I'm presently trying to setup a cisco pix 501 to forward a range of ports to a host on the inside.
192.168.100.200 needs to have several ports forwarded along to it. I've tried a couple different methods but everytime it comes back to setting a static up for each individual port... for obvious reasons when dealing with ~120 ports this sucks. When I only needed 10 ports I just setup static (outside, inside) 6881 192.168.100.200 6881 netmask 255.255.255.255 0 0... cant get it to work with a range or object-group though... but i may be doing something wrong.Any ideas? Here's the current config (It currently has some remenants of me trying to get the portrange forwarded.)
The basics are: I need ports 6881-6999, 6112, 3724 forwarded to
192.168.100.200 and I dont want to do ~120 lines of static port mappingsaker# sh run : Saved : PIX Version 6.3(3) interface ethernet0 auto interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password xxxxxxxxxxxxxxxx encrypted passwd xxxxxxxxxxxxxxxx encrypted hostname aker domain-name xxxxxxxxxxxxxxxxxx.net fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names object-group service wow tcp-udp port-object range 6881 6999 port-object eq 6112 port-object eq 3724 access-list inbound permit icmp any any access-list inbound deny tcp any any eq 135 access-list inbound deny tcp any any eq 137 access-list inbound deny tcp any any eq 138 access-list inbound deny tcp any any eq netbios-ssn access-list inbound deny udp any any eq netbios-ns access-list inbound deny udp any any eq netbios-dgm access-list inbound deny udp any any eq 139 access-list inbound deny tcp any any eq 445 access-list inbound deny udp any any eq 445 access-list inbound permit tcp any any eq ssh access-list inbound permit udp any any eq 22 access-list inbound permit tcp any any eq www access-list inbound permit tcp any any eq smtp access-list inbound permit tcp any any eq https access-list inbound permit tcp any any eq nntp access-list inbound permit udp any any eq 119 access-list inbound permit tcp any any object-group wow access-list inbound permit udp any any object-group wow access-list mortis permit tcp any any object-group wow access-list mortis permit udp any any object-group wow access-list nonatinside permit ip host 192.168.100.200 192.168.207.0
255.255.255.0 access-list to-end permit ip host 192.168.100.200 192.168.207.0 255.255.255.0 pager lines 24 icmp permit any outside icmp permit any inside mtu outside 1500 mtu inside 1500 ip address outside dhcp setroute ip address inside 192.168.100.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list nonatinside nat (inside) 1 0.0.0.0 0.0.0.0 0 0 access-group inbound in interface outside timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local no snmp-server location no snmp-server contact snmp-server community xxxxxxx no snmp-server enable traps floodguard enable sysopt connection permit-ipsec crypto ipsec transform-set a-transform esp-3des esp-md5-hmac crypto map mymap 10 ipsec-isakmp crypto map mymap 10 match address to-end crypto map mymap 10 set peer xxx.xx.xx.xxx crypto map mymap 10 set transform-set a-transform crypto map mymap interface outside isakmp enable outside isakmp key ******** address xxx.xx.xx.xxx netmask 255.255.255.255 isakmp identity address isakmp policy 10 authentication pre-share isakmp policy 10 encryption 3des isakmp policy 10 hash md5 isakmp policy 10 group 2 isakmp policy 10 lifetime 86400 telnet timeout 5 ssh 0.0.0.0 0.0.0.0 outside ssh 0.0.0.0 0.0.0.0 inside ssh timeout 60 console timeout 0 dhcpd address 192.168.100.204-192.168.100.210 inside dhcpd lease 3600 dhcpd ping_timeout 750 dhcpd domain xxxxxxxxxxxxxxxxxx.net dhcpd auto_config outside dhcpd enable inside terminal width 80 Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx : endIdeas? Suggestions?