09-11-2008 04:14 AM - edited 03-11-2019 06:43 AM
I am new to firewalling and have a PIX501 that has been setup and running for awhile now without any problems. But I now need to get the PIX to allow a new port number through. How do I do this?
I tried adding:
access-list 101 permit tcp any host xxx.xxx.xxx.xx eq 3389
and
static (inside,outside) tcp interface 3389 xxx.xxx.xxx.xx netmask 255.255.255.255 0 0
But according to the tech guys that need it, it still not open. Any help would be great. I really need to get this working.
Solved! Go to Solution.
09-11-2008 05:52 AM
have just tried it on my lab pix 525.
removed
no access-list 101 extended deny ip any any log
and add again
access-list 101 extended deny ip any any log
now
access-list 101 extended permit tcp any host 216.153.252.20 eq 3389
access-list 101 extended deny ip any any log
before making changes on production FW, i recommded you backup the config and do it out of working hours.
09-11-2008 04:54 AM
Mike,
yes by default traffic from outside to inside is block. so you need apply NAT and permit the traffic.
static NAT (NAT FROM OUTSIDE TO INSIDE)
static (inside,outside) [Public IP Address] [Private IP] netmask 255.255.255.255
ACL
access-list [Use exisitng ACL name applied to your outisde Interface] permit tcp any host [PUBLIC IP] eq 3389.
francisco.
09-11-2008 04:57 AM
Can you explain how to do that? What command is needed?
09-11-2008 05:03 AM
eg
static (inside,outside) 217.19.1.10 10.15.0.1 netmask 255.255.255.255
access-list outside_access_in permit tcp any host 217.19.1.10 eq 3389
access-group outside_access_in in interface outside
is your PIX Version 6.1(1)?
09-11-2008 05:11 AM
Ok, that seems to be what I have.
static (inside,outside) tcp 216.153.252.xx 3389 192.168.1.xx 3389 netmask 255.255.255.255 0 0
access-list 101 permit tcp any host 216.153.252.xx eq 3389
access-group 101 in interface outside
Do you see anything in my lines that isn't right? Then I think this should be working. I'll have to see if my outside tech can get in yet.
Thanks for your help, Mike
09-11-2008 05:17 AM
no worries. give it a go and let us know the outcome.
you can also use the PDM manager to setup your NAT/ACL statement as well. (Easier to use)
09-11-2008 05:18 AM
Yeah I was thinking that too, but when I connected an older laptop to it in the IP range of the firewall and entered the path in the address bar, it goes to the page, but then just says loading and nothing ever happens. Any thoughts on that?
09-11-2008 05:06 AM
Dude,
Try this ( a small modification in your commands ) :
access-list 101 permit tcp any interface outside eq 3389
and
static (inside,outside) tcp interface 3389 xxx.xxx.xxx.xx netmask 255.255.255.255 0 0
As you can see,in access list,I specified " interface outside " keyword rather then the outside interface ip address.
Try this,should work.Please rate if helps :)
Regards,
Sushil
09-11-2008 05:29 AM
in the example i provided, i already have an ACL applied to the outcide interface ( outside_access_in) The PIX can only allow a single ACL on the outside interface for inbound connection. so when adding a new ACL, you need to use the exiting ACL already applied to the outside interface. unless you are trying to tell something i do not know.
09-11-2008 05:29 AM
I'll give it a shot.
By the way after I add this and do a "write mem" is there any other commands I should be entering to make sure it gets loaded to the PIX?
Also, I notice that I have been using 101 but doesn't there need to be a line defining what 101 is? I am really not understanding this too well.
09-11-2008 05:32 AM
if 101 is not already applied to the outside interface i dont see how your ACL is going to work. you need to use an ACL already applied to your PIX outside interface.
if you post the config we can find out the ACL name.
09-11-2008 05:34 AM
09-11-2008 05:38 AM
so on your firewall access-group 101 is used.
The ACL below will work
access-list 101 permit tcp any host 216.153.252.20 eq 3389
09-11-2008 05:42 AM
Ok, I just had my outside tech try it and it didnt work. She said it might be a problem with the server instead, so from what you see, it looks like this firewall should be allowing incoming connections from everyone on port 3389, right? Is there anything else that could be blocking it on the firewall?
Thanks you for your help, it has been invaluable!
Mike
09-11-2008 05:46 AM
just noticed the deny
access-list 101 deny ip any any log (This is prevent your RDP from working)
access-list 101 permit tcp any host 216.153.252.20 eq 3389
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide