I've just added a switch between my PIX 506 and Microsoft ISA Server. My intention is to create a DMZ so that I do not have to open up any (more) ports in my ISA server. Here is my current layout:
Internet
|
Cisco Router
|
Pix 506
|
Switch -- Web Server
|
ISA Server
|
LAN
Everything is working as before but I cannot get my Web Server to communicate through the PIX. I can ping the inside interface but everything stops there. I thought I could just plug in the Web Server and connect to the internet (with my current config). I allow all internal connections any outbound traffic and the Web Server is on the same network as the insdie Pix interface. I've cleared the XLATE and ARP on the Pix and cleared the ARP on my router.
I must be missing something really easy....
Router Interface
64.x.x.121
PIX Interfaces Web Server
Out: 64.x.x.122 192.168.2.5
In: 192.198.2.1
ISA Interfaces
Out: 192.168.2.2
In: 192.168.1.1
Below is my current config for my PIX:
PIX Version 5.2(5)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname pixfirewall
fixup protocol ftp 21
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol sqlnet 1521
fixup protocol sip 5060
no fixup protocol smtp 25
no fixup protocol http 80
names
access-list outside permit tcp any host 64.x.x.124 eq smtp
access-list outside permit tcp any host 64.x.x.125 eq www
no pager
no logging on
interface ethernet0 10baset
interface ethernet1 10baset
mtu outside 1500
mtu inside 1500
ip address outside 64.x.x.122 255.255.255.248
ip address inside 192.168.2.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
arp timeout 14400
global (outside) 1 64.x.x.123
nat (inside) 1 192.168.2.0 255.255.255.0 0 0
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 64.x.x.124 192.168.2.2 netmask 255.255.255.255 0 0
static (inside,outside) 64.x.x.125 192.168.2.5 netmask 255.255.255.255 0 0
access-group outside in interface outside
route outside 0.0.0.0 0.0.0.0 64.x.x.121 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
isakmp identity hostname
telnet 192.168.2.0 255.255.255.0 inside
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
Another Question I have is regarding the following line in my config:
global (outside) 1 64.x.x.123
Is this necessary since I'm running ISA Server? Whenever I do a show xlate I only see:
pixfirewall# show xlate
Global 64.x.x.124 Local 192.168.2.2 static
Global 64.x.x.125 Local 192.168.2.5 static
It looks like 64.x.x.123 is never being used for PAT. I'm assuming because the ISA server is already doing it? I would say that I can remove this line and not have any issues (and free up a public IP for use somewhere else).
Comments, suggestions, and help are greatly appreciated.
--Rick
Internet
|
Cisco Router
|
Pix 506
|
Switch -- Web Server
|
ISA Server
|
LAN
Everything is working as before but I cannot get my Web Server to communicate through the PIX. I can ping the inside interface but everything stops there. I thought I could just plug in the Web Server and connect to the internet (with my current config). I allow all internal connections any outbound traffic and the Web Server is on the same network as the insdie Pix interface. I've cleared the XLATE and ARP on the Pix and cleared the ARP on my router.
I must be missing something really easy....
Router Interface
64.x.x.121
PIX Interfaces Web Server
Out: 64.x.x.122 192.168.2.5
In: 192.198.2.1
ISA Interfaces
Out: 192.168.2.2
In: 192.168.1.1
Below is my current config for my PIX:
PIX Version 5.2(5)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname pixfirewall
fixup protocol ftp 21
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol sqlnet 1521
fixup protocol sip 5060
no fixup protocol smtp 25
no fixup protocol http 80
names
access-list outside permit tcp any host 64.x.x.124 eq smtp
access-list outside permit tcp any host 64.x.x.125 eq www
no pager
no logging on
interface ethernet0 10baset
interface ethernet1 10baset
mtu outside 1500
mtu inside 1500
ip address outside 64.x.x.122 255.255.255.248
ip address inside 192.168.2.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
arp timeout 14400
global (outside) 1 64.x.x.123
nat (inside) 1 192.168.2.0 255.255.255.0 0 0
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 64.x.x.124 192.168.2.2 netmask 255.255.255.255 0 0
static (inside,outside) 64.x.x.125 192.168.2.5 netmask 255.255.255.255 0 0
access-group outside in interface outside
route outside 0.0.0.0 0.0.0.0 64.x.x.121 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
isakmp identity hostname
telnet 192.168.2.0 255.255.255.0 inside
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
Another Question I have is regarding the following line in my config:
global (outside) 1 64.x.x.123
Is this necessary since I'm running ISA Server? Whenever I do a show xlate I only see:
pixfirewall# show xlate
Global 64.x.x.124 Local 192.168.2.2 static
Global 64.x.x.125 Local 192.168.2.5 static
It looks like 64.x.x.123 is never being used for PAT. I'm assuming because the ISA server is already doing it? I would say that I can remove this line and not have any issues (and free up a public IP for use somewhere else).
Comments, suggestions, and help are greatly appreciated.
--Rick