NAT'ing help.

I recently replaced a Linksys router with a PIX however now I can not browse to web sites that are hosted behind the PIX.

A site has a private IP [192.168.1.12] NAT'd to the public IP.

Any way to solve this??

Reply to
J1C
Loading thread data ...

Send

Reply to
Shine, Gary

Hardware: PIX-506, 32 MB RAM, CPU Pentium 200 MHz Flash i28F640J5 @ 0x300, 8MB BIOS Flash AT29C257 @ 0xfffd8000, 32KB

0: ethernet0: address is 0050.54ff.b8b3, irq 11 1: ethernet1: address is 0050.54ff.b8b4, irq 10 Licensed Features: Failover: Disabled VPN-DES: Enabled VPN-3DES-AES: Enabled Maximum Physical Interfaces: 2 Maximum Interfaces: 2 Cut-through Proxy: Enabled Guards: Enabled URL-filtering: Enabled Inside Hosts: Unlimited Throughput: Limited IKE peers: Unlimited

This PIX has a Restricted (R) license.

--------------------------------

PIX Version 6.3(4) interface ethernet0 auto interface ethernet1 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password gvkgZoohT08p4BOj encrypted passwd vjvniIQEET51hqHp encrypted hostname pix506 fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol ils 389 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names access-list 100 permit tcp any host x.x.x.83 eq 3389 access-list 100 permit tcp any host x.x.x.83 eq www access-list 100 permit tcp any host x.x.x.83 eq ftp access-list 100 permit icmp any any echo-reply access-list 100 permit icmp any any time-exceeded access-list 100 permit icmp any any unreachable access-list 101 permit ip 192.168.1.0 255.255.255.0 10.1.1.0

255.255.255.0 pager lines 24 logging on mtu outside 1500 mtu inside 1500 ip address outside x.x.x.82 255.255.255.248 ip address inside 192.168.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool pptp-pool 10.1.1.10-10.1.1.20 pdm location 192.168.1.97 255.255.255.255 inside pdm location 10.1.1.0 255.255.255.0 outside pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list 101 nat (inside) 1 0.0.0.0 0.0.0.0 0 0 static (inside,outside) x.x.x.83 192.168.1.97 netmask 255.255.255.255 0 0 route outside 0.0.0.0 0.0.0.0 x.x.x.81 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local http server enable http 192.168.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-pptp vpngroup 1 idle-time 1800 vpngroup pptp idle-time 1800 telnet 192.168.1.0 255.255.255.0 inside telnet timeout 60 ssh timeout 60 console timeout 0 vpdn group 1 accept dialin pptp vpdn group 1 ppp authentication pap vpdn group 1 ppp authentication chap vpdn group 1 ppp authentication mschap vpdn group 1 ppp encryption mppe 128 required vpdn group 1 client configuration address local pptp-pool vpdn group 1 pptp echo 60 vpdn group 1 client authentication local vpdn username pptp password ********* vpdn enable outside dhcpd address 192.168.1.100-192.168.1.200 inside dhcpd dns 207.181.101.4 207.181.101.5 dhcpd lease 86400 dhcpd ping_timeout 750 dhcpd auto_config outside dhcpd enable inside terminal width 80
Reply to
J1C

Try this

access-group 100 in interface outside

Reply to
Gary

Added that ... no go ...

When I drop an entry in to the hosts file I can hit the site no trouble ... as soon as I remark it out the site times out ...

#hosts

192.168.1.97
formatting link
Reply to
J1C

Made this change ...

no static (inside,outside) x.x.x.83 192.168.1.97 netmask

255.255.255.255 static (inside,outside) x.x.x.83 192.168.1.97 dns
Reply to
J1C

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.