04-09-2010 06:43 AM - edited 03-04-2019 08:05 AM
Hi,
I have Cisco PIX 515E With Cisco PIX Security Appliance Software Version 7.0(6).
We are using three interfaces. One outside, second WEB(for web server) & third DB(for database server)
We have published our web server and so available from public network.
Now, I want to access my website(web server) from inside network(servers connected to WEB interface) with public IP address. But it is not working.
When I try from inside of the network, the packet is handled by the default route and sent onto the outside interface. At that point, the packet disappears because the PIX does not turn the packet around and send it back inside. In fact, I'm not even sure that the NAT
rules come into play in this scenario.
So, is it possible to hit external IP of my web server from internally?
If yes than how?
Regards,
Anil Oza
04-09-2010 06:46 AM
Anil-
You'll want to configure bi-directional NAT. Here's a link on how to do that.
http://blogs.interfacett.com/mike-storm/2006/6/29/bidirectional-nat-on-a-cisco-pix-or-asa.html
Hope it helps.
04-09-2010 08:29 AM
I just gave you the answer on the firewall thread for this issue.
Federico.
04-30-2010 01:36 AM
Hi,
I have followed the same step but still I can not access it from my dmz(in my case WA interface) network.
I am getting bellow error.
%PIX-3-305005: No translation group found for tcp src WA:x.x.x.x/4447 dst outside:x.x.x.x/443
Below is some part of my PIX config
There are 4 inerface.
1 interface - outside 92.60.xx.x
2 interface - WA 10.38.33.x
3 interface - DB 10.38.35.x
4 interface - inside 10.38.37.x
object-group icmp-type TRACERT-PING-RESPONSE
icmp-object echo-reply
icmp-object time-exceeded
icmp-object unreachable
object-group network WEB-HOSTS
network-object host 92.60.xx.x
object-group network WEB-HOSTS-SSL
network-object host 92.60.xx.x
object-group service WEB-PORTS tcp
port-object eq www
port-object eq https
access-list OUTSIDE extended permit icmp any any object-group TRACERT-PING-RESPONSE
access-list OUTSIDE extended permit tcp any object-group WEB-HOSTS object-group WEB-PORTS
access-list OUTSIDE extended permit tcp any object-group WEB-HOSTS-SSL eq https
access-list WA extended permit tcp any any object-group WEB-PORTS
nat-control
global (outside) 1 92.60.xx.x
global (outside) 2 92.60.xx.x
global (WA) 1 10.38.47.1-10.38.47.254
global (DB) 1 10.38.45.201-10.38.45.205
nat (inside) 0 access-list NO-NAT
nat (inside) 1 10.38.47.0 255.255.255.0
nat (WA) 0 access-list NO-NAT
nat (WA) 1 10.38.43.0 255.255.255.0
nat (DB) 0 access-list NO-NAT
nat (DB) 2 10.38.45.0 255.255.255.0
static (WA,outside) 92.60.xx.xx 10.38.43.33 netmask 255.255.255.255
static (outside,WA) 10.38.43.33 92.60.xx.xx netmask 255.255.255.255
access-group OUTSIDE in interface outside
access-group WA in interface WA
access-group DB in interface DB
route outside 0.0.0.0 0.0.0.0 92.60.xx.x 1
Let me know if you need more information .
Thanks,
Anil Oza
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide