Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Cant get to internet from host

Status
Not open for further replies.

jdl508

Technical User
Apr 30, 2001
242
0
0
US
Hello, I have a pix 515 with 3 int. I can ping to an internet ip address from the pix or router but cant ping anything but the FW from the workstation. My config is as follows.
PIX Version 6.1(1)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz2 security50
enable password 10QXqeH9cZMj1gf/ encrypted
passwd 10QXqeH9cZMj1gf/ encrypted
hostname fw2
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list 101 permit tcp any host 128.1.1.17 eq smtp
pager lines 24
interface ethernet0 100full
interface ethernet1 auto
<--- More --->

interface ethernet2 auto
mtu outside 1500
mtu inside 1500
mtu dmz2 1500
ip address outside 207.245.65.186 255.255.255.248
ip address inside 128.1.1.40 255.255.255.0
ip address dmz2 10.2.2.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 101 207.245.65.187
nat (inside) 101 0.0.0.0 0.0.0.0 0 0
conduit permit icmp any any
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc :10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
<--- More --->
telnet timeout 5
ssh timeout 60
terminal width 80
Cryptochecksum:348a2a982da8c1a5bc5b45b1eacdf718
: end
also if i do a sh route i get this
sh route
dmz2 10.2.2.0 255.255.255.0 10.2.2.1 1 CONNECT static
inside 128.1.1.0 255.255.255.0 128.1.1.40 1 CONNECT static
outside 207.245.65.184 255.255.255.248 207.245.65.186 1 CONNECT static
do i need publiclly routable ip's for my inside interaces on the pix (dmz2 and inside???)
thanks for any help
jdl
 
HI.

You can't ping because the pix is blocking the return ICMP echo reply packets on the outside interface.
You should remember that in the pix, ICMP is not statefull, so it won't accept ping return traffic, unlike TCP connections.

You can issue the following commands to approve that the pix is blocking the echo reply:
logging on
logging buffer 4
clear log
[... Try to ping ...]
show log

You can add the following command to allow ICMP :
access-list 101 permit icmp any any
But you can also make this ACL more specific using ICMP types (for example, allow only echo-reply or other specific types).

Bye
Yizhar Hurwitz
 
Thanks Yizhar for the comments. I guees to clarify my issue a little more I can send and recieve pings while consoled into the pix it is only from the actual server I have on int e2 that i cannot send and recieve pings, browse the web or anything. I connect to my router with crossover and get web so its not that??? I thought it could have either been a missing route or something wrong with my global / nat statements. I have nat on the inside interface however the server resides on the dmz2 interface. Thanks again
jd
 
Hi,

You need to create an access-list to allow traffic through the dmz2 interface. for example...

access-list acl-dmz2 permit icmp any any

then apply the access-list to interface dmz2

access-group acl-dmz2 in interface dmz2

this will allow the icmp traffic through the FW from the dmz2 interface.

Then you need a static route to map to the server on the dmz2 interface. for example...

static (dmz2 , outside) [SERVERS IP OUTSIDE ADDRESS] [SERVERS IP DMZ2 ADDRESS] netmask 255.255.255.255 0 0

Replace the wording in [] with your ip address scheme. This will route the returning traffic from the outside interface to the dmz2 interface.

There is a cisco online document that also talks about setting up the third interface. I am looking for the link now. As soon is I find it I will send your way.

Sean
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top