• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 593
  • Last Modified:

PIX 501 to linksys router to cable modem configuration help

Currently I have a cable modem connected to a linksys router with one PC coming off the router.  I would like to add a PIX 501 to the mix because I have other hosts that will need to be protected.  My linksys has a local address and the machine off the router is respectively (fully capable of getting out to the internet).  I used a cross over cable to connect the router to the uplink port on the pix.  The outside interface on the PIX is configured as and the inside interface is  I used a route statement of 1.  Since the PIX has 4 switch ports i plugged a laptop into one of the ports and gave it an ip address of  I disabled NAT for now using NAT (inside) 0 0 0 for testing purposes.  I'm not too sure what to do from here? I'd like to get this internal laptop to be able to access the internet and to be able to talk to the PC on the DMZ (and vice versa).  Any suggestions?
1 Solution
Well you have two options:

1) On your linksys, you have to add the on your NAT list and then add a static route for the pointing back to the PIX ( If you want bidirectional communication between the
PC behind the PIX and the PC on the DMZ ( I am assuming the DMZ you are referring to are host on the
you need to change the NAT 0 to Static NAT and add some access-rules depending on what type of traffic you want to exchange between the two networks.

no nat (inside) 0
static (inside, outside) netmask
access-list 101 permit ip
access-group 101 in interface outside

2) If you don't want to modify your linksys configuration, then you can just do static NAT and access-rule. Just allocate
an IP from the that is not being used and define the static statements manually. Of course this won't be feasible if you have tons of host.


static (inside, outside) netmask
static (inside, outside) netmask
static (inside, outside) netmask

lewylupoAuthor Commented:
Thanks for your help!  I got it to work using your 1st option.

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now