAKMP: Peer ip:72.79.125.235 Ref cnt incremented to:1 Total
> > VPN Peers:1
> > OAK_AG exchange
> > ISAKMP (0): processing SA payload. message ID = 0
> >
> > ISAKMP (0): Checking ISAKMP transform 1 against priority 1 policy
> > ISAKMP: encryption... What? 7?
> > ISAKMP: hash SHA
> > ISAKMP: default group 2
> > ISAKMP: extended auth pre-share
> > ISAKMP: life type in seconds
> > ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > ISAKMP: attribute 3584
> > ISAKMP (0): atts are not acceptable. Next payload is 3
> > ISAKMP (0): Checking ISAKMP transform 2 against priority 1 policy
> > ISAKMP: encryption... What? 7?
> > ISAKMP: hash MD5
> > ISAKMP: default group 2
> > ISAKMP: extended auth pre-share
> > ISAKMP: life type in seconds
> > ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > ISAKMP: attribute 3584
> > ISAKMP (0): atts are not acceptable. Next payload is 3
> > ISAKMP (0): Checking ISAKMP transform 3 against priority 1 policy
> > ISAKMP: encryption... What? 7?
> > ISAKMP: hash SHA
> > ISAKMP: default group 2
> > ISAKMP: auth pre-share
> > ISAKMP: life type in seconds
> > ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > ISAKMP: attribute 3584
> > ISAKMP (0): atts are not acceptable. Next payload is 3
> > ISAKMP (0): Checking ISAKMP transform 4 against priority 1 policy
> > ISAKMP: encryption... What? 7?
> > ISAKMP: hash MD5
> > ISAKMP: default group 2
> > ISAKMP: auth pre-share
> > ISAKMP: life type in seconds
> > ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > ISAKMP: attribute 3584
> > ISAKMP (0): atts are not acceptable. Next payload is 3
> > ISAKMP (0): Checking ISAKMP transform 5 against priority 1 policy
> > ISAKMP: encryption... What? 7?
> > ISAKMP: hash SHA
> > ISAKMP: default group 2
> > ISAKMP: extended auth pre-share
> > ISAKMP: life type in seconds
> > ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > ISAKMP: attribute 3584
> > ISAKMP (0): atts are not acceptable. Next payload is 3
> > ISAKMP (0): Checking ISAKMP transform 6 against priority 1 policy
> > ISAKMP: encryption... What? 7?
> > ISAKMP: hash MD5
> > ISAKMP: default group 2
> > ISAKMP: extended auth pre-share
> > ISAKMP: life type in seconds
> > ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > ISAKMP: attribute 3584
> > ISAKMP (0): atts are not acceptable. Next payload is 3
> > ISAKMP (0): Checking ISAKMP transform 7 against priority 1 policy
> > ISAKMP: encryption... What? 7?
> > ISAKMP: hash SHA
> > ISAKMP: default group 2
> > ISAKMP: auth pre-share
> > ISAKMP: life type in seconds
> > ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > ISAKMP: attribute 3584
> > ISAKMP (0): atts are not acceptable. Next payload is 3
> > ISAKMP (0): Checking ISAKMP transform 8 against priority 1 policy
> > ISAKMP: encryption... What? 7?
> > ISAKMP: hash MD5
> > ISAKMP: default group 2
> > ISAKMP: auth pre-share
> > ISAKMP: life type in seconds
> > ISAKMP: life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > ISAKMP: attribute 3584
> > ISAKMP (0): atts are not acceptable. Next payload is 3
> > ISAKMP (0): Checking ISAKMP transform 9 against priority 1 policy
> > ISAKMP: encryption 3DES-CBC
> > ISAKMP: hash SHA
> > ISAKMP: default group 2
> > ISAKMP: extended auth pre-share
> > ISAKMP: life type in seconds
> > ISAKMP: life duration (VPI) of 0x0 0x20 0xc4
> > crypto_isakmp_process_block: src 72.79.125.235, dest 209.178.198.242
> > OAK_AG exchange
> > ISAKMP (0): processing HASH payload. message ID = 0
> > ISAKMP (0): processing NOTIFY payload 24578 protocol 1
> > spi 0, message ID = 0
> > ISAKMP (0): processing notify INITIAL_CONTACTIPSEC(key_engine): got a
> > queue event...
> > IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
> > IPSEC(key_engine_delete_sas): delete all SAs shared with
> > 72.79.125.235
> >
> > ISAKMP (0): processing vendor id payload
> >
> > ISAKMP (0): speaking to another IOS box!
