PIX 506 is it possible ?

Hello,

I have a question. My PIX 506e config looks like above:

interface ethernet0 auto interface ethernet1 auto interface ethernet1 vlan1 physical interface ethernet1 vlan2 logical interface ethernet1 vlan3 logical nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif vlan2 ksieg security80 nameif vlan3 caffe security70 ip address outside 81.168.195.10 255.255.255.192 ip address inside 192.168.1.1 255.255.255.0 ip address caffe 192.168.3.1 255.255.255.0 ip address ksieg 192.168.2.1 255.255.255.0

Is it possible to permit full access to host

192.168.1.2 (inside vlan1 security 100) from all hosts from network ksieg (vlan2 and caffe vlan3).

Thanks for any help.

Best regards, a.

Reply to
ntst
Loading thread data ...

I think in this context you might want

nameif vlan1 inside security100

Either that or leave out the vlan1 line. It depends: is vlan1 explicitly tagged for that connection? Note that according to 802.1Q, the "native" vlan for a trunk will not be tagged (so if you want "all" vlans to be tagged, you need to change the "native" vlan for the trunk to a vlan# that is not used by any traffic.)

static (inside,ksieg) 192.168.1.2 192.168.1.2 netmask 255.255.255.255

access-list ksieg_to_inside permit ip 192.168.2.0 255.255.255.0 host 192.168.1.2 access-group ksieg_to_inside in interface ksieg

and repeat for caffe.

This will not allow "full access": for example, ksieg hosts would not be allowed to send IPX to 192.168.1.2, and ksieg hosts would not be allowed to suddenly send an ACK packet that was not part of an existing TCP connection (a technique that is sometimes used to bypass packet filters that are set to allow "established" traffic.) Also, ksieg hosts would still have to obey proper FTP protocols and so on for all other "fixup" statements you have active.

But I wouldn't do what you are asking. If you need to be able to start arbitrary connections from ksieg and caffe to host 192.168.1.2 then that host 192.168.1.2 should be on a *lower* security interface than either ksieg or caffe. Otherwise, if someone takes control of a system in ksieg or caffe they can use it to take control of 192.168.1.2 and then use that host to take control of everything else in your inside interface.

Reply to
Walter Roberson

Hello,

Walter Roberson napisa³(a):

[ ... ]

Thanks for advice Robert. It is all what i wanted to know. Thank you!

Reply to
ntst

Walter Roberson napisa³(a):

Yes it is. All frames going through ethernet1 are tagged. I've setup RubyTech switch to tag packets.

And then to grant access from higher security interface to lower i should use nat() ?

Reply to
ntst

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.