Solved

Cisco PIX506E - Accept Incoming ports, with a static bind for all ports.

Posted on 2009-04-06
5
527 Views
Last Modified: 2012-05-06
Hi,

I have a single server that is behind my PIX506E; it's address is 172.16.22.3, and as such I have a static for the PIX's outside IP directly to that server.

However, if I enable SNMP, telnet, ssh, VPN, etc. on the PIX, it gets passed directly to the server.
Is there a way to have a full "DMZ" like static to the server, and then individually pick off the ports the PIX needs to handle itself?
Or would I be better off putting several statics in? I have a very vague understanding how the statics, nat, and acl's work; any detailed explanations, or references would be greatly appreciated!

I'm very new with the PIX, and the PDM will not work for the life of me (plus I want to learn the CLI).
I would appreciate any tips or recommendations to my config/setup, as I haven't been able to find many good guides to setting it up beyond initial configuration.

Another question: with the statics, I'm not sure which of the two static's actually made it work, but I was frustrated getting it setup the first time, which is correct, static (outside,inside) or static (inside,outside)?
I did the blanket static bind, as I couldn't get the ACL's to work well; it's been a few weeks since I messed with the config, so I can't go into detail as to what I was trying.


Thanks in advance!
pixfirewall# sh run
: Saved
:
PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password <snip> encrypted
passwd <snip> encrypted
hostname pixfirewall
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit icmp any any 
access-list acl_out permit tcp any any eq ftp 
access-list acl_out permit tcp any any eq www 
access-list acl_out permit tcp any any eq 3389 
access-list acl_out permit tcp any any eq 161 
access-list acl_out permit udp any any eq snmp 
access-list acl_out permit tcp any any eq ssh 
access-list acl_out permit gre any any 
access-list acl_out permit tcp any any eq pptp 
pager lines 24
logging on
logging console emergencies
logging buffered emergencies
mtu outside 1500
mtu inside 1500
ip address outside 204.134.223.150 255.255.255.240
ip address inside 172.16.22.10 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (outside,inside) interface 172.16.22.3 netmask 255.255.255.255 0 0 
static (inside,outside) interface 172.16.22.3 netmask 255.255.255.255 0 0 
access-group acl_out in interface outside
route outside 0.0.0.0 0.0.0.0 204.134.223.147 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+ 
aaa-server RADIUS protocol radius 
aaa-server LOCAL protocol local 
no snmp-server location
no snmp-server contact
snmp-server community <snip>
no snmp-server enable traps
floodguard enable
telnet 172.16.22.10 255.255.255.255 inside
telnet timeout 60
ssh 204.134.223.150 255.255.255.255 outside
ssh timeout 30
console timeout 0
vpdn username <snip> password <snip>
vpdn enable outside
terminal width 80
Cryptochecksum:4bbb76f531aa23aef430648e649f608e
: end         
pixfirewall#

Open in new window

0
Comment
Question by:mtchs
  • 3
  • 2
5 Comments
 
LVL 23

Accepted Solution

by:
debuggerau earned 500 total points
ID: 24083966
keep the static (inside, outside), the other you can toss since you have a default nat outwards..

You may want to do static pnats..

hostname(config)# static (inside,outside) tcp 204.134.223.150 ftp 172.16.22.3 ftp netmask
255.255.255.255
hostname(config)# static (inside,outside) tcp 204.134.223.150 http 172.16.22.10 http netmask
255.255.255.255
hostname(config)# static (inside,outside) tcp  smtp 172.16.22.4 smtp netmask
255.255.255.255

So here you have the first to have a ftp host, second to give http access to the inside interface and the third could be a email server..

Hope that helps.
0
 
LVL 23

Assisted Solution

by:debuggerau
debuggerau earned 500 total points
ID: 24083973
I'd check the Cisco website too, the command reference, under static could be helpful...

http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/qref.html
0
 

Author Comment

by:mtchs
ID: 24084004
Thanks, I've already figured out that that is how I have to do it.
I found a 460 page PDF on cli reference for the version I have; it's been helping me quite a bit.

I've ditched the two static's I had before, and added all the static's I needed (rdp, ftp, snmp, etc.)


Now, I have another issue; being, configuring a PPTP VPN server on the PIX.

It would probably work fine, however I have an overlap in subnets.
Local subnet: 172.16.0.0/16
Remote subnet: 172.16.22.0/24

I will probably have to resort to renumbering one or the other subnets, it's a matter of deciding which one is easier to renumber...
0
 

Author Comment

by:mtchs
ID: 24084032
Yep, the subnetting was the issue.
0
 

Author Closing Comment

by:mtchs
ID: 31567338
I'll give credit for your time. Thanks
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question