08-01-2012 10:14 AM - edited 03-11-2019 04:37 PM
Allow the web server(193.170.4.2) in DMZ to communicate with the our exchange server(10.77.51.87) internally via SMTP..for which I used access-list acl-dmz permit tcp host 193.170.4.2 host 10.77.51.87 eq smtp but it did not work. Is it because of the deny ip line in acl-outbound..or the nat ..please clarify. FYi ...here is the configuration.
PIX_6.3(5)_515#
access-group acl-inbound in interface outside
access-group acl-outbound in interface inside
access-group acl-dmz in interface dmz1
PIX_6.3(5)_515#
PIX_6.3(5)_515# sh access-list acl-outbound | in deny
access-list acl-outbound line 86 deny ip 10.0.0.0 255.0.0.0 193.170.4.0 255.255.255.0 (hitcnt=1209)
access-list acl-outbound line 90 deny ip any any (hitcnt=1014022)
PIX_6.3(5)_515#
PIX_6.3(5)_515#
PIX_6.3(5)_515# sh access-list acl-dmz
access-list acl-dmz; 2 elements
access-list acl-dmz line 1 permit udp host 193.170.4.2 host 198.6.1.4 eq domain (hitcnt=5625)
access-list acl-dmz line 2 permit ip host 193.170.4.2 any (hitcnt=1089)
PIX_6.3(5)_515#
PIX_6.3(5)_515#
PIX_6.3(5)_515# sh nat
nat (inside) 0 access-list nonat
nat (inside) 1 10.77.51.80 255.255.255.255 0 0
nat (inside) 1 10.77.51.81 255.255.255.255 0 0
nat (inside) 1 10.77.51.87 255.255.255.255 0 0
nat (inside) 2 10.76.0.0 255.255.0.0 0 0
PIX_6.3(5)_515#
PIX_6.3(5)_515# sh run | in static
static (inside,outside) tcp 195.99.136.85 smtp 10.77.51.87 smtp netmask 255.255.255.255 0 0
static (inside,outside) 195.99.136.81 10.77.51.58 netmask 255.255.255.255 0 0
static (inside,outside) 195.99.136.84 10.77.51.38 netmask 255.255.255.255 0 0
static (dmz1,outside) 212.140.175.173 193.170.4.2 netmask 255.255.255.255 0 0
static (dmz1,inside) 212.140.175.173 193.170.4.2 netmask 255.255.255.255 0 0
static (inside,dmz1) 10.76.0.0 10.76.0.0 netmask 255.255.0.0 0 0
PIX_6.3(5)_515#
PIX_6.3(5)_515#
PIX_6.3(5)_515# sh run | in global
global (outside) 1 195.99.136.85
global (outside) 2 interface
PIX_6.3(5)_515#
PIX_6.3(5)_515#
08-01-2012 10:21 AM
hari,
Your best bet is to post this in article in the firewall section.
Thanks,
Tarik Admani
*Please rate helpful posts*
08-01-2012 11:15 AM
Thanks Tarik...Have moved it to Firewall space..
08-01-2012 11:33 AM
Hi Hari,
can you please share the complete configuration, it woudl be easier to corelate things with it.
Thanks,
Varun Rao
Security Team,
Cisco TAC
08-01-2012 11:49 AM
Can I ask you your email id ...will share the config to you.
08-01-2012 11:53 AM
You can p.m. me here...
Thanks,
Varun Rao
Security Team,
Cisco TAC
08-01-2012 12:15 PM
Sent you a PM ...appreciate your turnaround Varun.
08-01-2012 12:33 PM
Have tried it ..but you see there is a deny ip 10.0.0.0 line in the acl-outbound...I thought this could be the issue.
Also the
static (dmz1,inside) 212.140.175.173 193.170.4.2 netmask 255.255.255.255 0 0
is it really needed ? ...
08-01-2012 12:26 PM
You would need this config:
access-list acl-dmz permit tcp host 193.170.4.2 host 10.77.51.87 eq smtp
static (inside,dmz1) 10.77.51.87 10.77.51.87
It shoudl work after this.
Thanks,
Varun Rao
Security Team,
Cisco TAC
08-01-2012 12:38 PM
Hi Hari,
If the traffic is being initiated from the dmz1 interface then the access-list should not be a problem, since only the access-list on the dmz1 interface woudl matter. The traffic would be allowed back since it already has a state maintained by teh firewall. Also if you dont require the static then please remove it. You can also remove the deny acl if not needed.
Thanks,
Varun Rao
Security Team,
Cisco TAC
08-01-2012 12:48 PM
It did not work this morning ..so will try to remove the deny line and also the static (dmz1,inside) line. Will let you know the result Varun. Thanks a lot for clarifiying things.
Thanks again...
08-05-2012 04:43 PM
To let you know , this isssue was resolved...as I could the trace the problem was actually with the anitvirus..which was treating my telnet on port smtp as a mail worm.
Thanks Varun ..you help is much appreciated.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide