Hi,
I have a Pix 501 which I am trying to configure in the following environment:
1) Router (10.215.112.33) connected to the internet
2) LAN A (10.215.112.32 / 27)
3) LAN B (10.212.35.0 / 24)
3) Cisco Pix501 (Inside=10.212.35.2, Outside=10.215.112.35)
From LAN A I can ping the Cisco Pix on 10.215.112.35.
From LAN B I can ping the Cisco Pix on 10.212.35.2.
I need to be able to do the following:
1) From LAN B I need to be able to access devices on LAN A (such as 10.215.112.33).
2) I need statically assigned NAT (I think!) so that traffic for 10.215.112.34 always goes to 10.212.35.60
Here is my current config:
Building configuration...e <if_name> <audit_name>
: Saved
:
PIX Version 6.3(5)
interface ethernet0 auto_number> disable
interface ethernet1 100full
show|cl
nameif ethernet0 outside security0ace <interface>]
nameif ethernet1 inside security100
show ip [addre
enable password sxoDUvFgNGNRIZl3 encrypted
passwd 2KFQnbNIdI.2KYOU encryptedwall(config)# ip address inside 1
hostname cf-pixfirewall
domain-name xxxxxxxx.local
Interface address
fixup protocol dns maximum-length 512
fixup protocol ftp 21wall(config)# no dhcp
fixup protocol h323 h225 1720
Ambiguous com
fixup protocol h323 ras 1718-1719
fixup protocol sip udp 5060sip2>]
fixup protocol skinny 2000cpd wins <winsip1> [<winsi
fixup protocol smtp 25
fixup protocol sqlnet 1521length>
fixup protocol tftp 69 dhcpd ping_timeout <t
names>
pager lines 24
mtu outside 1500 domain <domain_
mtu inside 1500
ip address outside 10.215.112.35 255.255.255.224ng> | hex <hex_string> |
ip address inside 10.212.35.2 255.255.255.0 ip <address_1> [<address_2>]}
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100v_ifc_name>
pdm history enable show dhcpd
arp timeout 14400s]
global (outside) 1 interfaceixfirewall(con
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 10.212.35.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:a44671637db93e8fb6c3294cbcb3518d
: end
[OK]
I have a Pix 501 which I am trying to configure in the following environment:
1) Router (10.215.112.33) connected to the internet
2) LAN A (10.215.112.32 / 27)
3) LAN B (10.212.35.0 / 24)
3) Cisco Pix501 (Inside=10.212.35.2, Outside=10.215.112.35)
From LAN A I can ping the Cisco Pix on 10.215.112.35.
From LAN B I can ping the Cisco Pix on 10.212.35.2.
I need to be able to do the following:
1) From LAN B I need to be able to access devices on LAN A (such as 10.215.112.33).
2) I need statically assigned NAT (I think!) so that traffic for 10.215.112.34 always goes to 10.212.35.60
Here is my current config:
Building configuration...e <if_name> <audit_name>
: Saved
:
PIX Version 6.3(5)
interface ethernet0 auto_number> disable
interface ethernet1 100full
show|cl
nameif ethernet0 outside security0ace <interface>]
nameif ethernet1 inside security100
show ip [addre
enable password sxoDUvFgNGNRIZl3 encrypted
passwd 2KFQnbNIdI.2KYOU encryptedwall(config)# ip address inside 1
hostname cf-pixfirewall
domain-name xxxxxxxx.local
Interface address
fixup protocol dns maximum-length 512
fixup protocol ftp 21wall(config)# no dhcp
fixup protocol h323 h225 1720
Ambiguous com
fixup protocol h323 ras 1718-1719
fixup protocol sip udp 5060sip2>]
fixup protocol skinny 2000cpd wins <winsip1> [<winsi
fixup protocol smtp 25
fixup protocol sqlnet 1521length>
fixup protocol tftp 69 dhcpd ping_timeout <t
names>
pager lines 24
mtu outside 1500 domain <domain_
mtu inside 1500
ip address outside 10.215.112.35 255.255.255.224ng> | hex <hex_string> |
ip address inside 10.212.35.2 255.255.255.0 ip <address_1> [<address_2>]}
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100v_ifc_name>
pdm history enable show dhcpd
arp timeout 14400s]
global (outside) 1 interfaceixfirewall(con
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 10.212.35.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:a44671637db93e8fb6c3294cbcb3518d
: end
[OK]