PIX dmz configuration

Unanswered Question
Feb 26th, 2009

i have a pix520 running 6.3, i have access to the outside from both the dmz and inside but cant seem to figure out how to allow access to the dmz from the inside, network as follows, dmz int 10.1.10.1, inside 10.1.0.1, outside 81.*.*.*, default route to outside next hop router. acl states, tcp permit an any eq www, ......help wanted please.

I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
eddie.mitchell@... Thu, 02/26/2009 - 05:05

What does your inside ACL and NAT configuration look like? I would suggest posting a sanitized version of your configuration.

eddie.mitchell@... Thu, 02/26/2009 - 14:18

So, you're trying to access the DMZ from the inside?

I would add the following:

access-list nonat extended permit ip 10.1.0.0 255.255.255.0 10.1.10.0 255.255.255.0

nat (inside) 0 access-list nonat

I would also recommend adding an ACL to the inside interface to restrict the outbound access.

mick_flynn Thu, 02/26/2009 - 14:37

eddie,

with access-list bound to the inside int, i would still need to apply a 'permit ip any any' on the second line would i not?

eddie.mitchell@... Thu, 02/26/2009 - 14:49

The access-list I posted for you is not being bound to an interface. This is a nat exemption ACL which is telling the PIX to not perform NAT on traffic flowing from the inside to the DMZ network.

What I was suggesting was creating another ACL and applying this to the inside interface of the pix via 'access-group in interface inside' in order to restrict outbound traffic to the DMZ and the Internet for security reasons. It is always best to permit only those services that are necessary and no more. This means never using 'permit ip any any' statements.

mick_flynn Thu, 02/26/2009 - 14:57

eddie, many thanks.

I am only using this config to test for access between the inside/dmz and vice versa, once this has been established i will alter the config to only allow smtp as a mail server will be placed on the dmz.

Did you see my original config?

can you please tell me what an ACL would look like?

kind regards.

Tshi M Thu, 02/26/2009 - 05:24

What is your inside subnet? I assume it is 10.1.0.0/24. Try the command below:

static (inside,dmz) 10.1.0.0 10.1.0.0 netmask 255.255.255.0 0 0

mick_flynn Thu, 02/26/2009 - 14:52

thanks,

i have tried that and with an access-list bound to the inside but didnt work, it blocked traffic from inside to outside.

i am missing something...

please see attached test config.

Attachment: 
Tshi M Thu, 02/26/2009 - 15:04

Hi,

please try to change the following:

static (inside,dmz) 10.1.10.2 10.1.10.2 netmask 255.255.255.255 0 0

to:

static (inside,dmz) 10.1.0.0 10.1.0. netmask 255.255.255.0

Also: try this without using an inside ACL at first. Once you have it running than you can move on to applying ACL as you see fit.

rgds,

Actions

This Discussion