Hello,
Unable to get internal/external traffic into DMZ interface on PIX 515E 6.1(4). Have a cat3550 (Version 12.1(12c)EA1) with standard image directly connected to inside interface on pix. Three vlans/subnets on 3550, two vlans are for internal and one is for DMZ. Want to route internal vlans through 3550 to pix and then back into dmz vlan via pix. This should be possible however unable to get it to work and not sure if problem is 3550 or pix or combination of both. Vlans on 3550 have svi interface used as default gateway for users, then default route on 3550 to pix. This configuration currently works with just inside and outside interfaces by including dmz vlan traffic with internal traffic.
Essentially want users in uservlan1 & uservlan2 to access dmz via pix. DMZ vlan3 is directly connected to 3550. I want external users to be able to access web servers on dmz and dns server on inside.
Having problems moving traffic from internal interface to dmz, think problem is with nat and global. All traffic from inside is pat at external interface via :
global (outside) 1 interface
nat (inside) 1 10.100.50.0 255.255.255.0 0 0
nat (inside) 1 10.100.75.0 255.255.255.0 0 0
nat (inside) 1 10.100.100.0 255.255.255.0 0 0
static (inside,outside) xxx.xxx.xxx.xxx 10.100.50.xxx netmask 255.255.255.255 0 0
static (inside,outside) xxx.xxx.xxx.xxx 10.100.75.xxx netmask 255.255.255.255 0 0
static (inside,outside) xxx.xxx.xxx.xxx 10.100.75.xxx netmask 255.255.255.255 0 0
route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1
route inside 10.100.50.0 255.255.255.0 10.100.150.10 1
route inside 10.100.75.0 255.255.255.0 10.100.150.10 1
route inside 10.100.100.0 255.255.255.0 10.100.150.10 1
This configuration works using only the inside and outside interfaces, but want 10.100.75.0 subnet on DMZ and do not want to nat traffic between inside and dmz interfaces, however am willing to nat if I have to but can’t seem to get this to work either.
Have 2 web servers on dmz that need static translations to public addresses and internal dns server that needs to be accessible via internet as well. Have tried:
global (outside) 1 interface
nat (inside) 1 10.100.50.0 255.255.255.0 0 0
nat (inside) 1 10.100.100.0 255.255.255.0 0 0
nat (dmz) 0 0.0.0.0 0.0.0.0 0 0
static (inside,dmz ) 10.100.50.0 10.100.50.0 netmask 255.255.255.0 0 0
static (inside,dmz) 10.100.100.0 10.100.100.0 netmask 255.255.255.0 0 0
static (dmz,outside) xxx.xxx.xxx.xxx 10.100.75.xxx netmask 255.255.255.255 0 0
static (dmz,outside) xxx.xxx.xxx.xxx 10.100.75.xxx netmask 255.255.255.255 0 0
route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1
route inside 10.100.50.0 255.255.255.0 10.100.150.10 1
route dmz 10.100.75.0 255.255.255.0 10.100.75.1 1
route inside 10.100.100.0 255.255.255.0 10.100.150.10 1
Like I said, the above config works with the 3550 as long as I only use the two pix interfaces, however to try and route the dmz vlan through the 3550 I remove the svi interface(interface vlan75, 10.100.75.1) just to prevent the 3550 from moving the traffic to that subnet from within the switch and force it to go to the pix via the default gateway. Add an interface( switchport access vlan 75) on the 3550 to vlan75 that is directly connected to the pix dmz interface(which I reip to be 10.100.75.1). Just to be sure I add a route to the 3550 specifying 10.100.75.0 255.255.255.0 via the inside interface on the pix and add route dmz 10.100.75.0 255.255.255.0 10.100.75.1 1 to the pix. When I do this I can ping the .75.0 subnet from the pix but not from the 3550 or any workstations and for that matter when I do a show xlate or show log on the pix I don’t see anything referring to that subnet at all.
One other question, in my current two interface configuration I can’t seem to get dns traffic into the internal dns server, access list statement I have for this server is
Access-list 20 permit udp any host dnsserver eq domain
Am I missing something here, tried adding statement for tcp eq domain and this didn’t work either.
Any and all help is more than welcome. Please let me know if you need more information or more of the config.
