<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX515 IOS Version6.1(4) Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix515-ios-version6-1-4-configuration/m-p/659181#M1024841</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a lot of things to cover here - let me know if you need further clarification. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) if you want to put the pix behind the router then you will need another subnet to connect the pix external interface to the router internal interface. &lt;/P&gt;&lt;P&gt;So you don't have to setup up new default gayeways for your clients i suggest you move the 172.18.1.1 address to the pix inside interface. &lt;/P&gt;&lt;P&gt;The use another subnet for the pix outside/router inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For examples sake lets say you allocate 172.19.1.0/28 for this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix outside interface 172.19.1.1&lt;/P&gt;&lt;P&gt;router internal interface 172.19.1.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) On the router you will need to add a route for the internal network &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 172.18.1.0 255.255.255.0 172.19.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) On the pix you need a default route pointing to the router &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.19.1.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) You don't say where you want to do the NAT for your clients and these two machines you are giving access to. Lets assume you are going to leave it on the router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the pix &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This tells the pix not to NAT any clients as they go out. The NAT will still be done on your router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) You still need to do something about the 2 machines. On the pix &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.18.1.151 172.18.1.151 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.18.1.152 172.18.1.152 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT to public addressing will still happen on your router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) You will need to have an access-list on the outside interface of your pix for access to these 2 machines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't say which hosts and what ports so you will need to modify this access-list. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inbound permit host "x.x.x.1" 172.18.1.151 eq 23 &lt;/P&gt;&lt;P&gt;access-list acl_inbound permit host "x.x.x.1" 172.18.1.152 eq 23&lt;/P&gt;&lt;P&gt;access-list acl_inbound permit host "x.x.x.2" 172.18.1.151 eq 23 &lt;/P&gt;&lt;P&gt;access-list acl_inbound permit host "x.x.x.2" 172.18.1.152 eq 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note if you are familiar with object groups you could simplify this a bit. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this makes sense. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Feb 2007 09:06:22 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2007-02-27T09:06:22Z</dc:date>
    <item>
      <title>PIX515 IOS Version6.1(4) Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix515-ios-version6-1-4-configuration/m-p/659180#M1024840</link>
      <description>&lt;P&gt;I have a Cisco PIX515 firewall that I'd like to configure and install on my LAN. I have managed a Cisco 3640 router installed on my LAN and prefer to put the firewall behind the router to protect my LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The LAN Gateway is 172.18.1.1 netmask 255.255.255.0 which is the routers fastethernet0/0. Fasethernet0/1 of the router 3640 is 210.5.254.194 netmask 255.255.255.248. My LAN subnet is 172.18.1.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I prefer to give my inside IP address to the PIX as 172.18.1.235 netmask 255.255.255.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you be able to help me with this configuration please ASAP??.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have two hosts coming into two servers here which have their internal IP addresses as 172.18.1.152 and 172.18.1.151. These two server external IP addresses are 210.*.*.195 and 210.5.254.196 and both have a netmask of 255.255.255.248.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Summary Details of the above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN Subnet:  172.18.1.0&lt;/P&gt;&lt;P&gt;Cisco 3640 Router IP Address:&lt;/P&gt;&lt;P&gt; E0/0 - 172.18.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; E0/1 - 210.*.*.194 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Inside IP: 172.18.1.235 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client Host IP:&lt;/P&gt;&lt;P&gt;(Client 1) Inside IP: 172.18.1.151&lt;/P&gt;&lt;P&gt;           Outside IP: 210.5.254.195&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Client 2) Inside IP: 172.18.1.152&lt;/P&gt;&lt;P&gt;           Outside IP: 210.5.254.196&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hear from you soon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Pakoa&lt;/P&gt;&lt;P&gt;Port Vila&lt;/P&gt;&lt;P&gt;Vanuatu&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-ios-version6-1-4-configuration/m-p/659180#M1024840</guid>
      <dc:creator>vanuatupakoa123</dc:creator>
      <dc:date>2019-03-11T09:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: PIX515 IOS Version6.1(4) Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix515-ios-version6-1-4-configuration/m-p/659181#M1024841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a lot of things to cover here - let me know if you need further clarification. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) if you want to put the pix behind the router then you will need another subnet to connect the pix external interface to the router internal interface. &lt;/P&gt;&lt;P&gt;So you don't have to setup up new default gayeways for your clients i suggest you move the 172.18.1.1 address to the pix inside interface. &lt;/P&gt;&lt;P&gt;The use another subnet for the pix outside/router inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For examples sake lets say you allocate 172.19.1.0/28 for this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix outside interface 172.19.1.1&lt;/P&gt;&lt;P&gt;router internal interface 172.19.1.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) On the router you will need to add a route for the internal network &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 172.18.1.0 255.255.255.0 172.19.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) On the pix you need a default route pointing to the router &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.19.1.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) You don't say where you want to do the NAT for your clients and these two machines you are giving access to. Lets assume you are going to leave it on the router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the pix &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This tells the pix not to NAT any clients as they go out. The NAT will still be done on your router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) You still need to do something about the 2 machines. On the pix &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.18.1.151 172.18.1.151 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.18.1.152 172.18.1.152 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT to public addressing will still happen on your router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) You will need to have an access-list on the outside interface of your pix for access to these 2 machines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't say which hosts and what ports so you will need to modify this access-list. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inbound permit host "x.x.x.1" 172.18.1.151 eq 23 &lt;/P&gt;&lt;P&gt;access-list acl_inbound permit host "x.x.x.1" 172.18.1.152 eq 23&lt;/P&gt;&lt;P&gt;access-list acl_inbound permit host "x.x.x.2" 172.18.1.151 eq 23 &lt;/P&gt;&lt;P&gt;access-list acl_inbound permit host "x.x.x.2" 172.18.1.152 eq 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note if you are familiar with object groups you could simplify this a bit. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this makes sense. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2007 09:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-ios-version6-1-4-configuration/m-p/659181#M1024841</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-02-27T09:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: PIX515 IOS Version6.1(4) Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix515-ios-version6-1-4-configuration/m-p/659182#M1024842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration you submitted has worked and I can ping the required ip addresses from my LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the two hosts, 172.18.1.152 aslo has a global ip address of 210.x.x.195 and 172.18.1.151 has a global ip address of 210.5.254.196. The two hosts will be accessing the internal addresses from the 210.x.254.x addresses. These two hosts need to access 172.18.1.151 and 172.18.1.152 for port 1433 (SQL).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please could you update the access-list, otherwise all the rest of the configuration seems fine for now and will inform you on how I go with it this evening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reagrds,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Feb 2007 23:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-ios-version6-1-4-configuration/m-p/659182#M1024842</guid>
      <dc:creator>vanuatupakoa123</dc:creator>
      <dc:date>2007-02-27T23:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: PIX515 IOS Version6.1(4) Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix515-ios-version6-1-4-configuration/m-p/659183#M1024843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Samuel &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad things are working. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could i just clarify something ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.18.1.151 &amp;amp; 172.18.1.152 are on your internal network. You present these through the firewall as 210.5.254.195 and 210.5.254.196. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the IP addresses of the hosts that will be accessing these servers ? It's a little unclear from your post. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Feb 2007 07:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-ios-version6-1-4-configuration/m-p/659183#M1024843</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-02-28T07:15:49Z</dc:date>
    </item>
  </channel>
</rss>

