Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

New PIX, same config, don't work! help pls

Status
Not open for further replies.

dublin101

Technical User
May 26, 2006
49
0
0
AU
Hi guys..our PIX died so we got another one and i basically copied the same config...i had it printed out before and i copied it to the new one.......but the problem is, it won't accept incoming connections to our Terminal Servers

outgoing is fine, but incoming it won't...i'm baffled as to what it could be, but i just get the feeling its something that i haven't enabled or NAT'd properly... please help!

this is the config:

PIX(config)# sh run
: Saved
:
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password yF9U7jahkxdwU6GL encrypted
passwd PMVaTJm1Hz1ynsao encrypted
hostname PIX
domain-name domain.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 192.168.0.2 server1
name 192.168.0.1 dc1
name 192.168.0.3 server2
access-list outside_access_in permit tcp any host x.x.80.154 eq 3389
access-list outside_access_in permit tcp any host x.x.80.154 eq www
access-list outside_access_in permit tcp any host x.x.80.156 eq 3389
pager lines 24
logging on
icmp permit any echo-reply outside
icmp permit any echo-reply inside
icmp permit any echo inside
mtu outside 1500
mtu inside 1500
ip address outside x.x.80.157 255.255.255.248
ip address inside 192.168.0.254 255.255.255.0
ip audit name Info info action alarm
ip audit name Attack attack action alarm
ip audit interface outside Info
ip audit interface outside Attack
ip audit info action alarm
ip audit attack action alarm
pdm location server1 255.255.255.255 inside
pdm location server2 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 10 interface
nat (inside) 10 0.0.0.0 0.0.0.0 0 0
static (inside,outside) x.x.80.154 server1 netmask 255.255.255.255 0 0
static (inside,outside) x.x.80.156 server2 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 x.x.80.153 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt noproxyarp inside
telnet 192.168.0.0 255.255.255.0 inside
telnet timeout 5
ssh 192.168.0.0 255.255.255.0 inside
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:9f31e67814f27fe10830583cc6b7d292
: end
PIX(config)#
 
Your config looks good. You have the ACL and the statics up. Have you saved and reloaded? What do the logs look like when you try the connection?





Brent
Systems Engineer / Consultant
CCNP, CCSP
 
just a thought.........

we have an isp router in front of this......when the initial pix died i threw in a netgear temp device and set it up as x.x.80.154

i unplugged this and threw the pix in..i didn't touch or restart the isp router?????????

from my pc i get outboud web access no problems and show xlates shows the translations....

telnetting to x.x.80.156 3389 showed a match in teh access list, but that did not hit the server.

telnetting to x.x.80.154 did not show a match in the access list.


could it be anything with licensing?? from what i know the new pix is licensed fine.

show ver:

isco PIX Firewall Version 6.3(5)
Cisco PIX Device Manager Version 3.0(4)
Compiled on Thu 04-Aug-05 21:40 by morlee
pix up 12 days 5 hours 51 minutes

Hardware: PIX-506E, 32 MB RAM, CPU Pentium II 300 MHz
Flash E28F640J3 @ 0x300, 8MB
BIOS Flash AM29F400B @ 0xfffd8000, 32KB


0: ethernet0: address is 000b.5fea.c679, irq 10
1: ethernet1: address is 000b.5fea.c67a, irq 11
Licensed Features:
Failover: Disabled
VPN-DES: Enabled
VPN-3DES-AES: Enabled
Maximum Physical Interfaces: 2
Maximum Interfaces: 4
Cut-through Proxy: Enabled
Guards: Enabled
URL-filtering: Enabled
Inside Hosts: Unlimited
Throughput: Unlimited
IKE peers: Unlimited

This PIX has a Restricted (R) license.
Serial Number: 806474421 (0x3041f9c5)
Running Activation Key: 0x3131dbe1 0x03d47940 0x4318cc66 0xb3624766
Configuration has not been modified since last system restart.

i appreciate your advice.
 
You want to do this

logging timestamp
logging buffered debugging
logging trap debugging
logging on

then do a
show logging


Brent
Systems Engineer / Consultant
CCNP, CCSP
 
i'll try that when i'm back at work and get back to you. thanks.
 
i just did those commands (PIX still not on network though), and I got this output after show log:

DareWall# show log
Syslog logging: enabled
Facility: 20
Timestamp logging: disabled
Standby logging: disabled
Console logging: disabled
Monitor logging: disabled
Buffer logging: disabled
Trap logging: disabled
History logging: disabled
Device ID: disabled
DareWall#
 
did that again as it is now connected and same output as above.
 
You need to enter the commands listed above in config mode. From the output the logging output is disabled.


Brent
Systems Engineer / Consultant
CCNP, CCSP
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top