> >
> > ISAKMP (0): processing vendor id payload
> >
> > ISAKMP (0): speaking to a Unity client
> >
> > ISAKMP (0): SA has been authenticated
> > return status is IKMP_NO_ERROR
> > crypto_isakmp_process_block: src 72.79.125.235, dest 209.178.198.242
> > ISAKMP_TRANSACTION exchange
> > ISAKMP (0:0): processing transaction payload from 72.79.125.235.
> > message ID = 0
> > ISAKMP: Config payload CFG_REQUEST
> > ISAKMP (0:0): checking request:
> > ISAKMP: attribute IP4_ADDRESS (1)
> > ISAKMP: attribute IP4_NETMASK (2)
> > ISAKMP: attribute IP4_DNS (3)
> > ISAKMP: attribute IP4_NBNS (4)
> > ISAKMP: attribute ADDRESS_EXPIRY (5)
> > Unsupported Attr: 5
> > ISAKMP: attribute UNKNOWN (28672)
> > Unsupported Attr: 28672
> > ISAKMP: attribute UNKNOWN (28673)
> > Unsupported Attr: 28673
> > ISAKMP: attribute UNKNOWN (28674)
> > ISAKMP: attribute UNKNOWN (28676)
> > ISAKMP: attribute UNKNOWN (28675)
> > Unsupported Attr: 28675
> > ISAKMP: attribute UNKNOWN (28679)
> > Unsupported Attr: 28679
> > ISAKMP: attribute UNKNOWN (28681)
> > Unsupported Attr: 28681
> > ISAKMP: attribute APPLICATION_VERSION (7)
> > Unsupported Attr: 7
> > ISAKMP: attribute UNKNOWN (28680)
> > Unsupported Attr: 28680
> > ISAKMP: attribute UNKNOWN (28682)
> > Unsupported Attr: 28682
> > ISAKMP: attribute UNKNOWN (28677)
> > Unsupported Attr: 28677
> > ISAKMP: attribute UNKNOWN (28678)
> > Unsupported Attr: 28678
> > ISAKMP (0:0): responding to peer config from 72.79.125.235. ID =
> > 3561348378
> > return status is IKMP_NO_ERROR
> > crypto_isakmp_process_block: src 72.79.125.235, dest 209.178.198.242
> > OAK_QM exchange
> > oakley_process_quick_mode:
> > OAK_QM_IDLE
> > ISAKMP (0): processing SA payload. message ID = 3146087570
> >
> > ISAKMP : Checking IPSec proposal 1
> >
> > ISAKMP: unknown ESP transform!
> > ISAKMP: attributes in transform:
> > ISAKMP: authenticator is HMAC-MD5
> > ISAKMP: key length is 256
> > ISAKMP: encaps is 1
> > ISAKMP: SA life type in seconds
> > ISAKMP: SA life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > IPSEC(validate_proposal): invalid local address 209.178.198.242
> >
> > ISAKMP (0): atts not acceptable. Next payload is 0
> > ISAKMP (0): skipping next ANDed proposal (1)
> > ISAKMP : Checking IPSec proposal 2
> >
> > ISAKMP: unknown ESP transform!
> > ISAKMP: attributes in transform:
> > ISAKMP: authenticator is HMAC-SHA
> > ISAKMP: key length is 256
> > ISAKMP: encaps is 1
> > ISAKMP: SA life type in seconds
> > ISAKMP: SA life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > IPSEC(validate_proposal): invalid local address 209.178.198.242
> >
> > ISAKMP (0): atts not acceptable. Next payload is 0
> > ISAKMP (0): skipping next ANDed proposal (2)
> > ISAKMP : Checking IPSec proposal 3
> >
> > ISAKMP: unknown ESP transform!
> > ISAKMP: attributes in transform:
> > ISAKMP: authenticator is HMAC-MD5
> > ISAKMP: key length is 128
> > ISAKMP: encaps is 1
> > ISAKMP: SA life type in seconds
> > ISAKMP: SA life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > IPSEC(validate_proposal): invalid local address 209.178.198.242
> >
> > ISAKMP (0): atts not acceptable. Next payload is 0
> > ISAKMP (0): skipping next ANDed proposal (3)
> > ISAKMP : Checking IPSec proposal 4
> >
> > ISAKMP: unknown ESP transform!
> > ISAKMP: attributes in transform:
> > ISAKMP: authenticator is HMAC-SHA
> > ISAKMP: key length is 128
> > ISAKMP: encaps is 1
> > ISAKMP: SA life type in seconds
> > ISAKMP: SA life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > IPSEC(validate_proposal): invalid local address 209.178.198.242
> >
> > ISAKMP (0): atts not acceptable. Next payload is 0
> > ISAKMP (0): skipping next ANDed proposal (4)
> > ISAKMP : Checking IPSec proposal 5
> >
> > ISAKMP: unknown ESP transform!
> > ISAKMP: attributes in transform:
> > ISAKMP: authenticator is HMAC-MD5
> > ISAKMP: key length is 256
> > ISAKMP: encaps is 1
> > ISAKMP: SA life type in seconds
> > ISAKMP: SA life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > IPSEC(validate_proposal): invalid local address 209.178.198.242
> >
> > ISAKMP (0): atts not acceptable. Next payload is 0
> > ISAKMP : Checking IPSec proposal 6
> >
> > ISAKMP: unknown ESP transform!
> > ISAKMP: attributes in transform:
> > ISAKMP: authenticator is HMAC-SHA
> > ISAKMP: key length is 256
> > ISAKMP: encaps is 1
> > ISAKMP: SA life type in seconds
> > ISAKMP: SA life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > IPSEC(validate_proposal): invalid local address 209.178.198.242
> >
> > ISAKMP (0): atts not acceptable. Next payload is 0
> > ISAKMP : Checking IPSec proposal 7
> >
> > ISAKMP: unknown ESP transform!
> > ISAKMP: attributes in transform:
> > ISAKMP: authenticator is HMAC-MD5
> > ISAKMP: key length is 128
> > ISAKMP: encaps is 1
> > ISAKMP: SA life type in seconds
> > ISAKMP: SA life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > IPSEC(validate_proposal): invalid local address 209.178.198.242
> >
> > ISAKMP (0): atts not acceptable. Next payload is 0
> > ISAKMP : Checking IPSec proposal 8
> >
> > ISAKMP: unknown ESP transform!
> > ISAKMP: attributes in transform:
> > ISAKMP: authenticator is HMAC-SHA
> > ISAKMP: key length is 128
> > ISAKMP: encaps is 1
> > ISAKMP: SA life type in seconds
> > ISAKMP: SA life duration (VPI) of 0x0 0x20 0xc4 0x9b
> > IPSEC(validate_proposal): invalid local address 209.178.198.242
> > crypto_isakmp_process_block: src 72.79.125.235, dest 209.178.198.242
> > ISAKMP (0:0): phase 2 packet is a duplicate of a previous packet.
> > crypto_isakmp_process_block: src 72.79.125.235, dest 209.178.198.242
> > ISAKMP (0:0): phase 2 packet is a duplicate of a previous packet.
> > crypto_isakmp_process_block: src 72.79.125.235, dest 209.178.198.242
> > ISAKMP (0:0): phase 2 packet is a duplicate of a previous packet.
> > crypto_isakmp_process_block: src 72.79.125.235, dest 209.178.198.242
> > ISAKMP (0): processing NOTIFY payload 36136 protocol 1
> > spi 0, message ID = 4224895108
> > ISAMKP (0): received DPD_R_U_THERE from peer 72.79.125.235
> > ISAKMP (0): sending NOTIFY message 36137 protocol 1
> > return status is IKMP_NO_ERR_NO_TRANS
> > crypto_isakmp_process_block: src 72.79.125.235, dest 209.178.198.242
> > ISAKMP (0): processing DELETE payload. message ID =
> > 2699998900IPSEC(key_engine): got a queue event...
> > IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
> >
> > return status is IKMP_NO_ERR_NO_TRANS
> > crypto_isakmp_process_block: src 72.79.125.235, dest 209.178.198.242
> > ISAKMP (0): processing DELETE payload. message ID = 3651836985
> > ISAKMP (0): deleting SA: src 72.79.125.235, dst 209.178.198.242
> > ISAKMP (0): deleting IPSEC SAs with peer at
> > 72.79.125.235IPSEC(key_engine): got a queue event...
> > IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
> > IPSEC(key_engine_delete_sas): delete all SAs shared with
> > 72.79.125.235
> >
> > return status is IKMP_NO_ERR_NO_TRANS
> > ISADB: reaper checking SA 0x80c91590, conn_id = 0 DELETE IT!
> >
> > VPN Peer: ISAKMP: Peer ip:72.79.125.235 Ref cnt decremented to:0 Total
> > VPN Peers:1
> > VPN Peer: ISAKMP: Deleted peer: ip:72.79.125.235 Total VPN
> > peers:0IPSEC(key_engine): got a queue event...
> > IPSEC(key_engine_delete_sas): rec'd delete notify from ISAKMP
> > IPSEC(key_engine_delete_sas): delete all SAs shared with 72.79.125.235