07-15-2008 04:41 AM - edited 03-12-2019 05:57 PM
I'm at job configuring a Cisco PIX 506E, and I have a problem.
The outside interface can't reach the router wich bring the local net to the internet. I don't want anything by now but to reach the internet and do some port forwarding for some local servers. I don't care about any other aspect of the PIX as a firewall because it's a spare and we want it only to replace an old router. Then we want to do IPSEC tunneling but that's another history. By now I only want the PIX to do the same function as the old router. It could be interesting to erase everything and start from scratch . . . this is my configuration data on the old router:
ROUTER IP ADDRESS: 192.169.7.100 netmask 255.255.255.0 ( 192.169.7.0 is the local subnet )
INTERNET IP ADDRESS: 213.x.x.202 netmask 255.0.0.0
GATEWAY: 213.x.178.29
Ok. This is my actual PIX configuration:
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxx
passwd xxx
hostname pixfirewall
domain-name work.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol http 80-88
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list ping-acl remark allow pings on the outside
access-list ping-acl permit icmp any any
access-list inbound permit icmp any any
access-list inbound permit tcp any any eq www
access-list permit_icmp permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 213.x.x.202 255.0.0.0
ip address inside 192.169.7.100 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 192.169.7.0 255.255.255.0 0 0
access-group permit_icmp in interface outside
conduit permit tcp host 0.0.0.0 eq 81 host 192.169.7.2
route outside 0.0.0.0 0.0.0.0 213.229.178.29 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh 192.169.1.0 255.255.255.0 inside
ssh 192.169.7.0 255.255.255.0 inside
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:xxx
So I can reach the PIX but I can't get out of it to the inet. I don't know why, If you can answer this one, then it would be interesting to know how to make 1 port forwarding from the inet to an specific server of the local subnet on port, for example 8080. Thank you so much.
Solved! Go to Solution.
07-15-2008 10:20 AM
The static will change since you're using the interface IP.
static (inside,outside) tcp interface 8080 [private IP] 8080 netmask 255.255.255.255
I'm not sure what your ACL name is that is applied to your outside interface, but here's what it should look like for port 8080.
access-list outside_access permit tcp any host 213.27.252.202 eq 8080
You might want to change the any to the specific public IP's that will be accessing your services.
Hope that helps and thanks for the points!
07-16-2008 02:12 AM
Hi, this is my config now:
PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxx
passwd xxx
hostname pixfirewall
domain-name cisco.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 213.x.x.202 255.0.0.0
ip address inside 192.169.7.100 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp 213.27.252.202 8080 192.169.7.102 8080 netmask 255.255.255.255 0 0
static (inside,outside) tcp 213.27.252.202 81 192.169.7.2 81 netmask 255.255.255.255 0 0
static (inside,outside) tcp 213.27.252.202 520 192.169.7.30 520 netmask 255.255.255.255 0 0
static (inside,outside) tcp 213.27.252.202 ssh 192.169.7.3 ssh netmask 255.255.255.255 0 0
static (inside,outside) tcp 213.27.252.202 659 192.169.7.30 659 netmask 255.255.255.255 0 0
static (inside,outside) tcp 213.27.252.202 ftp 192.169.7.102 ftp netmask 255.255.255.255 0 0
static (inside,outside) tcp 213.27.252.202 www 192.169.7.3 www netmask 255.255.255.255 0 0
static (inside,outside) tcp 213.27.252.202 88 192.169.7.30 88 netmask 255.255.255.255 0 0
access-group outside-in in interface outside
route outside 0.0.0.0 0.0.0.0 213.229.178.29 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
http 192.169.7.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh 192.168.7.0 255.255.255.0 inside
ssh 192.169.7.0 255.255.255.0 inside
ssh timeout 60
console timeout 0
terminal width 80
Cryptochecksum:xxx
Can you say what kind of access list should I use and if my port mapping config is ok ?
Thanks !
07-16-2008 05:24 AM
The statics look OK. Here is what you need to add for the ACL-
access-group outside-in permit tcp any host 213.27.252.202 eq 8080
access-group outside-in permit tcp any host 213.27.252.202 eq 81
access-group outside-in permit tcp any host 213.27.252.202 eq 520
access-group outside-in permit tcp any host 213.27.252.202 eq 22
access-group outside-in permit tcp any host 213.27.252.202 eq 659
access-group outside-in permit tcp any host 213.27.252.202 eq 21
access-group outside-in permit tcp any host 213.27.252.202 eq 80
access-group outside-in permit tcp any host 213.27.252.202 eq 88
Let us know how it goes.
07-16-2008 05:27 AM
Slight typo on Collin Clark's post I think...
It should read:
access-list outside-in permit tcp any host 213.27.252.202 eq 8080
"
"
"
"
access-list outside-in permit tcp any host 213.27.252.202 eq 88
access-group outside-in in interface outside
HTH //Jay
07-16-2008 06:06 AM
Whoops, good catch Jay.
07-16-2008 08:21 AM
Ok !! Case closed ! Now everything is working and I know more about the PIX !!! Big thanks to everybody who helped and tried to help.
07-15-2008 09:02 AM
Ok, I did conf term, then configure factory-default 192.169.7.100 255.255.255.0, the process goes on but then if I do show conf the configurations remains the same. I even tryed to do it and then reboot the PIX but the configuration doesn't go away. Any comments ?
07-15-2008 09:03 AM
Ok, I did conf term, then configure factory-default 192.169.7.100 255.255.255.0, the process goes on but then if I do show conf the configurations remains the same. I even tryed to do it and then reboot the PIX but the configuration doesn't go away. Any comments ?
07-15-2008 09:06 AM
You can always do a write erase, then reload. If it prompts that the config has changed, do you want to save?, choose no. This will delete the ENTIRE config though.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide