Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

add NAT for backup mail server in PIX 515e

Posted on 2006-06-21
5
Medium Priority
?
260 Views
Last Modified: 2010-04-11
We have added a backup exchange server running Double-Take to be used in failover situations. I think I'll need to mimic the lines for the primary mail server for the secondary in the PIX config.  I need assistance with the commands to edit and save the working config.  The pix OS Ver is  6.3.(3)

The lines below reference my primary mail server.
access-list outside_in permit tcp any host 65.x.x.192 eq smtp
static (inside,outside) 65.x.x.192 10.10.10.50 netmask 255.255.255.255 0 0

I think I'll need to add the following for the backup machine:
access-list outside_in permit tcp any host 65.x.x.193 eq smtp
static (inside,outside) 65.x.x.193 10.10.10.51 netmask 255.255.255.255 0 0

There is also a line in the current config that reads:
access-list outside_in permit tcp any host 65.x.x.192 eq www What is this for (OWA)?  Looking at an older config form this PIX when the company had a backup mail server there is not a line similar to this referencing the backup server, only the one for smtp.

Thanks in advance.
0
Comment
Question by:Clamsy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 25

Expert Comment

by:Cyclops3590
ID: 16952531
I would make the same assumption as you and guess it was for OWA.  Those two lines for the backup machine are exactly right
you may want to also reapply the acl to the interface to be sure it applies and clear the xlate after the static entry to ensure that the backup machine is referenced correctly
access-group outside_in in interface outside
clear xlate

also, I would recommend an os upgrade to 6.3(5).  Then study the changes that have occurred in 7.x and see if you want to upgrade to that eventually.
0
 
LVL 2

Author Comment

by:Clamsy
ID: 16952704
OK but i am looking for what commands to use to edit the config.  I am somewhat familiar with the commands but it's a production box and I can't afford to guess. I can get to here (which isn't very far..)

telnet to pix, login, enable and then wr t.  not sure if it's 'config t' to edit or what to do after that to save the config.  

The only real work I have done with routers and firewalls is to reset the password and rebuild the config of a 2600, which was a spare. No deadline just had to make it work when we gave back the ISP their loaner.

We tried to upgrade to 6.3.(4) last year and had major problems with one of our remote connections, (outside vendor used for terminal server access) the tunnel to the remote vendor would not stay up and we had to initiate the conn from inside. after about a week of trying to figure out the problem and several remote user complaints we decieded to roll back the OS.

0
 
LVL 25

Accepted Solution

by:
Cyclops3590 earned 2000 total points
ID: 16953065
ok, after you telnet in and enable, type

config t
access-list outside_in permit tcp any host 65.x.x.192 eq smtp
static (inside,outside) 65.x.x.192 10.10.10.50 netmask 255.255.255.255 0 0
access-group outside_in in interface outside
clear xlate



so long as 65.x.x.192 is the public IP of the backup mail server and 10.10.10.50 is the Inside IP of it

oh and when you confirm that the config changes work go back in and type
config t
write mem
 to save the config changes

Understand about the OS rollback, **it happens sometimes and of course keeping this working is more important than uptodate.
0
 
LVL 2

Author Comment

by:Clamsy
ID: 16959206
Worked thanks!  
0
 
LVL 2

Author Comment

by:Clamsy
ID: 16959217
Also I confirmed the www line was for owa and added that as well with the IP of the backup machine.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As managed cloud service providers, we often get asked to intervene when cloud deployments go awry. Attracted by apparent ease-of-use, flexibility and low computing costs, companies quickly adopt leading public cloud platforms such as Amazon Web Ser…
How does someone stay on the right and legal side of the hacking world?
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question