themikehyde
IS-IT--Management
Hello everyone,
I am running a Pix 515E with 6.2 OS. We use Quantum SnapServers for our file stsorage. We have two snap servers to allow replication using Snap Appliance Server-to-Server synchronization software. It works great inhouse. I have relocated the second Disk server offsite. The offsite location is a Business class cable modem, providing a static IP Address. I have setup a Linksys Cable router, and setup the disk server as a dmz with public access to the necessary ports as noted by Snap.
Snap Appliance states that the Server-to-Server software uses TCP port 9090, 9092 & 9093 and UDP 4466. I believe I have modified my config correctly, but the offsite snap server says it is unable to establish communication with the internal server. I did a clear xlate after modifcations.
Can anyone help??
Thanks,
Mike
xxx.xxx.xxx. Our Public IP Addresses
yyy.yyy.yyy.yyy The public IP address for the remote site
192.168.1.15 The private IP address of the internal
server.
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security10
nameif ethernet3 intf3 security15
nameif ethernet4 intf4 security20
nameif ethernet5 dmz1 security10
enable passwordxxxxxxxxxxxxxxxx encrypted
passwd xxxxxxxxxxxxxxxxxxxxxx
hostname PIX515E
domain-name maxuse.com
clock timezone EST -5
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list acl_in permit icmp any any
access-list acl_out permit icmp any any
access-list acl_out permit tcp any host xxx.xxx.xxx.230 eq www
access-list acl_out permit tcp any host xxx.xxx.xxx.210 eq www
access-list acl_out permit tcp any host xxx.xxx.xxx.199 eq www
access-list acl_out permit tcp any host xxx.xxx.xxx.200 eq www
access-list acl_out permit tcp any host xxx.xxx.xxx.202 eq www
access-list acl_out permit tcp any host xxx.xxx.xxx.200 eq ftp
access-list acl_out permit tcp any host xxx.xxx.xxx.203 eq ftp
access-list acl_out permit tcp any host xxx.xxx.xxx.201 eq ftp
*****************The following is what I added. *****************
access-list acl_out permit tcp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.240 eq 8080
access-list acl_out permit tcp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.240 eq 9090
access-list acl_out permit tcp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.240 eq 9092
access-list acl_out permit tcp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.240 eq 9093
access-list acl_out permit udp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.240 eq 4466
access-list acl_dmz1 permit icmp any any
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.230 any eq www
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.210 any eq www
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.199 any eq www
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.200 any eq www
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.202 any eq www
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.200 any eq ftp
access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.10.0 255.255.255.0
access-list EDSVPN permit tcp any any eq 12106
pager lines 24
logging on
logging timestamp
logging trap debugging
logging host inside 192.168.1.20
logging host inside 0.0.0.4
logging host inside 0.0.0.3
interface ethernet0 auto
interface ethernet1 100full
interface ethernet2 auto shutdown
interface ethernet3 auto shutdown
interface ethernet4 auto shutdown
interface ethernet5 100full
mtu outside 1500
mtu inside 1500
mtu intf2 1500
mtu intf3 1500
mtu intf4 1500
mtu dmz1 1500
ip address outside xxx.xxx.xxx.250 255.255.255.252
ip address inside 192.168.1.1 255.255.248.0
ip address intf2 127.0.0.1 255.255.255.255
ip address intf3 127.0.0.1 255.255.255.255
ip address intf4 127.0.0.1 255.255.255.255
ip address dmz1 192.168.100.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool ippool 192.168.10.1-192.168.10.254
no failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
failover ip address intf2 0.0.0.0
failover ip address intf3 0.0.0.0
failover ip address intf4 0.0.0.0
failover ip address dmz1 0.0.0.0
pdm location 192.169.1.0 255.255.255.0 inside
pdm location 192.168.1.0 255.255.255.0 inside
pdm location 192.168.1.50 255.255.255.255 inside
pdm location 192.168.1.51 255.255.255.255 inside
pdm location 192.169.1.4 255.255.255.255 dmz1
pdm location 192.169.1.5 255.255.255.255 dmz1
pdm location xxx.xxx.xxx.210 255.255.255.255 dmz1
pdm location xxx.xxx.xxx.230 255.255.255.255 dmz1
pdm location 192.168.100.4 255.255.255.255 dmz1
pdm logging debugging 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
global (dmz1) 1 interface
nat (inside) 0 access-list 101
