Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Chriss Miller on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

pix - dmz's

Status
Not open for further replies.

radian7

IS-IT--Management
Dec 5, 2005
14
PL
Hi

I have two interfaces(dmz's):
ip address outside 192.168.0.1 255.255.255.0
ip address inside 125.142.1.1 255.255.255.0
nameif ethernet0 outside security0
nameif ethernet1 inside security100


Why connection from lower security(outside) to higher(inside) can working ?

I don't have command:
static (inside,outside) 125.142.1.1 125.142.1.1 255.255.255.0

thank you for any help...
 
I don't now why I can ping from dmz outside to dmz inside ...

My configuration is following:
(...)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
ip address outside 192.168.0.1 255.255.255.0
ip address inside 125.142.1.1 255.255.255.0
access-list wewn permit ip any any
access-list zewn permit ip any any
access-group wewn in interface inside
access-group zewn in interface outside
global (outside) 1 x.x.x.x
nat (inside) 0 access-list nonat
nat (inside) 1 access-list nat1 0 0
(...)

PIX Version 6.3(3)
 
Its following:

PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
interface ethernet3 auto
interface ethernet4 auto
interface ethernet5 auto shutdown
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet5 intf5 security10
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list zewn permit ip any any
access-list wewn permit ip any any
access-list nat1 deny ip 125.142.1.0 255.255.255.0 125.0.0.0 255.0.0.0
access-list nat1 permit ip host 125.142.1.21 any
access-list nat1 deny ip 125.142.1.0 255.255.255.0 host 125.141.10.11

access-list nonat permit ip 125.142.1.0 255.255.255.0 125.0.0.0 255.0.0.0
access-list nonat deny ip host 125.142.1.21 any
access-list nonat permit ip 125.142.1.0 255.255.255.0 host 125.141.10.11
access-list nonat permit ip any any

pager lines 24
logging on
logging monitor debugging
logging buffered debugging
mtu outside 1500
mtu inside 1500
mtu intf5 1500
ip address outside 192.168.1.1 255.255.255.0
ip address inside 125.142.1.1 255.255.255.0
no ip address intf5
ip audit info action alarm
ip audit attack action alarm
failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 192.168.1.5
failover ip address inside 125.142.1.2
no failover ip address intf5
pdm history enable
arp timeout 14400
global (outside) 1 192.168.1.2

nat (inside) 0 access-list nonat
nat (inside) 1 access-list nat1 0 0

access-group zewn in interface outside
access-group wewn in interface inside

routing interface inside
route outside 0.0.0.0 0.0.0.0 192.168.1.3 1


timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
aaa authentication ssh console LOCAL
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
isakmp enable outside
telnet timeout 5
ssh 192.168.1.3 255.255.255.255 outside
ssh 125.142.1.0 255.255.255.0 inside
ssh timeout 5
console timeout 0
dhcpd address 125.142.1.101-125.142.1.244 inside
dhcpd dns 125.142.201.21 125.142.201.22
dhcpd lease 3600
dhcpd ping_timeout 750
terminal width 80

In listing I replace my public address class with address class 192.168.1...

I have more dmz's but I cut their for easier listing...
 
I want to now why I can ping from dmz outside address 125.142.1.x ?

 
How can I do that ?
How can I clean "policy nating up" ?
 
Check your nat statements. But before you do anything can you verify that you dont have ány services on your network!?
 
What address are you pinging from? The only thing that I see that would allow ping is your NAT 0 statement along with the ACL.

Free Firewall/Network/Systems Support-
 
I ping from address 125.143.201.x (dmz outside) to address 125.142.1.x (dmz inside)...
I can open connection TCP also...
 
Your nonat config is not correct. What are you trying to achieve with NAT 0?

access-list nonat permit ip any any

I would remove the statements unless you need it.

Free Firewall/Network/Systems Support-
 
In outside dmz is router with VPNS to my branch offices (ex. 125.143.201.x) and nat 0 exempt from nat traffic to branch offices ...

 
Ok, i'm no PIX expert but correct me if i'm wrong but doesn't he have to have his NAT ranges?

Example
global (outside) 1 172.16.1.3-172.16.1.62 netmask 255.255.255.192
global (outside) 1 172.20.1.1-172.20.1.254 netmask 255.255.255.0
nat (inside) 1 0.0.0.0 0.0.0.0 0 0

(just an example, has nothing to do with his config)

And I don't see a DMZ configured on here at all.

I run 2 PIX 501's, like I said, i'm no expert and learning everyday. Would like to know what i'm missing. Thanks

Information Assurance,CCNP,CST
 
Wouldn't he have to have a DMZ configured, then nat it?

Example
global (dmz1) 1 172.21.1.1-172.21.1.254 netmask 255.255.255.0
nat (dmz1) 1 0.0.0.0 0.0.0.0 0 0



Information Assurance,CCNP,CST
 
In my config addresses (matched by nat1) are changes to one address - 192.168.1.2:

global (outside) 1 192.168.1.2
nat (inside) 0 access-list nonat
nat (inside) 1 access-list nat1 0 0

 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top