05-17-2005 08:44 PM - edited 02-21-2020 12:08 AM
i have a pix with three interfaces
inside 172.16.x.x.
outside 10.x.x.x
dmz 192.168.x.x.
now i have a switch in dmz whose vlan ip address is 192.168.1.68 . now i want to monitor
this switch from my NMS server which is in 10.x.x.x series its ip address is 10.0.67.100
wht i need to configure on pix ??
Thanks in advance
Thanks & Regards
Nataraj
05-17-2005 10:48 PM
static (inside, dmz) 10.x.x.x 10.x.x.x mask y.y.y.y
05-18-2005 01:14 AM
only static nat is enoguh ???
no need to put access-list ??
05-18-2005 02:15 AM
it depends on your configuration
05-18-2005 02:41 AM
Hi,
I think it will be something like:
!Allow NMS to talk to switch using SNMP
static (dmz,outside) 10.x.x.x 192.168.1.68 netmask 255.255.255.255
access-list acl_out permit udp host 10.0.67.100 host 10.x.x.x eq snmp
access-group acl_out in interface outside
!Allow DMZ to talk out to NMS (snmptraps etc)
global (outside) 1 10.x.x.x
nat (dmz) 1 192.168.1.0 255.255.255.0
HTH
Paddy
05-19-2005 09:43 AM
This is the resolution from a TAC case it might help.
All devices on both the inside interface of the PIX and the DMZ, for the purpose of this example, need to use their native addresses.
It is necessary to configure a static translation and access for the workstations on the DMZ to reach the inside network.
Note: The static Network Address Translation (NAT) that is required, is for the entire inside network, rather than for a single device. The ACL will not defer from the standard, but will be applied to the DMZ interface.
In this example, the inside network will be 192.168.1.0 and the DMZ network will be 10.10.3.0. This allows all traffic to pass between the DMZ and the inside networks.
Issue the following commands to configure static NAT:
pixfirewall> enable
pixfirewall# configure terminal
pixfirewall (config t)# static (inside, DMZ) 192.168.1.0 192.168.1.0
What the above statement tells the PIX is that when traffic hits it from the DMZ and is destined for the inside interface''s network (192.168.1.0), to translate that address to itself. Any traffic that passes through a PIX must be translated. To satisfy this requirement, the PIX translates any address in this range to itself. This is a one-to-one translation. Because this example uses the same range twice, if traffic destined for 192.168.1.25 hits the PIX, when it is sent out of the inside interface it will remain destined for 192.168.1.25. It does not reassign it a random IP address in the range.
Issue the following commands to configure the ACL:
pixfirewall (config t)# access-list dmztoinside permit ip any any
pixfirewall (config t)# access-group dmztoinside in interface DMZ
After these commands have been issued, you should be able to pass the specified traffic. If there is any problem with passing traffic at that point, issue the clear xlate command.
Note: Issuing this command will temporarily drop active connections. It should re-establish within 10 seconds.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide