11-26-2012 06:48 PM - edited 03-11-2019 05:28 PM
I am trying to set the PIX firewall to transparent mode.
After I set it to transparent firewall, I allowed all icmp, tcp, udp traffics.
Currently, any devices in the inside network can get the ip automatically from DHCP server in the outside network
but cannot ping to any servers in the outside network either access the internet.
Do I need additional confiration on the firewall?
Here's the configuration:
PIX Version 7.0(1)
firewall transparent
names
!
interface Ethernet0
nameif inside
security-level 100
!
interface Ethernet1
nameif outside
security-level 0
!
interface Ethernet2
shutdown
no nameif
no security-level
!
enable password encrypted
passwd .encrypted
hostname pixfirewall
ftp mode passive
access-list outside_in extended permit icmp any any
access-list outside_in extended permit tcp any any
access-list outside_in extended permit udp any any
access-list inside_out extended permit icmp any any
access-list inside_out extended permit tcp any any
access-list inside_out extended permit udp any any
pager lines 24
mtu inside 1500
mtu outside 1500
ip address 192.168.123.229 255.255.255.255
monitor-interface inside
monitor-interface outside
no asdm history enable
arp timeout 14400
access-group inside_out in interface inside
access-group outside_in in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.123.254 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp
telnet timeout 5
ssh timeout 5
console timeout 0
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
Cryptochecksum:
: end
pixfirewall#
pixfirewall#
pixfirewall# ping 192.168.123.254
Sending 5, 100-byte ICMP Echos to 192.168.123.254, timeout is 2 seconds:
No route to host 192.168.123.254
Success rate is 0 percent (0/1)
pixfirewall#
Would appreciate any suggestions,
Cory
Solved! Go to Solution.
11-27-2012 12:41 AM
Hi,
ip address 192.168.123.229 255.255.255.255, you should have the same mask as the connected subnet.
And by the way the route command is not needed anymore as you are now switching traffic and not routing.
Regards.
Alain
Don't forget to rate helpful posts.
11-27-2012 12:41 AM
Hi,
ip address 192.168.123.229 255.255.255.255, you should have the same mask as the connected subnet.
And by the way the route command is not needed anymore as you are now switching traffic and not routing.
Regards.
Alain
Don't forget to rate helpful posts.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide