<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Pix 506e static nat in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-506e-static-nat/m-p/813847#M1006026</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks ok, what's not working? With that config you should be able to access 20.20.20.20 from the outside on tcp 25.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Apr 2007 18:55:55 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2007-04-26T18:55:55Z</dc:date>
    <item>
      <title>Cisco Pix 506e static nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-506e-static-nat/m-p/813846#M1006025</link>
      <description>&lt;P&gt;Can you help with what seems to be a simple configuration issue?&lt;/P&gt;&lt;P&gt;I am trying to get my static NAT to work from outside to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco 506e v. 6.2(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;External address x.x.x.x nat'ted to internal address x.x.x.x for SMTP traffic.&lt;/P&gt;&lt;P&gt;Internal address is mail servers and can be accessed on internally on port 25.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is PIX is also used for some outbound internet access as well.&lt;/P&gt;&lt;P&gt;(though external access testing is being done through a different external link).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my running config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.2(2)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;hostname XXXFWL001&lt;/P&gt;&lt;P&gt;domain-name XXX.com&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list internet-in permit ip any any &lt;/P&gt;&lt;P&gt;access-list mkt-out permit tcp host 10.20.20.10 any eq domain &lt;/P&gt;&lt;P&gt;access-list mkt-out permit udp host 10.20.20.10 any eq domain &lt;/P&gt;&lt;P&gt;access-list mkt-out deny tcp any 216.178.32.0 255.255.240.0 &lt;/P&gt;&lt;P&gt;access-list mkt-out deny tcp any 204.16.32.0 255.255.252.0 &lt;/P&gt;&lt;P&gt;access-list mkt-out deny tcp any 67.134.143.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list mkt-out permit ip any any &lt;/P&gt;&lt;P&gt;access-list smtp permit tcp any host 20.20.20.20 eq smtp &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 20.x.x.18 255.255.255.x&lt;/P&gt;&lt;P&gt;ip address inside 10.20.31.222 255.255.255.224&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 10.20.20.10 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.20.20.30 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.20.20.35 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.20.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;pdm location 67.134.143.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location 204.16.32.0 255.255.252.0 outside&lt;/P&gt;&lt;P&gt;pdm location 216.178.32.0 255.255.240.0 outside&lt;/P&gt;&lt;P&gt;pdm location 10.20.20.55 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.20.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 20.20.20.20 10.20.20.55 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group smtp in interface outside&lt;/P&gt;&lt;P&gt;access-group mkt-out in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 20.20.20.17 1&lt;/P&gt;&lt;P&gt;route inside 10.20.0.0 255.255.0.0 10.20.31.193 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ (inside) host 10.20.20.35 xxxxxx timeout 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;aaa authentication telnet console TACACS+&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.20.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;snmp-server host inside 10.20.20.30&lt;/P&gt;&lt;P&gt;snmp-server location MKT&lt;/P&gt;&lt;P&gt;snmp-server contact &lt;A href="mailto:chris@xxx.com" target="_blank"&gt;chris@xxx.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;snmp-server community acs&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;telnet 10.20.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 15&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:05:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-506e-static-nat/m-p/813846#M1006025</guid>
      <dc:creator>acsmtrubee</dc:creator>
      <dc:date>2019-03-11T10:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 506e static nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-506e-static-nat/m-p/813847#M1006026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks ok, what's not working? With that config you should be able to access 20.20.20.20 from the outside on tcp 25.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2007 18:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-506e-static-nat/m-p/813847#M1006026</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-04-26T18:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 506e static nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-506e-static-nat/m-p/813848#M1006027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Adam said, config looks good. Your smtp server 10.20.20.55 is on a different subnet than your inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your pix has a route to 10.20.0.0 network. Does the smtp server know how to route back ie do you have a default route that sends traffic to the pix as the source IP addresses will be public addresses from the internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2007 19:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-506e-static-nat/m-p/813848#M1006027</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-04-26T19:20:08Z</dc:date>
    </item>
  </channel>
</rss>

