Solved

Cisco PIX506E - Accept Incoming ports, with a static bind for all ports.

Posted on 2009-04-06
5
526 Views
Last Modified: 2012-05-06
Hi,

I have a single server that is behind my PIX506E; it's address is 172.16.22.3, and as such I have a static for the PIX's outside IP directly to that server.

However, if I enable SNMP, telnet, ssh, VPN, etc. on the PIX, it gets passed directly to the server.
Is there a way to have a full "DMZ" like static to the server, and then individually pick off the ports the PIX needs to handle itself?
Or would I be better off putting several statics in? I have a very vague understanding how the statics, nat, and acl's work; any detailed explanations, or references would be greatly appreciated!

I'm very new with the PIX, and the PDM will not work for the life of me (plus I want to learn the CLI).
I would appreciate any tips or recommendations to my config/setup, as I haven't been able to find many good guides to setting it up beyond initial configuration.

Another question: with the statics, I'm not sure which of the two static's actually made it work, but I was frustrated getting it setup the first time, which is correct, static (outside,inside) or static (inside,outside)?
I did the blanket static bind, as I couldn't get the ACL's to work well; it's been a few weeks since I messed with the config, so I can't go into detail as to what I was trying.


Thanks in advance!
pixfirewall# sh run
: Saved
:
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password <snip> encrypted
passwd <snip> encrypted
hostname pixfirewall
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit icmp any any 
access-list acl_out permit tcp any any eq ftp 
access-list acl_out permit tcp any any eq www 
access-list acl_out permit tcp any any eq 3389 
access-list acl_out permit tcp any any eq 161 
access-list acl_out permit udp any any eq snmp 
access-list acl_out permit tcp any any eq ssh 
access-list acl_out permit gre any any 
access-list acl_out permit tcp any any eq pptp 
pager lines 24
logging on
logging console emergencies
logging buffered emergencies
mtu outside 1500
mtu inside 1500
ip address outside 204.134.223.150 255.255.255.240
ip address inside 172.16.22.10 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (outside,inside) interface 172.16.22.3 netmask 255.255.255.255 0 0 
static (inside,outside) interface 172.16.22.3 netmask 255.255.255.255 0 0 
access-group acl_out in interface outside
route outside 0.0.0.0 0.0.0.0 204.134.223.147 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+ 
aaa-server RADIUS protocol radius 
aaa-server LOCAL protocol local 
no snmp-server location
no snmp-server contact
snmp-server community <snip>
no snmp-server enable traps
floodguard enable
telnet 172.16.22.10 255.255.255.255 inside
telnet timeout 60
ssh 204.134.223.150 255.255.255.255 outside
ssh timeout 30
console timeout 0
vpdn username <snip> password <snip>
vpdn enable outside
terminal width 80
Cryptochecksum:4bbb76f531aa23aef430648e649f608e
: end         
pixfirewall#

Open in new window

0
Comment
Question by:mtchs
  • 3
  • 2
5 Comments
 
LVL 23

Accepted Solution

by:
debuggerau earned 500 total points
ID: 24083966
keep the static (inside, outside), the other you can toss since you have a default nat outwards..

You may want to do static pnats..

hostname(config)# static (inside,outside) tcp 204.134.223.150 ftp 172.16.22.3 ftp netmask
255.255.255.255
hostname(config)# static (inside,outside) tcp 204.134.223.150 http 172.16.22.10 http netmask
255.255.255.255
hostname(config)# static (inside,outside) tcp  smtp 172.16.22.4 smtp netmask
255.255.255.255

So here you have the first to have a ftp host, second to give http access to the inside interface and the third could be a email server..

Hope that helps.
0
 
LVL 23

Assisted Solution

by:debuggerau
debuggerau earned 500 total points
ID: 24083973
I'd check the Cisco website too, the command reference, under static could be helpful...

http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/qref.html
0
 

Author Comment

by:mtchs
ID: 24084004
Thanks, I've already figured out that that is how I have to do it.
I found a 460 page PDF on cli reference for the version I have; it's been helping me quite a bit.

I've ditched the two static's I had before, and added all the static's I needed (rdp, ftp, snmp, etc.)


Now, I have another issue; being, configuring a PPTP VPN server on the PIX.

It would probably work fine, however I have an overlap in subnets.
Local subnet: 172.16.0.0/16
Remote subnet: 172.16.22.0/24

I will probably have to resort to renumbering one or the other subnets, it's a matter of deciding which one is easier to renumber...
0
 

Author Comment

by:mtchs
ID: 24084032
Yep, the subnetting was the issue.
0
 

Author Closing Comment

by:mtchs
ID: 31567338
I'll give credit for your time. Thanks
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco ASA blocks some https sites. 27 42
HP 1920 Switch -- IFNET LINK_UPDOWN Errors 3 11
Blacked by spamhaus? 26 69
Netgear modem router default firmware 11 31
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Concerto Cloud Services, a provider of fully managed private, public and hybrid cloud solutions, announced today it was named to the 20 Coolest Cloud Infrastructure Vendors Of The 2017 Cloud  (http://www.concertocloud.com/about/in-the-news/2017/02/0…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question