PAT and NAT Pix 506E

Discussion in 'Cisco' started by kasonne, Dec 2, 2009.

  1. kasonne

    kasonne

    Joined:
    Dec 2, 2009
    Messages:
    2
    Likes Received:
    0
    Hello there, I am having a great old time trying to get my PIX to allow me to open up selected ports and even all ports on the none NAT'd address it has.

    ***.***.10.90 is its outside ip and i want to allow all or selcted ports though this to either seperate internal ip's or all ports to a single internal IP.

    Here is my config

    Code:
    Building configuration...
    : Saved
    :
    PIX Version 6.3(4)
    interface ethernet0 auto
    interface ethernet1 100full
    nameif ethernet0 outside security0
    nameif ethernet1 inside security100
    enable password xxx
    passwd xxx
    hostname Pix506E-02.DMN
    domain-name dmnpix2.com
    fixup protocol dns maximum-length 512
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol ils 389
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol skinny 2000
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    names
    access-list outside_access_in permit ip host 212.199.9.194 any 
    access-list outside_access_in permit ip host 199.203.111.252 any 
    access-list outside_access_in permit icmp any any 
    access-list outside_access_in permit icmp any any echo-reply 
    access-list outside_access_in permit ip host 62.219.234.203 any 
    access-list outside_access_in permit ip host 84.108.216.104 any 
    access-list outside_access_in permit ip host 86.8.243.204 any 
    access-list outside_access_in permit tcp any host **.***.95.145 eq ftp 
    access-list outside_access_in permit ip host ***.***.95.145 any 
    access-list outside_access_in permit ip host ***.***.95.150 any 
    access-list outside_access_in permit ip any host ***.***.95.150 
    access-list outside_access_in permit tcp any host ***.***.95.147 range 5800 5900 
    access-list outside_access_in permit tcp any host ***.***.95.146 range 5800 5900 
    access-list outside_access_in permit tcp any host ***.***.95.145 eq 10000 
    access-list outside_access_in permit tcp any host ***.***.95.145 range 60000 60500 
    access-list outside_access_in permit udp any host ***.***.95.145 range 60000 60500 
    access-list outside_access_in permit tcp any host ***.***.95.145 eq ssh 
    pager lines 24
    logging console alerts
    logging monitor errors
    logging buffered errors
    mtu outside 1500
    mtu inside 1500
    ip address outside ***.***.165.90 255.255.255.252
    ip address inside 192.168.0.1 255.255.255.0
    ip audit info action alarm
    ip audit attack action alarm
    pdm location 192.168.0.0 255.255.255.128 inside
    pdm location 192.168.0.145 255.255.255.255 inside
    pdm location 192.168.0.146 255.255.255.255 inside
    pdm location 192.168.0.147 255.255.255.255 inside
    pdm location 192.168.0.148 255.255.255.255 inside
    pdm location 192.168.0.149 255.255.255.255 inside
    pdm location 192.168.0.150 255.255.255.255 inside
    pdm location 62.219.234.203 255.255.255.255 outside
    pdm location 84.108.216.104 255.255.255.255 outside
    pdm location 86.8.243.204 255.255.255.255 outside
    pdm location ***.***.95.145 255.255.255.255 outside
    pdm location ***.***.95.150 255.255.255.255 outside
    pdm location 199.203.111.252 255.255.255.255 outside
    pdm location 212.199.9.194 255.255.255.255 outside
    pdm location 217.10.161.243 255.255.255.255 outside
    pdm location ***.***.95.6 255.255.255.255 outside
    pdm logging informational 100
    pdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 1 192.168.0.0 255.255.255.128 0 0
    static (inside,outside) ***.***.95.145 192.168.0.145 netmask 255.255.255.255 0 0 
    static (inside,outside) ***.***.95.146 192.168.0.146 netmask 255.255.255.255 0 0 
    static (inside,outside) ***.***.95.147 192.168.0.147 netmask 255.255.255.255 0 0 
    static (inside,outside) ***.***.95.148 192.168.0.148 netmask 255.255.255.255 0 0 
    static (inside,outside) ***.***.95.149 192.168.0.149 netmask 255.255.255.255 0 0 
    static (inside,outside) ***.***.95.150 192.168.0.150 netmask 255.255.255.255 0 0 
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 ***.***.165.89 1
    timeout xlate 0:05:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
    timeout uauth 0:05:00 absolute
    aaa-server TACACS+ protocol tacacs+ 
    aaa-server TACACS+ max-failed-attempts 3 
    aaa-server TACACS+ deadtime 10 
    aaa-server RADIUS protocol radius 
    aaa-server RADIUS max-failed-attempts 3 
    aaa-server RADIUS deadtime 10 
    aaa-server LOCAL protocol local 
    http server enable
    http ***.***.95.6 255.255.255.255 outside
    http 192.168.0.0 255.255.255.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server community public
    no snmp-server enable traps
    floodguard enable
    telnet timeout 5
    ssh 217.10.161.243 255.255.255.255 outside
    ssh timeout 5
    console timeout 0
    terminal width 80
    Cryptochecksum:xxx
    : end
    [OK]
    
    Please any help would be fantastic.

    Cheers

    Matthew
     
    kasonne, Dec 2, 2009
    #1
    1. Advertisements

  2. kasonne

    kasonne

    Joined:
    Dec 2, 2009
    Messages:
    2
    Likes Received:
    0
    Bump

    BUMP

    bump
     
    kasonne, Dec 9, 2009
    #2
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.