515e eth0 and eth1 not seeing each other's networks
I feel like a n00b here, but I'm having troubles with something that should be basic, so note the following question as one asked with a sheepish grin...
Problem: I have a 515e setup to authenticate to a DSL modem that supplies me with one public IP over the ethernet0 of the 515e. From the 515e I can ping the outside world.
I have ethernet1 seeing an internal network 192.168.50.0, pingable from the 515e as well.
Computers on the inside of the 515e cannot see through to the outside, ping, or anything.
I am assuming I have setup my nat or global wrong, but from the documentation i've been reading, they all assume you have more than one outside IP address to work with. I just need to take all the users on the inside and get them using the one IP on the outside interface. I am also going to be setting up several VPN's over that interface, is it unwise to use only one for everything?
Here's my config:
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security10
enable password ********** encrypted
passwd ************ encrypted
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
name x.x.x.x Bluff_Outside
access-list acl_out permit tcp 192.168.50.0 255.255.255.0 any
access-list acl_out permit icmp any any
access-list acl_out permit ip any any
access-list acl_in permit icmp any any
access-list inside_nat0_outbound permit ip 192.168.50.0 255.255.255.0 host Bluff_Outside
access-list outside_cryptomap_9 permit ip 192.168.50.0 255.255.255.0 host Bluff_Outside
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :