PIX 515 - Inbound access list

Posted on 2005-03-15
Medium Priority
Last Modified: 2010-04-09
How do I allow traffic from a specific server in the DMZ (ie to allow an SQL database to advertise itself on the LAN (192.168.50.x /24). Basically, we have an SQL client that, when you install it, you should see the available servers in a "drop down" - but I only am seeing servers on our LAN, and not the one I need to see in the DMZ.

The translation is already there (I can ping this DMZ server from the inside).

I have read that with an ACL "Access lists on the PIX firewall can only be applied to traffic entering an interface, not traffic that is exiting an interface."

I think I am confusing myself more about what is considered Inbound and what is considered outbound.

Thanks for any advice.
Question by:pinger
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Accepted Solution

graemeboro earned 150 total points
ID: 13553565
You need to set up an access list into your dmz.  You will also need to set up a static translation between the server inside interface.

Lets say you inside interface is and dmz interface is and sql server

static (dmz, inside) (this will map the networks together)

access-list dmz_in permit tcp any host any eq sql

where you have eq sql I mean whatever protocol you want to allow through.  also where I have used the word any this may be a specific ip address to restrict machines.

The pix firewall is stateful so when a client is allowed through to the DMZ the pix will track the session state and allow the connection back to the lan.  Therfore you do not need an outbound acl from the dmz in this scenario.  

I hope this is what you were looking for.


Author Comment

ID: 13556488
I thought for my static command I would need something like:

static (inside,dmz) network  (I thought that this would satisfy the requirement for translation in EITHER direction on the inside and dmz interfaces)

1) You have (dmz,inside) instead of (inside,dmz) (higher,lower). Is it necessary to do it that way?

2) Why do you map the pix interfaces instead of the networks (like my example above)? I've never seen that. Is it accomplishing the same thing (basically, doing "no nat")?

3) There is already an "access-list dmz_in permit any any", with an access-group dmz_in in interface dmz. (Wouldn't this permit any traffic to the inside interface? or is this only allowing traffic to a lower interface, and you need to be specific to allow traffic to a higher interface - like your example)

Thank you.

Expert Comment

ID: 13571263
What if you want to filter ip's sending mail to your internal mail server. I haven't hit the right syntax yet. I have a static statement and access-list for mail to come in on port 25, but want to block certain ip(hosts) from sendign junk to us.

I a sense I'm trying to do the same thing graemeboro

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of the companies I’ve worked with have embraced cloud solutions due to their desire to “get out of the datacenter business.” The ability to achieve better security and availability, and the speed with which they are able to deploy, is far grea…
There’s a movement in Information Technology (IT), and while it’s hard to define, it is gaining momentum. Some call it “stream-lined IT;” others call it “thin-model IT.”
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question