All default info has been removed. As well Ip's
What I would like to know is this correct.
I need outside people to have limited access
to 206.xxx.xxx.xx6(dmz) for smtp,pop3,dns,http
the dmz only needs to access outside for this.
As well the Inside needs full access outside
and to the dmz.
Please read between the lines down below.
any help would be great
PIX Version 6.2(2)135
--Security settings of interfaces
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security10
--Access-lists do I need lines 1-3
--I know I need 4-6 for outside people
access-list 100 permit icmp any any echo-reply
access-list 100 permit icmp any any time-exceeded
access-list 100 permit icmp any any unreachable
access-list 100 permit tcp any host 206.xxx.xxx.xx6 eq pop3
access-list 100 permit tcp any host 206.xxx.xxx.xx6 eq smtp
access-list 100 permit udp any host 206.xxx.xxx.xx6 eq dman
-- This is to allow inside to go anywhere(correct)?
access-list inside_access_in permit ip any any
--After upgrade this showed up help?
ip verify reverse-path interface outside
--This is the ip people use to surf etc.
global (outside) 1 206.xxx.xxx.xx5
--This is the ip inside to dmz (do I need this)
--If not how do I accomplish
global (dmz) 1 172.17.1.100-172.17.1.150
--Tells pix to translate these to outside 206.xxx.xxx.xx5
nat (inside) 1 172.16.1.0 255.255.255.0 0 0
nat (dmz) 1 172.17.1.0 255.255.255.0 0 0
--Static Ip(public) to private
static (inside,outside) 206.xxx.xxx.xxx8 172.16.1.250 netmask 255.255.255.255 0 0
static (dmz,outside) 206.xxx.xxx.xx6 NS2 netmask 255.255.255.255 0 0
--not sure what these are?
access-group 100 in interface outside
access-group inside_access_in in interface inside
: end
[OK]
What I would like to know is this correct.
I need outside people to have limited access
to 206.xxx.xxx.xx6(dmz) for smtp,pop3,dns,http
the dmz only needs to access outside for this.
As well the Inside needs full access outside
and to the dmz.
Please read between the lines down below.
any help would be great
PIX Version 6.2(2)135
--Security settings of interfaces
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security10
--Access-lists do I need lines 1-3
--I know I need 4-6 for outside people
access-list 100 permit icmp any any echo-reply
access-list 100 permit icmp any any time-exceeded
access-list 100 permit icmp any any unreachable
access-list 100 permit tcp any host 206.xxx.xxx.xx6 eq pop3
access-list 100 permit tcp any host 206.xxx.xxx.xx6 eq smtp
access-list 100 permit udp any host 206.xxx.xxx.xx6 eq dman
-- This is to allow inside to go anywhere(correct)?
access-list inside_access_in permit ip any any
--After upgrade this showed up help?
ip verify reverse-path interface outside
--This is the ip people use to surf etc.
global (outside) 1 206.xxx.xxx.xx5
--This is the ip inside to dmz (do I need this)
--If not how do I accomplish
global (dmz) 1 172.17.1.100-172.17.1.150
--Tells pix to translate these to outside 206.xxx.xxx.xx5
nat (inside) 1 172.16.1.0 255.255.255.0 0 0
nat (dmz) 1 172.17.1.0 255.255.255.0 0 0
--Static Ip(public) to private
static (inside,outside) 206.xxx.xxx.xxx8 172.16.1.250 netmask 255.255.255.255 0 0
static (dmz,outside) 206.xxx.xxx.xx6 NS2 netmask 255.255.255.255 0 0
--not sure what these are?
access-group 100 in interface outside
access-group inside_access_in in interface inside
: end
[OK]