• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 399
  • Last Modified:

DMZ Routing traffic to VPN Hardware Client

I have a Cisco Pix 515e. i thought i had this problem whipped when i was able to get my internal hosts to access my websvr in the dmz. However, i also have a hardware vpn client hanging off the dmz.  

Remote                        Public IP for                Private IP                       PIX                             PIX
Site                            Hardware Client          Hardware Client             DMZ Inside                   Inside
172.16.2.x----------------20x.xxx.xxx.xx3 <---->10.60.4.2<--------------->10.60.4.1<----------->10.5.5.1

I added a route statement as follows   route dmz 172.16.2.0 255.255.255.0 10.60.4.2 1

I can ping the remote site 172.16.2.1 ok from the pix, but i cannot ping it from the inside.  I can ping a server in my dmz and access it so i know communications to the 10.60.4.x network is ok.  

I have this for my DMZ access-list.   The reason for the static is that the server located on the 172.16.2.x network see's our network printers as a 10.60.4.x IP, so i have all those IP's being translated to the appropriate IP on the inside.

access-list acl_dmz_in; 17 elements
access-list acl_dmz_in line 1 permit ip 172.16.2.0 255.255.255.0 10.5.5.0 255.255.255.0 (hitcnt=0)
access-list acl_dmz_in line 2 permit ip 172.16.2.0 255.255.255.0 10.60.4.0 255.255.255.0 (hitcnt=0)
access-list acl_dmz_in line 3 permit icmp any any echo-reply (hitcnt=12)
access-list acl_dmz_in line 4 permit icmp any any (hitcnt=170)
access-list acl_dmz_in line 5 permit ip host 10.60.4.10 host 10.5.5.230 (hitcnt=25)
access-list acl_dmz_in line 6 permit ip host 10.60.4.11 host 10.5.5.231 (hitcnt=0)
access-list acl_dmz_in line 7 permit ip host 10.60.4.12 host 10.5.5.232 (hitcnt=0)
access-list acl_dmz_in line 8 permit ip host 10.60.4.13 host 10.5.5.236 (hitcnt=0)
access-list acl_dmz_in line 9 permit ip host 10.60.4.14 host 10.5.5.237 (hitcnt=0)
access-list acl_dmz_in line 10 permit ip host 10.60.4.15 host 10.5.5.238 (hitcnt=0)
access-list acl_dmz_in line 11 permit ip host 10.60.4.16 host 10.5.5.242 (hitcnt=0)
access-list acl_dmz_in line 12 permit ip host 10.60.4.17 host 10.5.5.243 (hitcnt=0)
access-list acl_dmz_in line 13 permit ip host 10.60.4.18 host 10.5.5.244 (hitcnt=0)
access-list acl_dmz_in line 14 permit ip host 10.60.4.19 host 10.5.5.246 (hitcnt=0)
access-list acl_dmz_in line 15 permit ip host 10.60.4.20 host 10.5.5.247 (hitcnt=0)
access-list acl_dmz_in line 16 permit ip host 10.60.4.22 host 10.5.5.241 (hitcnt=0)
access-list acl_dmz_in line 17 permit ip host 10.60.4.23 host 10.5.5.248 (hitcnt=0)

Here are my global's

global (outside) 1 2xx.xx.xx.30 netmask 255.255.255.224
global (outside) 2 2xx.xx.xx.29 netmask 255.255.255.224

Here are my NAT statements

nat (inside) 0 access-list nonat
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
nat (dmz) 2 10.60.4.0 255.255.255.0 0 0
0
rolltide_bama
Asked:
rolltide_bama
  • 5
  • 4
1 Solution
 
rolltide_bamaAuthor Commented:
I forgot to add it's just not an icmp problem, i cannot telnet to that ip either....
0
 
lrmooreCommented:
Sounds more like a routing issue. Does the hardware client know about the 10.5.5.0 network?
Perhaps you can nat traffic to the 172.16.2.0 to that it appears as though it is from the 10.60.4.0 subnet:

global(dmz) 3 interface

remove any nonat access-list lines that include the 172.16.2.0 network

0
 
rolltide_bamaAuthor Commented:
The hardware client knows about the 10.60.4.x network because that's its inside.  The Pix should be able to hit the 10.60.4.2 address of the inside and routed to the 172.16.2.x encrypted side.  What's weird is i just added this to my nonat acl and i can now ping the 172.16.2.x network. Keep in my mind that i am now substituting a Win2k3 svr box with RAS going because the other is in production.

access-list nonat line 3 permit ip 10.5.5.0 255.255.255.0 172.16.2.0 255.255.255.0

This is really weird. Does this mean that anytime you wanted to route to traffic on your DMZ network you have to have the nonat going?
0
Improved Protection from Phishing Attacks

WatchGuard DNSWatch reduces malware infections by detecting and blocking malicious DNS requests, improving your ability to protect employees from phishing attacks. Learn more about our newest service included in Total Security Suite today!

 
lrmooreCommented:
You either have to have the Nat set up as I showed with a global (dmz), or add the line to the nonat acl..
It depends some on how the hardware client is setup ...
0
 
rolltide_bamaAuthor Commented:
Yeah, well i havent had much luck just using the global (dmz) 3 int command but its working ok with the nonat. Is there an advantage to using the global other then the real source address is hidden. Since i am going to a secure network i dont think it's going to matter to much. However, on those static statements that i have, those are translations going to network printers. The 172.16.2.x network see's the printers as 10.60.4.x IP, thats why i added those statements to translate them over to the inside, however they are not working as planned? Is that the prefered way to do that?
0
 
rolltide_bamaAuthor Commented:
Well i found the answer to my own requestion regarding the static translations... i had the freakin statement in backwards.... i should have read like this.

static (inside,dmz) 10.60.4.23 10.5.5.248 netmask 255.255.255.255

i had the (dmz,inside) ..... Thats what happens when you look at this crap too long... go blind.  As for the advantage part on using the global (dmz) versus the nonat ??
0
 
lrmooreCommented:
My bad. Try using
global (dmz) 1  <-- "1" instead of "3"
Be sure to remove the line from the nonat acl so that you have either/or situation.


Unless you want to get into more conditional nat statements....

0
 
rolltide_bamaAuthor Commented:
thanks that worked, i just had to reload the pix for it to clear itself up after i made the changes...
0
 
lrmooreCommented:
Glad to help. Next time try "clear xlate" before resorting to reboot.

- ROLL TIDE, ROLL!
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Get your problem seen by more experts

Be seen. Boost your question’s priority for more expert views and faster solutions

  • 5
  • 4
Tackle projects and never again get stuck behind a technical roadblock.
Join Now