Hi,
I have the following configuration on Cisco PIX 506E firewall and I'm unable to access the internet or ping an outside address. I have Satellite Internet, which is by Direcway. A module DW4020 by Direcway is acting as a gateway to the internet on my current firewall which is not a Cisco firewall and is working just fine.
If someone could help me figure out what i'm missing in the PIX configuration, I would really appreciate it.
Thanks in advance.
:
PIX Version 6.3(1)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password XXXXXXXXXXXXX encrypted
passwd XXXXXXXXXXXXXXX encrypted
hostname XXXXXXXXXX
domain-name XXXXX
clock timezone EST -5
clock summer-time EDT recurring
no fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
no fixup protocol skinny 2000
fixup protocol smtp 25
no fixup protocol sqlnet 1521
names
access-list compiled
access-list XXXXX permit ip 192.168.201.0 255.255.255.0 host 192.168.1.11
access-list XXXXX permit ip 192.168.201.0 255.255.255.0 host 192.168.1.80
access-list XXXXX permit ip host 192.168.1.11 192.168.201.0 255.255.255.0
access-list XXXXX permit ip host 192.168.1.80 192.168.201.0 255.255.255.0
access-list inside permit ip any any
access-list inside permit icmp any any
no pager
logging on
logging timestamp
logging standby
logging console emergencies
logging monitor alerts
logging buffered errors
logging trap notifications
logging history notifications
logging facility 22
no logging message 305005
no logging message 304001
icmp permit any unreachable outside
mtu outside 1500
mtu inside 1500
ip address outside 66.82.155.101 255.255.255.252
ip address inside 192.168.201.1 255.255.255.0
ip verify reverse-path interface outside
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.201.1 255.255.255.255 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
nat (inside) 0 0.0.0.0 0.0.0.0 0 0
route outside 192.168.201.1 255.255.255.255 66.82.155.102 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server 64.26.173.193 source outside
ntp server 64.26.173.192 source outside prefer
http server enable
http 192.168.201.0 255.255.255.0 inside
snmp-server location XXXXXXXX
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set XXXXXX esp-des esp-md5-hmac
crypto map XXXXX 1 ipsec-isakmp
crypto map XXXXX 1 set peer XXXXX
crypto map XXXXX 1 set transform-set pensontset
crypto map XXXXX interface outside
isakmp enable outside
isakmp key ******** address XXXXX netmask 255.255.255.192
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
username XXXXX password XXXXX encrypted privilege 15
terminal width 120
Cryptochecksum:XXXXX: end
[OK]
I have the following configuration on Cisco PIX 506E firewall and I'm unable to access the internet or ping an outside address. I have Satellite Internet, which is by Direcway. A module DW4020 by Direcway is acting as a gateway to the internet on my current firewall which is not a Cisco firewall and is working just fine.
If someone could help me figure out what i'm missing in the PIX configuration, I would really appreciate it.
Thanks in advance.
:
PIX Version 6.3(1)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password XXXXXXXXXXXXX encrypted
passwd XXXXXXXXXXXXXXX encrypted
hostname XXXXXXXXXX
domain-name XXXXX
clock timezone EST -5
clock summer-time EDT recurring
no fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
no fixup protocol skinny 2000
fixup protocol smtp 25
no fixup protocol sqlnet 1521
names
access-list compiled
access-list XXXXX permit ip 192.168.201.0 255.255.255.0 host 192.168.1.11
access-list XXXXX permit ip 192.168.201.0 255.255.255.0 host 192.168.1.80
access-list XXXXX permit ip host 192.168.1.11 192.168.201.0 255.255.255.0
access-list XXXXX permit ip host 192.168.1.80 192.168.201.0 255.255.255.0
access-list inside permit ip any any
access-list inside permit icmp any any
no pager
logging on
logging timestamp
logging standby
logging console emergencies
logging monitor alerts
logging buffered errors
logging trap notifications
logging history notifications
logging facility 22
no logging message 305005
no logging message 304001
icmp permit any unreachable outside
mtu outside 1500
mtu inside 1500
ip address outside 66.82.155.101 255.255.255.252
ip address inside 192.168.201.1 255.255.255.0
ip verify reverse-path interface outside
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.201.1 255.255.255.255 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
nat (inside) 0 0.0.0.0 0.0.0.0 0 0
route outside 192.168.201.1 255.255.255.255 66.82.155.102 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server 64.26.173.193 source outside
ntp server 64.26.173.192 source outside prefer
http server enable
http 192.168.201.0 255.255.255.0 inside
snmp-server location XXXXXXXX
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set XXXXXX esp-des esp-md5-hmac
crypto map XXXXX 1 ipsec-isakmp
crypto map XXXXX 1 set peer XXXXX
crypto map XXXXX 1 set transform-set pensontset
crypto map XXXXX interface outside
isakmp enable outside
isakmp key ******** address XXXXX netmask 255.255.255.192
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
username XXXXX password XXXXX encrypted privilege 15
terminal width 120
Cryptochecksum:XXXXX: end
[OK]