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
alias (inside) xxx.xxx.xxx.199 192.168.100.2 255.255.255.255
alias (inside) xxx.xxx.xxx.200 192.168.100.4 255.255.255.255
alias (inside) xxx.xxx.xxx.202 192.168.100.3 255.255.255.255
alias (inside) xxx.xxx.xxx.230 192.168.100.50 255.255.255.255
alias (inside) xxx.xxx.xxx.201 192.168.100.100 255.255.255.255
alias (inside) xxx.xxx.xxx.203 192.168.100.6 255.255.255.255
alias (inside) xxx.xxx.xxx.210 192.168.100.5 255.255.255.255
static (dmz1,outside) xxx.xxx.xxx.199 192.168.100.2 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.200 192.168.100.4 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.202 192.168.100.3 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.230 192.168.100.50 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.201 192.168.100.100 netmask 255.255.255.255 0 0
static (inside,dmz1) 192.168.2.41 192.168.2.41 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.203 192.168.100.6 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.210 192.168.100.5 netmask 255.255.255.255 0 0
static (inside,outside) xxx.xxx.xxx.240 192.168.1.15 netmask 255.255.255.255 0 0
access-group acl_out in interface outside
route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.193 1
timeout xlate 3:00:00
timeout conn 9:00:00 half-closed 0:10:00 udp 0:10:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 0.0.0.0 0.0.0.0 inside
http 192.168.1.51 255.255.255.255 inside
http 192.168.1.50 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto dynamic-map mydynmap 10 set transform-set myset
crypto map newmap 10 ipsec-isakmp dynamic mydynmap
crypto map newmap client configuration address initiate
crypto map newmap client configuration address respond
crypto map newmap interface outside
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup vpn3000 address-pool ippool
vpngroup vpn3000 dns-server 192.168.1.20
vpngroup vpn3000 wins-server 192.168.1.20
vpngroup vpn3000 default-domain hyperion
vpngroup vpn3000 split-tunnel 101
vpngroup vpn3000 idle-time 1800
vpngroup vpn3000 password ********
telnet timeout 5
dhcpd address 192.168.2.1-192.168.2.254 inside
dhcpd dns 198.6.1.1 198.6.1.2
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd enable inside
terminal width 80
Cryptochecksum:8a504d05d029b3ef1dc1929a4a2b4825
: end
[OK]
PIX515E(config)#
I am running a Pix 515E with 6.2 OS. We use Quantum SnapServers for our file stsorage. We have two snap servers to allow replication using Snap Appliance Server-to-Server synchronization software. It works great inhouse. I have relocated the second Disk server offsite. The offsite location is a Business class cable modem, providing a static IP Address. I have setup a Linksys Cable router, and setup the disk server as a dmz with public access to the necessary ports as noted by Snap.
Snap Appliance states that the Server-to-Server software uses TCP port 9090, 9092 & 9093 and UDP 4466. I believe I have modified my config correctly, but the offsite snap server says it is unable to establish communication with the internal server. I did a clear xlate after modifcations.
Can anyone help??
Thanks,
Mike
xxx.xxx.xxx. Our Public IP Addresses
yyy.yyy.yyy.yyy The public IP address for the remote site
192.168.1.15 The private IP address of the internal
server.
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security10
nameif ethernet3 intf3 security15
nameif ethernet4 intf4 security20
nameif ethernet5 dmz1 security10
enable passwordxxxxxxxxxxxxxxxx encrypted
passwd xxxxxxxxxxxxxxxxxxxxxx
hostname PIX515E
domain-name maxuse.com
clock timezone EST -5
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list acl_in permit icmp any any
access-list acl_out permit icmp any any
access-list acl_out permit tcp any host xxx.xxx.xxx.230 eq www
access-list acl_out permit tcp any host xxx.xxx.xxx.210 eq www
access-list acl_out permit tcp any host xxx.xxx.xxx.199 eq www
access-list acl_out permit tcp any host xxx.xxx.xxx.200 eq www
access-list acl_out permit tcp any host xxx.xxx.xxx.202 eq www
access-list acl_out permit tcp any host xxx.xxx.xxx.200 eq ftp
access-list acl_out permit tcp any host xxx.xxx.xxx.203 eq ftp
access-list acl_out permit tcp any host xxx.xxx.xxx.201 eq ftp
*****************The following is what I added. *****************
access-list acl_out permit tcp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.240 eq 8080
access-list acl_out permit tcp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.240 eq 9090
access-list acl_out permit tcp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.240 eq 9092
