<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX515e 3 Interfaces Setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508732#M615756</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ronald.lawrimore wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am doing some testing and would like to get the following to work.&lt;/P&gt;&lt;P&gt;1. E0 - Outside - ISP: 172.16.2.1 255.255.255.252&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ISP Gateway: 172.16.2.2 255.255.255.252&lt;/P&gt;&lt;P&gt;2. E1 - Inside - IP: 192.168.100.50 255.255.255.0&lt;/P&gt;&lt;P&gt;3. E2 - DMZ IP: 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to setup all hosts in the DMZ to be able to get to the internet via Outside interface. I want to use the DMZ as public internet access for hosts on the DMZ network. No Internet hosts will be accessing anything on the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside Interface is really just for ease of management, no access form DMZ or Outside Interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What route and ACL rules do I need.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;None of the addresses above are public ones ie. none are routable on the internet. So does the Natting happen elsewhere or does the outside interface actually have a public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the NAT happens elsewhere -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 0 0.0.0.0 0.0.0.0 &amp;lt;-- this will simply anot change the DMZ addresses as they leave the pix so they would need to be natted by something else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if the outside interface has a public IP -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this will PAT all dmz host addresses to the outside IP of the pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as the security level of the dmz interface is higher than the outside security level, and it should be as outside is usally given a level of 0 then you do not need to use any access-lists anywhere. No internet hosts will be able to initiate connections to the dmz hosts, they will only be able to send return traffic to connections initiated from the dmz hosts and for this you don't need acls as the pix is a stateful firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit - routing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you need a default-route on your firewall -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are patting all addresses to the outside interface of your firewall that's all you need as the ISP will know how to get to that address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you aren't ie. as above the NAT takes place elsewhere then either -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) the ISP would need to add a route back to the dmz hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) even if the NAT is happening elsewhere you could still PAT all dmz hosts to 172.16.2.1. That way the ISP would know where to send the return traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Nov 2010 16:27:58 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2010-11-24T16:27:58Z</dc:date>
    <item>
      <title>PIX515e 3 Interfaces Setup</title>
      <link>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508731#M615751</link>
      <description>&lt;P&gt;I am doing some testing and would like to get the following to work.&lt;/P&gt;&lt;P&gt;1. E0 - Outside - ISP: 172.16.2.1 255.255.255.252&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ISP Gateway: 172.16.2.2 255.255.255.252&lt;/P&gt;&lt;P&gt;2. E1 - Inside - IP: 192.168.100.50 255.255.255.0&lt;/P&gt;&lt;P&gt;3. E2 - DMZ IP: 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to setup all hosts in the DMZ to be able to get to the internet via Outside interface. I want to use the DMZ as public internet access for hosts on the DMZ network. No Internet hosts will be accessing anything on the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside Interface is really just for ease of management, no access form DMZ or Outside Interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What route and ACL rules do I need.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:14:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508731#M615751</guid>
      <dc:creator>ronald.lawrimore</dc:creator>
      <dc:date>2019-03-11T19:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: PIX515e 3 Interfaces Setup</title>
      <link>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508732#M615756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ronald.lawrimore wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am doing some testing and would like to get the following to work.&lt;/P&gt;&lt;P&gt;1. E0 - Outside - ISP: 172.16.2.1 255.255.255.252&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ISP Gateway: 172.16.2.2 255.255.255.252&lt;/P&gt;&lt;P&gt;2. E1 - Inside - IP: 192.168.100.50 255.255.255.0&lt;/P&gt;&lt;P&gt;3. E2 - DMZ IP: 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to setup all hosts in the DMZ to be able to get to the internet via Outside interface. I want to use the DMZ as public internet access for hosts on the DMZ network. No Internet hosts will be accessing anything on the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside Interface is really just for ease of management, no access form DMZ or Outside Interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What route and ACL rules do I need.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;None of the addresses above are public ones ie. none are routable on the internet. So does the Natting happen elsewhere or does the outside interface actually have a public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the NAT happens elsewhere -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 0 0.0.0.0 0.0.0.0 &amp;lt;-- this will simply anot change the DMZ addresses as they leave the pix so they would need to be natted by something else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if the outside interface has a public IP -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this will PAT all dmz host addresses to the outside IP of the pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as the security level of the dmz interface is higher than the outside security level, and it should be as outside is usally given a level of 0 then you do not need to use any access-lists anywhere. No internet hosts will be able to initiate connections to the dmz hosts, they will only be able to send return traffic to connections initiated from the dmz hosts and for this you don't need acls as the pix is a stateful firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit - routing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you need a default-route on your firewall -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are patting all addresses to the outside interface of your firewall that's all you need as the ISP will know how to get to that address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you aren't ie. as above the NAT takes place elsewhere then either -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) the ISP would need to add a route back to the dmz hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) even if the NAT is happening elsewhere you could still PAT all dmz hosts to 172.16.2.1. That way the ISP would know where to send the return traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 16:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508732#M615756</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-11-24T16:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: PIX515e 3 Interfaces Setup</title>
      <link>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508733#M615759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do have an actual public IP address, just used the one as an example.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 16:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508733#M615759</guid>
      <dc:creator>ronald.lawrimore</dc:creator>
      <dc:date>2010-11-24T16:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: PIX515e 3 Interfaces Setup</title>
      <link>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508734#M615779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ronald.lawrimore wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do have an actual public IP address, just used the one as an example.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay, then simply use the PAT example i gave and for routing you simply need a default route -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 &lt;ISP gateway=""&gt;&lt;/ISP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 16:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508734#M615779</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-11-24T16:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: PIX515e 3 Interfaces Setup</title>
      <link>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508735#M615781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is my running config. I have a PC setup to be the ISP gateway at x.x.x.161 just to be able to test my pings and so forth. From the PC, I can ping my Outside interface, but from the PIX I cannot ping the x.x.x.161 address. I cannot ping from the DMZ to the x.x.x.161 address either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 8.0(4) &lt;BR /&gt;!&lt;BR /&gt;hostname pixfirewall&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address x.x.x.162 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.100.50 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image flash:/asdm-61551.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (Outside) 1 interface&lt;BR /&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 x.x.x.161 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.100.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.100.51-192.168.100.254 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:2231aafb63445593017c89d66a36096b&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 16:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508735#M615781</guid>
      <dc:creator>ronald.lawrimore</dc:creator>
      <dc:date>2010-11-24T16:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: PIX515e 3 Interfaces Setup</title>
      <link>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508736#M615782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;add this to your pix config under the policy-map global_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;PRE&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; class inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/PRE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this will allow you to ping from a pc on the DMZ to the pc with the default-gateway on the outside of the pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit - if you want to ping from the outside to a device on the dmz you will need an access-list to allow it. I said before you didn't need an acl because you don't want anything to connect into the dmz but if it is just for testing purposes you could set one up. See this doc for full details -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml"&gt;ICMP through Pix/ASA&lt;BR /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 16:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515e-3-interfaces-setup/m-p/1508736#M615782</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-11-24T16:54:07Z</dc:date>
    </item>
  </channel>
</rss>

