Solved

WEB ACCESS FROM DMZ THROUGH PIX FIREWALL

Posted on 2006-10-30
8
232 Views
Last Modified: 2013-11-16
I have a strange problem in that i have 3 servers sat on the DMZ which can all access the web ok. I have added another, but although this can ping the local network and can be accessed externally i can not get the server to access the web.

The pix is connected to a linkproof loadbalancer, but there are not access rules set on this unit.

I can see in the log of the loadbalancer that the ip address of the server is getting through to it, but does not make it as far as the router. or so it seems.

The server is added to the pix as a host and all rules are host based, so i shouldnt need to add any extra rules to the access list.

If i take down one of the servers and use this ip addres on the new server it works fine.

I can only assume that there is a problem with the firewall in that it is not letting something through somewhere.


access-list dmz_access_in permit ip host HOST1-1 255.255.255.0
access-list dmz_access_in permit ip host HOST2-1 255.255.255.0
access-list dmz_access_in permit ip host HOST3-1 255.255.255.0
access-list dmz_access_in permit ip host HOST4-1 255.255.255.0
access-list dmz_access_in permit tcp host HOST1 any eq smtp
access-list dmz_access_in permit ip any any
access-list dmz_access_in permit tcp any any












0
Comment
Question by:WMfxms
8 Comments
 
LVL 27

Expert Comment

by:pseudocyber
Comment Utility
Do you have firewall rules disallowing access out?  This is the way we do it - and think it's a good design.  Since you said all the rules are host based, if you did it this way, you'd have to add an outbound rule as well.  To get around such minute administration, we recognize the DMZ net as trusted and have a rule which allows port 80 outbound from the DMZ net, instead of each individual server.

HTH
0
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
Do you have static xlates for these servers? You probably need another static for this new server
0
 

Author Comment

by:WMfxms
Comment Utility
I am awaiting feedback from Radware on the load balancer as the firewall seems to be configured ok. I am getting an entry on the loadbalancer, so i know the request is going through the firewall ok. It just doesnt make it to the router....

0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 27

Expert Comment

by:pseudocyber
Comment Utility
(As an aside, we used to have Radware Linkproof LB's.  Tons of problems.  Yanked them out and replaced with two beefy Cisco routers running BGP to two different ISP's who we peer with.  No problems since then.  All our Radware has gone away - Linkproofs, WSD's, Fireproofs).
0
 

Author Comment

by:WMfxms
Comment Utility
Sorted - was a problem with linkproof
0
 
LVL 27

Expert Comment

by:pseudocyber
Comment Utility
Go figure.  :|  Glad you got it working.
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
Comment Utility
PAQed with no points refunded (of 500)

Computer101
EE Admin
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now