10-19-2009 07:05 AM - edited 03-11-2019 09:27 AM
Here is my situation:
I have a pix 515E currently running with private IPs on both the outside and inside interfaces. I now have to have the outside interface pingable from the Internet and cannot figure out how to do it.
This is what I thought I needed to do:
z.z.z.z is the Internet address of the person who needs to ping my pix
a.a.a.a is the new Internet address I am trying to use on the firewall.
10.0.0.1 is the inside interface
access-list outside_access_in permit icmp z.z.z.z host a.a.a.a
static (inside,outside) a.a.a.a 10.0.0.1 netmask 255.255.255.255 0 0
It does not work.
I was thinking maybe I just need a second ip address on the outside interface, but really have no idea.
Thanks!
10-19-2009 08:44 AM
Nope, that would be too easy. :)
I know the range makes it to my firewall, so at least that part of the problem is not an issue.
Thanks for all your help.
10-19-2009 12:05 PM
I've set it up in the lab, but I can't do it exactly with the hardware I have. I did do some searching on the internet and it looks like this will work. You need to create a management interface-
vlan 44
nameif management
ip address 192.168.1.50 255.255.255.0
Then create a NAT from one of your public IP's to the management interface.
static (management,outside) [public IP] 192.168.1.50 netmask 255.255.255.255
The port needs to be up, so I would plug it into a null VLAN so the can't get anywhere else when they SSH in.
10-19-2009 12:36 PM
Excellent, I will try it tomorrow and let you know.
Thank you for all your hard work!
10-29-2009 12:07 PM
I was just able to try this, but I cannot use the vlan command. It is not recognized.
I am running 6.3(3)
How do I this up? My google-fu is low today and I cannot find any info on it.
10-29-2009 12:13 PM
Ahh, just use a new interface instead of the VLAN.
11-02-2009 09:28 AM
I am going to have the outside monitoring group test it soon, but this is what I added:
a.a.a.a is the legal IP address they will be using to connect.
access-list outside_access_in permit tcp object-group outside_servers eq ssh host a.a.a.a eq ssh
access-list outside_access_in permit tcp object-group outside_servers host a.a.a.a
access-list outside_access_in permit icmp object-group outside_servers host a.a.a.a
!
static (inside,outside) a.a.a.a 1.1.1.1 netmask 255.255.255.255 0 0
!
int ethernet5 nameif management 10
!
ip address management 1.1.1.1 255.255.255.255
!
int ethernet5 100full
The 1.1.1.1 is then blocked by an access-list on the switch to which it connects.
Does that look like it should work?
11-02-2009 09:36 AM
Looks good. Your first two ACLs can be replaced by one that is more secure-
access-list outside_access_in permit tcp object-group outside_servers host a.a.a.a eq 22
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide