cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
420
Views
0
Helpful
5
Replies

urgent needed pix configuration

nataraj_v
Level 1
Level 1

i have a pix with three interfaces

inside 172.16.x.x.

outside 10.x.x.x

dmz 192.168.x.x.

now i have a switch in dmz whose vlan ip address is 192.168.1.68 . now i want to monitor

this switch from my NMS server which is in 10.x.x.x series its ip address is 10.0.67.100

wht i need to configure on pix ??

Thanks in advance

Thanks & Regards

Nataraj

5 Replies 5

a.alekseev
Level 7
Level 7

static (inside, dmz) 10.x.x.x 10.x.x.x mask y.y.y.y

only static nat is enoguh ???

no need to put access-list ??

it depends on your configuration

paddyxdoyle
Level 6
Level 6

Hi,

I think it will be something like:

!Allow NMS to talk to switch using SNMP

static (dmz,outside) 10.x.x.x 192.168.1.68 netmask 255.255.255.255

access-list acl_out permit udp host 10.0.67.100 host 10.x.x.x eq snmp

access-group acl_out in interface outside

!Allow DMZ to talk out to NMS (snmptraps etc)

global (outside) 1 10.x.x.x

nat (dmz) 1 192.168.1.0 255.255.255.0

HTH

Paddy

ggarlington
Level 1
Level 1

This is the resolution from a TAC case it might help.

All devices on both the inside interface of the PIX and the DMZ, for the purpose of this example, need to use their native addresses.

It is necessary to configure a static translation and access for the workstations on the DMZ to reach the inside network.

Note: The static Network Address Translation (NAT) that is required, is for the entire inside network, rather than for a single device. The ACL will not defer from the standard, but will be applied to the DMZ interface.

In this example, the inside network will be 192.168.1.0 and the DMZ network will be 10.10.3.0. This allows all traffic to pass between the DMZ and the inside networks.

Issue the following commands to configure static NAT:

pixfirewall> enable

pixfirewall# configure terminal

pixfirewall (config t)# static (inside, DMZ) 192.168.1.0 192.168.1.0

What the above statement tells the PIX is that when traffic hits it from the DMZ and is destined for the inside interface''s network (192.168.1.0), to translate that address to itself. Any traffic that passes through a PIX must be translated. To satisfy this requirement, the PIX translates any address in this range to itself. This is a one-to-one translation. Because this example uses the same range twice, if traffic destined for 192.168.1.25 hits the PIX, when it is sent out of the inside interface it will remain destined for 192.168.1.25. It does not reassign it a random IP address in the range.

Issue the following commands to configure the ACL:

pixfirewall (config t)# access-list dmztoinside permit ip any any

pixfirewall (config t)# access-group dmztoinside in interface DMZ

After these commands have been issued, you should be able to pass the specified traffic. If there is any problem with passing traffic at that point, issue the clear xlate command.

Note: Issuing this command will temporarily drop active connections. It should re-establish within 10 seconds.

Review Cisco Networking for a $25 gift card