Cisco PIX506E - Accept Incoming ports, with a static bind for all ports.

Hi,

I have a single server that is behind my PIX506E; it's address is 172.16.22.3, and as such I have a static for the PIX's outside IP directly to that server.

However, if I enable SNMP, telnet, ssh, VPN, etc. on the PIX, it gets passed directly to the server.
Is there a way to have a full "DMZ" like static to the server, and then individually pick off the ports the PIX needs to handle itself?
Or would I be better off putting several statics in? I have a very vague understanding how the statics, nat, and acl's work; any detailed explanations, or references would be greatly appreciated!

I'm very new with the PIX, and the PDM will not work for the life of me (plus I want to learn the CLI).
I would appreciate any tips or recommendations to my config/setup, as I haven't been able to find many good guides to setting it up beyond initial configuration.

Another question: with the statics, I'm not sure which of the two static's actually made it work, but I was frustrated getting it setup the first time, which is correct, static (outside,inside) or static (inside,outside)?
I did the blanket static bind, as I couldn't get the ACL's to work well; it's been a few weeks since I messed with the config, so I can't go into detail as to what I was trying.


Thanks in advance!
pixfirewall# sh run
: Saved
:
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password <snip> encrypted
passwd <snip> encrypted
hostname pixfirewall
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit icmp any any 
access-list acl_out permit tcp any any eq ftp 
access-list acl_out permit tcp any any eq www 
access-list acl_out permit tcp any any eq 3389 
access-list acl_out permit tcp any any eq 161 
access-list acl_out permit udp any any eq snmp 
access-list acl_out permit tcp any any eq ssh 
access-list acl_out permit gre any any 
access-list acl_out permit tcp any any eq pptp 
pager lines 24
logging on
logging console emergencies
logging buffered emergencies
mtu outside 1500
mtu inside 1500
ip address outside 204.134.223.150 255.255.255.240
ip address inside 172.16.22.10 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (outside,inside) interface 172.16.22.3 netmask 255.255.255.255 0 0 
static (inside,outside) interface 172.16.22.3 netmask 255.255.255.255 0 0 
access-group acl_out in interface outside
route outside 0.0.0.0 0.0.0.0 204.134.223.147 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+ 
aaa-server RADIUS protocol radius 
aaa-server LOCAL protocol local 
no snmp-server location
no snmp-server contact
snmp-server community <snip>
no snmp-server enable traps
floodguard enable
telnet 172.16.22.10 255.255.255.255 inside
telnet timeout 60
ssh 204.134.223.150 255.255.255.255 outside
ssh timeout 30
console timeout 0
vpdn username <snip> password <snip>
vpdn enable outside
terminal width 80
Cryptochecksum:4bbb76f531aa23aef430648e649f608e
: end         
pixfirewall#

Open in new window

mtchsAsked:
Who is Participating?
 
debuggerauConnect With a Mentor Commented:
keep the static (inside, outside), the other you can toss since you have a default nat outwards..

You may want to do static pnats..

hostname(config)# static (inside,outside) tcp 204.134.223.150 ftp 172.16.22.3 ftp netmask
255.255.255.255
hostname(config)# static (inside,outside) tcp 204.134.223.150 http 172.16.22.10 http netmask
255.255.255.255
hostname(config)# static (inside,outside) tcp  smtp 172.16.22.4 smtp netmask
255.255.255.255

So here you have the first to have a ftp host, second to give http access to the inside interface and the third could be a email server..

Hope that helps.
0
 
debuggerauConnect With a Mentor Commented:
I'd check the Cisco website too, the command reference, under static could be helpful...

http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/qref.html
0
 
mtchsAuthor Commented:
Thanks, I've already figured out that that is how I have to do it.
I found a 460 page PDF on cli reference for the version I have; it's been helping me quite a bit.

I've ditched the two static's I had before, and added all the static's I needed (rdp, ftp, snmp, etc.)


Now, I have another issue; being, configuring a PPTP VPN server on the PIX.

It would probably work fine, however I have an overlap in subnets.
Local subnet: 172.16.0.0/16
Remote subnet: 172.16.22.0/24

I will probably have to resort to renumbering one or the other subnets, it's a matter of deciding which one is easier to renumber...
0
 
mtchsAuthor Commented:
Yep, the subnetting was the issue.
0
 
mtchsAuthor Commented:
I'll give credit for your time. Thanks
0
All Courses

From novice to tech pro — start learning today.