nasemabdullaa
asked on
install ISA after firewall
hi
i have network with this information
https://filedb.experts-exchange.com/incoming/ee-stuff/2882-network-diagram.JPG
can i install ISA after PIX 525 firewall or not (i have nat in router)
and if i can can anyone help me with that
if i can must i disable nat in router or not
i have mltiVLAN in my network
any details can help me
thanks
i have network with this information
https://filedb.experts-exchange.com/incoming/ee-stuff/2882-network-diagram.JPG
can i install ISA after PIX 525 firewall or not (i have nat in router)
and if i can can anyone help me with that
if i can must i disable nat in router or not
i have mltiVLAN in my network
any details can help me
thanks
ASKER
hi
thanks keith_alabaster iam realy happy to hear from you
thanks again
this what i want to do (this is the diagram of my network)
all distribution switch and core switch is layer 3 switch
each distribution switch connect to 6 access switch
each access switch is in different VLAN from other switch
distrbution switch(1)
i want to add ISA here distrbution switch(2)
router-->pix-->ISA--> core switch-->distrbution switch(3)-->access switch---> PC
----- distrbution switch(4)
i want to use ISA as firewall only
this is what i do(iam install ISA) with two NIC with this information for each card
first card connect to pix information
ip address 172.16.100.2
mask 255.255.255.0
gateaway 172.16.100.1
second NIC connect to core switch information
IP 172.16.100.3
mask 255.255.255.0
and iam add all my network to ISA
172.16.2.0
172.16.3.0---------------- ---------- 172.16.14. 0
>>>Just forward the ports required through pix to the isa external nic
i have 64 public IP address and now iam using from 4-42 for nat caa i do that or not
you mean must iam using static nat for NIC for ISA
now iam using this command for forward port for one bublic IP address (you mean must i use like this command) and what is about NAT in PIX?
static (inside,outside) 62.68.65.50 172.16.14.130 netmask 255.255.255.255 0 0
access-list OutsideIn permit tcp any host 62.68.65.50 eq www
access-list OutsideIn permit tcp any host 62.68.65.50 eq smtp
access-list OutsideIn permit tcp any host 62.68.65.50 eq ftp
access-list OutsideIn permit tcp any host 62.68.65.50 eq telnet
access-list OutsideIn permit tcp any host 62.68.65.50 eq 3389
access-list OutsideIn permit tcp any host 62.68.65.50 eq 69
access-list OutsideIn permit tcp any host 62.68.65.50 eq ssh
second question in my network now the IP address of core switch is 172.16.100.1 must i change it to 172.16.100.4 and change
ip default-gateway 172.16.100.1 to 172.16.100.4 is that true
and change
ip route 0.0.0.0 0.0.0.0 172.16.100.2 to ip route 0.0.0.0 0.0.0.0 172.16.100.3 (ip address of second NIC of ISA server) is that true
last question must i cahnge configuration in PIX and core switch only and not in router (is that true)
i send to you the configuration of PIX and router and core switch
core configuration is
! interface GigabitEthernet1/1
no switchport
ip address 172.16.100.1 255.255.255.0 (must chang to 172.16.100.4)
!
interface GigabitEthernet1/2
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet1/3
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet1/4
description TrunkToD2_Floor7A
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet1/5
description TrunkToD3_Floor3A
switchport trunk encapsulation dot1q
switchport mode trunk
interface GigabitEth
description WEB_SERVER
no switchport
ip address 172.16.110.1 255.255.255.0
!
interface GigabitEthernet2/3
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet2/4
description Exchange_server
no switchport
ip address 172.16.120.1 255.255.255.0
interface Vlan1
no ip address
shutdown
!
interface Vlan10
no ip address
!
interface Vlan50
ip address 172.16.50.50 255.255.255.0
!
router rip
network 172.16.0.0
!
