Hello, I'm new to the firewall arena and I'm looking for any help I can get. So here goes...
I have 3 global IPs xxx.xxx.xxx.241, xxx.xxx.xxx.242, xxx.xxx.xxx.243. Internal I have 192.168.23.11, 192.168.23.12, 192.168.23.13. Currently all these IPs are bound to one NIC, but as I get more servers they will be removed and tied to individual boxes.
With the DSL router sitting as xxx.xxx.xxx.1
I'm running Cisco PIX Firewall Version 6.1(1)
I need to allow web (80), smtp (25 tcp), pop3 (110 tcp), domain (53 tcp & udp) through the firewall.
Currently I am allowing anything outbound (i.e. so I can post on the web and look up helpful info). But I need to restrict inbound to the before mentioned ports.
Here is config:
PIX Version 6.1(1)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol smtp 25
no fixup protocol skinny 2000
no fixup protocol sqlnet 1521
no fixup protocol sip 5060
no fixup protocol rtsp 554
access-list acl_inside permit ip 192.168.23.0 255.255.255.0 any
access-list acl_outside permit tcp any host xxx.xxx.xxx.241 eq www
access-list acl_outside permit tcp any host xxx.xxx.xxx.241 eq smtp
access-list acl_outside permit tcp any host xxx.xxx.xxx.241 eq pop3
access-list acl_outside permit tcp any host xxx.xxx.xxx.241 eq domain
access-list acl_outside permit tcp any host xxx.xxx.xxx.242 eq www
access-list acl_outside permit tcp any host xxx.xxx.xxx.242 eq smtp
access-list acl_outside permit tcp any host xxx.xxx.xxx.242 eq pop3
access-list acl_outside permit tcp any host xxx.xxx.xxx.242 eq domain
access-list acl_outside permit tcp any host xxx.xxx.xxx.243 eq www
access-list acl_outside permit tcp any host xxx.xxx.xxx.243 eq smtp
access-list acl_outside permit tcp any host xxx.xxx.xxx.243 eq pop3
access-list acl_outside permit tcp any host xxx.xxx.xxx.243 eq domain
access-list acl_outside permit udp any host xxx.xxx.xxx.241 eq domain
access-list acl_outside permit udp any host xxx.xxx.xxx.242 eq domain
access-list acl_outside permit udp any host xxx.xxx.xxx.243 eq domain
interface ethernet0 10baset
interface ethernet1 10full
ip address outside xxx.xxx.xxx.243 255.255.255.0
ip address inside 192.168.23.1 255.255.255.0
global (outside) 1 xxx.xxx.xxx.241-xxx.xxx.xxx.242
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp xxx.xxx.xxx.241 255.255.255.255 0 0
static (inside,outside) tcp xxx.xxx.xxx.241 smtp 192.168.23.11 smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp xxx.xxx.xxx.241 pop3 192.168.23.11 pop3 netmask 255.255.255.255 0 0
static (inside,outside) tcp xxx.xxx.xxx.241 domain 192.168.23.11 domain netmask 255.255.255.255 0
static (inside,outside) udp 216.30.0.241 domain 192.168.23.11 domain netmask 255.255.255.255 0 0
access-group acl_outside in interface outside
access-group acl_inside in interface inside
route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.1 1
NOTE: the statics for .242 amd .243 are not in there becuase when I do that all access is cut off from the firewall.
So...
1) Any ideas on why when I add the statics for .242 and .243 that the firewall does not allow any traffice in or out?
2) I know I'm doing something wrong in either the acl or static or something, but I just can't figure out which part has the problem. I have the Cisco PIX book, I've perused Barnes and Nobles a great many times, I've been up one side and down the other of Cisco's site, but I just can't figure out what I'm doing wrong. So if you see where the error(s) are I would greatly appreciate it.
Thanks in advance.
I have 3 global IPs xxx.xxx.xxx.241, xxx.xxx.xxx.242, xxx.xxx.xxx.243. Internal I have 192.168.23.11, 192.168.23.12, 192.168.23.13. Currently all these IPs are bound to one NIC, but as I get more servers they will be removed and tied to individual boxes.
With the DSL router sitting as xxx.xxx.xxx.1
I'm running Cisco PIX Firewall Version 6.1(1)
I need to allow web (80), smtp (25 tcp), pop3 (110 tcp), domain (53 tcp & udp) through the firewall.
Currently I am allowing anything outbound (i.e. so I can post on the web and look up helpful info). But I need to restrict inbound to the before mentioned ports.
Here is config:
PIX Version 6.1(1)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol smtp 25
no fixup protocol skinny 2000
no fixup protocol sqlnet 1521
no fixup protocol sip 5060
no fixup protocol rtsp 554
access-list acl_inside permit ip 192.168.23.0 255.255.255.0 any
access-list acl_outside permit tcp any host xxx.xxx.xxx.241 eq www
access-list acl_outside permit tcp any host xxx.xxx.xxx.241 eq smtp
access-list acl_outside permit tcp any host xxx.xxx.xxx.241 eq pop3
access-list acl_outside permit tcp any host xxx.xxx.xxx.241 eq domain
access-list acl_outside permit tcp any host xxx.xxx.xxx.242 eq www
access-list acl_outside permit tcp any host xxx.xxx.xxx.242 eq smtp
access-list acl_outside permit tcp any host xxx.xxx.xxx.242 eq pop3
access-list acl_outside permit tcp any host xxx.xxx.xxx.242 eq domain
access-list acl_outside permit tcp any host xxx.xxx.xxx.243 eq www
access-list acl_outside permit tcp any host xxx.xxx.xxx.243 eq smtp
access-list acl_outside permit tcp any host xxx.xxx.xxx.243 eq pop3
access-list acl_outside permit tcp any host xxx.xxx.xxx.243 eq domain
access-list acl_outside permit udp any host xxx.xxx.xxx.241 eq domain
access-list acl_outside permit udp any host xxx.xxx.xxx.242 eq domain
access-list acl_outside permit udp any host xxx.xxx.xxx.243 eq domain
interface ethernet0 10baset
interface ethernet1 10full
ip address outside xxx.xxx.xxx.243 255.255.255.0
ip address inside 192.168.23.1 255.255.255.0
global (outside) 1 xxx.xxx.xxx.241-xxx.xxx.xxx.242
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp xxx.xxx.xxx.241 255.255.255.255 0 0
static (inside,outside) tcp xxx.xxx.xxx.241 smtp 192.168.23.11 smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp xxx.xxx.xxx.241 pop3 192.168.23.11 pop3 netmask 255.255.255.255 0 0
static (inside,outside) tcp xxx.xxx.xxx.241 domain 192.168.23.11 domain netmask 255.255.255.255 0
static (inside,outside) udp 216.30.0.241 domain 192.168.23.11 domain netmask 255.255.255.255 0 0
access-group acl_outside in interface outside
access-group acl_inside in interface inside
route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.1 1
NOTE: the statics for .242 amd .243 are not in there becuase when I do that all access is cut off from the firewall.
So...
1) Any ideas on why when I add the statics for .242 and .243 that the firewall does not allow any traffice in or out?
2) I know I'm doing something wrong in either the acl or static or something, but I just can't figure out which part has the problem. I have the Cisco PIX book, I've perused Barnes and Nobles a great many times, I've been up one side and down the other of Cisco's site, but I just can't figure out what I'm doing wrong. So if you see where the error(s) are I would greatly appreciate it.
Thanks in advance.