Aiuto configurazione PIX 501
Inviato: gio 24 apr , 2008 3:13 pm
Salve a tutti,
in aziende abbiamo da poco acquistato un Cisco Pix 501 per sostituire un ingombrante firewall linux. In un'altra azienda ho configurato un netscreen senza grosse difficoltà ma in questo caso ho incontrato alcuni problemi. Spero possiate aiutarmi! QUesta è la situazione:
Router Fastweb ip 192.168.0.100
Pix 501
Rete interna 192.168.1.x
Configurando in questo modo le interfacce:
inside 192.168.1.101 (gateway dei pc della lan)
outside 192.168.0.103
gateway 192.168.0.100
i pc riescono a navigare e in internet correttamente.
Abbiamo però la necessità di far accedere un pc esterno (85.42.xxx.xxx) ad un pc della rete interna per servizi di ftp.
Ho provato i seguenti comandi:
static (inside, outside) 85.42.xxx.xxx 192.168.1.13
access-list 101 permit icmp any any
access-list 101 permit tcp host 85.42.xxx.xxx host 192.168.1.13 eq www
access-list 101 permit tcp host 85.42.xxx.xxx host 192.168.1.13 eq ftp
access-group 101 in interface outside
ma non sembra funzionare alcunchè.
Potete darmi un aiuto?
Grazie mille
Marco
Riporto la configurazione attuale:
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxxxx encrypted
passwd xxxx encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 192.168.1.13 Daniele
access-list 110 permit icmp any any
access-list 102 permit icmp any any
access-list 102 permit tcp host 85.42.xxx.xxx host Daniele eq www
access-list 102 permit tcp host 85.42.xxx.xxx host Daniele eq ftp
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 192.168.0.3 255.255.255.0
ip address inside 192.168.1.101 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location Daniele 255.255.255.255 inside
pdm location 85.42.xxx.xxx 255.255.255.255 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 85.42.xxx.xxx Daniele netmask 255.255.255.255 0 0
access-group 102 in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.0.3 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd address 192.168.1.102-192.168.1.133 inside
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
dhcpd enable inside
terminal width 80
Cryptochecksum:bee45803b1ee972edf4636828b95fb4e
: end
[OK]
in aziende abbiamo da poco acquistato un Cisco Pix 501 per sostituire un ingombrante firewall linux. In un'altra azienda ho configurato un netscreen senza grosse difficoltà ma in questo caso ho incontrato alcuni problemi. Spero possiate aiutarmi! QUesta è la situazione:
Router Fastweb ip 192.168.0.100
Pix 501
Rete interna 192.168.1.x
Configurando in questo modo le interfacce:
inside 192.168.1.101 (gateway dei pc della lan)
outside 192.168.0.103
gateway 192.168.0.100
i pc riescono a navigare e in internet correttamente.
Abbiamo però la necessità di far accedere un pc esterno (85.42.xxx.xxx) ad un pc della rete interna per servizi di ftp.
Ho provato i seguenti comandi:
static (inside, outside) 85.42.xxx.xxx 192.168.1.13
access-list 101 permit icmp any any
access-list 101 permit tcp host 85.42.xxx.xxx host 192.168.1.13 eq www
access-list 101 permit tcp host 85.42.xxx.xxx host 192.168.1.13 eq ftp
access-group 101 in interface outside
ma non sembra funzionare alcunchè.
Potete darmi un aiuto?
Grazie mille
Marco
Riporto la configurazione attuale:
PIX Version 6.3(5)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxxxx encrypted
passwd xxxx encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 192.168.1.13 Daniele
access-list 110 permit icmp any any
access-list 102 permit icmp any any
access-list 102 permit tcp host 85.42.xxx.xxx host Daniele eq www
access-list 102 permit tcp host 85.42.xxx.xxx host Daniele eq ftp
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 192.168.0.3 255.255.255.0
ip address inside 192.168.1.101 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location Daniele 255.255.255.255 inside
pdm location 85.42.xxx.xxx 255.255.255.255 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) 85.42.xxx.xxx Daniele netmask 255.255.255.255 0 0
access-group 102 in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.0.3 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd address 192.168.1.102-192.168.1.133 inside
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd auto_config outside
dhcpd enable inside
terminal width 80
Cryptochecksum:bee45803b1ee972edf4636828b95fb4e
: end
[OK]