Guest_imported
New member
- Jan 1, 1970
- 0
My Pix has 3 interfaces inside, dmz and outside
10.1.1.0 addresses are used inside.
Public Addresses are used in the DMZ and Outside. (I know Public addresses are not recommended for the DMZ but I can't change that at present without major upheaval to Legacy systems)
Partial configuration is as follows (not real addresses):-
names
name 200.0.0.10 blue (Mail relay)
name 200.0.0.11 yellow (Web server & Certif. server)
ip address outside 200.0.0.5 255.255.255.248
ip address dmz 200.0.0.9 255.255.255.248
ip address inside 10.1.1.0 255.255.255.0
global (outside) 1 200.0.0.1-200.0.0.4 netmask 255.255.255.248
global (outside) 1 interface
nat (inside) 0 access-list no-nat
nat (inside) 1 10.1.1.0 255.255.255.0 0 0
static (dmz,outside) blue blue 255.255.255.255 0 0
static (dmz,outside) yellow yellow 255.255.255.255 0 0
static (inside,dmz) 10.1.1.0 10.1.1.0 netmask 255.255.255.0 0 0
My reasoning is as follows:- Because the dmz uses public addresses the first two statics allow them to go out without translation using their own public addresses.
The 3rd static is because people on the 10.1.1.0 network need to be able to get to both dmz servers but not to the internet other a few users (5) who have access via a proxy server. I thought they would not need translation just to go to the dmz but is this correct?
Is the 3rd static incorrect
At present all users have access to everything they should have BUT due to the nat (inside) 1 10.1.1.0 255.255.255.0 rule everybody also has direct access to the internet.
I tried to cut this off with an access list on the inside interface which allowed everything from inside to the DMZ but denied access to the outside on port 80 but this cut off everybody from the DMZ.
Could somebody please tell me where I have gone wrong? I am beginning to wish I had spent the extra money on FW-1 which is a breeze to configure compared to this Pix.
What translations do I need to enable all inside users to get to the DMZ and all DMZ servers to be able to reach the internet. I do not want all inside users to have access to the internet. Only the proxy server and a couple of other servers should have access to the internet. It is no good looking at the Cisco site as there are no examples which use public addresses in the DMZ.
TIA
Regards
Rob
10.1.1.0 addresses are used inside.
Public Addresses are used in the DMZ and Outside. (I know Public addresses are not recommended for the DMZ but I can't change that at present without major upheaval to Legacy systems)
Partial configuration is as follows (not real addresses):-
names
name 200.0.0.10 blue (Mail relay)
name 200.0.0.11 yellow (Web server & Certif. server)
ip address outside 200.0.0.5 255.255.255.248
ip address dmz 200.0.0.9 255.255.255.248
ip address inside 10.1.1.0 255.255.255.0
global (outside) 1 200.0.0.1-200.0.0.4 netmask 255.255.255.248
global (outside) 1 interface
nat (inside) 0 access-list no-nat
nat (inside) 1 10.1.1.0 255.255.255.0 0 0
static (dmz,outside) blue blue 255.255.255.255 0 0
static (dmz,outside) yellow yellow 255.255.255.255 0 0
static (inside,dmz) 10.1.1.0 10.1.1.0 netmask 255.255.255.0 0 0
My reasoning is as follows:- Because the dmz uses public addresses the first two statics allow them to go out without translation using their own public addresses.
The 3rd static is because people on the 10.1.1.0 network need to be able to get to both dmz servers but not to the internet other a few users (5) who have access via a proxy server. I thought they would not need translation just to go to the dmz but is this correct?
Is the 3rd static incorrect
At present all users have access to everything they should have BUT due to the nat (inside) 1 10.1.1.0 255.255.255.0 rule everybody also has direct access to the internet.
I tried to cut this off with an access list on the inside interface which allowed everything from inside to the DMZ but denied access to the outside on port 80 but this cut off everybody from the DMZ.
Could somebody please tell me where I have gone wrong? I am beginning to wish I had spent the extra money on FW-1 which is a breeze to configure compared to this Pix.
What translations do I need to enable all inside users to get to the DMZ and all DMZ servers to be able to reach the internet. I do not want all inside users to have access to the internet. Only the proxy server and a couple of other servers should have access to the internet. It is no good looking at the Cisco site as there are no examples which use public addresses in the DMZ.
TIA
Regards
Rob