<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX and ISA server integratio and internal servers with 1 pu in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-and-isa-server-integratio-and-internal-servers-with-1-public/m-p/717992#M1005705</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I recommend you do:&lt;/P&gt;&lt;P&gt;1 NAT to inside hosts&lt;/P&gt;&lt;P&gt;2 Static NAT if you have a block of IP's or do a Static PAT if you only have one IP&lt;/P&gt;&lt;P&gt;3 Open the servers for the NAT with an access-list just like you tried to do on the ex above &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then clear the xlate to make it affective &lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.1 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 85.85.100.2 172.16.1.1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;????? why you did that ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.0 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then you configure the statics &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp 172.16.1.1 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ssh 172.16.1.1 ssh netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;( I used the ftp and ssh as example you change to whatever you need ) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now you need an access list to open the static servers &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_TO_INSIDE remark Access-list for static allow trafic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_TO_INSIDE extended permit tcp any interface outside eq ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_TO_INSIDE extended permit tcp any interface outside eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then apply it &lt;/P&gt;&lt;P&gt;access-group OUTSIDE_TO_INSIDE in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 29 Apr 2007 20:43:50 GMT</pubDate>
    <dc:creator>Rodrigo Gurriti</dc:creator>
    <dc:date>2007-04-29T20:43:50Z</dc:date>
    <item>
      <title>PIX and ISA server integratio and internal servers with 1 public IP</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-isa-server-integratio-and-internal-servers-with-1-public/m-p/717991#M1005703</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to integrate the ISA server to the pix firewall.&lt;/P&gt;&lt;P&gt;The pix firewall inside directly connected to the &lt;/P&gt;&lt;P&gt;ISA server outside inetrface (ISA-172.16.1.1, Pix inside 172.16.1.2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are 5 servers in the inside ISA server network (192.168.100.0)&lt;/P&gt;&lt;P&gt;192.168.100.1 80,443&lt;/P&gt;&lt;P&gt;192.168.100.2 801, &lt;/P&gt;&lt;P&gt;192.168.100.3 25&lt;/P&gt;&lt;P&gt;192.168.100.4 80&lt;/P&gt;&lt;P&gt;192.168.100.4 3101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX config as below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.1 255.255.255.255   # only ISA outside goes for internet and client use&lt;/P&gt;&lt;P&gt;						the ISA as proxy to access the internet&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int eth0&lt;/P&gt;&lt;P&gt;ip add 85.85.100.1 255.255.255.248&lt;/P&gt;&lt;P&gt;no sh&lt;/P&gt;&lt;P&gt;int eth1&lt;/P&gt;&lt;P&gt;ip add 172.16.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;no sh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 85.85.100.2 172.16.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;accesss-list 101 permit ip any host 85.85.100.2&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the config the internet access in stoped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i check the show xlate it shows 85.85.100.2 translated to 172.16.1.1&lt;/P&gt;&lt;P&gt;not the global cmd ip 85.85.100.1. So the internet is stoped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how can i configured both inbound and outbound thro the PIX as per the above design.&lt;/P&gt;&lt;P&gt;Ur reply is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;swami&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-isa-server-integratio-and-internal-servers-with-1-public/m-p/717991#M1005703</guid>
      <dc:creator>arumugasamy</dc:creator>
      <dc:date>2019-03-11T10:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and ISA server integratio and internal servers with 1 pu</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-isa-server-integratio-and-internal-servers-with-1-public/m-p/717992#M1005705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I recommend you do:&lt;/P&gt;&lt;P&gt;1 NAT to inside hosts&lt;/P&gt;&lt;P&gt;2 Static NAT if you have a block of IP's or do a Static PAT if you only have one IP&lt;/P&gt;&lt;P&gt;3 Open the servers for the NAT with an access-list just like you tried to do on the ex above &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then clear the xlate to make it affective &lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.1 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 85.85.100.2 172.16.1.1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;????? why you did that ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.0 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then you configure the statics &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp 172.16.1.1 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ssh 172.16.1.1 ssh netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;( I used the ftp and ssh as example you change to whatever you need ) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now you need an access list to open the static servers &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_TO_INSIDE remark Access-list for static allow trafic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_TO_INSIDE extended permit tcp any interface outside eq ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_TO_INSIDE extended permit tcp any interface outside eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then apply it &lt;/P&gt;&lt;P&gt;access-group OUTSIDE_TO_INSIDE in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Apr 2007 20:43:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-isa-server-integratio-and-internal-servers-with-1-public/m-p/717992#M1005705</guid>
      <dc:creator>Rodrigo Gurriti</dc:creator>
      <dc:date>2007-04-29T20:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and ISA server integratio and internal servers with 1 pu</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-isa-server-integratio-and-internal-servers-with-1-public/m-p/717993#M1005708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear ,&lt;/P&gt;&lt;P&gt;Thanks lot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me go the customer place to re-config again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also quick question.&lt;/P&gt;&lt;P&gt;I can ping the mpls switch ip add 192.168.100.1 from 192.168.100.2 of pix outside int.&lt;/P&gt;&lt;P&gt;If i change the pix outside ip to 192.168.100.3 or any number i can not ping the switch .Tell me why since both in same subnet it has to reply for the changed IP also as it gives for the old one 192.168.100.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I called the local ISP to check their switch (batelco provide and keep the switch config confident)they told that it will work even change the IP for the pix outside interface since it is directly connected to the switch MPLS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SWAMI&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 May 2007 06:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-isa-server-integratio-and-internal-servers-with-1-public/m-p/717993#M1005708</guid>
      <dc:creator>arumugasamy</dc:creator>
      <dc:date>2007-05-02T06:30:44Z</dc:date>
    </item>
  </channel>
</rss>