ip default-gateway 172.16.100.1 (must i cahnge this to 172.16.100.4)
ip route 0.0.0.0 0.0.0.0 172.16.100.2 (must i change this to 172.16.100.3 the IP address of second NIC of ISA)
PIX configuration is
access-list acl_out permit icmp any any
access-list inside_outbound_nat0_acl permit ip any 172.16.2.96 255.255.255.240
access-list OutsideIn permit tcp any host 62.68.65.43 eq www
access-list OutsideIn permit tcp any host 62.68.65.43 eq smtp
access-list OutsideIn permit tcp any host 62.68.65.43 eq ftp
access-list OutsideIn permit tcp any host 62.68.65.43 eq telnet
access-list OutsideIn permit tcp any host 62.68.65.43 eq 3389
access-list OutsideIn permit tcp any host 62.68.65.43 eq 69
access-list OutsideIn permit tcp any host 62.68.65.43 eq ssh
access-list OutsideIn permit tcp any host 62.68.65.50 eq www
access-list OutsideIn permit tcp any host 62.68.65.50 eq smtp
access-list OutsideIn permit tcp any host 62.68.65.50 eq ftp
access-list OutsideIn permit tcp any host 62.68.65.50 eq telnet
access-list OutsideIn permit tcp any host 62.68.65.50 eq 3389
access-list OutsideIn permit tcp any host 62.68.65.50 eq 69
access-list OutsideIn permit tcp any host 62.68.65.50 eq ssh
access-list OutsideIn permit tcp any host 62.68.65.51 eq www
access-list OutsideIn permit tcp any host 62.68.65.51 eq ftp
access-list OutsideIn permit tcp any host 62.68.65.52 eq www
access-list OutsideIn permit tcp any host 62.68.65.52 eq ftp
pager lines 24
mtu outside 1500
mtu inside 1500
mtu intf2 1500
mtu intf3 1500
ip address outside 62.68.65.3 255.255.255.192
ip address inside 172.16.100.2 255.255.255.0
no ip address intf2
no ip address intf3
ip audit info action alarm
ip audit attack action alarm
no failover
failover timeout 0:00:00
failover poll 15
no failover ip addr
no failover ip address inside
no failover ip address intf2
no failover ip address intf3
pdm location 172.16.2.70 255.255.255.255 inside
pdm location 172.16.2.200 255.255.255.255 inside
pdm location 172.16.2.0 255.255.255.0 inside
pdm location 172.16.3.0 255.255.255.0 inside
pdm location 172.16.4.0 255.255.255.0 inside
pdm location 172.16.5.0 255.255.255.0 inside
pdm location 172.16.6.0 255.255.255.0 inside
pdm location 172.16.7.0 255.255.255.0 inside
pdm location 172.16.8.0 255.255.255.0 inside
pdm location 172.16.9.0 255.255.255.0 inside
pdm location 172.16.10.0 255.255.255.0 inside
pdm location 172.16.11.0 255.255.255.0 inside
pdm location 172.16.12.0 255.255.255.0 inside
pdm location 172.16.13.0 255.255.255.0 inside
pdm location 172.16.14.0 255.255.255.0 inside
pdm location 172.16.20.0 255.255.255.0 inside
pdm location 172.16.30.0 255.255.255.0 inside
pdm location 172.16.40.0 255.255.255.0 inside
pdm location 172.16.50.0 255.255.255.0 inside
pdm location 172.16.110.2 255.255.255.255 inside
pdm location 172.16.120.2 255.255.255.255 inside
pdm location 62.68.65.43 255.255.255.255 outside
pdm location 62.68.65.44 255.255.255.255 outside
pdm location 172.16.2.96 255.255.255.240 outside
pdm history enable
arp timeout 14400
global (outside) 1 62.68.65.4-62.68.65.42
global (outside) 1 62.68.65.60
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 172.16.2.0 255.255.255.0 0 0
nat (inside) 1 172.16.3.0 255.255.255.0 0 0
nat (inside) 1 172.16.4.0 255.255.255.0 0 0
nat (inside) 1 172.16.5.0 25
nat (inside) 1 172.16.6.0 255.255.255.0 0 0
nat (inside) 1 172.16.7.0 255.255.255.0 0 0
nat (inside) 1 172.16.8.0 255.255.255.0 0 0
nat (inside) 1 172.16.9.0 255.255.255.0 0 0
nat (inside) 1 172.16.10.0 255.255.255.0 0 0
nat (inside) 1 172.16.11.0 255.255.255.0 0 0
nat (inside) 1 172.16.12.0 255.255.255.0 0 0
nat (inside) 1 172.16.13.0 255.255.255.0 0 0
nat (inside) 1 172.16.14.0 255.255.255.0 0 0
nat (inside) 1 172.16.20.0 255.255.255.0 0 0
nat (inside) 1 172.16.30.0 255.255.255.0 0 0
nat (inside) 1 172.16.40.0
nat (inside) 1 172.16.100.0 255.255.255.0 0 0
static (inside,outside) 62.68.65.43 172.16.110.2 netmask 255.255.255.255 0 0
static (outside,inside) 172.16.110.2 62.68.65.43 netmask 255.255.255.255 0 0
static (inside,outside) 62.68.65.44 172.16.120.2 netmask 255.255.255.255 0 0
static (outside,inside) 172.16.120.2 62.68.65.44 netmask 255.255.255.255 0 0
static (inside,outside) 62.68.65.50 172.16.14.130 netmask 255.255.255.255 0 0
static (inside,outside) 62.68.65.51 172.16.2.7 netmask 255.255.255.255 0 0
static (inside,outside) 62.68.65.52 172.16.2.6 netmask 255.255.255.255 0 0
access-group OutsideIn in interface outside
conduit permit icmp any any
conduit permit tcp host 62.68.65.43 eq www any
conduit permit tcp host 62.68.65.44 eq www any
conduit permit tcp host 62.68.65.44 eq pop3 any
conduit permit tcp host 62.68.65.44 eq imap4 any
conduit permit tcp host 62.68.65.44 eq smtp any
rip inside passive version 1
route outside 0.0.0.0 0.0.0.0 62.68.65.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 172.16.2.70 255.255.255.255
http 172.16.2.200 255.255.255.255 inside
http 172.16.130.2 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-pptp
telnet 172.16.100.0 255.255.255.0 inside
telnet 172.16.50.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn username nasem password *********
dhcpd address 172.16.100.50-172.16.100.2 25 inside
dhcpd dns 172.16.2.5
dhcpd lease 6000
dhcpd ping_timeout 750
dhcpd auto_config outside
dhcpd enable inside
terminal width 80
router configuration is
!
interface GigabitEthernet0/1
ip address 192.168.0.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 172.16.197.2 255.255.255.0
no ip route-cache cef
no ip route-cache
no ip mroute-cache
load-interval 30
no keepalive
no fair-queue
ignore dcd
no cdp enable
!
interface Content-Engine1/0
ip unnumbered GigabitEthernet0/0
service-module ip address 62.68.65.2 255.255.255.192
service-module ip default-gateway 62.68.65.1
!
ip default-gateway 172.16.197.2
ip classless
ip route 0.0.0.0 0.0.0.0 172.16.197.1
ip route 62.68.65.2 255.255.255.255 Content-Engine1/0
thanks for your help
thanks keith_alabaster iam realy happy to hear from you
thanks again
this what i want to do (this is the diagram of my network)
all distribution switch and core switch is layer 3 switch
each distribution switch connect to 6 access switch
each access switch is in different VLAN from other switch
distrbution switch(1)
i want to add ISA here distrbution switch(2)
router-->pix-->ISA--> core switch-->distrbution switch(3)-->access switch---> PC
----- distrbution switch(4)
i want to use ISA as firewall only
this is what i do(iam install ISA) with two NIC with this information for each card
first card connect to pix information
ip address 172.16.100.2
mask 255.255.255.0
gateaway 172.16.100.1
second NIC connect to core switch information
IP 172.16.100.3
mask 255.255.255.0
and iam add all my network to ISA
172.16.2.0
172.16.3.0----------------
>>>Just forward the ports required through pix to the isa external nic
i have 64 public IP address and now iam using from 4-42 for nat caa i do that or not
you mean must iam using static nat for NIC for ISA
now iam using this command for forward port for one bublic IP address (you mean must i use like this command) and what is about NAT in PIX?
static (inside,outside) 62.68.65.50 172.16.14.130 netmask 255.255.255.255 0 0
access-list OutsideIn permit tcp any host 62.68.65.50 eq www
access-list OutsideIn permit tcp any host 62.68.65.50 eq smtp
access-list OutsideIn permit tcp any host 62.68.65.50 eq ftp
access-list OutsideIn permit tcp any host 62.68.65.50 eq telnet
access-list OutsideIn permit tcp any host 62.68.65.50 eq 3389
access-list OutsideIn permit tcp any host 62.68.65.50 eq 69
access-list OutsideIn permit tcp any host 62.68.65.50 eq ssh
second question in my network now the IP address of core switch is 172.16.100.1 must i change it to 172.16.100.4 and change
ip default-gateway 172.16.100.1 to 172.16.100.4 is that true
and change
ip route 0.0.0.0 0.0.0.0 172.16.100.2 to ip route 0.0.0.0 0.0.0.0 172.16.100.3 (ip address of second NIC of ISA server) is that true
last question must i cahnge configuration in PIX and core switch only and not in router (is that true)
i send to you the configuration of PIX and router and core switch
core configuration is
! interface GigabitEthernet1/1
no switchport
ip address 172.16.100.1 255.255.255.0 (must chang to 172.16.100.4)
!
interface GigabitEthernet1/2
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet1/3
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet1/4
description TrunkToD2_Floor7A
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet1/5
description TrunkToD3_Floor3A
switchport trunk encapsulation dot1q
switchport mode trunk
interface GigabitEth
description WEB_SERVER
no switchport
ip address 172.16.110.1 255.255.255.0
!
interface GigabitEthernet2/3
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface GigabitEthernet2/4
description Exchange_server
no switchport
ip address 172.16.120.1 255.255.255.0
interface Vlan1
no ip address
shutdown
!
interface Vlan10
no ip address
!
interface Vlan50
ip address 172.16.50.50 255.255.255.0
!
router rip
network 172.16.0.0
!
ip default-gateway 172.16.100.1 (must i cahnge this to 172.16.100.4)
ip route 0.0.0.0 0.0.0.0 172.16.100.2 (must i change this to 172.16.100.3 the IP address of second NIC of ISA)
PIX configuration is
access-list acl_out permit icmp any any
access-list inside_outbound_nat0_acl permit ip any 172.16.2.96 255.255.255.240
access-list OutsideIn permit tcp any host 62.68.65.43 eq www
access-list OutsideIn permit tcp any host 62.68.65.43 eq smtp
access-list OutsideIn permit tcp any host 62.68.65.43 eq ftp
access-list OutsideIn permit tcp any host 62.68.65.43 eq telnet
access-list OutsideIn permit tcp any host 62.68.65.43 eq 3389
access-list OutsideIn permit tcp any host 62.68.65.43 eq 69
access-list OutsideIn permit tcp any host 62.68.65.43 eq ssh
access-list OutsideIn permit tcp any host 62.68.65.50 eq www
access-list OutsideIn permit tcp any host 62.68.65.50 eq smtp
access-list OutsideIn permit tcp any host 62.68.65.50 eq ftp
access-list OutsideIn permit tcp any host 62.68.65.50 eq telnet
access-list OutsideIn permit tcp any host 62.68.65.50 eq 3389
access-list OutsideIn permit tcp any host 62.68.65.50 eq 69
access-list OutsideIn permit tcp any host 62.68.65.50 eq ssh
access-list OutsideIn permit tcp any host 62.68.65.51 eq www
access-list OutsideIn permit tcp any host 62.68.65.51 eq ftp
access-list OutsideIn permit tcp any host 62.68.65.52 eq www
access-list OutsideIn permit tcp any host 62.68.65.52 eq ftp
pager lines 24
mtu outside 1500
mtu inside 1500
mtu intf2 1500
mtu intf3 1500
ip address outside 62.68.65.3 255.255.255.192
ip address inside 172.16.100.2 255.255.255.0
no ip address intf2
no ip address intf3
ip audit info action alarm
ip audit attack action alarm
no failover
failover timeout 0:00:00
failover poll 15
no failover ip addr
no failover ip address inside
no failover ip address intf2
no failover ip address intf3
pdm location 172.16.2.70 255.255.255.255 inside
pdm location 172.16.2.200 255.255.255.255 inside
pdm location 172.16.2.0 255.255.255.0 inside
pdm location 172.16.3.0 255.255.255.0 inside
pdm location 172.16.4.0 255.255.255.0 inside
pdm location 172.16.5.0 255.255.255.0 inside
pdm location 172.16.6.0 255.255.255.0 inside
pdm location 172.16.7.0 255.255.255.0 inside
pdm location 172.16.8.0 255.255.255.0 inside
pdm location 172.16.9.0 255.255.255.0 inside
pdm location 172.16.10.0 255.255.255.0 inside
pdm location 172.16.11.0 255.255.255.0 inside
pdm location 172.16.12.0 255.255.255.0 inside
pdm location 172.16.13.0 255.255.255.0 inside
pdm location 172.16.14.0 255.255.255.0 inside
pdm location 172.16.20.0 255.255.255.0 inside
pdm location 172.16.30.0 255.255.255.0 inside
pdm location 172.16.40.0 255.255.255.0 inside
pdm location 172.16.50.0 255.255.255.0 inside
pdm location 172.16.110.2 255.255.255.255 inside
pdm location 172.16.120.2 255.255.255.255 inside
pdm location 62.68.65.43 255.255.255.255 outside
pdm location 62.68.65.44 255.255.255.255 outside
pdm location 172.16.2.96 255.255.255.240 outside
pdm history enable
arp timeout 14400
global (outside) 1 62.68.65.4-62.68.65.42
global (outside) 1 62.68.65.60
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 172.16.2.0 255.255.255.0 0 0
nat (inside) 1 172.16.3.0 255.255.255.0 0 0
nat (inside) 1 172.16.4.0 255.255.255.0 0 0
nat (inside) 1 172.16.5.0 25
nat (inside) 1 172.16.6.0 255.255.255.0 0 0
nat (inside) 1 172.16.7.0 255.255.255.0 0 0
nat (inside) 1 172.16.8.0 255.255.255.0 0 0
nat (inside) 1 172.16.9.0 255.255.255.0 0 0
nat (inside) 1 172.16.10.0 255.255.255.0 0 0
nat (inside) 1 172.16.11.0 255.255.255.0 0 0
nat (inside) 1 172.16.12.0 255.255.255.0 0 0
nat (inside) 1 172.16.13.0 255.255.255.0 0 0
nat (inside) 1 172.16.14.0 255.255.255.0 0 0
nat (inside) 1 172.16.20.0 255.255.255.0 0 0
nat (inside) 1 172.16.30.0 255.255.255.0 0 0
nat (inside) 1 172.16.40.0
nat (inside) 1 172.16.100.0 255.255.255.0 0 0
static (inside,outside) 62.68.65.43 172.16.110.2 netmask 255.255.255.255 0 0
static (outside,inside) 172.16.110.2 62.68.65.43 netmask 255.255.255.255 0 0
static (inside,outside) 62.68.65.44 172.16.120.2 netmask 255.255.255.255 0 0
static (outside,inside) 172.16.120.2 62.68.65.44 netmask 255.255.255.255 0 0
static (inside,outside) 62.68.65.50 172.16.14.130 netmask 255.255.255.255 0 0
static (inside,outside) 62.68.65.51 172.16.2.7 netmask 255.255.255.255 0 0
static (inside,outside) 62.68.65.52 172.16.2.6 netmask 255.255.255.255 0 0
access-group OutsideIn in interface outside
conduit permit icmp any any
conduit permit tcp host 62.68.65.43 eq www any
conduit permit tcp host 62.68.65.44 eq www any
conduit permit tcp host 62.68.65.44 eq pop3 any
conduit permit tcp host 62.68.65.44 eq imap4 any
conduit permit tcp host 62.68.65.44 eq smtp any
rip inside passive version 1
route outside 0.0.0.0 0.0.0.0 62.68.65.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 172.16.2.70 255.255.255.255
http 172.16.2.200 255.255.255.255 inside
http 172.16.130.2 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-pptp
telnet 172.16.100.0 255.255.255.0 inside
telnet 172.16.50.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn username nasem password *********
dhcpd address 172.16.100.50-172.16.100.2
dhcpd dns 172.16.2.5
dhcpd lease 6000
dhcpd ping_timeout 750
dhcpd auto_config outside
dhcpd enable inside
terminal width 80
router configuration is
!
interface GigabitEthernet0/1
ip address 192.168.0.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 172.16.197.2 255.255.255.0
no ip route-cache cef
no ip route-cache
no ip mroute-cache
load-interval 30
no keepalive
no fair-queue
ignore dcd
no cdp enable
!
interface Content-Engine1/0
ip unnumbered GigabitEthernet0/0
service-module ip address 62.68.65.2 255.255.255.192
service-module ip default-gateway 62.68.65.1
!
ip default-gateway 172.16.197.2
ip classless
ip route 0.0.0.0 0.0.0.0 172.16.197.1
ip route 62.68.65.2 255.255.255.255 Content-Engine1/0
thanks for your help
ASKER
hi again
sorry i forget this for router configuration
interface GigabitEthernet0/0
description $ETH-LAN$$ETH-SW-LAUNCH$$I NTF-INFO-G E 0/0$
ip address 62.68.65.1 255.255.255.192
ip wccp web-cache redirect out
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 192.168.0.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 172.16.197.2 255.255.255.0
no ip route-cache cef
no ip route-cache
no ip mroute-cache
load-interval 30
no keepalive
no fair-queue
ignore dcd
no cdp enable
!
interface Content-Engine1/0
ip unnumbered GigabitEthernet0/0
service-module ip address 62.68.65.2 255.255.255.192
service-module ip default-gateway 62.68.65.1
!
ip default-gateway 172.16.197.2
ip classless
ip route 0.0.0.0 0.0.0.0 172.16.197.1
ip route 62.68.65.2 255.255.255.255 Content-Engine1/0
thaks
sorry i forget this for router configuration
interface GigabitEthernet0/0
description $ETH-LAN$$ETH-SW-LAUNCH$$I
ip address 62.68.65.1 255.255.255.192
ip wccp web-cache redirect out
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 192.168.0.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 172.16.197.2 255.255.255.0
no ip route-cache cef
no ip route-cache
no ip mroute-cache
load-interval 30
no keepalive
no fair-queue
ignore dcd
no cdp enable
!
interface Content-Engine1/0
ip unnumbered GigabitEthernet0/0
service-module ip address 62.68.65.2 255.255.255.192
service-module ip default-gateway 62.68.65.1
!
ip default-gateway 172.16.197.2
ip classless
ip route 0.0.0.0 0.0.0.0 172.16.197.1
ip route 62.68.65.2 255.255.255.255 Content-Engine1/0
thaks
ASKER
hi
can anyone help me please
this is what i do exactly
X.X.X.X= public IP of router
X1.X1.X1.X1= public IP of outside of pix
X.X.X.X (my public IP address) ( I have 64 public IP address)
:
router
:
IP address X1.X1.X1.X1(PIX outside)
IP address 172.16.100.2 (PIX inside )
:
IP address (outside interface connect to PIX) 172.16.100.3 (ISA server)
:
IP address (inside interface connect to core switch) 172.16.100.4(ISA server)
:
Core switch ( layer3 switch)IP address 172.16.100.2
and i made this change of configuration is PIX to foword port to IP address 172.16.100.3
static (inside,outside) X.X.X.X 172.16.100.3 netmask 255.255.255.255 0 0
access-list OutsideIn permit tcp any host X.X.X.X eq www
access-list OutsideIn permit tcp any host X.X.X.X eq smtp
access-list OutsideIn permit tcp any host X.X.X.X eq ftp
access-list OutsideIn permit tcp any host X.X.X.X eq telnet
access-list OutsideIn permit tcp any host X.X.X.X eq 3389
access-list OutsideIn permit tcp any host X.X.X.X eq 69
access-list OutsideIn permit tcp any host X.X.X.X eq ssh
access-group OutsideIn in interface outside
and in core switch i made this change in configuration
ip route 0.0.0.0 0.0.0.0 172.16.100.2 ------------->>(must i change this to 172.16.100.4 the inside IP address of NIC of ISA)
i di that but the internet not work (i do not know what is the problem)
any suggestion can help me
thanks
can anyone help me please
this is what i do exactly
X.X.X.X= public IP of router
X1.X1.X1.X1= public IP of outside of pix
X.X.X.X (my public IP address) ( I have 64 public IP address)
:
router
:
IP address X1.X1.X1.X1(PIX outside)
IP address 172.16.100.2 (PIX inside )
:
IP address (outside interface connect to PIX) 172.16.100.3 (ISA server)
:
IP address (inside interface connect to core switch) 172.16.100.4(ISA server)
:
Core switch ( layer3 switch)IP address 172.16.100.2
and i made this change of configuration is PIX to foword port to IP address 172.16.100.3
static (inside,outside) X.X.X.X 172.16.100.3 netmask 255.255.255.255 0 0
access-list OutsideIn permit tcp any host X.X.X.X eq www
access-list OutsideIn permit tcp any host X.X.X.X eq smtp
access-list OutsideIn permit tcp any host X.X.X.X eq ftp
access-list OutsideIn permit tcp any host X.X.X.X eq telnet
access-list OutsideIn permit tcp any host X.X.X.X eq 3389
access-list OutsideIn permit tcp any host X.X.X.X eq 69
access-list OutsideIn permit tcp any host X.X.X.X eq ssh
access-group OutsideIn in interface outside
and in core switch i made this change in configuration
ip route 0.0.0.0 0.0.0.0 172.16.100.2 ------------->>(must i change this to 172.16.100.4 the inside IP address of NIC of ISA)
i di that but the internet not work (i do not know what is the problem)
any suggestion can help me
thanks
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
so
a.a.a.a
router --- > PIX ext nic x1.x1.x1.x1
|
|
PIX int nic 192.168.110.1
|
ISA ext nic 192.168.110.2
|
ISA int nic 172.16.100.4
I'll assume you have used a 255.255.255.0 subnet mask so set ISA internal LAT to include:
172.30.100.0 - 172.16.100.255
repeat entries for EVERY subnet you have that will enter ISA through the the INTERNAL nic.
ANYTHING that is not listed in the internal LAT is treated as being available through the EXTERNAL nic.
Hope this helps a little
Keith
a.a.a.a
router --- > PIX ext nic x1.x1.x1.x1
|
|
PIX int nic 192.168.110.1
|
ISA ext nic 192.168.110.2
|
ISA int nic 172.16.100.4
I'll assume you have used a 255.255.255.0 subnet mask so set ISA internal LAT to include:
172.30.100.0 - 172.16.100.255
repeat entries for EVERY subnet you have that will enter ISA through the the INTERNAL nic.
ANYTHING that is not listed in the internal LAT is treated as being available through the EXTERNAL nic.
Hope this helps a little
Keith
ASKER
hi keith_alabaster
thanks for your reply
i use these command in core switch
and in core switch i made this configuration (now)(old configuration)
ip route 0.0.0.0 0.0.0.0 172.16.100.2 ( to routed to pix must now i change the defualt route from pix to internal NIC for ISA ) is that true
i mean must i change ip defulat route in core switch
ip route 0.0.0.0 0.0.0.0 172.16.100.2 ------------->>(must i change this to 172.16.100.4 the inside IP address of NIC of ISA)
thanks
thanks for your reply
i use these command in core switch
and in core switch i made this configuration (now)(old configuration)
ip route 0.0.0.0 0.0.0.0 172.16.100.2 ( to routed to pix must now i change the defualt route from pix to internal NIC for ISA ) is that true
i mean must i change ip defulat route in core switch
ip route 0.0.0.0 0.0.0.0 172.16.100.2 ------------->>(must i change this to 172.16.100.4 the inside IP address of NIC of ISA)
thanks
Yes. all the traffic must go through to the ISA internal NIC address. This send out to its default which is the PIX internal address which in turn send to the external router internal address.
ASKER
hi
thanks keith_alabaster for all your reply
i do all above and iam add this network to ISA network
172.16.2.0
172.16.3.0................ .......... .172.16.14 .0 (i have i4 VLAN) in my network
and this is configuration of iSA NIC
outside NIC
IP address 10.100.100.2
mask 255.255.255.0
gateaway 10.100.100.1
inside NIC
IP address 172.16.100.4
mask 255.255.255.0 (mask of internal network is 255.255.255.0 not 255.255.0.0)
and iam foword from core to internal NIC of ISA using this command
ip route 0.0.0.0 0.0.0.0 10.100.100.2
but i want to say (in my network i have routing in core switch and distrbution switch can ISA work with that)
this is all my network digram
X.X.X.X= public IP of router
X1.X1.X1.X1= public IP of outside of pix
X.X.X.X (my public IP address) ( I have 64 public IP address)
:
router
:
IP address X1.X1.X1.X1(PIX outside)
IP address 10.100.100.1 (PIX inside )
:
IP address (outside interface connect to PIX) 10.100.100.2 (ISA server)
:
IP address (inside interface connect to core switch) 172.16.100.4(ISA server)
:
Core switch ( layer3 switch)IP address 172.16.100.2
: : : :
distribution switch (layer3) distribution switch distribution switch distribution switch
: : : :
access switch (4) access switch (4) access switch (4) access switch (4)
all distribution switch is layer 3 switch
i do all that but its not work
can you help me
thanks
thanks keith_alabaster for all your reply
i do all above and iam add this network to ISA network
172.16.2.0
172.16.3.0................
and this is configuration of iSA NIC
outside NIC
IP address 10.100.100.2
mask 255.255.255.0
gateaway 10.100.100.1
inside NIC
IP address 172.16.100.4
mask 255.255.255.0 (mask of internal network is 255.255.255.0 not 255.255.0.0)
and iam foword from core to internal NIC of ISA using this command
ip route 0.0.0.0 0.0.0.0 10.100.100.2
but i want to say (in my network i have routing in core switch and distrbution switch can ISA work with that)
this is all my network digram
X.X.X.X= public IP of router
X1.X1.X1.X1= public IP of outside of pix
X.X.X.X (my public IP address) ( I have 64 public IP address)
:
router
:
IP address X1.X1.X1.X1(PIX outside)
IP address 10.100.100.1 (PIX inside )
:
IP address (outside interface connect to PIX) 10.100.100.2 (ISA server)
:
IP address (inside interface connect to core switch) 172.16.100.4(ISA server)
:
Core switch ( layer3 switch)IP address 172.16.100.2
: : : :
distribution switch (layer3) distribution switch distribution switch distribution switch
: : : :
access switch (4) access switch (4) access switch (4) access switch (4)
all distribution switch is layer 3 switch
i do all that but its not work
can you help me
thanks
ASKER
hi
sorry i forget
must i add network of core switch in ISA or not 172.16.100.0
can ISA work with 14 VLAN or not
thanks
sorry i forget
must i add network of core switch in ISA or not 172.16.100.0
can ISA work with 14 VLAN or not
thanks
I don't understand your question.
ISA must have ALL the internal subnets/vlans added if they are inside the ISA server.
If you have used a 255.255.0.0 subnet mask then ISA would have 172.16.0.0 - 172.16.255.255 in the lat.
If you have used a 255.255.255.0 subnet mask then you must add each individually to the LAT.
172.16.0.0 - 172.30.0.255
172.16.1.0 - 172.16.1.255
172.16.100.0 - 172.16.100.255
etc etc
for each subnet vlan that is used inside the ISA.
On the ISA server, you should have a rule for allow all outbounf protocols from local & internal host to external
the ISA internet explorer settings should point to the isa internal ip on port 8080.
The internal isa card should have its dns settings pointing to the internal dns server
From isa, can you now get to the internet?
ISA must have ALL the internal subnets/vlans added if they are inside the ISA server.
If you have used a 255.255.0.0 subnet mask then ISA would have 172.16.0.0 - 172.16.255.255 in the lat.
