08-25-2011 08:17 AM - edited 03-11-2019 02:17 PM
I am having a problem getting this to work and I have always done it with 2 Static ip address. but now this company changed to 1 and I am doing something wrong.
I have comcast with 1 static IP, I have a local LAN with 6 host and 1 server that does Mail and remote access and web traffic.
I need a config that allows me to use 1 static ip on the outside interface of the PIX and allow with an ACL 7 ports open to the server and allow all the local host out to the internet.
I seem to be missing something when I try to do it so I hope some one can help, I know the pix can do it but just cant seem to find the answer I need
thank you!
Brandon
Solved! Go to Solution.
08-25-2011 08:34 AM
Hi Bandon,
You would need to use static port forwarding for all teh servers, lets say you need to access mail(25), web(443), RDP(3389) with single ip then:
static (inside,outside) tcp 1.1.1.1 25 10.1.1.1 25
static (inside,outside) tcp 1.1.1.1 443 10.1.1.2 443
static (inside,outside) tcp 1.1.1.1 3389 10.1.1.3 3389
access-list need not change, you can use the same.
How to do port forwarding on PIX/ASA:
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00804708b4.shtml
1.1.1.1 ---------> is the public ip
10.1.1.x -------> internal ip of your servers.
Hope this was helpul.
Thanks,
Varun
08-25-2011 09:00 AM
The static statements are not correct:
static (inside,outside) tcp 173.167.235.117 25 192.168.1.253 25
static (inside,outside) tcp 173.167.235.117 3389 192.168.1.253 3389
static (inside,outside) tcp 173.167.235.117 80 192.168.1.253 80
static (inside,outside) tcp 173.167.235.117 443 192.168.1.253 443
static (inside,outside) tcp 173.167.235.117 444 192.168.1.253 444
static (inside,outside) tcp 173.167.235.117 4125 192.168.1.253 4125
static (inside,outside) tcp 173.167.235.117 pptp 192.168.1.253 pptp
rest everything is fine
Thanks,
Varun
08-25-2011 08:21 AM
here is the old config
using 2 static ip and static NAT for the server what do I do to change this to only one Static ip?
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname pixfirewall
domain-name lsquaredconst.com
clock timezone est -5
clock summer-time edt recurring
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list lsc permit icmp any any log
access-list lsc permit tcp any host 99.96.155.162 eq 3389
access-list lsc permit tcp any host 99.96.155.162 eq www
access-list lsc permit tcp any host 99.96.155.162 eq https
access-list lsc permit tcp any host 99.96.155.162 eq 444
access-list lsc permit tcp any host 99.96.155.162 eq smtp
access-list lsc permit tcp any host 99.96.155.162 eq 4125
access-list lsc permit tcp any host 99.96.155.162 eq pptp
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 99.96.155.161 255.255.255.248
ip address inside 192.168.1.254 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 99.96.155.162 192.168.1.253 netmask 255.255.255.255 0 0
access-group lsc in interface outside
route outside 0.0.0.0 0.0.0.0 99.96.155.166 1
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
08-25-2011 08:34 AM
Hi Bandon,
You would need to use static port forwarding for all teh servers, lets say you need to access mail(25), web(443), RDP(3389) with single ip then:
static (inside,outside) tcp 1.1.1.1 25 10.1.1.1 25
static (inside,outside) tcp 1.1.1.1 443 10.1.1.2 443
static (inside,outside) tcp 1.1.1.1 3389 10.1.1.3 3389
access-list need not change, you can use the same.
How to do port forwarding on PIX/ASA:
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00804708b4.shtml
1.1.1.1 ---------> is the public ip
10.1.1.x -------> internal ip of your servers.
Hope this was helpul.
Thanks,
Varun
08-25-2011 08:40 AM
so instead of using a second IP which I have here in this config for my Static (inside,outside) I just use the same IP that I assigned to my PIX outside interface?
and everything else stays the same for the most part?
08-25-2011 08:43 AM
Thats right, so now what you are doing is, you are not using the whole public ip for the server, instead just using a single port on that public ip for multiple servers, which saves you an extra public ip.
Let me know if you have any further questions.
Thanks,
Varun
08-25-2011 08:46 AM
ok great will do it now and let you know thank you very much =)
08-25-2011 08:49 AM
No Problem let me know the results
-Varun
08-25-2011 08:57 AM
ok here is my proposed new config to remove the old stuff and put in the new stuff. tell me if this is right and I am leaving the NAT global alone I didnt think that needed to change
this is my nat statement which I was not changing
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
no ip address outside 99.96.155.161 255.255.255.248
no static (inside,outside) 99.96.155.162 192.168.1.253 netmask 255.255.255.255 0 0
no route outside 0.0.0.0 0.0.0.0 99.96.155.166 1
ip address outside 173.167.235.117 255.255.255.252
route outside 0.0.0.0 0.0.0.0 173.167.235.118
static (inside,outside) 173.167.235.117 tcp 192.168.1.253 25
static (inside,outside) 173.167.235.117 tcp 192.168.1.253 3389
static (inside,outside) 173.167.235.117 tcp 192.168.1.253 80
static (inside,outside) 173.167.235.117 tcp 192.168.1.253 443
static (inside,outside) 173.167.235.117 tcp 192.168.1.253 444
static (inside,outside) 173.167.235.117 tcp 192.168.1.253 4125
static (inside,outside) 173.167.235.117 tcp 192.168.1.253 PPTP
thank you again
08-25-2011 09:00 AM
The static statements are not correct:
static (inside,outside) tcp 173.167.235.117 25 192.168.1.253 25
static (inside,outside) tcp 173.167.235.117 3389 192.168.1.253 3389
static (inside,outside) tcp 173.167.235.117 80 192.168.1.253 80
static (inside,outside) tcp 173.167.235.117 443 192.168.1.253 443
static (inside,outside) tcp 173.167.235.117 444 192.168.1.253 444
static (inside,outside) tcp 173.167.235.117 4125 192.168.1.253 4125
static (inside,outside) tcp 173.167.235.117 pptp 192.168.1.253 pptp
rest everything is fine
Thanks,
Varun
08-25-2011 09:04 AM
opps thank you =) here goes! =) brb hopfully
08-25-2011 09:14 AM
great its working thank you =) and I learned something new =)
08-25-2011 09:15 AM
Thats great you can mark this thread as answered now if its working.
Thanks,
Varun
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide