?
Solved

PIX 501 switchover from t-1 to cable modem need help asap

Posted on 2006-04-10
1
Medium Priority
?
377 Views
Last Modified: 2012-08-13
Here is my dilehma, I am new to pix config but can do access-lists, etc and some config changes, the problem is I don't know how to do a switchover from our t-1 provider to the new cable modem with higher bandwidth.

my old IP was 209.58.252.x

my new IP is going to be 24.234.163.x

here is a sample of my config. Any help would be greatly appreciated!.....


PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxxxxxxxxxxxxxxx encrypted
passwd xxxxxxxxxxxxxxxx encrypted
hostname lt
domain-name secure.corp
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit tcp any host 209.58.xxx.xxx eq 3389
access-list acl_out permit tcp any host 209.58.xxx.xxx eq smtp
access-list acl_out permit tcp any host 209.58.xxx.xxx eq www
access-list acl_out permit tcp any host 209.58.xxx.xxx eq www
access-list acl_out permit tcp any host 209.58.xxx.xxx eq 3389
access-list acl_out permit tcp any host 209.58.xxx.xxx eq ssh
access-list acl_out permit icmp any any
access-list acl_out permit tcp any host 209.58.xxx.xxx eq 3389
access-list acl_out permit tcp any host 209.58.xxx.xxx eq pptp
access-list acl_out permit gre any any
access-list acl_out permit tcp any host 209.58.xxx.xxx eq pcanywhere-data
access-list acl_out permit udp any host 209.58.xxx.xxx eq pcanywhere-status
access-list outside permit gre any host 209.58.xxx.xxx
access-list acl_in deny tcp any host 63.208.226.42 eq www
access-list acl_in permit ip any any
pager lines 24
logging on
logging buffered informational
icmp permit any echo-reply outside
icmp permit any unreachable outside
icmp permit any time-exceeded outside
icmp permit any source-quench outside
icmp permit host 66.18.133.203 echo outside
icmp permit any inside
mtu outside 1500
mtu inside 1500
ip address outside 209.58.xxx.xxx 255.255.255.240
ip address inside 10.0.0.254 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp 209.58.xxx.xxx 3389 10.0.0.9 3389 netmask 255.255.255.255 0 0
static (inside,outside) tcp 209.58.xxx.xxx smtp 10.0.0.8 smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp 209.58.xxx.xxx www 10.0.0.8 www netmask 255.255.255.255 0 0
static (inside,outside) tcp 209.58.xxx.xxx 3389 10.0.0.7 3389 netmask 255.255.255.255 0 0
static (inside,outside) tcp 209.58.xxx.xxx ssh 10.0.0.3 ssh netmask 255.255.255.255 0 0
static (inside,outside) tcp 209.58.xxx.xxx pptp 10.0.0.3 pptp netmask 255.255.255.255 0 0
static (inside,outside) tcp 209.58.xxx.xxx 3389 10.0.0.3 3389 netmask 255.255.255.255 0 0
static (inside,outside) tcp 209.58.xxx.xxx pcanywhere-data 10.0.0.5 pcanywhere-data netmask 255.255.255.255 0 0
static (inside,outside) udp 209.58.xxx.xxx pcanywhere-status 10.0.0.5 pcanywhere-status netmask 255.255.255.255 0 0
access-group acl_out in interface outside
route outside 0.0.0.0 0.0.0.0 209.58.xxx.xxx 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
isakmp enable outside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh 0.0.0.0 0.0.0.0 inside
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:4a07e38259bfba5a62e27a1737320b99
0
Comment
Question by:richardmmathis
1 Comment
 
LVL 79

Accepted Solution

by:
lrmoore earned 1500 total points
ID: 16422585
The easiest way would be with a script that changes all instances of 209.58.x.x to the word "interface"
Question for you:
How many IP addresses do you get with the Cable ISP?

for example, you can get by with just one IP address:

no access-group acl_out in interface outside

no access-list acl_out

access-list acl_out permit tcp any interface outside eq 3389
access-list acl_out permit tcp any interface outside eq smtp
access-list acl_out permit tcp any interface outside eq www
access-list acl_out permit tcp any interface outside eq www
access-list acl_out permit tcp any interface outside eq 3390
access-list acl_out permit tcp any interface outside eq ssh
access-list acl_out permit icmp any any
access-list acl_out permit tcp any interface outside eq pptp
access-list acl_out permit gre any any
access-list acl_out permit tcp any interface outside  eq pcanywhere-data
access-list acl_out permit udp any interface outside eq pcanywhere-status

access-group acl_out in interface outside

//--Same with the statics

no static (inside,outside) tcp 209.58.xxx.xxx 3389 10.0.0.9 3389 netmask 255.255.255.255 0 0
no static (inside,outside) tcp 209.58.xxx.xxx smtp 10.0.0.8 smtp netmask 255.255.255.255 0 0
no static (inside,outside) tcp 209.58.xxx.xxx www 10.0.0.8 www netmask 255.255.255.255 0 0
no static (inside,outside) tcp 209.58.xxx.xxx 3389 10.0.0.7 3389 netmask 255.255.255.255 0 0
no static (inside,outside) tcp 209.58.xxx.xxx ssh 10.0.0.3 ssh netmask 255.255.255.255 0 0
<etc>
clear xlate

static (inside,outside) tcp interface 3389 10.0.0.9 3389 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface smtp 10.0.0.8 smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp interface www 10.0.0.8 www netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 3390 10.0.0.7 3390 netmask 255.255.255.255 0 0 <== you can set RDP to listen on different ports for each WS
static (inside,outside) tcp interface ssh 10.0.0.3 ssh netmask 255.255.255.255 0 0
<etc>

//--Now change the interface IP:
ip address outside 209.58.xxx.xxx 24.234.163.x

//--Now change the default route:
no route outside 0.0.0.0 0.0.0.0 209.58.xxx.xxx
route outside 0.0.0.0 0.0.0.0 24.234.163.1

0

Featured Post

[Webinar] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
The Relationships Diagram is a good way to get an overall view of what a database is keeping track of. It is also where relationships are defined. A relationship specifies how two tables connect to each other. As you build tables in Microsoft Ac…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question