[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

PIX 515 DMZ Woes

Posted on 2006-05-03
4
Medium Priority
?
466 Views
Last Modified: 2010-04-09
We are trying to get a web/ftp server setup on a dmz and it's not going as well as we would've liked.  As of now, we are working on getting web acces setup and will then make the necessary changes to allow ftp access as well.  Our internal clients are able to access the web server from our internal network using the web server's internal address but the web server is not accessible from outside our network.  Furthermore, the web server is not able to get past the firewall and out to the internet- I can't help but believe that this is a big part of the problem.  Any help is greatly appreciated.  Here is a copy of our firewall config:

Building configuration...
: Saved
:
PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 DMZ security50
enable password 61xYgpu4KcM8ihNr encrypted
passwd 61xYgpu4KcM8ihNr encrypted
hostname TEST
domain-name TEST.LOCAL
clock timezone EST -5
clock summer-time EDT recurring
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 10.10.1.21 GPSVR
name 10.10.215.0 ny2_net
name 10.10.1.0 ny1_net
name 10.10.210.0 nc1_net
name 10.10.100.0 ny1_dmz_net
name AAA.AAA.199.90 ny1_ext_ip
name BBB.BBB.33.10 ny2_ext_ip
name 10.10.235.0 ca1_net
name CCC.CCC.10.22 nc1_ext_ip
name DDD.DDD..210.2 ca1_ext_ip
name AAA.AAA.199.91 DMZ
name 10.10.100.50 DMZSVR
access-list inside_outbound_nat0_acl permit ip any ny1_net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip host GPSVR host 10.10.200.211
access-list inside_outbound_nat0_acl permit ip ny1_net 255.255.255.0 nc1_net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip ny1_net 255.255.255.0 ca1_net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip ny1_net 255.255.255.0 ny2_net 255.255.255.0
access-list inside_outbound_nat0_acl permit ip ny1_net 255.255.255.0 ny1_dmz_net 255.255.255.0
access-list outside_cryptomap_dyn_20 permit ip any ny1_net 255.255.255.0

access-list outside_access_in permit icmp any any echo-reply
access-list outside_access_in permit icmp any any unreachable
access-list outside_access_in permit icmp any any time-exceeded
access-list outside_access_in permit tcp ny1_net 255.255.255.0 any
access-list outside_access_in permit ip ny1_net 255.255.255.0 any
access-list outside_access_in deny tcp host 10.10.1.235 ny1_net 255.255.255.0
access-list outside_access_in deny tcp host 10.10.1.240 ny1_net 255.255.255.0
access-list outside_access_in deny ip host 10.10.1.235 ny1_net 255.255.255.0
access-list outside_access_in deny ip host 10.10.1.240 ny1_net 255.255.255.0
access-list outside_access_in permit tcp host 10.10.1.235 host GPSVR
access-list outside_access_in permit tcp host 10.10.1.240 host GPSVR
access-list outside_access_in permit ip host 10.10.1.235 host GPSVR
access-list outside_access_in permit ip host 10.10.1.240 host GPSVR
access-list outside_access_dmz permit tcp any any

access-list ny2 permit ip ny1_net 255.255.255.0 ny2_net 255.255.255.0
access-list dmz_access_in permit tcp host DMZSVR host 10.10.1.20 eq netbios-ssn
access-list dmz_access_in permit udp host DMZSVR host 10.10.1.20 eq domain
access-list dmz_access_in permit udp host DMZSVR host 10.10.1.20 eq netbios-ns
access-list dmz_access_in permit tcp host DMZSVR host GPSVR eq 1433

access-list outside_cryptomap_40 permit ip ny1_net 255.255.255.0 ny2_net 255.255.255.0
pager lines 24
mtu outside 1500
mtu inside 1500
mtu DMZ 1500
ip address outside ny1_ext_ip 255.255.255.0
ip address inside 10.10.1.254 255.255.255.0
ip address DMZ 10.10.100.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm

no failover
failover timeout 0:00:00
failover poll 15
no failover ip address outside
no failover ip address inside
no failover ip address DMZ

pdm location ny1_net 255.255.255.0 inside
pdm location ny1_net 255.255.255.0 outside
pdm location 10.10.1.235 255.255.255.255 outside
pdm location 10.10.200.211 255.255.255.255 outside
pdm location nc1_net 255.255.255.0 outside
pdm location ca1_net 255.255.255.0 outside
pdm location GPSVR 255.255.255.255 outside
pdm location DMZSVR 255.255.255.255 outside
pdm location GPSVR 255.255.255.255 inside
pdm location 10.10.0.0 255.255.255.0 inside
pdm location 10.10.1.240 255.255.255.255 outside
pdm location ny2_net 255.255.255.0 outside
pdm location 10.10.1.20 255.255.255.255 outside
pdm location 10.10.0.0 255.255.0.0 inside
pdm location ny1_dmz_net 255.255.255.0 outside
pdm location DMZSVR 255.255.255.255 DMZ
pdm location DMZ 255.255.255.255 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 200 interface
global (inside) 200 interface
global (DMZ) 200 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 200 0.0.0.0 0.0.0.0 0 0
static (inside,outside) GPSVR GPSVR netmask 255.255.255.255 0 0
static (inside,DMZ) 10.10.0.0 10.10.0.0 netmask 255.255.0.0 0 0
static (outside,DMZ) DMZSVR DMZ netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
access-group outside_access_dmz in interface DMZ
route outside 0.0.0.0 0.0.0.0 ny1_ext_ip 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http ny1_net 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable

telnet ny1_net 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
management-access inside
console timeout 0
dhcpd address 10.10.1.100-10.10.1.229 inside
dhcpd dns 10.10.1.20 10.10.1.22
dhcpd wins 10.10.1.20 10.10.1.22
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain EXTRANET.LOCAL
dhcpd enable inside
terminal width 80
banner exec xxxxxxx Perimeter Security
banner login Welcome to xxxxxxx
Cryptochecksum:4dac60a9ba0fc9b4bc1a948efcda2b64
: end
[OK]

Thanks in advance!!
0
Comment
Question by:callis610
  • 2
  • 2
4 Comments
 
LVL 9

Expert Comment

by:stressedout2004
ID: 16598244
I don't see any configuration above that will allow the said webserver to be accessible from the internet. You will need to add static and access-rule to do this. What is the internal IP of the webserver in question?
0
 

Author Comment

by:callis610
ID: 16598322
Thanks for your help.  Here is the information you requested:

name AAA.AAA.199.91 DMZ
name 10.10.100.50 DMZSVR

The external IP is AAA.AAA.199.91 and the internal IP is 10.10.100.50.  The IP address of the DMZ interface is 10.10.100.1.
0
 
LVL 9

Accepted Solution

by:
stressedout2004 earned 2000 total points
ID: 16599110

Here are the commands you need on  the PIX.

static (DMZ, outside) DMZ DMZSVR dns netmask 255.255.255.255
no static (outside,DMZ) DMZSVR DMZ netmask 255.255.255.255
access-list outside_access_in permit tcp any host DMZ eq www
access-list outside_access_dmz permit udp any any
clear xlate

The 1st line is statically mapping the private IP to its public IP, the dns keyword is for DNAT so that
the host on the DMZ can access the webserver  by its URL.

2nd Line is incorrect, so we need to remove it.

3rd line is to allow web access on the DMZ server, (you may also need to allow DNS to come thru depending on
where the DNS is located that resolves the name of the DMZ server)

4th line is optional, so you can perform test and verify if translation on the PIX is working. You first
need to make sure that the server DMZ should be able to go out to the internet.

5th line is to refresh the xlate table.
0
 

Author Comment

by:callis610
ID: 16599221
stressedout2004- you da man!  thank you so much- your explanation and speed has been greatly appreciated!
0

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
In this article, the configuration steps in Zabbix to monitor devices via SNMP will be discussed with some real examples on Cisco Router/Switch, Catalyst Switch, NAS Synology device.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month18 days, 8 hours left to enroll

825 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question