Solved

Cisco PIXe506 : Port Forwarding

Posted on 2006-06-21
4
375 Views
Last Modified: 2013-11-16

 How to perform port forwarding in Cisco PIX506e Firewall.
 I know it has router capability.
 

  DSL Modem ----> PIX ----> 5 port -------->  server1
                                          Switch     |
                                                        |----> server2

0
Comment
Question by:surys
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 32

Accepted Solution

by:
rsivanandan earned 25 total points
ID: 16956878
static (inside,outside) <protocol> interface <port> <internal IP> <port> netmask 255.255.255.255

access-list <name> permit <protocol> any interface outside eq <port>

access-group <name> in inside

Those the command syntax, now for an example;

Lets say your PIX outside has an ip address of 172.1.1.1 and internal server1 has ip of 10.1.1.1 and you want to run a web server on it.

static (inside,outside) tcp interface 80 10.1.1.1 80 netmask 255.255.255.255

access-list <name> permit tcp any interface outside eq 80

access-group <name> in inside

Cheers,
Rajesh
0
 
LVL 19

Assisted Solution

by:nodisco
nodisco earned 25 total points
ID: 16958407
As per Rajesh

With slight amendment :

access-group <name> in inside

should be

access-group <name> in interface outside



0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Network latency question 9 85
Internet Access how it is displayed in my status bar 7 50
Network access 24 60
Move WSUS to Server 2016 3 42
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question