cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
392
Views
0
Helpful
2
Replies

PIX 7.0.4 NAT Issue

dspdss
Level 1
Level 1

I recently upgraded from version 6.3.4 to 7.0.4 on a new PIX firewall. Now it appears that mapping multiple outside IP addresses to a single inside IP, which was supported in 6.3.4, is not longer supported in 7.0.4. Is this true, and if so, are there any workarounds? Thanks.

PIX 6.3.4 Config

----------------

access-list acl_DMZ_in permit tcp 192.168.3.3 255.255.255.0 any eq 80

access-list acl_DMZ_in permit tcp 192.168.3.3 255.255.255.0 any eq 443

access-list acl_DMZ_in permit tcp host 192.168.3.3 host 10.250.225.25 eq 9080

access-list acl_DMZ_in permit tcp host 192.168.3.3 host 10.250.225.25 eq 9443

static (DMZ,outside) 172.16.1.10 192.168.3.3 netmask 255.255.255.255 0 0

static (DMZ,outside) 172.16.1.11 192.168.3.3 netmask 255.255.255.255 0 0

static (DMZ,outside) 172.16.1.12 192.168.3.3 netmask 255.255.255.255 0 0

PIX 7.0.4 Config

----------------

access-list acl_DMZ_in extended permit tcp 192.168.3.3 255.255.255.0 any eq 80

access-list acl_DMZ_in extended permit tcp 192.168.3.3 255.255.255.0 any eq 443

access-list acl_DMZ_in extended permit tcp host 192.168.3.3 host 10.250.225.25 eq 9080

access-list acl_DMZ_in extended permit tcp host 192.168.3.3 host 10.250.225.25 eq 9443

static (DMZ,outside) 172.16.1.10 192.168.3.3 netmask 255.255.255.255 0 0

config term

static (DMZ,outside) 172.16.1.11 192.168.3.3 netmask 255.255.255.255 0 0

ERROR: duplicate of existing static

DMZ-1:192.168.3.3 to outside:172.16.1.11 netmask 255.255.255.255

2 Replies 2

jackko
Level 7
Level 7

providing different static statements are used for different ports, you can configure port forwarding instead of one-to-one mapping.

e.g.

static (dmz,outside) tcp 172.16.1.10 9443 192.168.3.3 9443 netmask 255.255.255.255

static (dmz,outside) tcp 172.16.1.11 9080 192.168.3.3 9080 netmask 255.255.255.255

I've just had a response back from TAC on this exact issue

multiple to 1 NAT is not, and has never been supported in PIX/ASA

wrt it previously working in 6.3.4, (and other versions.) TAC response is "may have worked.... but it is not guaranteed to work all the time".

Review Cisco Networking products for a $25 gift card