10-29-2012 12:39 PM - edited 03-11-2019 05:15 PM
Hi there,
I'm a bit new to Cisco OS, and have been trying to setup NAT through my pix 501 to my test network. I've got a basic home network, on which most of my computers sit, and I want to control my lab via RDP. To that end, I've installed the 501 between my network and test network, and have gotten basic communication working. I just can't seem to open the port back to the server in my test network.
I understand that:
static (inside,outside) tcp interface 3389 "InsideServerIP" 3389 netmask 255.255.255.255
should do what I want it to do, but... it doesn't seem to work. I can't seem to get RDP working, and when I try to telnet to the port on the external interface IP address, it fails. I'm pretty sure that I've got something wrong in my NAT configuration, but am just too green in this area to spot it. Any ideas?
Here's my wr term info:
PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname pixfirewall
domain-name testpix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list ping_acl permit icmp any any echo-reply
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 192.168.0.20 255.255.255.0
ip address inside 192.168.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 192.168.0.0 255.255.0.0 0 0
access-group ping_acl in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.0.1 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
10-29-2012 12:40 PM
Hi,
Seems you havent allowed the traffic in the ACL you have attached to the "outside" interface
If you want to use the already existing ACL issue the following command
access-list ping_acl permit tcp any interface outside eq 3389
I think you should be able to use the keyword "interface outside"
If not issue
access-list ping_acl permit tcp any host 192.168.0.20 eq 3389
EDIT: You will naturally need the static NAT configuration you mention in the start of the post in addition to the ACL statement. Just thought as you dont have the NAT statement listed in the actual configuration you posted.
- Jouni
10-29-2012 12:50 PM
Also to clarify the situation abit,
Notice that your interface security-levels are 0 and 100
By default with Cisco PIX, ASA and FWSM products if you dont have any ACLs configured traffic will be allowed from networks/hosts behind higher security-level interface to networks/hosts behind lower security-level interface.
This is why your Labs hosts can connect to rest of your network.
But when you are trying to initiate connections from lower security-level interface/networks/hosts to higher security-level interface/networks/hosts you will almost always need an ACL list. (Connections coming through VPN connections that are taken to the local firewall can bypass the ACL totally in configured with certain command)
So for every connection you initiate from local network to lab network throug the PIX, you will need an ACL rule.
- Jouni
10-29-2012 04:30 PM
Thank you! I'm going to tinker with this tonight and will let you know how things go/send the thumbs up for the resolution. The explanation is brilliant too btw, understanding the why behind it will help me in the future. Greatly appreciated!
10-29-2012 04:53 PM
It did not seem to resolve the issue. Do I need to do anything after running the static and acl insert?
I confirmed in sh static that it was there, and sh access-list that it was listed as line 2.
I also noticed my NAT scope included my external subnet, and I think I should adjust that. Tried it, didn't help.
nat (inside) 1 192.168.1.0 255.255.255.0 0 0
10-30-2012 07:17 AM
Hi,
Well you can always do "clear xlate" on the lab PIX to clear all NAT translations there and then try again.
Can you see the "hitcount" increase in the access-list rule you added for the RDP?
Have you confirmed in the lab network that you can connect using RDP even there? Is there some settings on the remote computer that might prevent these connections?
If you got the Portforward configuration on the PIX and an access-list rule allowing the RDP connections, there shouldnt be anything else regarding the PIX that could cause the problems.
If you want to configure that there is NO NAT between the Lab network and your own network, you can do the following
access-list LAB-INSIDE-NONAT permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0
nat (inside) 0 access-list LAB-INSIDE-NONAT
What the above would do is that you could connect to the Lab network using the actual IP addresses of the devices.In other words the Lab network would be "visible" to your own network with their actual IP addresses. You will have to take into consideration ofcourse that your own networks router will have to have a route for the lab network pointing towards the lab PIX interface IP address for this to work. Also you would naturally need to use different IP addressess in the ACL rules also. (The actual IP addresses of the lab network)
BUT the configuration you had should work also. So there is no actual need to change to the above configuration. Just thought I'd throw it out there incase you want to try it out.
Its a shame the PIX is running on such a old software. I'm not sure if it even has the graphical interface for management (ASDM) which would make monitoring the connection attempts much easier compared to CLI = command line interface.
- Jouni
10-30-2012 10:02 AM
So I busted out Wireshark and started looking around, and ARP was also hitting the wrong MAC. I was pinging before, so... not sure what happened there, but I'll chalk it up to D-Link not being a terribly bright router.
Anyway, one static reservation in my external firewall later, things are running like clockwork. You friend, are legendary. Not only did you fix my problem, you taught me how ACLs integrate into the process. Thank you!
10-31-2012 12:40 AM
Hi,
Glad to be of help. Thanks for the rating also Always helps keep up the motivation to hang around the forums.
Can you mark the question as answered?
Dont hesitate to post new questions if you run into some problems with the PIX.
- Jouni
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide