Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 267
  • Last Modified:

Configuring PIX Firewall

Hello

I am an IT administrator for Fully Microsoft based Network , Internet , Email and every thing work fine.

The next plan is to install PIX Firewall in front of ISA.

I am new to Cisco PIX , so I need full configuration to setup the PIX 506E. either using command line or PDM web Interface.

What I need excatly to do , is firstly allow Internet connection , secondaly , forward any SMTP Traffic to ISA Server because I am publishing the Exchange Server through ISA.

Internet Router === PIX=====ISA====LAN

Any Help

0
Hisham_Elkouha
Asked:
Hisham_Elkouha
2 Solutions
 
Ilir MitrushiIT Infrastructure and Security ArchitectCommented:
Depending on your pix software follow instructions from config guides you can find on cisco.com. Here is a link you can start with
http://cisco.com/en/US/products/sw/secursw/ps2120/products_installation_and_configuration_guides_list.html
0
 
egyptcoCommented:
there are a lot configuration examples you would find in web (e.g. http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094768.shtml) but since you have already working infrastructure adding new firewall would result in changing your ip addressing scheme. i would recommend instead of pix to buy asa which is successor of the pix family and do transparent firewall. the firewall in this mode is like bump on the wire works as L2 device, which you can connect between your isa and isp router without renumbering and changing already existing L3 settings.

otherwise you need to:

1. if needed extend and divide your external ip range from your ISP in 2 subnes. leave the external ip address of the ISA (spending you whole bunch reconfiguration work) and connect it with the PIX. this makes your inside from pix prospective.
ISP ---(new.subnet)---PIX---- (old.subnet)----ISA

2. on asa configure default gateway being the inside ip of the PIX

3. configure default route on the PIX, next hop your ISP router

4. configure nat exeption rule on your inside. your ISA remains in charge  for nat:
nat (inside) 0 0.0.0.0 0.0.0.0

5. configure ACLs permitting whatever kind of traffic you allows inbound on your pix's outside interface. e.g. SMTP
access-list acl-outside permit tcp any host <ISA's ip address> eq 25
access-group acl-outside in interface outside

6. configure static nat translation to your ISA server. (PIX doesn't route if there is no xlate translation slot)
static (inside,outside) tcp interface 25 <ISA's ip address> netmask 255.255.255.255

7. do your tests if the whole thing works as suppose to.
0

Featured Post

IT Degree with Certifications Included

Aspire to become a network administrator, network security analyst, or computer and information systems manager? Make the most of your experience as an IT professional by earning your B.S. in Network Operations and Security.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now