<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Questions about adding another interface on PIX 515 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/questions-about-adding-another-interface-on-pix-515/m-p/403356#M558739</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Q1. Would you make the security level of the new interface higher or lower than the DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A1: If you want to restrict the other company then it would  be easyer to configure their access by using a LOWER SECURITY LEVEL than the DMZ, but both Higher and lower would be possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you choose a lower security level then you need to configure an access-list on this new company interface to permit an access to any higher level interfaces. If you forget to configure the access-list then they will not have acces to any higher lvel interfaces, example the DMZ but to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you choose a higher security level then the DMZ then you also need to configure the access-list to limit (block) access to DMZ ressources. If you do not configure an access-list then all access to the lover DMZ interface is permited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q2. Is the security level for my failover important? If so, what should it be based on my config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A2: No it is not really important as this interface is not used for users or network data, just for faiover stateful synchronisation between the two PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q3. I don't believe I would need to add a global pool for the new company as they would just utilize my existing global pool.Am I right? If not, would I need to add the default nat statement for the interface and some globals? Something like: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A3: As you prefer you can use the same PAT pool or give hem another global public IP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Examples:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 114.33.100.129-114.33.100.189&lt;/P&gt;&lt;P&gt;global (outside) 1 114.33.100.190&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (NEWCOMANY) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or another public IP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 114.33.100.129-114.33.100.189&lt;/P&gt;&lt;P&gt;global (outside) 1 114.33.100.190&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 2 114.33.100.191&lt;/P&gt;&lt;P&gt;nat (NEWCOMANY) 2 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 May 2005 17:14:17 GMT</pubDate>
    <dc:creator>Patrick Iseli</dc:creator>
    <dc:date>2005-05-02T17:14:17Z</dc:date>
    <item>
      <title>Questions about adding another interface on PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/questions-about-adding-another-interface-on-pix-515/m-p/403355#M558738</link>
      <description>&lt;P&gt;Hello all, I have a PIX 515 with 5 interfaces.  I need to add a totally seperate company to an interface. I want to make it so that they can't access our internal network and dmz (with the exception of the rules allowed by the dmz).  At the same time, I want to make sure that our DMZ can't access the "Company" interface with the exception of responding to web requests initiated by hosts behind the Company and smtp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My questions are as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.  Would you make the security level of the new interface higher or lower than the DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.  Is the security level for my failover important?  If so, what should it be based on my config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.  I don't believe I would need to add a global pool for the new company as they would just utilize my existing global pool.Am I right?  If not, would I need to add the default nat statement for the interface and some globals?  Something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Company) 2 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;global (outside) 2 114.xx.xx.xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help and my config is below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security50&lt;/P&gt;&lt;P&gt;nameif ethernet3 SQLDMZ security60&lt;/P&gt;&lt;P&gt;nameif ethernet4 Company security20&lt;/P&gt;&lt;P&gt;nameif ethernet5 failover security10&lt;/P&gt;&lt;P&gt;ip address outside 114.33.100.3 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 10.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address DMZ 114.33.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip address SQLDMZ&lt;/P&gt;&lt;P&gt;no ip address Company&lt;/P&gt;&lt;P&gt;ip address failover 10.5.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;failover ip address outside 114.33.100.27&lt;/P&gt;&lt;P&gt;failover ip address inside 10.1.1.20&lt;/P&gt;&lt;P&gt;failover ip address DMZ 114.33.101.27&lt;/P&gt;&lt;P&gt;no failover ip address SQLDMZ&lt;/P&gt;&lt;P&gt;no failover ip address Company&lt;/P&gt;&lt;P&gt;failover ip address failover 10.5.1.2&lt;/P&gt;&lt;P&gt;failover link failover&lt;/P&gt;&lt;P&gt;global (outside) 1 114.33.100.129-114.33.100.189&lt;/P&gt;&lt;P&gt;global (outside) 1 114.33.100.190&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 114.33.101.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.1.1.0 10.1.1.0 netmask 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.20 114.33.101.20 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.16 114.33.101.16 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.18 114.33.101.18 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.21 114.33.101.21 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.23 114.33.101.23 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.24 114.33.101.24 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.28 114.33.101.28 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.29 114.33.101.29 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.30 114.33.101.30 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.31 114.33.101.31 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 114.33.101.15 114.33.101.15 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;conduit permit udp host 114.33.101.4 eq domain any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 10.1.1.25 eq smtp host 114.33.101.4&lt;/P&gt;&lt;P&gt;conduit permit tcp host 10.1.1.13 eq 1433 host 114.33.101.17&lt;/P&gt;&lt;P&gt;conduit permit tcp host 114.33.101.4 eq domain any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 114.33.101.8 eq www any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 114.33.101.31 eq pop3 any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 114.33.101.31 eq www any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 114.33.101.8 eq smtp object-group SMTP-to-Exchange-Server&lt;/P&gt;&lt;P&gt;conduit permit tcp object-group TS-Servers eq 3389 any&lt;/P&gt;&lt;P&gt;conduit permit tcp object-group TS-Servers eq www any&lt;/P&gt;&lt;P&gt;conduit permit tcp object-group WWW-Servers eq www any&lt;/P&gt;&lt;P&gt;conduit permit tcp object-group WWW-Servers eq https any&lt;/P&gt;&lt;P&gt;conduit permit tcp object-group FTP-Servers eq ftp any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:07:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-about-adding-another-interface-on-pix-515/m-p/403355#M558738</guid>
      <dc:creator>joneschw1</dc:creator>
      <dc:date>2020-02-21T08:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about adding another interface on PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/questions-about-adding-another-interface-on-pix-515/m-p/403356#M558739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Q1. Would you make the security level of the new interface higher or lower than the DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A1: If you want to restrict the other company then it would  be easyer to configure their access by using a LOWER SECURITY LEVEL than the DMZ, but both Higher and lower would be possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you choose a lower security level then you need to configure an access-list on this new company interface to permit an access to any higher level interfaces. If you forget to configure the access-list then they will not have acces to any higher lvel interfaces, example the DMZ but to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you choose a higher security level then the DMZ then you also need to configure the access-list to limit (block) access to DMZ ressources. If you do not configure an access-list then all access to the lover DMZ interface is permited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q2. Is the security level for my failover important? If so, what should it be based on my config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A2: No it is not really important as this interface is not used for users or network data, just for faiover stateful synchronisation between the two PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q3. I don't believe I would need to add a global pool for the new company as they would just utilize my existing global pool.Am I right? If not, would I need to add the default nat statement for the interface and some globals? Something like: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A3: As you prefer you can use the same PAT pool or give hem another global public IP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Examples:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 114.33.100.129-114.33.100.189&lt;/P&gt;&lt;P&gt;global (outside) 1 114.33.100.190&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (NEWCOMANY) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or another public IP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 114.33.100.129-114.33.100.189&lt;/P&gt;&lt;P&gt;global (outside) 1 114.33.100.190&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 2 114.33.100.191&lt;/P&gt;&lt;P&gt;nat (NEWCOMANY) 2 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 May 2005 17:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-about-adding-another-interface-on-pix-515/m-p/403356#M558739</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-05-02T17:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about adding another interface on PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/questions-about-adding-another-interface-on-pix-515/m-p/403357#M558740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Patrick, I will try this.  I appreciate the help.  It may be a few days before I can take a shot at it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 May 2005 19:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-about-adding-another-interface-on-pix-515/m-p/403357#M558740</guid>
      <dc:creator>joneschw1</dc:creator>
      <dc:date>2005-05-02T19:01:38Z</dc:date>
    </item>
  </channel>
</rss>

