Improve company productivity with a Business Account.Sign Up

x
?
Solved

Cisco PIX 501:- Network AND Port translation

Posted on 2004-10-08
6
Medium Priority
?
204 Views
Last Modified: 2013-11-16
I have an overlapping IP range conflict which I (think) can fixed by changing the network address of the remote network.

I have two 10.1.0.0/16 networks that I need to route to from my core network - 10.7.30.0/24.

My plan was to introduce a cisco 501 as the gateway to one of the networks and use it to NAT to non-overlapping address.  Say 10.100.0.0/16

So instead of;

10.1.0.0/16 <-> 10.7.30.0/24 <-> 10.1.0.0/16 <== Which wont work

For clarification, the <-> are actually the same gateway

I was intending to create;

10.1.0.0/16 <-> 107.30.0/24 <-> 10.100.0.0/16 <Address NAT> 10.1.0.0/16

I've opened up the f/w on the 501 to allow traffice both ways
I've added a translation rule to translate inside to outside & the reverse.  but seem to be missing a step.

Configuration below;

: Saved
:
PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 1kGROcx33PtGkTLC encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname no-pix-wrexham
domain-name norish.engltd.net
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list inside_access_in permit ip any any
access-list inside_access_in permit icmp any any
access-list outside_access_in permit ip any any
access-list outside_access_in permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.101.1.1 255.255.0.0
ip address inside 10.1.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 10.101.0.0
global (inside) 1 10.1.0.0
nat (outside) 0 10.101.0.0 255.255.0.0 outside 0 0
nat (inside) 0 10.1.0.0 255.255.0.0 0 0
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.101.1.11 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 0.0.0.0 0.0.0.0 outside
http 10.1.0.0 255.255.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet 0.0.0.0 0.0.0.0 outside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
terminal width 80
Cryptochecksum:f001bee62df105a0ee915d584595c65b
: end
0
Comment
Question by:MarkNethercott
  • 3
  • 3
6 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 12262077
These might work, but you have to change the number to something other than "0"

>nat (outside) 0 10.101.0.0 255.255.0.0 outside 0 0
                     ^
>nat (inside) 0 10.1.0.0 255.255.0.0 0 0
                    ^

Try this:

global (outside) 1 10.101.0.0
nat (inside) 1 10.1.0.0 255.255.0.0 0 0

global (inside) 2 10.1.0.0
nat (outside) 2 10.101.0.0 255.255.0.0 outside 0 0
0
 

Author Comment

by:MarkNethercott
ID: 12262973
Thanks, I'll try that when I get in tomorrow - I had tried the 2 globals in the same group (without success), but it makes sense to have a group for each 'direction'
0
 

Author Comment

by:MarkNethercott
ID: 12267091
I've not had much success today with getting this to work.

To re-state the problem, I'd like to be able to achieve the following

<G/W 10.101.250.11/16> -(Intermediate network 10.101.0.0/16)- <10.101.250.1/16 (PIX 501) 10.1.1.11/16> - <Internal network of 10.1.0.0/16 machines>

So that all the 10.1.0.0/16 addresses appear as 10.101.0.0/16 addresses to the G/W

Although, a 10.1.0.0/16 adressing scheme has been used on the internal network, there are only a few (<100) devices, but a re-numbering of the devices is not possible.

1. Is there an issue being caused because I'm trying to translate a 10.x.0.0/16 to a 10.y.0.0/16 and am exceeding the number of possible registers?
2. Have I addressed the 2 addresses interfaces in the intermediate network correctly (250.11 & 250.1) will not appear on the internal network?
3. Have I missed something on my config - enclosed below?

: Saved
:
PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pixfirewall
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit ip any any
access-list acl_out permit icmp any any
access-list acl_in permit ip any any
access-list acl_in permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.101.250.1 255.255.0.0
ip address inside 10.1.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 10.101.0.0
global (inside) 2 10.1.0.0
nat (outside) 2 10.101.0.0 255.255.0.0 outside 0 0
nat (inside) 1 10.1.0.0 255.255.0.0 0 0
access-group acl_out in interface outside
access-group acl_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.101.250.11 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:8235a53a8d1dceeb8aae397385181627
: end
0
Become an IT Security Management Expert

In today’s fast-paced, digitally transformed world of business, the need to protect network data and ensure cloud privacy has never been greater. With a B.S. in Network Operations and Security, you can get the credentials it takes to become an IT security management expert.

 
LVL 79

Expert Comment

by:lrmoore
ID: 12346790
Sorry for the delayed response..

Any progress? I don't see anything amiss in your test config..
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 2000 total points
ID: 13703157
How's it going? Have you found a solution? Do you need more information?
Can you close this question?

http://www.experts-exchange.com/help.jsp#hs5

Thanks for attending to this long-forgotten question.

<-8}
0
 

Author Comment

by:MarkNethercott
ID: 13718806
:-) Is that smiley a left or right-handed one?

To be honest, I'd forgotten about this one.  I agree it would have been good etiquette to clean up this thread, apologies for having let it slip.

I did get it to work in the end.  As far as I can tell, the config was almost working, but a combination of not testing it correctly – pinging the internal rather than the external address (!) or I had a route incorrectly set on a firewall further upstream – again outside vs. inside error.

The following is the config I eventually settled on that works.

The key difference seems (using ‘BeyondCompare’ http://www.scootersoftware.com/ ) to be;
-      dropping the global (inside)
-      dropping the nat (outside)
-      creating a static translation (inside,outside)

PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ************ encrypted
passwd ************ encrypted
hostname <hostname>
domain-name <domainname>
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit ip any any
access-list acl_in permit ip any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.102.126.1 255.255.0.0
ip address inside 10.3.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 10.102.0.0 10.3.0.0 netmask 255.255.0.0 0 0
access-group acl_out in interface outside
access-group acl_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.102.126.11 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
!
!SSH Configuration
!
ca generate rsa key 2048
ca save all
ssh 10.7.4.0 255.255.255.0 outside
ssh 10.7.30.0 255.255.255.0 outside
ssh 10.102.0.0 255.255.0.0 outside
ssh timeout 60
password <password>
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
no user admin
username admin password <password> privilege 2
terminal width 80


0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Many of the companies I’ve worked with have embraced cloud solutions due to their desire to “get out of the datacenter business.” The ability to achieve better security and availability, and the speed with which they are able to deploy, is far grea…
Powerful tools can do wonders, but only in the right hands.  Nowhere is this more obvious than with the cloud.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question