I am looking at setting up a DMZ as follows: -
Internet > router > pix -------> dmz / isa > web servers
¦
¦-----> lan
I want to set up the DMZ with a 192.168.0.0 address.
At present I have my Pix setup with the outside interface address of 10.0.0.254. I have configured the inside interface to be 192.168.0.254.
I have an ISA server providing application layer filtering for my DMZ with an ip address of 192.168.0.253. I would like all web traffic to be forwarded to this ISA server.
Now the problem is that I need to have communication for Citrix Secure Gateway which will sit in the DMZ with an ip address of 192.168.0.10 to the internal citrix servers that sit on the internal LAN in the 10.0.0.0 range.
Can anyone confirm whether this is possible to setup routing between these two networks and then create an access list for access for the host in the DMZ?
Note that 10.0.0.254 is assigned to the outside interface and the LAN is 10.0.0.0 and that the inside interface 1 is assigned 192.168.0.254.
Here is my config: -
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ######## encrypted
passwd ######## encrypted
hostname CP501FW
domain-name mydomain.co.uk
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 10.0.0.254 255.0.0.0
ip address inside 192.168.0.254 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
route outside 0.0.0.0 0.0.0.0 10.0.0.254 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
aaa authentication ssh console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
telnet 10.0.0.0 255.0.0.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 60
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
terminal width 80
Cryptochecksum:fa67b32670247455a9aa50685da1e794
: end
Internet > router > pix -------> dmz / isa > web servers
¦
¦-----> lan
I want to set up the DMZ with a 192.168.0.0 address.
At present I have my Pix setup with the outside interface address of 10.0.0.254. I have configured the inside interface to be 192.168.0.254.
I have an ISA server providing application layer filtering for my DMZ with an ip address of 192.168.0.253. I would like all web traffic to be forwarded to this ISA server.
Now the problem is that I need to have communication for Citrix Secure Gateway which will sit in the DMZ with an ip address of 192.168.0.10 to the internal citrix servers that sit on the internal LAN in the 10.0.0.0 range.
Can anyone confirm whether this is possible to setup routing between these two networks and then create an access list for access for the host in the DMZ?
Note that 10.0.0.254 is assigned to the outside interface and the LAN is 10.0.0.0 and that the inside interface 1 is assigned 192.168.0.254.
Here is my config: -
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ######## encrypted
passwd ######## encrypted
hostname CP501FW
domain-name mydomain.co.uk
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 10.0.0.254 255.0.0.0
ip address inside 192.168.0.254 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
route outside 0.0.0.0 0.0.0.0 10.0.0.254 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
aaa authentication ssh console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
telnet 10.0.0.0 255.0.0.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 60
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
terminal width 80
Cryptochecksum:fa67b32670247455a9aa50685da1e794
: end