configuring pix 515e for symantec spam appliance

i have a cisco pix 515e that sits in front of a symantec spam 8240 appliance. we need to nat the ip address of the box to a public ip 67.a.b.c which is done - no problem. what we need to do next is nat the virtual interface that is used for sending mail out to the same public ip. the virtual ip address cant accept mail from the outside.
i am looking for advice configuring this on the firewall.
thanks in advance.
Who is Participating?
lrmooreConnect With a Mentor Commented:
>static (inside,outside) 67.a.b.16 netmask
>static (inside,outside) tcp 67.a.b.16 25 25 netmask

>error "ERROR: duplicate of existing static"
Correct. You can't do both. That's why you have to do conditional nat with a global and nat w/access-list
OK. Use a static port xlate for inbound email and conditional nat defined with acl for outbound NAT

static (inside,outside) tcp 67.a.b.c smtp 8240PrivateIP smtp netmask
global (outside) 10 67.a.b.c
nat (inside) 10 access-list SPAM
access-list SPAM permit ip host <virtual IP> any
jmcrae72Author Commented:
static (inside,outside) tcp 67.a.b.c smtp smtp netmask ====> will provide static nat for public to private port 25.

global (outside) 10 67.a.b.c ===> creates a pool of mapped address for nat.

nat (inside) 10 access-list SPAM ===> enables natting on the inside interface for those who meet acl requirments.

access-list SPAM permit ip host any ====> allows virtual ip to be natted.

am i understanding this correctly? i do have other nat commands in place - how will this effect them?
i guess that it will not - do you agree?


The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

jmcrae72Author Commented:
lrmoore - i havent tried your suggestion yet but i will here in a few - but i did try this. i dont have a dmz yet.

static (inside,outside) 67.a.b.16 netmask

access-list 100 permit tcp any host 67.a.b.16 eq pop3 ===> on outside int scanning incoming traffic
access-list 100 permit tcp any host 67.a.b.16 eq smtp
access-list 100 permit tcp any host 67.a.b.16 eq www
access-list 100 permit tcp any host 67.a.b.16 eq 995

static (inside,outside) tcp 67.a.b.16 25 25 netmask  ==> port forwarding attempt but i get this error "ERROR: duplicate of existing static"

i'll post the results of you suggestion today.

jmcrae72Author Commented:
lrmoore - looks like it is working. we are sending mail from the correct address. we are doing more test and will confirm later. below i attached your config entry into the PIX.

PIX# conf t
PIX(config)# global (outside) 10 67.a.b.c
Global 67.a.b.c will be Port Address Translated
PIX(config)# nat (inside) 10 access-list SPAM
ERROR: access-list <SPAM> does not exist
ERROR: fail to insert nat entry
PIX(config)# access-list SPAM permit ip host any
PIX(config)# nat (inside) 10 access-list SPAM

Thanks for the update. Keeping fingers crossed!
jmcrae72Author Commented:
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.