cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Bookmark
|
Subscribe
|
702
Views
0
Helpful
3
Replies

PIX-515 DMZ problem

lumecir
Level 1
Level 1

Hello,

I have PIX-515 with 3 Ethernets. Here is config (only relevant parts):

access-list FROM_OUTSIDE permit icmp any any

access-list FROM_OUTSIDE permit ip any host xxx.xxx.xxx.xxx

access-list FROM_OUTSIDE permit ip any host yyy.yyy.yyy.yyy

access-list NONAT permit ip 192.168.4.0 255.255.255.0 192.168.3.0 255.255.255.0

access-list NONAT permit ip 192.168.2.0 255.255.255.0 192.168.3.0 255.255.255.0

access-list NONAT permit ip 192.168.4.0 255.255.255.0 192.168.2.0 255.255.255.0

ip address outside xxx.xxx.xxx.xxx 255.255.255.240

ip address inside 192.168.4.1 255.255.255.0

ip address DMZ 192.168.2.1 255.255.255.0

global (outside) 1 interface

nat (inside) 0 access-list NONAT

nat (inside) 1 192.168.4.0 255.255.255.0 0 0

nat (DMZ) 0 access-list NONAT

nat (DMZ) 1 192.168.2.0 255.255.255.0 0 0

static (DMZ,outside) tcp interface pop3 192.168.2.2 pop3 netmask 255.255.255.255 0 0

static (DMZ,outside) tcp interface smtp 192.168.2.2 smtp netmask 255.255.255.255 0 0

static (DMZ,outside) tcp interface imap4 192.168.2.2 imap4 netmask 255.255.255.255 0 0

static (DMZ,outside) tcp interface www 192.168.2.3 www netmask 255.255.255.255 0 0

static (DMZ,outside) tcp interface 442 192.168.2.2 442 netmask 255.255.255.255 0 0

static (DMZ,outside) tcp interface ftp-data 192.168.2.3 ftp-data netmask 255.255.255.255 0 0

static (DMZ,outside) tcp interface ftp 192.168.2.3 ftp netmask 255.255.255.255 0 0

static (DMZ,inside) tcp xxx.xxx.xxx.xxx pop3 192.168.2.2 pop3 netmask 255.255.255.255 0 0

static (DMZ,inside) tcp xxx.xxx.xxx.xxx smtp 192.168.2.2 smtp netmask 255.255.255.255 0 0

static (DMZ,inside) tcp xxx.xxx.xxx.xxx imap4 192.168.2.2 imap4 netmask 255.255.255.255 0 0

static (DMZ,inside) tcp xxx.xxx.xxx.xxx 81 192.168.2.2 81 netmask 255.255.255.255 0 0

static (DMZ,inside) tcp interface 3389 192.168.2.2 3389 netmask 255.255.255.255 0 0

static (DMZ,inside) tcp xxx.xxx.xxx.xxx 442 192.168.2.2 442 netmask 255.255.255.255 0 0

static (DMZ,inside) tcp xxx.xxx.xxx.xxx www 192.168.2.3 www netmask 255.255.255.255 0 0

static (DMZ,inside) tcp xxx.xxx.xxx.xxx ftp-data 192.168.2.3 ftp-data netmask 255.255.255.255 0 0

static (DMZ,inside) tcp xxx.xxx.xxx.xxx ftp 192.168.2.3 ftp netmask 255.255.255.255 0 0

static (DMZ,outside) yyy.yyy.yyy.yyy 192.168.2.4 netmask 255.255.255.255 0 0

access-group FROM_OUTSIDE in interface outside

Problem is: users report that from outside all work well (www, ftp, mail, www access to mail on 442/tcp), but from inside they cannot connect to ftp server and cannot use MS Remote Desktop Conn. (3389/tcp) to connect to server 192.168.2.2 (mail server). 192.168.2.3 is www and ftp server. They connect to same address (xxx.xxx.xxx.xxx) as from outside. I am sure that configuration is OK, so I would ask: is something in configuration, what prevents users from using ftp and MS Rem. Deskt. from inside? Thanks in advance for any comment.

Best regards

Lukas Mecir

Albit

3 Replies 3

bmutcherson
Level 1
Level 1

check your static statements for static (dmz,inside)

verify your security settings for each interface.

is your inside interface lower or higher than your dmz?

ex.

nameif ethernet0 outside security0

nameif ethernet1 inside security100

nameif ethernet3 dmz1 security50

if the inside has the higher preference then your static statements are defined wrong. they should be.

static (high, low) tcp low high netmask

static (inside, dmz)tcp dmz inside netmask

the outside statements are defined right becuase your outside interface has the lowest security setting. make change and then test.

mrarahman
Level 1
Level 1

Change all the ACL static(DMZ,inside) to following:

static (inside,DMZ) tcp xxx.xxx.xxx.xxx pop3 192.168.2.2 pop3 netmask 255.255.255.255 0 0

static (inside,DMZ) tcp xxx.xxx.xxx.xxx smtp 192.168.2.2 smtp netmask 255.255.255.255 0 0

static (inside,DMZ) tcp xxx.xxx.xxx.xxx imap4 192.168.2.2 imap4 netmask 255.255.255.255 0 0

static (inside,DMZ) tcp xxx.xxx.xxx.xxx 81 192.168.2.2 81 netmask 255.255.255.255 0 0

static (inside,DMZ) tcp interface 3389 192.168.2.2 3389 netmask 255.255.255.255 0 0

static (inside,DMZ) tcp xxx.xxx.xxx.xxx 442 192.168.2.2 442 netmask 255.255.255.255 0 0

static (inside,DMZ) tcp xxx.xxx.xxx.xxx www 192.168.2.3 www netmask 255.255.255.255 0 0

static (inside,DMZ) tcp xxx.xxx.xxx.xxx ftp-data 192.168.2.3 ftp-data netmask 255.255.255.255 0 0

static (inside,DMZ) tcp xxx.xxx.xxx.xxx ftp 192.168.2.3 ftp netmask 255.255.255.255 0 0

Its always like this:

static(high,low) low(IP) high(IP)

wla1evc
Level 1
Level 1

Two useful command in t/s pix issues:

- To see if this is caused by nat. use "debug icmp trace". this will show if your natting as expected

- if you're using ver 6.2 or above use the capture command.

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/c.htm#wp1053548