Solved

Cisco PIX 501:- Network AND Port translation

Posted on 2004-10-08
6
197 Views
Last Modified: 2013-11-16
I have an overlapping IP range conflict which I (think) can fixed by changing the network address of the remote network.

I have two 10.1.0.0/16 networks that I need to route to from my core network - 10.7.30.0/24.

My plan was to introduce a cisco 501 as the gateway to one of the networks and use it to NAT to non-overlapping address.  Say 10.100.0.0/16

So instead of;

10.1.0.0/16 <-> 10.7.30.0/24 <-> 10.1.0.0/16 <== Which wont work

For clarification, the <-> are actually the same gateway

I was intending to create;

10.1.0.0/16 <-> 107.30.0/24 <-> 10.100.0.0/16 <Address NAT> 10.1.0.0/16

I've opened up the f/w on the 501 to allow traffice both ways
I've added a translation rule to translate inside to outside & the reverse.  but seem to be missing a step.

Configuration below;

: Saved
:
PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 1kGROcx33PtGkTLC encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname no-pix-wrexham
domain-name norish.engltd.net
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list inside_access_in permit ip any any
access-list inside_access_in permit icmp any any
access-list outside_access_in permit ip any any
access-list outside_access_in permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.101.1.1 255.255.0.0
ip address inside 10.1.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 10.101.0.0
global (inside) 1 10.1.0.0
nat (outside) 0 10.101.0.0 255.255.0.0 outside 0 0
nat (inside) 0 10.1.0.0 255.255.0.0 0 0
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.101.1.11 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 0.0.0.0 0.0.0.0 outside
http 10.1.0.0 255.255.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet 0.0.0.0 0.0.0.0 outside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
terminal width 80
Cryptochecksum:f001bee62df105a0ee915d584595c65b
: end
0
Comment
Question by:MarkNethercott
  • 3
  • 3
6 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 12262077
These might work, but you have to change the number to something other than "0"

>nat (outside) 0 10.101.0.0 255.255.0.0 outside 0 0
                     ^
>nat (inside) 0 10.1.0.0 255.255.0.0 0 0
                    ^

Try this:

global (outside) 1 10.101.0.0
nat (inside) 1 10.1.0.0 255.255.0.0 0 0

global (inside) 2 10.1.0.0
nat (outside) 2 10.101.0.0 255.255.0.0 outside 0 0
0
 

Author Comment

by:MarkNethercott
ID: 12262973
Thanks, I'll try that when I get in tomorrow - I had tried the 2 globals in the same group (without success), but it makes sense to have a group for each 'direction'
0
 

Author Comment

by:MarkNethercott
ID: 12267091
I've not had much success today with getting this to work.

To re-state the problem, I'd like to be able to achieve the following

<G/W 10.101.250.11/16> -(Intermediate network 10.101.0.0/16)- <10.101.250.1/16 (PIX 501) 10.1.1.11/16> - <Internal network of 10.1.0.0/16 machines>

So that all the 10.1.0.0/16 addresses appear as 10.101.0.0/16 addresses to the G/W

Although, a 10.1.0.0/16 adressing scheme has been used on the internal network, there are only a few (<100) devices, but a re-numbering of the devices is not possible.

1. Is there an issue being caused because I'm trying to translate a 10.x.0.0/16 to a 10.y.0.0/16 and am exceeding the number of possible registers?
2. Have I addressed the 2 addresses interfaces in the intermediate network correctly (250.11 & 250.1) will not appear on the internal network?
3. Have I missed something on my config - enclosed below?

: Saved
:
PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pixfirewall
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit ip any any
access-list acl_out permit icmp any any
access-list acl_in permit ip any any
access-list acl_in permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.101.250.1 255.255.0.0
ip address inside 10.1.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 10.101.0.0
global (inside) 2 10.1.0.0
nat (outside) 2 10.101.0.0 255.255.0.0 outside 0 0
nat (inside) 1 10.1.0.0 255.255.0.0 0 0
access-group acl_out in interface outside
access-group acl_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.101.250.11 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:8235a53a8d1dceeb8aae397385181627
: end
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 79

Expert Comment

by:lrmoore
ID: 12346790
Sorry for the delayed response..

Any progress? I don't see anything amiss in your test config..
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 13703157
How's it going? Have you found a solution? Do you need more information?
Can you close this question?

http://www.experts-exchange.com/help.jsp#hs5

Thanks for attending to this long-forgotten question.

<-8}
0
 

Author Comment

by:MarkNethercott
ID: 13718806
:-) Is that smiley a left or right-handed one?

To be honest, I'd forgotten about this one.  I agree it would have been good etiquette to clean up this thread, apologies for having let it slip.

I did get it to work in the end.  As far as I can tell, the config was almost working, but a combination of not testing it correctly – pinging the internal rather than the external address (!) or I had a route incorrectly set on a firewall further upstream – again outside vs. inside error.

The following is the config I eventually settled on that works.

The key difference seems (using ‘BeyondCompare’ http://www.scootersoftware.com/ ) to be;
-      dropping the global (inside)
-      dropping the nat (outside)
-      creating a static translation (inside,outside)

PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ************ encrypted
passwd ************ encrypted
hostname <hostname>
domain-name <domainname>
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit ip any any
access-list acl_in permit ip any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.102.126.1 255.255.0.0
ip address inside 10.3.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 10.102.0.0 10.3.0.0 netmask 255.255.0.0 0 0
access-group acl_out in interface outside
access-group acl_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.102.126.11 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
!
!SSH Configuration
!
ca generate rsa key 2048
ca save all
ssh 10.7.4.0 255.255.255.0 outside
ssh 10.7.30.0 255.255.255.0 outside
ssh 10.102.0.0 255.255.0.0 outside
ssh timeout 60
password <password>
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
no user admin
username admin password <password> privilege 2
terminal width 80


0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article assumes you have at least one Cisco ASA or PIX configured with working internet and a non-dynamic, public, address on the outside interface. If you need instructions on how to enable your device for internet, or basic configuration info…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question