Solved

Cisco PIX internal interface and internal router interface

Posted on 2009-04-10
4
365 Views
Last Modified: 2012-05-06
I have the following setup:
Internet -------------------- Cisco PIX ------- DMZ - 10.172.192.0 network
                                       /         |          
 Internal IP - 192.168.1.5     |            
                                                 | -------------Cisco Switch--Internal LAN 192.168.1.0      
                                                 |
 DR ----   Cisco Router ---------Internal  IP: 192.168.1.254

Default gateway is set to 192.168.1.254 for all clients.
The issue is to reach the DMZ, we have to set the gateway as 192.168.1.5.
What needs to be done on the firewall or the router to reach the DMZ with all the computers set for gateway of 192.168.0.254 and they can reach all the networks.
0
Comment
Question by:TopTechie
  • 2
4 Comments
 
LVL 43

Accepted Solution

by:
JFrederick29 earned 500 total points
ID: 24116593
Add a route to the router:

conf t
ip route 10.172.192.0 255.255.255.0 192.168.1.5
0
 

Author Comment

by:TopTechie
ID: 24116867
Actually the route is added. I forgot to mention, the VPN users cannot access any machines unless the machines are set to 192.168.1.5 (the PIX interface). If I set it to 192.168.1.254 they don't even ping.

0
 
LVL 43

Assisted Solution

by:JFrederick29
JFrederick29 earned 500 total points
ID: 24116887
So you still can't access the DMZ hosts?

You also need a route to the VPN pool of addresses on the router.

ip route x.x.x.0 255.255.255.0 192.168.1.5

Where x.x.x.0 is the VPN subnet.
0
 
LVL 5

Expert Comment

by:shirkan
ID: 24138725
if your LAN is 192.168.0.x then your default gateway needs to be on the same Network not 192.168.1.254 but rather 192.168.0.x

like Fred says, on the router you need

ip route 10.172.192.0 255.255.255.0 192.168.1.5
ip route x.x.x.0 255.255.255.0 192.168.1.5

and on the ASA you need a route back for the 192.168.0.x Network

route inside 192.168.0.0 255.255.255.0 192.168.1.254 (guessing)

0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

Overview The Cisco PIX 501, PIX 506e, ASA 5505 and ASA 5510 (most if not all of this information will be relevant to the PIX 515e but I do not have a working configuration handy to verify the validity) are primarily used within small to medium busi…
In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now