Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Cannot port forward to Inside Network

Status
Not open for further replies.

splicerguy

IS-IT--Management
Jul 6, 2005
18
0
0
CA
Hey guys,

I can't seem to forward any ports from the outside to my inside network.

In my config I'm trying to forward ports 80 and 443 to 172.16.0.10 (an exchange server).

Yes, I'm testing from an external source.
No, the server is not blocking these ports because I can telnet to ports 80/443 when on the inside network.

Here's my config. Any ideas? I think it may be an issue with NAT/PAT and my VPN config? PS - still a PIX newbie.

interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security4
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname Pixfirewall
domain-name ciscopix.com
no fixup protocol dns
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 10.0.0.3 DNS2
name 10.0.0.2 web-server
name 172.16.0.24 APC-Enviro

access-list 101 permit ip 172.16.0.0 255.255.254.0 10.10.8.0 255.255.255.0
access-list 102 permit ip 172.16.0.0 255.255.254.0 10.10.8.0 255.255.255.0
access-list inbound permit tcp any host **.119.167.69 eq www
access-list inbound permit tcp any host **.119.167.69 eq https
access-list outside_test permit tcp any host 172.16.0.10 eq www
access-list outside_test permit tcp host 172.16.0.10 eq
pager lines 24
logging on
logging buffered debugging
mtu outside 1500
mtu inside 1500
mtu dmz 1500

ip address outside **.119.167.69 255.255.240.0
ip address inside 172.16.1.253 255.255.254.0
ip address dmz 10.0.0.254 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool vpnpool1 10.10.8.1-10.10.8.254

pdm location 172.16.0.10 255.255.255.255 inside
pdm location DNS2 255.255.255.255 dmz
pdm location APC-Enviro 255.255.255.255 inside
pdm location web-server 255.255.255.255 dmz
pdm history enable
arp timeout 14400

global (outside) 100 interface
global (inside) 50 interface

nat (inside) 0 access-list 102
nat (inside) 100 0.0.0.0 0.0.0.0 0 0
nat (dmz) 100 0.0.0.0 0.0.0.0 0 0
static (inside,outside) **.119.167.69 172.16.0.10 netmask 255.255.255.255 0 0
access-group inbound in interface outside
route outside 0.0.0.0 0.0.0.0 **.119.167.65 1

timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
aaa-server partnerauth protocol radius
aaa-server partnerauth (inside) host 172.16.0.10 ******* timeout 10

http server enable
http 172.16.0.0 255.255.254.0 inside

no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable

sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto dynamic-map map2 10 set transform-set myset
crypto map map1 10 ipsec-isakmp dynamic map2
crypto map map1 client authentication partnerauth
crypto map map1 interface outside

isakmp enable outside
isakmp identity address
isakmp nat-traversal 20
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400

vpngroup corpvpn address-pool vpnpool1
vpngroup corpvpn dns-server 172.16.0.10
vpngroup corpvpn wins-server 172.16.0.10
vpngroup corpvpn default-domain corpnet
vpngroup corpvpn split-tunnel 101
vpngroup corpvpn idle-time 1800
vpngroup corpvpn password ********
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
 
I solved it. Not sure how to close this damn thread.
 
Hi Mate

I'm having the same problem however i'm trying to allow port 25 from the outside to inside (my exchange 2003 server) I've been trying to do this using the PDM however i can't seem to get any of my rules to work.

Can you advise how i can acomplish this? thanks.
 
If it is a PIX with ver 6 code, you will need to turn off
fixup smtp. Exchange uses ESMTP and the PIX will reject it.

If this isn't the case, post your config and someone will have a look.

Brent
Systems Engineer / Consultant
CCNP, CCSP
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top