cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
439
Views
0
Helpful
2
Replies

PIX 7.0.4 NAT Issue

dspdss
Level 1
Level 1

I recently upgraded from version 6.3.4 to 7.0.4 on a new PIX firewall. Now it appears that mapping multiple outside IP addresses to a single inside IP, which was supported in 6.3.4, is not longer supported in 7.0.4. Is this true, and if so, are there any workarounds? Thanks.

PIX 6.3.4 Config

----------------

access-list acl_DMZ_in permit tcp 192.168.3.3 255.255.255.0 any eq 80

access-list acl_DMZ_in permit tcp 192.168.3.3 255.255.255.0 any eq 443

access-list acl_DMZ_in permit tcp host 192.168.3.3 host 10.250.225.25 eq 9080

access-list acl_DMZ_in permit tcp host 192.168.3.3 host 10.250.225.25 eq 9443

static (DMZ,outside) 172.16.1.10 192.168.3.3 netmask 255.255.255.255 0 0

static (DMZ,outside) 172.16.1.11 192.168.3.3 netmask 255.255.255.255 0 0

static (DMZ,outside) 172.16.1.12 192.168.3.3 netmask 255.255.255.255 0 0

PIX 7.0.4 Config

----------------

access-list acl_DMZ_in extended permit tcp 192.168.3.3 255.255.255.0 any eq 80

access-list acl_DMZ_in extended permit tcp 192.168.3.3 255.255.255.0 any eq 443

access-list acl_DMZ_in extended permit tcp host 192.168.3.3 host 10.250.225.25 eq 9080

access-list acl_DMZ_in extended permit tcp host 192.168.3.3 host 10.250.225.25 eq 9443

static (DMZ,outside) 172.16.1.10 192.168.3.3 netmask 255.255.255.255 0 0

config term

static (DMZ,outside) 172.16.1.11 192.168.3.3 netmask 255.255.255.255 0 0

ERROR: duplicate of existing static

DMZ-1:192.168.3.3 to outside:172.16.1.11 netmask 255.255.255.255

2 Replies 2

jackko
Level 7
Level 7

providing different static statements are used for different ports, you can configure port forwarding instead of one-to-one mapping.

e.g.

static (dmz,outside) tcp 172.16.1.10 9443 192.168.3.3 9443 netmask 255.255.255.255

static (dmz,outside) tcp 172.16.1.11 9080 192.168.3.3 9080 netmask 255.255.255.255

I've just had a response back from TAC on this exact issue

multiple to 1 NAT is not, and has never been supported in PIX/ASA

wrt it previously working in 6.3.4, (and other versions.) TAC response is "may have worked.... but it is not guaranteed to work all the time".

Review Cisco Networking for a $25 gift card