Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 400
  • Last Modified:

Urgent - Cisco Pix configuration was "How do i configure a cisco PIX passthrough IP addresses on the same subnet"

I have been given a range of 64-1 usable IP addresses.  I have a problem in that i cannot use NAT and as so have been advised to split the range into a /27 subnet.
(http://www.experts-exchange.com/Security/Firewalls/Q_21400005.html)

The range that i have been given is *.*.*.192/26 thus
network Address = *.*.*.192
ISP default gateway = *.*.*.193
Broadcast = *.*.*.255
subnet mask 255.255.255.192

I need to further subnet this for the outside and inside network so i get:
Outside
network Address = *.*.*.192
ISP default gateway = *.*.*.193
PixFirewall = *.*.*.194

However when i do this i am unable to route anything through the firewall (connectivity has been tested by getting it all working using NAT first).

Here is a copy of my config. What am i missing?

Pat

: Saved
: Written by enable_15 at 14:45:33.289 UTC Tue May 3 2005
PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password ************* encrypted
passwd *************** encrypted
hostname lewes
domain-name accesst.co.uk
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name *.*.*.254 Pat
access-list inside_access_in permit icmp any any
access-list outside_access_in permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside *.*.*.194 255.255.255.224
ip address inside *.*.*.225 255.255.255.224
ip audit info action alarm
ip audit attack action alarm
pdm location *.*.*.226 255.255.255.255 inside
pdm location Pat 255.255.255.255 inside
pdm location 192.168.1.0 255.255.255.0 inside
pdm location *.*.*.* 255.255.255.255 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
nat (inside) 0 0.0.0.0 0.0.0.0 0 0
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
rip inside default version 1
route inside 0.0.0.0 0.0.0.0 83.245.1.225 1
route outside 0.0.0.0 0.0.0.0 83.245.1.193 2
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http *.*.*.* 255.255.255.255 outside
http 192.168.1.0 255.255.255.0 inside
http Pat 255.255.255.255 inside
http *.*.*.224 255.255.255.224 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
tftp-server outside *.*.*.* lewes.accesst.co.uk
floodguard enable
telnet timeout 5
ssh *.*.*.* 255.255.255.255 outside
ssh timeout 5
console timeout 0
dhcpd auto_config outside
terminal width 80
Cryptochecksum:c4f6cb602278477eb070b8fb36c33c01
: end

Broadcast = *.*.*.223
subnet mask 255.255.255.224

Inside
network Address = *.*.*.224
default gateway / inside interface = *.*.*.225
Broadcast = *.*.*.255
subnet mask 255.255.255.224
0
PatHastings
Asked:
PatHastings
  • 2
1 Solution
 
PatHastingsAuthor Commented:
oops seem to have pasted the config in the middle of the IP address summary - to confirm i wish to configure the two interfaces with the following ranges:

Outside
network Address = *.*.*.192
ISP default gateway = *.*.*.193 (unusable by us)
PixFirewall = *.*.*.194
Broadcast = *.*.*.223
subnet mask 255.255.255.224

Inside
network Address = *.*.*.224
default gateway / inside interface = *.*.*.225
Broadcast = *.*.*.255
subnet mask 255.255.255.224


0
 
lrmooreCommented:
You need to remove this line:
   access-group inside_access_in in interface inside

You are only permitting icmp out...

Instead of this:
  >nat (inside) 0 0.0.0.0 0.0.0.0 0 0

I would use this:
  static (inside,outside) *.*.*.224 *.*.*.224 netmask 255.255.255.224

I think you want the route outside to be the default:
 route inside 0.0.0.0 0.0.0.0 83.245.1.225 1  <== remove this:
route outside 0.0.0.0 0.0.0.0 83.245.1.193 2 <== change this metric from "2" to "1"

  no route inside 0.0.0.0 0.0.0.0 83.245.1.225
  no route outside 0.0.0.0 0.0.0.0 83.245.1.193 2
   route outside 0.0.0.0 0.0.0.0 83.245.1.193


0
 
JFrederick29Commented:
Remove your inside route:

lewes(config)#no route inside 0.0.0.0 0.0.0.0 83.245.1.225 1
0
 
PatHastingsAuthor Commented:
The deletion of the route command had no effect,

however the changing the NAT command to a static worked a treat
cheers
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now