Solved

Cisco PIX506E - Accept Incoming ports, with a static bind for all ports.

Posted on 2009-04-06
5
522 Views
Last Modified: 2012-05-06
Hi,

I have a single server that is behind my PIX506E; it's address is 172.16.22.3, and as such I have a static for the PIX's outside IP directly to that server.

However, if I enable SNMP, telnet, ssh, VPN, etc. on the PIX, it gets passed directly to the server.
Is there a way to have a full "DMZ" like static to the server, and then individually pick off the ports the PIX needs to handle itself?
Or would I be better off putting several statics in? I have a very vague understanding how the statics, nat, and acl's work; any detailed explanations, or references would be greatly appreciated!

I'm very new with the PIX, and the PDM will not work for the life of me (plus I want to learn the CLI).
I would appreciate any tips or recommendations to my config/setup, as I haven't been able to find many good guides to setting it up beyond initial configuration.

Another question: with the statics, I'm not sure which of the two static's actually made it work, but I was frustrated getting it setup the first time, which is correct, static (outside,inside) or static (inside,outside)?
I did the blanket static bind, as I couldn't get the ACL's to work well; it's been a few weeks since I messed with the config, so I can't go into detail as to what I was trying.


Thanks in advance!
pixfirewall# sh run

: Saved

:

PIX Version 6.3(3)

interface ethernet0 auto

interface ethernet1 auto

nameif ethernet0 outside security0

nameif ethernet1 inside security100

enable password <snip> encrypted

passwd <snip> encrypted

hostname pixfirewall

fixup protocol dns maximum-length 512

fixup protocol ftp 21

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol http 80

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol sip 5060

fixup protocol sip udp 5060

fixup protocol skinny 2000

fixup protocol smtp 25

fixup protocol sqlnet 1521

fixup protocol tftp 69

names

access-list acl_out permit icmp any any 

access-list acl_out permit tcp any any eq ftp 

access-list acl_out permit tcp any any eq www 

access-list acl_out permit tcp any any eq 3389 

access-list acl_out permit tcp any any eq 161 

access-list acl_out permit udp any any eq snmp 

access-list acl_out permit tcp any any eq ssh 

access-list acl_out permit gre any any 

access-list acl_out permit tcp any any eq pptp 

pager lines 24

logging on

logging console emergencies

logging buffered emergencies

mtu outside 1500

mtu inside 1500

ip address outside 204.134.223.150 255.255.255.240

ip address inside 172.16.22.10 255.255.255.0

ip audit info action alarm

ip audit attack action alarm

pdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

static (outside,inside) interface 172.16.22.3 netmask 255.255.255.255 0 0 

static (inside,outside) interface 172.16.22.3 netmask 255.255.255.255 0 0 

access-group acl_out in interface outside

route outside 0.0.0.0 0.0.0.0 204.134.223.147 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+ 

aaa-server RADIUS protocol radius 

aaa-server LOCAL protocol local 

no snmp-server location

no snmp-server contact

snmp-server community <snip>

no snmp-server enable traps

floodguard enable

telnet 172.16.22.10 255.255.255.255 inside

telnet timeout 60

ssh 204.134.223.150 255.255.255.255 outside

ssh timeout 30

console timeout 0

vpdn username <snip> password <snip>

vpdn enable outside

terminal width 80

Cryptochecksum:4bbb76f531aa23aef430648e649f608e

: end         

pixfirewall#

Open in new window

0
Comment
Question by:mtchs
  • 3
  • 2
5 Comments
 
LVL 23

Accepted Solution

by:
debuggerau earned 500 total points
ID: 24083966
keep the static (inside, outside), the other you can toss since you have a default nat outwards..

You may want to do static pnats..

hostname(config)# static (inside,outside) tcp 204.134.223.150 ftp 172.16.22.3 ftp netmask
255.255.255.255
hostname(config)# static (inside,outside) tcp 204.134.223.150 http 172.16.22.10 http netmask
255.255.255.255
hostname(config)# static (inside,outside) tcp  smtp 172.16.22.4 smtp netmask
255.255.255.255

So here you have the first to have a ftp host, second to give http access to the inside interface and the third could be a email server..

Hope that helps.
0
 
LVL 23

Assisted Solution

by:debuggerau
debuggerau earned 500 total points
ID: 24083973
I'd check the Cisco website too, the command reference, under static could be helpful...

http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/qref.html
0
 

Author Comment

by:mtchs
ID: 24084004
Thanks, I've already figured out that that is how I have to do it.
I found a 460 page PDF on cli reference for the version I have; it's been helping me quite a bit.

I've ditched the two static's I had before, and added all the static's I needed (rdp, ftp, snmp, etc.)


Now, I have another issue; being, configuring a PPTP VPN server on the PIX.

It would probably work fine, however I have an overlap in subnets.
Local subnet: 172.16.0.0/16
Remote subnet: 172.16.22.0/24

I will probably have to resort to renumbering one or the other subnets, it's a matter of deciding which one is easier to renumber...
0
 

Author Comment

by:mtchs
ID: 24084032
Yep, the subnetting was the issue.
0
 

Author Closing Comment

by:mtchs
ID: 31567338
I'll give credit for your time. Thanks
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Some time ago I was asked to set up a web portal PC to put at our entrance. When customers arrive, they could see a webpage 'promoting' our company. So I tried to set up a windows 7 PC as a kiosk PC.......... I will spare you all the annoyances I…
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now