Hi,
I am a newbie to the world of PIX and I need some help configuring a PIX-501 3des to allow access into specified devices from the outside interface.
One of these inside devices has an IP address of 193.39.99.21 and access may be required by telnet, ping and web browser.
All devices on the inside interface need access to all devices on the outside interface.
With the config below, I can access devices on the outside interface, but can not access the 193.39.99.21 device from the outside interface
Copy of existing config below.
Host site
|
Cisco PIX 501 inside interface 172.31.11.10
|
Cisco PIX 501 outside interface 10.250.245.1
|
Cisco C1603 router 10.250.245.250
|
Leased line
|
Cisco 1603 router 172.16.157.250
|
Remote site 172.16.157.220
Many thanks in advance
sh conf
: Saved
:
PIX Version 6.1(4)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname PIXfirewall
domain-name cisco.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list 101 permit icmp any any echo-reply
access-list 101 permit tcp any any
access-list 101 permit ip any any
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 10.250.245.1 255.255.255.0
ip address inside 172.31.11.10 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 172.30.24.245 255.255.255.255 inside
pdm location 192.168.1.0 255.255.255.0 inside
pdm location 10.250.245.1 255.255.255.255 outside
pdm location 172.30.24.0 255.255.255.0 inside
pdm location 172.30.11.0 255.255.255.0 inside
pdm location 172.30.0.0 255.255.0.0 inside
pdm location 172.31.11.10 255.255.255.255 inside
pdm location 172.31.0.0 255.255.0.0 inside
pdm location 193.39.0.0 255.255.0.0 inside
pdm location 172.16.157.0 255.255.255.0 outside
pdm location 172.16.157.0 255.255.255.0 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
global (outside) 1 10.250.245.0
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 10.250.245.250 172.31.11.10 netmask 255.255.255.255 0 0
access-group 101 in interface outside
rip inside default version 1
route outside 172.16.157.0 255.255.255.0 10.250.245.1 1
route inside 172.30.0.0 255.255.0.0 172.31.11.10 1
route inside 172.31.0.0 255.255.0.0 172.31.11.10 1
route inside 172.31.11.10 255.255.255.255 172.31.11.250 1
route inside 193.39.0.0 255.255.0.0 172.31.11.10 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.1.0 255.255.255.0 inside
http 172.30.11.0 255.255.255.0 inside
http 172.30.24.0 255.255.255.0 inside
http 172.30.24.245 255.255.255.255 inside
http 172.30.0.0 255.255.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
telnet 172.30.24.245 255.255.255.255 inside
telnet timeout 5
ssh timeout 5
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
terminal width 80
Cryptochecksum:19d867cbd761f88d9440b63ba0a5068a
I am a newbie to the world of PIX and I need some help configuring a PIX-501 3des to allow access into specified devices from the outside interface.
One of these inside devices has an IP address of 193.39.99.21 and access may be required by telnet, ping and web browser.
All devices on the inside interface need access to all devices on the outside interface.
With the config below, I can access devices on the outside interface, but can not access the 193.39.99.21 device from the outside interface
Copy of existing config below.
Host site
|
Cisco PIX 501 inside interface 172.31.11.10
|
Cisco PIX 501 outside interface 10.250.245.1
|
Cisco C1603 router 10.250.245.250
|
Leased line
|
Cisco 1603 router 172.16.157.250
|
Remote site 172.16.157.220
Many thanks in advance
sh conf
: Saved
:
PIX Version 6.1(4)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname PIXfirewall
domain-name cisco.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list 101 permit icmp any any echo-reply
access-list 101 permit tcp any any
access-list 101 permit ip any any
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 10.250.245.1 255.255.255.0
ip address inside 172.31.11.10 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 172.30.24.245 255.255.255.255 inside
pdm location 192.168.1.0 255.255.255.0 inside
pdm location 10.250.245.1 255.255.255.255 outside
pdm location 172.30.24.0 255.255.255.0 inside
pdm location 172.30.11.0 255.255.255.0 inside
pdm location 172.30.0.0 255.255.0.0 inside
pdm location 172.31.11.10 255.255.255.255 inside
pdm location 172.31.0.0 255.255.0.0 inside
pdm location 193.39.0.0 255.255.0.0 inside
pdm location 172.16.157.0 255.255.255.0 outside
pdm location 172.16.157.0 255.255.255.0 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
global (outside) 1 10.250.245.0
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 10.250.245.250 172.31.11.10 netmask 255.255.255.255 0 0
access-group 101 in interface outside
rip inside default version 1
route outside 172.16.157.0 255.255.255.0 10.250.245.1 1
route inside 172.30.0.0 255.255.0.0 172.31.11.10 1
route inside 172.31.0.0 255.255.0.0 172.31.11.10 1
route inside 172.31.11.10 255.255.255.255 172.31.11.250 1
route inside 193.39.0.0 255.255.0.0 172.31.11.10 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.1.0 255.255.255.0 inside
http 172.30.11.0 255.255.255.0 inside
http 172.30.24.0 255.255.255.0 inside
http 172.30.24.245 255.255.255.255 inside
http 172.30.0.0 255.255.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
telnet 172.30.24.245 255.255.255.255 inside
telnet timeout 5
ssh timeout 5
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
terminal width 80
Cryptochecksum:19d867cbd761f88d9440b63ba0a5068a