Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

How to configure the PPPoE on PIX 501?

Mailto: jacky_xie@cn.cnlink.net

MSN: xxf8@msn.com

According for the below URL of Cisco TAC:

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00801055dd.shtml

but I Still failed.And my PIX 501 Configuration shown below:

pixfirewall# write terminal

Building configuration...

: Saved

:

PIX Version 6.3(1)

interface ethernet0 10baset

interface ethernet1 100full

nameif ethernet0 outside security0

nameif ethernet1 inside security100

enable password xxxx

passwd xxxx

hostname pixfirewall

fixup protocol ftp 21

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol http 80

fixup protocol ils 389

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol sip 5060

fixup protocol sip udp 5060

fixup protocol skinny 2000

fixup protocol smtp 25

fixup protocol sqlnet 1521

names

pager lines 24

mtu outside 1500

mtu inside 1500

ip address outside pppoe setroute

ip address inside 192.168.1.254 255.255.255.0

ip audit info action alarm

ip audit attack action alarm

pdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

route inside 10.0.0.0 255.0.0.0 192.168.1.1 1

route inside 20.0.0.0 255.0.0.0 192.168.1.1 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+

aaa-server RADIUS protocol radius

aaa-server LOCAL protocol local

no snmp-server location

no snmp-server contact

snmp-server community public

no snmp-server enable traps

floodguard enable

telnet timeout 5

ssh timeout 5

console timeout 0

vpdn group pppoex request dialout pppoe

vpdn group pppoex localname cisco

vpdn group pppoex ppp authentication pap

vpdn username xxxx password *********

terminal width 80

Cryptochecksum:xxxx

: end

[OK]

pixfirewall# show version

Cisco PIX Firewall Version 6.3(1)

Cisco PIX Device Manager Version 1.1(2)

Compiled on Wed 19-Mar-03 11:49 by morlee

pixfirewall up 58 mins 6 secs

Hardware: PIX-501, 16 MB RAM, CPU Am5x86 133 MHz

Flash E28F640J3 @ 0x3000000, 8MB

BIOS Flash E28F640J3 @ 0xfffd8000, 128KB

0: ethernet0: address is 000b.fd58.886b, irq 9

1: ethernet1: address is 000b.fd58.886c, irq 10

Licensed Features:

Failover: Disabled

VPN-DES: Enabled

VPN-3DES-AES: Enabled

Maximum Interfaces: 2

Cut-through Proxy: Enabled

Guards: Enabled

URL-filtering: Enabled

Inside Hosts: 50

Throughput: Unlimited

1 ACCEPTED SOLUTION

Accepted Solutions
Silver

Re: How to configure the PPPoE on PIX 501?

do you have any debug logs?

2 REPLIES
Silver

Re: How to configure the PPPoE on PIX 501?

do you have any debug logs?

New Member

Re: How to configure the PPPoE on PIX 501?

It is ok now.

The program is:

vpdn group pppoex localname cisco

It should changeinto:

vpdn group pppoex localname ADSL-dialup-username

My finally configuration shown below,It's successful,Thank you everybody.

pixfirewall# show running-config

: Saved

:

PIX Version 6.3(1)

interface ethernet0 auto

interface ethernet1 100full

nameif ethernet0 outside security0

nameif ethernet1 inside security100

enable password xxxxx

passwd xxxx

hostname pixfirewall

domain-name pix

fixup protocol ftp 21

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol http 80

fixup protocol ils 389

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol sip 5060

fixup protocol sip udp 5060

fixup protocol skinny 2000

fixup protocol smtp 25

fixup protocol sqlnet 1521

names

pager lines 24

mtu outside 1500

mtu inside 1500

ip address outside pppoe setroute

ip address inside 192.168.1.254 255.255.255.0

ip audit info action alarm

ip audit attack action alarm

pdm location 192.168.1.200 255.255.255.255 inside

pdm location 192.168.1.100 255.255.255.255 inside

pdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+

aaa-server RADIUS protocol radius

aaa-server LOCAL protocol local

http server enable

http 192.168.1.100 255.255.255.255 inside

http 192.168.1.200 255.255.255.255 inside

no snmp-server location

no snmp-server contact

snmp-server community public

no snmp-server enable traps

floodguard enable

telnet timeout 5

ssh timeout 5

console timeout 0

vpdn group pppoe_group request dialout pppoe

vpdn group pppoe_group localname xxxx

vpdn group pppoe_group ppp authentication pap

vpdn username xxxxx password ********* store-local

terminal width 80

Cryptochecksum:xxxx

: end

pixfirewall#

pixfirewall#

pixfirewall# ping 61.144.56.100

61.144.56.100 response received -- 10ms

61.144.56.100 response received -- 0ms

61.144.56.100 response received -- 0ms

pixfirewall# show ip address

System IP Addresses:

ip address outside 61.144.102.24 255.255.255.255

ip address inside 192.168.1.254 255.255.255.0

Current IP Addresses:

ip address outside 61.144.102.24 255.255.255.255

ip address inside 192.168.1.254 255.255.255.0

pixfirewall#

1556
Views
0
Helpful
2
Replies
CreatePlease login to create content