Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Pix with 4 Interfaces and MS Proxy

Status
Not open for further replies.

18121999

Technical User
May 27, 2002
22
0
0
GB
Hi guys,
I hope you can help, I am having a bit of difficulty setting up a pix. I hope you can tell me where I am going wrong with this.

I initially set up the pix with 3 interfaces - inside, outside and dmz and was able to communicate between interfaces as desired however I am having some problmes with the proxy server which I have put on the dmz.

The Inside interface has been set to not connect directly to the Internet but all Internet-bound traffic go via the Microsoft proxy server which as I have said is on the dmz interface. The machines on the Interface are able to connect to the proxy server and static statements have been set up.

The problem I then had was with trying to get the traffic back from the Internet via the proxy and through to the Inside interface. The proxy server was not able to redirect the traffic recieved out to another interface and so I had to install another card in the proxy server, assign it an address in another network and connect it a seperate interface so in effect one nic was pointing to the dmz interface and the other nic to dmz2b as it were.

The idea being the first nic (network) on the proxy server would be the only interface accessible from the Inside interface and the interface responsible for passing traffic to the Internet and the 2nd nic would be responsible for receiving traffic FROM the Internet and would not have access to or be accessible from the Inside interface. The proxy would then transfer (reverse-proxy) the information received from the internet to the dmz interface where the Inside interface machines can access it.

I'm sure I have made this much more convoluted than it has to be and need your help. I have got my knickers in a twist with static, nat and access-list commands and would appreciate some pointers in the right direction. I have attached a copy of the current (non-working) config.

Pix1(config)# sh run
: Saved
:
PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
interface ethernet2 100full
interface ethernet3 100full
interface ethernet4 auto shutdown
interface ethernet5 auto shutdown
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
nameif ethernet3 dmz2 security60
nameif ethernet4 intf4 security20
nameif ethernet5 intf5 security25
enable password UIugltjxbjLY/cOy encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname aglonfw1
domain-name xxxxxxxxx.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acldmzout permit ip 172.16.1.0 255.255.255.0 10.1.0.0 255.255.0.0
access-list acldmzout permit tcp host 172.16.1.1 host 202.116.68.66 eq smtp
access-list acldmzout permit tcp host 172.16.1.1 any eq www
access-list acldmzout permit tcp host 172.16.1.1 any eq https
access-list acldmzout permit tcp host 172.16.1.1 any eq ftp
access-list acldmzout permit tcp host 172.16.1.1 any eq domain
access-list acldmzout permit tcp host 172.16.1.1 any eq pptp
access-list acldmzout permit udp host 172.16.1.1 any eq domain
access-list acldmzout deny ip any any
access-list nonat permit ip 172.16.1.0 255.255.255.0 10.1.0.0 255.255.0.0
access-list nonat permit ip 10.1.0.0 255.255.0.0 172.16.1.0 255.255.255.0
access-list aclin permit tcp any host 68.135.101.46 eq https
access-list aclin permit tcp any host 68.135.101.47 eq pptp
access-list aclin permit tcp any host 68.135.101.48 eq pptp
access-list aclin permit tcp host 202.116.68.66 host 68.135.101.45 eq smtp
access-list aclin deny ip any any
access-list aclout permit ip any 172.16.1.0 255.255.255.0
access-list acldmzin permit ip any host 172.16.2.1
pager lines 24
logging on
mtu outside 1500
mtu inside 1500
mtu dmz 1500
mtu dmz2 1500
mtu intf4 1500
mtu intf5 1500
ip address outside 68.135.101.44 255.255.248.0
ip address inside 10.1.10.245 255.255.255.0
ip address dmz 172.16.1.6 255.255.255.248
ip address dmz2 172.16.2.6 255.255.255.248
no ip address intf4
no ip address intf5
ip audit info action alarm
ip audit attack action alarm
no failover
failover timeout 0:00:00
failover poll 15
no failover ip address outside
no failover ip address inside
no failover ip address dmz
no failover ip address dmz2
no failover ip address intf4
no failover ip address intf5
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list nonat
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (dmz,outside) 68.135.101.46 172.16.1.1 netmask 255.255.255.255 0 0
static (dmz,outside) 68.135.101.47 172.16.1.1 netmask 255.255.255.255 0 0
static (dmz,outside) 68.135.101.48 172.16.1.1 netmask 255.255.255.255 0 0
static (dmz2,outside) 68.135.101.49 172.16.2.1 netmask 255.255.255.255 0 0
access-group aclin in interface outside
access-group aclout in interface inside
access-group acldmzout in interface dmz
access-group acldmzin in interface dmz2
route outside 0.0.0.0 0.0.0.0 68.135.101.43 1
timeout xlate 3:00:00
timeout xlate 3:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
sysopt noproxyarp inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh 0.0.0.206 255.255.255.255 inside
ssh 0.0.0.206 255.255.255.255 intf4
ssh 0.0.0.206 255.255.255.255 intf5
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:d343de3f07a12e3037453be95e3ae7bb
: end
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top