cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
997
Views
0
Helpful
4
Replies

Unity Client to Pix inside and dmz networks

aemr
Level 1
Level 1

Are there any problems that would prohibit a Unity Client to start connections to hosts on the pix inside and pix dmz networks at the same time?

Can you provide a link that describes the PIX side of the configuration for access to both networks not just the inside network?

1 Accepted Solution

Accepted Solutions

gfullage
Cisco Employee
Cisco Employee

Whoops, yep sorry, brain fade on my part, disregard my first email. Your configuration would look like this:

ip address inside 10.1.1.1 255.255.255.0

ip address dmz 172.16.1.1 255.255.255.0

ip local pool vpnpool 192.168.1.1-192.168.1.254

nat (inside) 0 access-list nonatinside

nat (dmz) 0 access-list nonatdmz

access-list nonatinside permit ip 10.1.1.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list nonatdmz permit ip 172.16.1.0 255.255.255.0 192.168.1.0 255.255.255.0

Hope that helps.

View solution in original post

4 Replies 4

gfullage
Cisco Employee
Cisco Employee

There isn't any problems with this, you just have to make sure you bypass NAT for traffic from both interfaces going to your VPN pool of addresses. The PIX will take care of the routing, etc.

For example, your config would look like this:

ip address inside 10.1.1.1 255.255.255.0

ip address dmz 172.16.1.1 255.255.255.0

ip local pool vpnpool 192.168.1.1-192.168.1.254

nat (inside) 0 access-list nonat

access-list nonat permit ip 10.1.1.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list nonat permit ip 172.16.1.0 255.255.255.0 192.168.1.0 255.255.255.0

Hope that helps.

Very Helpful, Thank you!

Would I also need a nat (dmz) 0 access-list nonat statement for the DMZ hosts to bypass nat?

gfullage
Cisco Employee
Cisco Employee

Whoops, yep sorry, brain fade on my part, disregard my first email. Your configuration would look like this:

ip address inside 10.1.1.1 255.255.255.0

ip address dmz 172.16.1.1 255.255.255.0

ip local pool vpnpool 192.168.1.1-192.168.1.254

nat (inside) 0 access-list nonatinside

nat (dmz) 0 access-list nonatdmz

access-list nonatinside permit ip 10.1.1.0 255.255.255.0 192.168.1.0 255.255.255.0

access-list nonatdmz permit ip 172.16.1.0 255.255.255.0 192.168.1.0 255.255.255.0

Hope that helps.

That helps very much.... Thank you!

Review Cisco Networking products for a $25 gift card