Solved

NAT is the problem ?

Posted on 2004-10-18
9
326 Views
Last Modified: 2010-04-10
I have the following configuration:

ADSL-----RouterVPN (172.25.6.1)------SWITCH------(172.25.6.254) PIX501 (192.168.1.254)--------PcA (192.168.1.100)
                                                             |
                                                             |
                                                    PcB (172.25.6.3)

All subnet masks are 24 bits.
RouterVPN has proper configuration.


I need PcA to be able to go outside and to be reachable from outside, hence i decided a static NAT by entering:

static (inside,outside) 172.25.6.205 192.168.1.100 netmask 255.255.255.255

Also I set the following default gateways:
For PcA: 192.168.1.254
For PcB: 172.25.6.1
For PIX: 172.25.6.1

After setting all the IP I performed some connectivity tests and got what follows:

From PcB:
ping 172.25.6.1 : OK
ping 172.25.6.254 : OK
ping 172.25.6.205 : NO RESPONSE

From PcA:
ping 192.168.1.254 : OK
ping 172.25.6.1 : NO RESPONSE

From PIX:
ping outside 172.25.6.1 : OK
ping outside 172.25.6.3 : ? I need to verify
ping inside 192.168.1.100 : OK


My questions are:
1)Is it enough to use only the "static (...,..)..."  command or should I use it after entering:
nat (inside) 1 192.168.1.100 netmask 255.255.255.255
global (outside) 1 172.25.6.205 netmask 255.255.255.255

2)Why can't I reach from PcA the router 172.25.6.1 ?

Thx in advance


0
Comment
Question by:minicuc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
  • +2
9 Comments
 
LVL 43

Expert Comment

by:JFrederick29
ID: 12339679
Are you allowing ICMP traffic on the PIX outside interface?  If ICMP is not permitted, you won't be able to ping anything beyond the PIX from PcA or ping through the PIX from the outside interface.
0
 
LVL 6

Expert Comment

by:gjohnson99
ID: 12339709
can you ping the internet form your  pix  ?

if you can the its not routing the segment 192.168.1.xx
0
 
LVL 3

Accepted Solution

by:
Felix2000 earned 250 total points
ID: 12339973
Doing the static is fine but you also need to make an access list to allow traffic in. Otherwise the traffic is still denied.
Statics only make the translation for traffic allowed in.

This is an example access access list to allow traffic in from your natted ip and icmp

### Permit Access from anybody to host 172.25.6.25
access-list acloutin permit ip any 172.25.6.205

### If you want specific access you can do something like this for a website
# access-list acloutin permit tcp any 172.25.6.205 eq 80

### Permit Things like Ping / Traceroute through the pix
access-list acloutin permit icmp any interface outside unreachable
access-list acloutin permit icmp any interface outside time-exceeded
access-list acloutin permit icmp any interface outside echo-reply
access-list acloutin permit icmp any interface outside echo

### Apply the access list to the interface
access-group acloutin in interface outside

Hope that helps.

-= Felix =-
0
Is your NGFW recommended by NSS Labs?

Ours is! NSS Labs Next Generation Firewall Test gives the WatchGuard Firebox M4600 a "Recommended" rating! Curious where your NGFW landed on the  Security Value Map? See the map and download the full report today!

 
LVL 5

Expert Comment

by:NashvilleGuitarPicker
ID: 12340634
Your router can't connect to PC-A because the router doesn't know that 192.168.1.xx is handled by PIX501.  It assumes that the only addresses on its internal network are in the 172.25.6.0/??? subnet (whatever the netmask is), and that everything else must be on the external side.  If your RouterVPN supports it, you will need to add a route/gateway to 192.168.1.0/255.255.255.0 via 172.25.6.254.  Since 192.168.x.x addresses are technically considered "non-routable," this might present a problem.  Also, if your RouterVPN doesn't support static routes, you are in trouble.

Since RouterVPN does not know how to get to PC-A, it can not return the pings, even if your firewall rules are correct.  If you were to put a network sniffer (like Ethereal on a hub, not a switch) right in front of 172.25.6.1, then you should see the packets from PC-A, each one followed by "Destination Unreachable" packets from the router.

If that doesn't work, then one troubleshooting step is to try everything using routable addresses on PC-A and the PIX, and then change them to non-routable addresses once things are working, in case your router/PIX refuses to route the non-routable addresses.

- Will
0
 
LVL 3

Expert Comment

by:Felix2000
ID: 12341287
RouterVPN or PC-B doesn't need routers for the 192.168.x.x it's being natted... to anyone infront of the nat he needs to try to connect to 172.25.6.205.

-= Felix =-
0
 

Author Comment

by:minicuc
ID: 12368866
Thx all, i'll check and get back to you shortly
0
 
LVL 5

Expert Comment

by:NashvilleGuitarPicker
ID: 12369509
Good point, Felix2000.  Somehow I must have been thinking that the NAT was on the other end.  In that case, disregard most of my previous post.
0
 

Author Comment

by:minicuc
ID: 12381331
Felix  solution works fine.Thx.
Only couple of doubts:

1) It seems the ICMP access-list lines are not needed, PcA is able to ping RouterVPN even without them. Is it correct ?

2) Are these ICMP access-list lines equivalent to the following ICMp commands ?

icmp permit any echo-reply outside
icmp permit any echo outside
etc.

Thx
Roberto
0
 
LVL 3

Expert Comment

by:Felix2000
ID: 12384505
I believe the ICMP lines are for the PIX itself  not things being or being NAT'ed by it.

PC A is allowed out since he is inside. The access lists should also help people coming from the outside to ping / traceroute to the router/nat ip's.
Traceroute's time-exceeded might not normally be allowed back through the pix by default.

Glad it helped
-= Felix =-
0

Featured Post

Prevent Ransomware with Total Security Suite

With recent ransomware attacks topping the headlines, it might seem like there'e no hope in the battle against these advanced threats. Learn more about how WatchGuard's Total Security Suite can effectively prevent ransomware attacks including Petya 2.0 and WannaCry!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question