Solved

Cisco PIX 501:- Network AND Port translation

Posted on 2004-10-08
6
195 Views
Last Modified: 2013-11-16
I have an overlapping IP range conflict which I (think) can fixed by changing the network address of the remote network.

I have two 10.1.0.0/16 networks that I need to route to from my core network - 10.7.30.0/24.

My plan was to introduce a cisco 501 as the gateway to one of the networks and use it to NAT to non-overlapping address.  Say 10.100.0.0/16

So instead of;

10.1.0.0/16 <-> 10.7.30.0/24 <-> 10.1.0.0/16 <== Which wont work

For clarification, the <-> are actually the same gateway

I was intending to create;

10.1.0.0/16 <-> 107.30.0/24 <-> 10.100.0.0/16 <Address NAT> 10.1.0.0/16

I've opened up the f/w on the 501 to allow traffice both ways
I've added a translation rule to translate inside to outside & the reverse.  but seem to be missing a step.

Configuration below;

: Saved
:
PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 1kGROcx33PtGkTLC encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname no-pix-wrexham
domain-name norish.engltd.net
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list inside_access_in permit ip any any
access-list inside_access_in permit icmp any any
access-list outside_access_in permit ip any any
access-list outside_access_in permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.101.1.1 255.255.0.0
ip address inside 10.1.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 10.101.0.0
global (inside) 1 10.1.0.0
nat (outside) 0 10.101.0.0 255.255.0.0 outside 0 0
nat (inside) 0 10.1.0.0 255.255.0.0 0 0
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.101.1.11 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 0.0.0.0 0.0.0.0 outside
http 10.1.0.0 255.255.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet 0.0.0.0 0.0.0.0 outside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
terminal width 80
Cryptochecksum:f001bee62df105a0ee915d584595c65b
: end
0
Comment
Question by:MarkNethercott
  • 3
  • 3
6 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 12262077
These might work, but you have to change the number to something other than "0"

>nat (outside) 0 10.101.0.0 255.255.0.0 outside 0 0
                     ^
>nat (inside) 0 10.1.0.0 255.255.0.0 0 0
                    ^

Try this:

global (outside) 1 10.101.0.0
nat (inside) 1 10.1.0.0 255.255.0.0 0 0

global (inside) 2 10.1.0.0
nat (outside) 2 10.101.0.0 255.255.0.0 outside 0 0
0
 

Author Comment

by:MarkNethercott
ID: 12262973
Thanks, I'll try that when I get in tomorrow - I had tried the 2 globals in the same group (without success), but it makes sense to have a group for each 'direction'
0
 

Author Comment

by:MarkNethercott
ID: 12267091
I've not had much success today with getting this to work.

To re-state the problem, I'd like to be able to achieve the following

<G/W 10.101.250.11/16> -(Intermediate network 10.101.0.0/16)- <10.101.250.1/16 (PIX 501) 10.1.1.11/16> - <Internal network of 10.1.0.0/16 machines>

So that all the 10.1.0.0/16 addresses appear as 10.101.0.0/16 addresses to the G/W

Although, a 10.1.0.0/16 adressing scheme has been used on the internal network, there are only a few (<100) devices, but a re-numbering of the devices is not possible.

1. Is there an issue being caused because I'm trying to translate a 10.x.0.0/16 to a 10.y.0.0/16 and am exceeding the number of possible registers?
2. Have I addressed the 2 addresses interfaces in the intermediate network correctly (250.11 & 250.1) will not appear on the internal network?
3. Have I missed something on my config - enclosed below?

: Saved
:
PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname pixfirewall
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit ip any any
access-list acl_out permit icmp any any
access-list acl_in permit ip any any
access-list acl_in permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.101.250.1 255.255.0.0
ip address inside 10.1.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 10.101.0.0
global (inside) 2 10.1.0.0
nat (outside) 2 10.101.0.0 255.255.0.0 outside 0 0
nat (inside) 1 10.1.0.0 255.255.0.0 0 0
access-group acl_out in interface outside
access-group acl_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.101.250.11 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:8235a53a8d1dceeb8aae397385181627
: end
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 
LVL 79

Expert Comment

by:lrmoore
ID: 12346790
Sorry for the delayed response..

Any progress? I don't see anything amiss in your test config..
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 13703157
How's it going? Have you found a solution? Do you need more information?
Can you close this question?

http://www.experts-exchange.com/help.jsp#hs5

Thanks for attending to this long-forgotten question.

<-8}
0
 

Author Comment

by:MarkNethercott
ID: 13718806
:-) Is that smiley a left or right-handed one?

To be honest, I'd forgotten about this one.  I agree it would have been good etiquette to clean up this thread, apologies for having let it slip.

I did get it to work in the end.  As far as I can tell, the config was almost working, but a combination of not testing it correctly – pinging the internal rather than the external address (!) or I had a route incorrectly set on a firewall further upstream – again outside vs. inside error.

The following is the config I eventually settled on that works.

The key difference seems (using ‘BeyondCompare’ http://www.scootersoftware.com/ ) to be;
-      dropping the global (inside)
-      dropping the nat (outside)
-      creating a static translation (inside,outside)

PIX Version 6.3(3)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ************ encrypted
passwd ************ encrypted
hostname <hostname>
domain-name <domainname>
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit ip any any
access-list acl_in permit ip any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 10.102.126.1 255.255.0.0
ip address inside 10.3.1.11 255.255.0.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 10.102.0.0 10.3.0.0 netmask 255.255.0.0 0 0
access-group acl_out in interface outside
access-group acl_in in interface inside
route outside 0.0.0.0 0.0.0.0 10.102.126.11 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
!
!SSH Configuration
!
ca generate rsa key 2048
ca save all
ssh 10.7.4.0 255.255.255.0 outside
ssh 10.7.30.0 255.255.255.0 outside
ssh 10.102.0.0 255.255.0.0 outside
ssh timeout 60
password <password>
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
no user admin
username admin password <password> privilege 2
terminal width 80


0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now