Solved

Help configuring static route on PIX

Posted on 2003-11-03
1
1,162 Views
Last Modified: 2007-11-27
Here is a brief summary of my setup:

(untrusted network) - 10.15.0.0/24
           |
           |
           e1  
      [router]
           e0    10.5.5.2/24
           |
         (o)   outside interface - 10.5.5.1/24
        [PIX]
         (in) inside interface - 10.20.20.109/23
          |
  (trusted network)

The PIX is in under my control the router is managed by the vendor. I want to make sure that traffic from my netowork 10.20.0.0/16 can pass to the vendor's network, and that the PIX knows where to send their traffic bound for my network. I currently have 2 routes on my PIX:

inside 10.15.0.0  255.255.255.0  GW 10.5.5.2  Metric 1
inside 10.20.0.0  255.255.0.0     GW 10.20.20.1 Metric 1

*10.20.20.1 is the internal router

I guess my confusion deals with the "inside" before the route. Does this mean that this route only applies to traffic hitting the inside interface? Will traffic arriving at the outside interface know where to go?
0
Comment
Question by:MrWhitefolks
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 1

Accepted Solution

by:
swapsthegreat earned 50 total points
ID: 9677632
You will need to add a route

route outside 10.15.0.0 255.255.255.0 10.5.5.2

You will also need to delete the inside route to 10.15.0.0
The inside is just the interface name from where the traffic will be forwarded(outgoing).

The route provided above would forward all traffic destined to 10.15.0.0 to 10.5.5.2 through outside interface.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question