08-28-2003 01:47 PM - edited 02-20-2020 10:57 PM
I have been tasked with the project of configing this PIX. I am new but now just a little about the PIX.
I can not ping any machines in the DMZ or from the inside or outside.
Please help
This is my config
Building configuration...
: Saved
:
PIX Version 6.3(1)
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
interface ethernet3 auto
interface ethernet4 auto
interface ethernet5 auto shutdown
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 InetDMZ security50
nameif ethernet3 RASDMZ security45
nameif ethernet4 ISADMZ security40
nameif ethernet5 spare security1
enable password xxxxxxxxxx encrypted
passwd xxxxxx encrypted
hostname xxxxxxPix
domain-name xxxxxxx.com
clock timezone EST -5
clock summer-time EDT recurring
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
names
name 10.59.64.70 Exchange
name 10.59.64.80 SMTP
name 192.168.12.10 RAS
object-group service Exchange tcp
port-object range 5000 5001
port-object eq www
port-object eq smtp
port-object eq 135
object-group service Deny_out tcp
port-object range aol aol
port-object eq 5050
port-object eq 7320
port-object eq 3574
port-object eq 1503
port-object eq 4443
port-object eq 6891
port-object eq 24613
port-object eq 1863
port-object eq 1214
port-object range 6346 6347
port-object eq netbios-ssn
port-object eq aol
port-object eq irc
object-group service Deny_outudp udp
port-object range 13324 13325
port-object eq netbios-ns
object-group icmp-type icmp
access-list outside_access_in permit tcp any host xxx.xxx.198.129 eq smtp log
access-list outside_access_in permit tcp any host xxx.xxx.198.128 object-group Exchange log
access-list outside_access_in permit gre any host xxx.xxx.198.70 log
access-list outside_access_in permit tcp any host xxx.xxx.198.70 eq pptp log
access-list outside_access_in permit icmp any host xxx.xxx.198.70 log
access-list outside_access_in permit tcp any host xxx.xxx.198.130 eq www log
access-list outside_access_in permit tcp any host xxx.xxx.198.130 eq https log
access-list outside_access_in permit tcp any host xxx.xxx.198.131 eq www log
access-list outside_access_in permit tcp any host xxx.xxx.198.131 eq https log
access-list outside_access_in permit tcp any host xxx.xxx.198.132 eq www log
access-list outside_access_in permit tcp any host xxx.xxx.198.132 eq https log
access-list outside_access_in permit icmp any host xxx.xxx.198.128 log
access-list outside_access_in permit icmp any host xxx.xxx.198.129 log
access-list outside_access_in permit icmp any host xxx.xxx.198.130 log
access-list outside_access_in permit icmp any host xxx.xxx.198.131 log
access-list outside_access_in permit icmp any host xxx.xxx.198.132 log
access-list acl_inside permit ip any any log
access-list acl_inside permit icmp any any log
access-list acl_inside permit udp any any log
access-list RASDMZ_access_in permit icmp any any
access-list No_NAT permit ip 10.0.0.0 255.0.0.0 10.57.9.0 255.255.255.0
pager lines 24
logging on
mtu outside 1500
mtu inside 1500
mtu InetDMZ 1500
mtu RASDMZ 1500
mtu ISADMZ 1500
mtu spare 1500
ip address outside xxx.xxx.198.252 255.255.255.0
ip address inside 10.57.3.2 255.255.255.0
ip address InetDMZ 192.168.10.1 255.255.255.0
ip address RASDMZ 192.168.12.1 255.255.255.0
ip address ISADMZ 192.168.11.1 255.255.255.0
no ip address spare
ip audit info action alarm
ip audit attack action alarm
ip audit signature 1000 disable
ip audit signature 1102 disable
ip audit signature 2154 disable
ip audit signature 4050 disable
ip audit signature 4051 disable
ip audit signature 6190 disable
ip local pool pptp 10.57.9.1-10.57.9.254
no failover
failover timeout 0:00:00
failover poll 15