access-list acl_out permit tcp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.240 eq 9093
access-list acl_out permit udp host yyy.yyy.yyy.yyy host xxx.xxx.xxx.240 eq 4466
access-list acl_dmz1 permit icmp any any
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.230 any eq www
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.210 any eq www
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.199 any eq www
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.200 any eq www
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.202 any eq www
access-list acl_dmz1 permit tcp host xxx.xxx.xxx.200 any eq ftp
access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.10.0 255.255.255.0
access-list EDSVPN permit tcp any any eq 12106
pager lines 24
logging on
logging timestamp
logging trap debugging
logging host inside 192.168.1.20
logging host inside 0.0.0.4
logging host inside 0.0.0.3
interface ethernet0 auto
interface ethernet1 100full
interface ethernet2 auto shutdown
interface ethernet3 auto shutdown
interface ethernet4 auto shutdown
interface ethernet5 100full
mtu outside 1500
mtu inside 1500
mtu intf2 1500
mtu intf3 1500
mtu intf4 1500
mtu dmz1 1500
ip address outside xxx.xxx.xxx.250 255.255.255.252
ip address inside 192.168.1.1 255.255.248.0
ip address intf2 127.0.0.1 255.255.255.255
ip address intf3 127.0.0.1 255.255.255.255
ip address intf4 127.0.0.1 255.255.255.255
ip address dmz1 192.168.100.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool ippool 192.168.10.1-192.168.10.254
no failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
failover ip address intf2 0.0.0.0
failover ip address intf3 0.0.0.0
failover ip address intf4 0.0.0.0
failover ip address dmz1 0.0.0.0
pdm location 192.169.1.0 255.255.255.0 inside
pdm location 192.168.1.0 255.255.255.0 inside
pdm location 192.168.1.50 255.255.255.255 inside
pdm location 192.168.1.51 255.255.255.255 inside
pdm location 192.169.1.4 255.255.255.255 dmz1
pdm location 192.169.1.5 255.255.255.255 dmz1
pdm location xxx.xxx.xxx.210 255.255.255.255 dmz1
pdm location xxx.xxx.xxx.230 255.255.255.255 dmz1
pdm location 192.168.100.4 255.255.255.255 dmz1
pdm logging debugging 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
global (dmz1) 1 interface
nat (inside) 0 access-list 101
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
alias (inside) xxx.xxx.xxx.199 192.168.100.2 255.255.255.255
alias (inside) xxx.xxx.xxx.200 192.168.100.4 255.255.255.255
alias (inside) xxx.xxx.xxx.202 192.168.100.3 255.255.255.255
alias (inside) xxx.xxx.xxx.230 192.168.100.50 255.255.255.255
alias (inside) xxx.xxx.xxx.201 192.168.100.100 255.255.255.255
alias (inside) xxx.xxx.xxx.203 192.168.100.6 255.255.255.255
alias (inside) xxx.xxx.xxx.210 192.168.100.5 255.255.255.255
static (dmz1,outside) xxx.xxx.xxx.199 192.168.100.2 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.200 192.168.100.4 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.202 192.168.100.3 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.230 192.168.100.50 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.201 192.168.100.100 netmask 255.255.255.255 0 0
static (inside,dmz1) 192.168.2.41 192.168.2.41 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.203 192.168.100.6 netmask 255.255.255.255 0 0
static (dmz1,outside) xxx.xxx.xxx.210 192.168.100.5 netmask 255.255.255.255 0 0
static (inside,outside) xxx.xxx.xxx.240 192.168.1.15 netmask 255.255.255.255 0 0
access-group acl_out in interface outside
route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.193 1
timeout xlate 3:00:00
timeout conn 9:00:00 half-closed 0:10:00 udp 0:10:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 0.0.0.0 0.0.0.0 inside
http 192.168.1.51 255.255.255.255 inside
http 192.168.1.50 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto dynamic-map mydynmap 10 set transform-set myset
crypto map newmap 10 ipsec-isakmp dynamic mydynmap
crypto map newmap client configuration address initiate
crypto map newmap client configuration address respond
crypto map newmap interface outside
isakmp enable outside
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup vpn3000 address-pool ippool
vpngroup vpn3000 dns-server 192.168.1.20
vpngroup vpn3000 wins-server 192.168.1.20
vpngroup vpn3000 default-domain hyperion
vpngroup vpn3000 split-tunnel 101
vpngroup vpn3000 idle-time 1800
vpngroup vpn3000 password ********
telnet timeout 5
dhcpd address 192.168.2.1-192.168.2.254 inside
dhcpd dns 198.6.1.1 198.6.1.2
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd enable inside
terminal width 80
Cryptochecksum:8a504d05d029b3ef1dc1929a4a2b4825
: end
[OK]
PIX515E(config)#