?
Solved

I need to clarify the syntax of the alias command used in ver 6.2 of the PIX to correct problems with DNS replies

Posted on 2003-03-13
2
Medium Priority
?
217 Views
Last Modified: 2013-11-16
If I have an internal network using 200.200.200.0 255.255.255.0 (which I do not own) and I now need to connect to the Internet and use the alias command to fix the DNS resolution to the outside address of 200.200.200.0 what would the syntax of the alias command be?  I have seen two examples of this, one on the Cisco web site and one in a book and they do not agree on the syntax.  I am using 201.201.201.0 as the alternate address for this example translation.  It is my understanding that the first address is the address being used as the alternate, but because I see two conflicting examples I'm not sure.

Thanks for your help.

Jerri Benton

alias (inside) 200.200.200.0 201.201.201.0 255.255.255.0

or

alias (inside) 202.201.201.0 200.200.200.0 255.255.255.0



0
Comment
Question by:benje02
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 300 total points
ID: 8135938
alias [(if_name)] dnat_ip foreign_ip [netmask]


translastion:
alias(inside)<realip> <globalip> 255.255.255.255

So in your case:
alias(inside)201.201.201.0 200.200.200.0 255.255.255.0

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_62/cmdref/ab.htm#1083304
0
 

Author Comment

by:benje02
ID: 8139069
Thank you so much, this has been of great help to me.
0

Featured Post

Need protection from advanced malware attacks?

Look no further than WatchGuard's Total Security Suite, providing defense in depth against today's most headlining attacks like Petya 2.0 and WannaCry. Keep your organization out of the news with protection from known and unknown threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question