If you have used a 255.255.255.0 subnet mask then you must add each individually to the LAT.
172.16.0.0 - 172.30.0.255
172.16.1.0 - 172.16.1.255
172.16.100.0 - 172.16.100.255
etc etc
for each subnet vlan that is used inside the ISA.
On the ISA server, you should have a rule for allow all outbounf protocols from local & internal host to external
the ISA internet explorer settings should point to the isa internal ip on port 8080.
The internal isa card should have its dns settings pointing to the internal dns server
From isa, can you now get to the internet?
ASKER
hi keith_alabaster
thanks for your reply
>>>On the ISA server, you should have a rule for allow all outbounf protocols from local & internal host to external
i do that
>>>the ISA internet explorer settings should point to the isa internal ip on port 8080.
can you explain more about this
>>>The internal isa card should have its dns settings pointing to the internal dns server
i have DNS internal dns 172.16.2.5 and 172.16.2.7 and external dns 62.68.95.11 and 62.68.64.11 iam add all these dns in internal ISA NIC
NIC of ISA setting is
ip address 172.16.100.4
mask 255.255.255.0
dns1 172.16.2.5
dns2 172.26.2.7
dns3 62.68.95.11
dns4 62.68.64.11
external NIC of ISA
ip address 10.100.100.2
mask 255.0.0.0
gateaway 10.100.100.1
the internet not work
thanks
thanks for your reply
>>>On the ISA server, you should have a rule for allow all outbounf protocols from local & internal host to external
i do that
>>>the ISA internet explorer settings should point to the isa internal ip on port 8080.
can you explain more about this
>>>The internal isa card should have its dns settings pointing to the internal dns server
i have DNS internal dns 172.16.2.5 and 172.16.2.7 and external dns 62.68.95.11 and 62.68.64.11 iam add all these dns in internal ISA NIC
NIC of ISA setting is
ip address 172.16.100.4
mask 255.255.255.0
dns1 172.16.2.5
dns2 172.26.2.7
dns3 62.68.95.11
dns4 62.68.64.11
external NIC of ISA
ip address 10.100.100.2
mask 255.0.0.0
gateaway 10.100.100.1
the internet not work
thanks
I can assist you with technical issues but I cannot teach you an entire product by this process.
remove dns3 & dns4. ISA should have its dns pointing to your internal dns servers only, not the ISP's or other external dns. Your internal DNS servers should have entries in their forwarders tab that point to the isp's dns servers (they resolve external DNS for the ISA server).
>>>the ISA internet explorer settings should point to the isa internal ip on port 8080.
can you explain more about this
The ISA internet explorer proxy settings should be set to use the isa internal ip on port 8080 (this is the default port number used by ISA to accept web proxy traffic. Please check that your outbound internet rule includes:
allow all protocols from internal & local host to external all users.
If you cannot get to the Internet from ISA, then you certainly will not get out from any internal machines.
remove dns3 & dns4. ISA should have its dns pointing to your internal dns servers only, not the ISP's or other external dns. Your internal DNS servers should have entries in their forwarders tab that point to the isp's dns servers (they resolve external DNS for the ISA server).
>>>the ISA internet explorer settings should point to the isa internal ip on port 8080.
can you explain more about this
The ISA internet explorer proxy settings should be set to use the isa internal ip on port 8080 (this is the default port number used by ISA to accept web proxy traffic. Please check that your outbound internet rule includes:
allow all protocols from internal & local host to external all users.
If you cannot get to the Internet from ISA, then you certainly will not get out from any internal machines.
ASKER
hi
thanks for your reply
must i use proxy settings for all computer in my network or i use it in server only
thanks
thanks for your reply
must i use proxy settings for all computer in my network or i use it in server only
thanks
All computers that will access the internet through the web browser require it.
Any traffic that will use non-proxy traffic out to the internet must be routed to the ISA internal nic.
Any traffic that will use non-proxy traffic out to the internet must be routed to the ISA internal nic.
ASKER
hi keith_alabaster
thanks
iam very happy its working now (you are more than genius if i can gave you more than 500 point i give it now)
iam grateful to you
thanks for you to gave me the long time for my question and to work at the weekend
thanks
thanks
iam very happy its working now (you are more than genius if i can gave you more than 500 point i give it now)
iam grateful to you
thanks for you to gave me the long time for my question and to work at the weekend
thanks
You are most welcome.
Regards
Keith
Regards
Keith
As an aside, I am going to edit the question so there is one Accept rather than many assists.
ASKER
hi
thanks
thanks
:)
That said, PIX as the outer firewall then isa as the inner firewall is a brilliant combination. Just forward the ports required through pix to the isa external nic and then publish the services you want. For outgoing, its exactly as it says on the box.