You have no DHCPD addresses!
It should look like this:
dhcpd address 192.168.1.2-192.168.1.254 inside
dhcpd dns 12.127.16.67 12.127.17.72
dhcpd wins x.x.x.x x.x.x.x
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain xxxx.com
dhcpd enable inside
This should help you.
Mike
Best way to do this is a client VPN connection through the PIX into the trusted network then w/remote desktop you can access it. Or do a static one for one translation & open yourself up to the world. VPN is the way to go.
Mike
First off keep it simple! Kill the names until it's working.
2nd you have an outside ip 99.99.99.99 255.255.255.240
w/a route outside of 62.206.41.65, can you even ping the default route. Ping outside 62.206.41.65 do you get a reply?
Kill these 2 transform sets,
crypto ipsec transform-set...
Well you have to create ACLs for this. For example if you have internal net. 192.168.1.0/24 & the DMZ is 172.168.4.0/24 the ACLs go source then destination.
Example: access-list in2dmz permit ip 192.168.1.0 255.255.255.0 172.168.4.0 255.255.255.0
Then: access-group in2dmz in interface dmz
This...
Yes, UDP/500 is part of the crypto process, but if you are passing through a PIX from something like a client, If this is the case then you need UDP/500 protocol 50 & 51 AH & ESP opened to pass client through. If you are trying to just L2L crypto tunnel up that's different. What version are you...
Trying to setup sonics back to back, sonic 1 being a scrub house for all traffic, monitoring etc. then forward all traffic vpn etc. to the firewall for normal delivery.
Need some advice on how to do this.
What I'm trying to do is build a safe zone for all traffic to pass through for content filter monitor & traffic monitor, also have a mail scrubber in the safe zone. Then forward all traffic vpn & otherwise through to the firewall ( a second sonic ) for normal translation into the trusted zone...
It sounds to me like you have the same user doing wireless & connecting to the LAN wired, if this is the case then what you have now is a bridged loop in the network & that can storm your network to a crawl, just like a DOS attack.
I would go w/the Hardware Appliance of PIX (Cisco) I have worked on firewall 1 (checkpoint), Sonic,Netscreen. The PIX I have done so many apps. for customers through, I was doing the VPN setup in beta w/Cisco. Believe it or not I have even passed IPX through a VPN tunnel on a PIX w/other...
You could setup a Radius or Tacacs server that they have to auth. before browse, the only problem w/that is you would have to change the auth. pass alot to maintain a balance,
Have you ever seen a program called CAIN? If you get this program it has tools that will allow you to encrypt passwords alpha or numeral, all you do is type what you want & it will show the encrypt for the number or letter.
Hope that helps
I have the same issue, I am starting my own business in Consulting & every name I have come up w/sounds bad or does not click w/me. But I have found a software thats called Razor & it will produce a bunch of names by the info you put in & it's only 20$.
My business name was going to be...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.