spillo3000
IS-IT--Management
block hosts from inside to dmz net...
this is my pix configuration
PIX Version 6.1(4)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
enable password ddcdcde encrypted
passwd 2ddrdrefrefrefre encrypted
hostname pluto
domain-name pippo
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no names
access-list dmz-in permit icmp any any
access-list dmz-in permit tcp any any
access-list dmz-in permit udp any any
access-list dmz-in permit ip any any
pager lines 24
logging on
logging trap debugging
logging host dmz dmz-host
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip address outside a.b.d.10 255.255.255.252
ip address inside a.b.c.1 255.255.255.0
ip address dmz a.b.e.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
no failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
failover ip address dmz 0.0.0.0
pdm history enable
arp timeout 14400
nat (inside) 0 a.b.c.0 255.255.255.0 0 0
static (inside,dmz) a.b.c.0 a.b.c.0 netmask 255.255.255.0 0 0
access-group dmz-in in interface dmz
conduit permit icmp any any
conduit permit tcp a.b.c.0 255.255.255.0 range 0 65535 a.b.d.8 255.255.2
55.252
conduit permit udp a.b.c.0 255.255.255.0 range 0 65535 a.b.d.8 255.255.2
55.252
route outside 0.0.0.0 0.0.0.0 a.b.d.9 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
telnet timeout 60
ssh timeout 5
terminal width 80
Cryptochecksum:fdvvcdfrfrff
how i can block hosts from inside network to connect on dmz...?
1)i must remove the actual access-list :
access-list dmz-in permit tcp any any
access-list dmz-in permit udp any any
access-list dmz-in permit ip any any
2)and i must add an access-list :
for example...to connect on a fileserver
access-list dmz-in permit tcp host a.b.c.40 eq 139 host a.b.e.3
access-list dmz-in permit tcp host a.b.c.40 eq 445 host a.b.e.3
access-list dmz-in permit udp host a.b.c.40 eq 137 host a.b.e.3
access-list dmz-in permit udp host a.b.c.40 eq 138 host a.b.e.3
in this situation the host on dmz can't connect to inside hosts ?
and then i must create another access list for these hosts....from dmz to inside...?
please help me...
this is my pix configuration
PIX Version 6.1(4)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
enable password ddcdcde encrypted
passwd 2ddrdrefrefrefre encrypted
hostname pluto
domain-name pippo
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no names
access-list dmz-in permit icmp any any
access-list dmz-in permit tcp any any
access-list dmz-in permit udp any any
access-list dmz-in permit ip any any
pager lines 24
logging on
logging trap debugging
logging host dmz dmz-host
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip address outside a.b.d.10 255.255.255.252
ip address inside a.b.c.1 255.255.255.0
ip address dmz a.b.e.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
no failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
failover ip address dmz 0.0.0.0
pdm history enable
arp timeout 14400
nat (inside) 0 a.b.c.0 255.255.255.0 0 0
static (inside,dmz) a.b.c.0 a.b.c.0 netmask 255.255.255.0 0 0
access-group dmz-in in interface dmz
conduit permit icmp any any
conduit permit tcp a.b.c.0 255.255.255.0 range 0 65535 a.b.d.8 255.255.2
55.252
conduit permit udp a.b.c.0 255.255.255.0 range 0 65535 a.b.d.8 255.255.2
55.252
route outside 0.0.0.0 0.0.0.0 a.b.d.9 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
telnet timeout 60
ssh timeout 5
terminal width 80
Cryptochecksum:fdvvcdfrfrff
how i can block hosts from inside network to connect on dmz...?
1)i must remove the actual access-list :
access-list dmz-in permit tcp any any
access-list dmz-in permit udp any any
access-list dmz-in permit ip any any
2)and i must add an access-list :
for example...to connect on a fileserver
access-list dmz-in permit tcp host a.b.c.40 eq 139 host a.b.e.3
access-list dmz-in permit tcp host a.b.c.40 eq 445 host a.b.e.3
access-list dmz-in permit udp host a.b.c.40 eq 137 host a.b.e.3
access-list dmz-in permit udp host a.b.c.40 eq 138 host a.b.e.3
in this situation the host on dmz can't connect to inside hosts ?
and then i must create another access list for these hosts....from dmz to inside...?
please help me...