<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX Port Forwarding in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-port-forwarding/m-p/368898#M555007</link>
    <description>&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First time user on the PIX and wondering based on current config what is the best way to forward a range of IP ports to a dedicated internal server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password &lt;/P&gt;&lt;P&gt;passwd &lt;/P&gt;&lt;P&gt;hostname pix&lt;/P&gt;&lt;P&gt;domain-name &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;no fixup protocol http 80&lt;/P&gt;&lt;P&gt;no fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 111 permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 111 permit icmp 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list MAIL permit gre any host 1.10.20.20&lt;/P&gt;&lt;P&gt;access-list MAIL permit tcp any host 1.10.20.20 eq 1723&lt;/P&gt;&lt;P&gt;access-list MAIL permit tcp any host 1.10.20.20 eq smtp&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap errors&lt;/P&gt;&lt;P&gt;logging history errors&lt;/P&gt;&lt;P&gt;logging facility 0&lt;/P&gt;&lt;P&gt;logging host inside 10.0.0.5&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 1.10.20.18 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 10.0.0.254 255.255.0.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 10.0.0.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 10.0.0.251 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 1.10.20.19&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 111&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.10.20.20 10.0.0.3 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group MAIL in interface outside&lt;/P&gt;&lt;P&gt;conduit permit tcp host 1.10.20.20 eq smtp any&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 1.10.20.17 1&lt;/P&gt;&lt;P&gt;route inside 10.1.0.0 255.255.0.0 10.0.1.100 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 07:44:36 GMT</pubDate>
    <dc:creator>jayson</dc:creator>
    <dc:date>2020-02-21T07:44:36Z</dc:date>
    <item>
      <title>PIX Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/pix-port-forwarding/m-p/368898#M555007</link>
      <description>&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First time user on the PIX and wondering based on current config what is the best way to forward a range of IP ports to a dedicated internal server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password &lt;/P&gt;&lt;P&gt;passwd &lt;/P&gt;&lt;P&gt;hostname pix&lt;/P&gt;&lt;P&gt;domain-name &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;no fixup protocol http 80&lt;/P&gt;&lt;P&gt;no fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 111 permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list 111 permit icmp 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list MAIL permit gre any host 1.10.20.20&lt;/P&gt;&lt;P&gt;access-list MAIL permit tcp any host 1.10.20.20 eq 1723&lt;/P&gt;&lt;P&gt;access-list MAIL permit tcp any host 1.10.20.20 eq smtp&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap errors&lt;/P&gt;&lt;P&gt;logging history errors&lt;/P&gt;&lt;P&gt;logging facility 0&lt;/P&gt;&lt;P&gt;logging host inside 10.0.0.5&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 1.10.20.18 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 10.0.0.254 255.255.0.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 10.0.0.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 10.0.0.251 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 1.10.20.19&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 111&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.10.20.20 10.0.0.3 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group MAIL in interface outside&lt;/P&gt;&lt;P&gt;conduit permit tcp host 1.10.20.20 eq smtp any&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 1.10.20.17 1&lt;/P&gt;&lt;P&gt;route inside 10.1.0.0 255.255.0.0 10.0.1.100 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:44:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-port-forwarding/m-p/368898#M555007</guid>
      <dc:creator>jayson</dc:creator>
      <dc:date>2020-02-21T07:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/pix-port-forwarding/m-p/368899#M555008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The best way to do this is to create a dedicated 1:1 static like you already have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.10.20.20 10.0.0.3 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but I assume you are asking for something a little more specific.  Are you trying use the 1.10.20.20 address for multiple internal servers?  Perhaps a little more detail will help in clarifying this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2004 17:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-port-forwarding/m-p/368899#M555008</guid>
      <dc:creator>scoclayton</dc:creator>
      <dc:date>2004-11-12T17:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/pix-port-forwarding/m-p/368900#M555009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I would like to use 1.10.20.20 to multiple servers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2004 18:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-port-forwarding/m-p/368900#M555009</guid>
      <dc:creator>jayson</dc:creator>
      <dc:date>2004-11-12T18:26:25Z</dc:date>
    </item>
  </channel>
</rss>

