Solved

using public Ip after firewall

Posted on 2006-11-10
10
267 Views
Last Modified: 2010-04-10
hi
i want to use pblic ip 62.68.65.55 to my pc which is after pix firewall  525 i want to use that ip to my pc
i do not want to use static nat
how i can do that

know my pc in VLAN 14 with ip 172.16.14.20 connect to switch 2950 with managment ip 172.16.40.5 then connect to distrbution switch with management ip 172.16.40.1 then connect to core switch then to pix 525 with ip 172.16.100.2
then to router with ip 62.68.65.1


thanks

0
Comment
Question by:nasemabdullaa
  • 5
  • 5
10 Comments
 
LVL 10

Accepted Solution

by:
srgilani earned 500 total points
ID: 17913359
Your pix 525 have addition lan interfaces to use real ip on your pix do this


nameif   int3  dmz


ip address dmz  62.68.65.54 <your subnet mask>

your pc lan card and this pix interface should be in same vlan.
0
 

Author Comment

by:nasemabdullaa
ID: 17913386
hi
thanks for your reply
>>><your subnet mask>
you mean the subnet for the ip 62.68.65.55

my pc in VLAN 14
how i can put my pc lan  in same vlan of pix
how i can do that my pc after many switch

thnaks
0
 
LVL 10

Expert Comment

by:srgilani
ID: 17913403
you have to plug your pix DMZ cable to that vlan.

and about subnet yes the subnet mask for 62.68.65.55

0
 

Author Comment

by:nasemabdullaa
ID: 17913432
hi
sorry i do not understand

my pix connect two interface one connect to router and the other to my core switch then 4 distrbution switch connect  to core  and my pc connect to switch 2950 which connect to distrbution then to core then to pix

how i can do that

thanks
0
 
LVL 10

Expert Comment

by:srgilani
ID: 17913503
your pix have additional interfaces check and connect intf3 of your pix to that switch which have pc you want to give real ip.

first you have to configure intf3 for dmz set it security level 50.

then connect intf3 cable to that switch vlan which have pc attach.

0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 

Author Comment

by:nasemabdullaa
ID: 17913538
hi
thanks for your reply
how i can put security level 50
you mean must i displug my switch 2950 from distrbution switch which is connect to it now and connect to dmz cable
or i add to switch with the cable connect to distrbution switch

thanks
0
 
LVL 10

Expert Comment

by:srgilani
ID: 17913555
no no dear


let suppose your pc is connected to a switch 2950 we called switch 4.

run a cable from switch 4 and pulg it to intf3 of you pix, by doing this your pc and pix intf3 will be on same switch.
0
 

Author Comment

by:nasemabdullaa
ID: 17913580
ok
thanks but how i can put security level 50


thanks
0
 
LVL 10

Expert Comment

by:srgilani
ID: 17913606
nameif ethernet3 dmz security50


you above command you can do this.
0
 

Author Comment

by:nasemabdullaa
ID: 17913633
thanks for all
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Suggested Solutions

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now