I'm having trouble getting a 501 configured, and I'm sure that there's probably just one little thing that I'm missing. I have a one-person company, a web server, database server, email server all connected through a T1. Our public IP address is 209.101.224.134. The T1 router (netopia) reports that the default IP gateway is 209.101.224.133. (subnet 255.255.255.252). The router is defined with an internal IP of 192.168.1.3 (255.255.255.0). I need to configure the PIX unit before installing it in between the router and the switch, so I've got it currently connected into the switch, with a laptop connected to the PIX both via serial connector and network cable. The PIX unit is defined with an internal IP address of 192.168.1.221. There will be some other IP addresses connected to the PIX after installation, in the 192.168.1.X range..
I'm able to ping the PIX IP address (192.168.1.221) from the laptop connected, and can ping the external IP address (209.101.224.134), but am unable to get out to the internet or ping any IP addresses that would be on the internet.
I bought the book "Cisco PIX Firewalls", and have been going through that and this forum with a fine toothed comb, but cannot seem to figure out what I'm missing here... I'm pasting my configuration below. Hopefully someone can point me in the right direction. Thanks in advance..
PIX Version 6.1(4)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password sx8NZwVB5AmnOmVh encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pixfirewall
domain-name mystshopsol.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list ping_acl permit icmp any any
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 209.101.224.134 255.255.255.252
ip address inside 192.168.1.221 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 209.101.224.135-209.101.224.136
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group ping_acl in interface outside
route outside 0.0.0.0 0.0.0.0 209.101.224.133 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.1.205 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
telnet timeout 5
ssh timeout 5
terminal width 80
I'm able to ping the PIX IP address (192.168.1.221) from the laptop connected, and can ping the external IP address (209.101.224.134), but am unable to get out to the internet or ping any IP addresses that would be on the internet.
I bought the book "Cisco PIX Firewalls", and have been going through that and this forum with a fine toothed comb, but cannot seem to figure out what I'm missing here... I'm pasting my configuration below. Hopefully someone can point me in the right direction. Thanks in advance..
PIX Version 6.1(4)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password sx8NZwVB5AmnOmVh encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pixfirewall
domain-name mystshopsol.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names
access-list ping_acl permit icmp any any
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 209.101.224.134 255.255.255.252
ip address inside 192.168.1.221 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 209.101.224.135-209.101.224.136
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group ping_acl in interface outside
route outside 0.0.0.0 0.0.0.0 209.101.224.133 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.1.205 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
telnet timeout 5
ssh timeout 5
terminal width 80