Cisco 501 port forward PDM

Hi,

I've just upgraded to a PIX 501 (6.2)for my home network. I've been trying to configure a port forward to an internal web server (192.168.1.100) from the external interface which is DHCP from my ISP.

From reading various posts it appears this can not be done by the PDM alone..?? I'm juts learning the command line so have been using the PDM as much as possible and the command line.

So from the cli I've added;

static (inside,outside) tcp interface www 192.168.1.100 www netmask

255.255.255.255

The problem is traffic is dropped (error message = deny tcp src outside: x.x.x.x/port dst inside: ip/80 by access group "outside_access_in") when using the config below.

I can however make this work by changing the access rule to any / on the PDM - but I guess this is not advisable..

Any help would be much appreciated

Will

Building configuration... : Saved : PIX Version 6.2(2) nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted hostname pixfirewall domain-name ciscopix.com fixup protocol ftp 21 fixup protocol http 80 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol ils 389 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol sip 5060 fixup protocol skinny 2000 names access-list outside_access_in permit tcp any host 127.0.0.1 eq www pager lines 24 logging on logging timestamp logging trap informational logging host inside 192.168.1.100 interface ethernet0 10baset interface ethernet1 10full mtu outside 1500 mtu inside 1500 ip address outside dhcp setroute ip address inside 192.168.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm pdm location 192.168.1.100 255.255.255.255 inside pdm location 192.168.1.100 255.255.255.255 outside pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 0.0.0.0 0.0.0.0 0 0 static (inside,outside) tcp interface www 192.168.1.100 www netmask

255.255.255.255 0 0 static (outside,inside) tcp interface www 192.168.1.100 www netmask 255.255.255.255 0 0 access-group outside_access_in in interface outside timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local http server enable http 192.168.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable no sysopt route dnat telnet timeout 5 ssh timeout 5 dhcpd address 192.168.1.2-192.168.1.33 inside dhcpd lease 3600 dhcpd ping_timeout 750 dhcpd auto_config outside dhcpd enable inside terminal width 80 Cryptochecksum:65e69a93df50a3c1755f556a31ea4a43 : end [OK]
Reply to
William Bain
Loading thread data ...

Change access-list outside_access_in permit tcp any host 127.0.0.1 eq www

to access-list outside_access_in permit tcp any any eq www

Reply to
oTTo

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.