Link to home
Start Free TrialLog in
Avatar of MarkNethercott
MarkNethercott

asked on

Cisco PIX 501:- Network AND Port translation

I have an overlapping IP range conflict which I (think) can fixed by changing the network address of the remote network.

I have two 10.1.0.0/16 networks that I need to route to from my core network - 10.7.30.0/24.

My plan was to introduce a cisco 501 as the gateway to one of the networks and use it to NAT to non-overlapping address.  Say 10.100.0.0/16

So instead of;

10.1.0.0/16 <-> 10.7.30.0/24 <-> 10.1.0.0/16 <== Which wont work

For clarification, the <-> are actually the same gateway

I was intending to create;

10.1.0.0/16 <-> 107.30.0/24 <-> 10.100.0.0/16 <Address NAT> 10.1.0.0/16

I've opened up the f/w on the 501 to allow traffice both ways
I've added a translation rule to translate inside to outside & the reverse.  but seem to be missing a step.

Configuration below;

: Saved
:
PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 1kGROcx33PtGkTLC encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname no-pix-wrexham
domain-name norish.engltd.net
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list inside_access_in permit ip any any
access-list inside_access_in permit icmp any any
access-list outside_access_in permit ip any any
access-list outside_access_in permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.101.1.1 255.255.0.0
ip address inside 10.1.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 10.101.0.0
global (inside) 1 10.1.0.0
nat (outside) 0 10.101.0.0 255.255.0.0 outside 0 0
nat (inside) 0 10.1.0.0 255.255.0.0 0 0
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.101.1.11 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 0.0.0.0 0.0.0.0 outside
http 10.1.0.0 255.255.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet 0.0.0.0 0.0.0.0 outside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
terminal width 80
Cryptochecksum:f001bee62df105a0ee915d584595c65b
: end
Avatar of Les Moore
Les Moore
Flag of United States of America image

These might work, but you have to change the number to something other than "0"

>nat (outside) 0 10.101.0.0 255.255.0.0 outside 0 0
                     ^
>nat (inside) 0 10.1.0.0 255.255.0.0 0 0
                    ^

Try this:

global (outside) 1 10.101.0.0
nat (inside) 1 10.1.0.0 255.255.0.0 0 0

global (inside) 2 10.1.0.0
nat (outside) 2 10.101.0.0 255.255.0.0 outside 0 0
Avatar of MarkNethercott
MarkNethercott

ASKER

Thanks, I'll try that when I get in tomorrow - I had tried the 2 globals in the same group (without success), but it makes sense to have a group for each 'direction'
I've not had much success today with getting this to work.

To re-state the problem, I'd like to be able to achieve the following

<G/W 10.101.250.11/16> -(Intermediate network 10.101.0.0/16)- <10.101.250.1/16 (PIX 501) 10.1.1.11/16> - <Internal network of 10.1.0.0/16 machines>

So that all the 10.1.0.0/16 addresses appear as 10.101.0.0/16 addresses to the G/W

Although, a 10.1.0.0/16 adressing scheme has been used on the internal network, there are only a few (<100) devices, but a re-numbering of the devices is not possible.

1. Is there an issue being caused because I'm trying to translate a 10.x.0.0/16 to a 10.y.0.0/16 and am exceeding the number of possible registers?
2. Have I addressed the 2 addresses interfaces in the intermediate network correctly (250.11 & 250.1) will not appear on the internal network?
3. Have I missed something on my config - enclosed below?

: Saved
:
PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pixfirewall
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit ip any any
access-list acl_out permit icmp any any
access-list acl_in permit ip any any
access-list acl_in permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.101.250.1 255.255.0.0
ip address inside 10.1.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 10.101.0.0
global (inside) 2 10.1.0.0
nat (outside) 2 10.101.0.0 255.255.0.0 outside 0 0
nat (inside) 1 10.1.0.0 255.255.0.0 0 0
access-group acl_out in interface outside
access-group acl_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.101.250.11 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:8235a53a8d1dceeb8aae397385181627
: end
Sorry for the delayed response..

Any progress? I don't see anything amiss in your test config..
ASKER CERTIFIED SOLUTION
Avatar of Les Moore
Les Moore
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
:-) Is that smiley a left or right-handed one?

To be honest, I'd forgotten about this one.  I agree it would have been good etiquette to clean up this thread, apologies for having let it slip.

I did get it to work in the end.  As far as I can tell, the config was almost working, but a combination of not testing it correctly – pinging the internal rather than the external address (!) or I had a route incorrectly set on a firewall further upstream – again outside vs. inside error.

The following is the config I eventually settled on that works.

The key difference seems (using ‘BeyondCompare’ http://www.scootersoftware.com/ ) to be;
-      dropping the global (inside)
-      dropping the nat (outside)
-      creating a static translation (inside,outside)

PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ************ encrypted
passwd ************ encrypted
hostname <hostname>
domain-name <domainname>
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit ip any any
access-list acl_in permit ip any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.102.126.1 255.255.0.0
ip address inside 10.3.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 10.102.0.0 10.3.0.0 netmask 255.255.0.0 0 0
access-group acl_out in interface outside
access-group acl_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.102.126.11 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
!
!SSH Configuration
!
ca generate rsa key 2048
ca save all
ssh 10.7.4.0 255.255.255.0 outside
ssh 10.7.30.0 255.255.255.0 outside
ssh 10.102.0.0 255.255.0.0 outside
ssh timeout 60
password <password>
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
no user admin
username admin password <password> privilege 2
terminal width 80