no failover ip address outside
no failover ip address inside
no failover ip address InetDMZ
no failover ip address RASDMZ
no failover ip address ISADMZ
no failover ip address spare
pdm location 10.0.1.0 255.255.255.0 inside
pdm location 10.59.64.3 255.255.255.255 inside
pdm location 10.58.65.9 255.255.255.255 inside
pdm location 10.59.64.0 255.255.224.0 inside
pdm location 10.0.0.0 255.0.0.0 inside
pdm location 0.0.0.0 255.255.255.255 outside
pdm location 10.0.0.0 255.0.0.0 RASDMZ
pdm location RAS 255.255.255.255 RASDMZ
pdm location Exchange 255.255.255.255 inside
pdm location SMTP 255.255.255.255 inside
pdm location 192.168.11.10 255.255.255.255 inside
pdm location 10.57.9.0 255.255.255.0 RASDMZ
pdm location 192.168.11.11 255.255.255.255 ISADMZ
pdm location 192.168.11.12 255.255.255.255 ISADMZ
pdm location 192.168.11.13 255.255.255.255 ISADMZ
pdm logging errors 100
pdm history enable
arp timeout 14400
global (outside) 10 xxx.xxx.198.241
global (InetDMZ) 10 192.168.10.128-192.168.10.254 netmask 255.255.255.0
global (RASDMZ) 10 192.168.12.128-192.168.12.254 netmask 255.255.255.0
global (ISADMZ) 10 192.168.11.128-192.168.11.254 netmask 255.255.255.0
nat (inside) 0 access-list No_NAT
nat (InetDMZ) 10 0.0.0.0 0.0.0.0 0 0
nat (RASDMZ) 10 0.0.0.0 0.0.0.0 0 0
nat (ISADMZ) 10 0.0.0.0 0.0.0.0 0 0
static (RASDMZ,outside) xxx.xxx.198.70 RAS netmask 255.255.255.255 0 0
static (inside,outside) xxx.xxx.198.129 SMTP netmask 255.255.255.255 0 0
static (inside,outside) xxx.xxx.198.128 Exchange netmask 255.255.255.255 0 0
static (ISADMZ,outside) xxx.xxx.198.30 192.168.11.11 netmask 255.255.255.255 0 0
static (ISADMZ,outside) xxx.xxx.198.31 192.168.11.12 netmask 255.255.255.255 0 0
static (ISADMZ,outside) xxx.xxx.198.32 192.168.11.13 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
access-group acl_inside in interface inside
route outside 0.0.0.0 0.0.0.0 xxx.xxx.198.251 1
route inside 10.0.0.0 255.0.0.0 10.57.3.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authentication telnet console LOCAL
http server enable
http 10.58.65.9 255.255.255.255 inside
http 10.59.64.0 255.255.224.0 inside
http 10.0.1.0 255.255.255.0 inside
no snmp-server location
snmp-server contact James Blancke
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-pptp
telnet 10.58.65.9 255.255.255.255 inside
telnet 10.59.64.0 255.255.224.0 inside
telnet 10.0.1.0 255.255.255.0 inside
telnet timeout 15
ssh timeout 5
console timeout 0
vpdn group PPTP-VPDN-GROUP accept dialin pptp
vpdn group PPTP-VPDN-GROUP ppp authentication pap
vpdn group PPTP-VPDN-GROUP ppp authentication chap
vpdn group PPTP-VPDN-GROUP ppp authentication mschap
vpdn group PPTP-VPDN-GROUP ppp encryption mppe auto
vpdn group PPTP-VPDN-GROUP client configuration address local pptp
vpdn group PPTP-VPDN-GROUP client configuration dns 10.59.64.50 10.56.64.51
vpdn group PPTP-VPDN-GROUP client configuration wins 10.59.64.50 10.56.64.51
vpdn group PPTP-VPDN-GROUP pptp echo 60
vpdn group PPTP-VPDN-GROUP client authentication local
vpdn username hanscomb password *********
vpdn enable outside
username Hanscomb password xxxxxx encrypted privilege 15
terminal width 90
: end
[OK]
08-28-2003 05:35 PM
The PIX does not allow ICMP packets similarly to how it handles UDP/TCP packets in between interfaces, you always hav eto specifically allow them in.
access-group RASDMZ_access_in in interface RASDMZ
should get you going (for the RASDMZ interface at least)
02-21-2014 08:14 AM
thanks your solution helped me as well
Regards
Nitin Mohan
08-30-2003 12:56 PM
You put the any any in the inside interface, should be in the DMZ interface.
Try that.
-k
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide