Solved

Cisco Pix 515E - dmz configuration

Posted on 2003-11-13
5
1,314 Views
Last Modified: 2013-11-16
Hi,

I have a Cisco Pix 515e fire wall and comleted all basic configurations along with DMZ.

Inside IP range 192.168.X.X
DMZ IP rang   172.16.X.X

I want to access(read and wriite files) the systems in the DMZ from the inside network systemalso access the systems(read and write files) inside the local network from the system within the DMZ

What is the command line configuration to do this.

Can comeone help me


Thanks
Deva
0
Comment
Question by:deva_rajesh
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 18

Accepted Solution

by:
chicagoan earned 250 total points
ID: 9739138
You don't need any PIX configuration to access the DMZ from the inside unless you're filtering outbound traffic.


I'd be very cautious about setting up a share on a windoze machine in the DMZ and would heartily suggest FTP for that purpose as the IP filtering on the server will be much more straightforward and the protocol is subject to a lot fewer vulnerabilities.

If you want to address a host on a higher security interface, assign an address in the DMZ, create a static NAT and appropriate access lists *dbl chk syntax*
static (inside, DMZ) 192.168.xxx.xxx 172.16.x.x  255.255.255.255
access-list dmz_in permit tcp any host <host address> eq (service - ftp, any, etc.)  
access-group dmz_in in interface insode
 
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/config/bafwcfg.htm#26921
would be some good bedtime reading
;-)
0
 
LVL 2

Expert Comment

by:skyfreedomdotnet
ID: 9884679
Deva do you have PIX Device Manager installed? What is the version of your IOS on the PIX?
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Part One of the two-part Q&A series with MalwareTech.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question