Thanks,
Loyalist
Unable to get internal/external traffic into DMZ interface on PIX 515E 6.1(4). Have a cat3550 (Version 12.1(12c)EA1) with standard image directly connected to inside interface on pix. Three vlans/subnets on 3550, two vlans are for internal and one is for DMZ. Want to route internal vlans through 3550 to pix and then back into dmz vlan via pix. This should be possible however unable to get it to work and not sure if problem is 3550 or pix or combination of both. Vlans on 3550 have svi interface used as default gateway for users, then default route on 3550 to pix. This configuration currently works with just inside and outside interfaces by including dmz vlan traffic with internal traffic.
Essentially want users in uservlan1 & uservlan2 to access dmz via pix. DMZ vlan3 is directly connected to 3550. I want external users to be able to access web servers on dmz and dns server on inside.
Having problems moving traffic from internal interface to dmz, think problem is with nat and global. All traffic from inside is pat at external interface via :
global (outside) 1 interface
nat (inside) 1 10.100.50.0 255.255.255.0 0 0
nat (inside) 1 10.100.75.0 255.255.255.0 0 0
nat (inside) 1 10.100.100.0 255.255.255.0 0 0
static (inside,outside) xxx.xxx.xxx.xxx 10.100.50.xxx netmask 255.255.255.255 0 0
static (inside,outside) xxx.xxx.xxx.xxx 10.100.75.xxx netmask 255.255.255.255 0 0
static (inside,outside) xxx.xxx.xxx.xxx 10.100.75.xxx netmask 255.255.255.255 0 0
route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1
route inside 10.100.50.0 255.255.255.0 10.100.150.10 1
route inside 10.100.75.0 255.255.255.0 10.100.150.10 1
route inside 10.100.100.0 255.255.255.0 10.100.150.10 1
This configuration works using only the inside and outside interfaces, but want 10.100.75.0 subnet on DMZ and do not want to nat traffic between inside and dmz interfaces, however am willing to nat if I have to but can’t seem to get this to work either.
Have 2 web servers on dmz that need static translations to public addresses and internal dns server that needs to be accessible via internet as well. Have tried:
global (outside) 1 interface
nat (inside) 1 10.100.50.0 255.255.255.0 0 0
nat (inside) 1 10.100.100.0 255.255.255.0 0 0
nat (dmz) 0 0.0.0.0 0.0.0.0 0 0
static (inside,dmz ) 10.100.50.0 10.100.50.0 netmask 255.255.255.0 0 0
static (inside,dmz) 10.100.100.0 10.100.100.0 netmask 255.255.255.0 0 0
static (dmz,outside) xxx.xxx.xxx.xxx 10.100.75.xxx netmask 255.255.255.255 0 0
static (dmz,outside) xxx.xxx.xxx.xxx 10.100.75.xxx netmask 255.255.255.255 0 0
route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1
route inside 10.100.50.0 255.255.255.0 10.100.150.10 1
route dmz 10.100.75.0 255.255.255.0 10.100.75.1 1
route inside 10.100.100.0 255.255.255.0 10.100.150.10 1
Like I said, the above config works with the 3550 as long as I only use the two pix interfaces, however to try and route the dmz vlan through the 3550 I remove the svi interface(interface vlan75, 10.100.75.1) just to prevent the 3550 from moving the traffic to that subnet from within the switch and force it to go to the pix via the default gateway. Add an interface( switchport access vlan 75) on the 3550 to vlan75 that is directly connected to the pix dmz interface(which I reip to be 10.100.75.1). Just to be sure I add a route to the 3550 specifying 10.100.75.0 255.255.255.0 via the inside interface on the pix and add route dmz 10.100.75.0 255.255.255.0 10.100.75.1 1 to the pix. When I do this I can ping the .75.0 subnet from the pix but not from the 3550 or any workstations and for that matter when I do a show xlate or show log on the pix I don’t see anything referring to that subnet at all.
One other question, in my current two interface configuration I can’t seem to get dns traffic into the internal dns server, access list statement I have for this server is
Access-list 20 permit udp any host dnsserver eq domain
Am I missing something here, tried adding statement for tcp eq domain and this didn’t work either.
Any and all help is more than welcome. Please let me know if you need more information or more of the config.
Thanks,
Loyalist