cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
504
Views
0
Helpful
2
Replies

patting

a.kachroo
Level 1
Level 1

hi everyone,

I have 506e pix with 192.168.1.1 as its inside ip address and i have one public ip address configured on outside port.I have no public ip address pool but i am overloading its outside port and eveything is working fine.

I have one more local network say 193.168.1.0 255.255.255.0.How can this network access internet through this pix.Tricolite-PIX#

Tricolite-PIX# SHOW RUN

: Saved

:

PIX Version 6.3(3)

interface ethernet0 auto

interface ethernet1 auto

nameif ethernet0 outside security0

nameif ethernet1 inside security100

enable password xxxx

passwd xxxx

hostname Tricolite-PIX

domain-name Tricolite

fixup protocol dns maximum-length 512

fixup protocol ftp 21

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol http 80

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol sip 5060

fixup protocol sip udp 5060

fixup protocol skinny 2000

fixup protocol smtp 25

fixup protocol sqlnet 1521

fixup protocol tftp 69

names

access-list ACL_INBOUND permit tcp any host 220.227.152.39 eq 26

access-list ACL_INBOUND permit icmp any host 220.227.152.39 echo-reply

access-list ACL_INBOUND permit tcp any host 220.227.152.39 eq imap4

access-list ACL_INBOUND permit tcp any host 220.227.152.39 eq www

access-list ACL_INBOUND permit tcp any host 220.227.152.39 eq pop3

access-list ACL_OUTBOUND deny tcp any host 209.81.7.23

access-list ACL_OUTBOUND deny tcp any host 64.15.205.132

access-list ACL_OUTBOUND permit ip any any

pager lines 24

logging on

logging trap warnings

logging device-id hostname

logging host inside 192.168.1.106 format emblem

icmp deny any outside

mtu outside 1500

mtu inside 1500

ip address outside 220.227.x.x.x.255.240

ip address inside 192.168.1.201 255.255.255.0

ip audit name ATTACKPOLICY attack action alarm drop

ip audit interface outside ATTACKPOLICY

ip audit interface inside ATTACKPOLICY

ip audit info action alarm

ip audit attack action alarm

pdm location 192.168.1.106 255.255.255.255 inside

pdm location 64.15.x.x.x.255.255 outside

pdm location 209.81.x.x.x.255.255 outside

pdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

static (inside,outside) 220.x.x.x.168.1.1 netmask 255.x.x.255 0

access-group ACL_INBOUND in interface outside

access-group ACL_OUTBOUND in interface inside

route outside 0.0.0.0 0.0.0.0 220.227.152.35 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+

aaa-server RADIUS protocol radius

aaa-server LOCAL protocol local

http server enable

http 192.168.1.106 255.255.255.255 inside

no snmp-server location

no snmp-server contact

snmp-server community public

no snmp-server enable traps

floodguard enable

telnet 192.168.1.106 255.255.255.255 inside

telnet timeout 5

ssh timeout 5

console timeout 0

terminal width 80

Cryptochecksum:xxxxx

: end

i have added one static route for that network.Also i don,t think i have to add some new configuration as natting is allowed for all classes.

I also tried to add through nat command 193.168.1.0 network,but no progress.From 193.168.1.0 network, I can ping pix,s inside ip address and from pix i am able to ping 193.168.1.0 network.

So what i have to check or configure to overcome this problem.

Arun Kachroo

2 Replies 2

mhussein
Level 4
Level 4

The router connecting the second network should have a default route pointing to the PIX's inside ip address 192.168.1.201 as follows:

ip route 0.0.0.0 0.0.0.0 192.168.1.201

HTH

Mustafa

Philip D'Ath
VIP Alumni
VIP Alumni

You really shouldn't post passwords, encrypted or otherwise ...

You need to add:

route inside 193.168.1.0 255.255.255.0

The PIX is already told to NAT everything, so nothing to change there.