Firewall Wizards mailing list archives

PIX v7: routing without NAT?


From: Vahid Pazirandeh <vpaziran () yahoo com>
Date: Tue, 17 Jan 2006 12:07:26 -0800 (PST)

Hi All,

At our co-lo, we have IPs *.65 to *.97 available.  I'm trying to setup a mock
network before touching the production environment.

Our ISP router will be sitting on *.64, and we'd like to  use external IPs for
all our servers that are behind the PIX.  Is this possible?

I've run some tests (and mind you I am new to pix), and it seems that the ARP
requests are not passing through the pix.  I'm also not sure that the network
design we're using is going to work as intended.  Any thoughts?


IP definitions:

192.168.111.73: PIX "outside" interface
192.168.111.65: PIX "inside" interface
192.168.111.66: PC sitting behind the "inside" network
192.168.111.74: PC sitting outside

What does the network look like?
[192.168.111.74]---[switch1]---[PIX]---[switch2]---[192.168.111.66]


What was tested?
1. SUCCESS: ping from PIX to 192.168.111.74 ("outside" PC)
2. SUCCESS: ping from inside PC (192.168.111.66) to the PIX
3. FAILURE: ping from inside PC (192.168.111.66) to the "outside" PC
(192.168.111.74)


pixfirewall(config)# show ip
System IP Addresses:
Interface                Name                   IP address      Subnet mask
Ethernet0                outside                192.168.111.73  255.255.255.248
Ethernet1                inside                 192.168.111.65  255.255.255.248



pixfirewall(config)# show cap capout
4 packets captured
   1: 23:45:28.568192 192.168.111.73 > 192.168.111.74: icmp: echo request
   2: 23:45:28.568574 192.168.111.74 > 192.168.111.73: icmp: echo reply
   3: 23:45:53.230121 192.168.111.66 > 192.168.111.74: icmp: echo request
   4: 23:46:33.933499 192.168.111.66 > 192.168.111.74: icmp: echo request
4 packets shown
pixfirewall(config)# show cap capin
4 packets captured
   1: 23:45:47.379786 192.168.111.66 > 192.168.111.65: icmp: echo request
   2: 23:45:47.380183 192.168.111.65 > 192.168.111.66: icmp: echo reply
   3: 23:45:53.229953 192.168.111.66 > 192.168.111.74: icmp: echo request
   4: 23:46:33.933286 192.168.111.66 > 192.168.111.74: icmp: echo request
4 packets shown
pixfirewall(config)#




pixfirewall(config)# debug arp
debug arp  enabled at level 1
pixfirewall(config)# arp-in: request at outside from 192.168.111.74
000c.41e6.fcda for 192.168.111.66 0000.0000.0000
arp-set: added arp outside 192.168.111.74 000c.41e6.fcda and updating NPs at
425957510
arp-in: request at outside from 192.168.111.74 000c.41e6.fcda for
192.168.111.66 0000.0000.0000
arp-set: added arp outside 192.168.111.74 000c.41e6.fcda and updating NPs at
425958510
arp-in: request at outside from 192.168.111.74 000c.41e6.fcda for
192.168.111.66 0000.0000.0000
arp-set: added arp outside 192.168.111.74 000c.41e6.fcda and updating NPs at
425959510
pixfirewall(config)# no debug arp
debug arp  disabled.





Was Proxy ARP enabled?  Yes.

no sysopt noproxyarp inside
no sysopt noproxyarp outside

pixfirewall(config)# show running-config all sysopt
no sysopt connection timewait
sysopt connection tcpmss 1380
sysopt connection tcpmss minimum 0
no sysopt nodnsalias inbound
no sysopt nodnsalias outbound
no sysopt radius ignore-secret
no sysopt uauth allow-http-cache
sysopt connection permit-ipsec
pixfirewall(config)#




PIX Version 7.0(4)
!
hostname pixfirewall
domain-name default.domain.invalid
names
!
interface Ethernet0
 nameif outside
 security-level 0
 ip address 192.168.111.73 255.255.255.248
!
interface Ethernet1
 nameif inside
 security-level 100
 ip address 192.168.111.65 255.255.255.248
!
interface Ethernet2
 shutdown
 no nameif
 no security-level
 no ip address
!
access-list outside_access_in extended permit ip any any
access-list inside_access_in extended permit ip any any
access-list test extended permit icmp 192.168.111.0 255.255.255.0 192.168.111.0
255.255.255.0
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
ERROR: Command requires failover license
ERROR: Command requires failover license
asdm image flash:/pdm
no asdm history enable
arp timeout 14400
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http 192.168.111.8 255.255.255.248 inside
http 192.168.111.0 255.255.255.0 inside
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
telnet timeout 5
ssh timeout 5
ssh version 2
console timeout 0
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map global_policy
 class inspection_default
  inspect dns maximum-length 512
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
!

=============================================
 "Make it better before you make it faster."
=============================================

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
_______________________________________________
firewall-wizards mailing list
firewall-wizards () honor icsalabs com
http://honor.icsalabs.com/mailman/listinfo/firewall-wizards


Current thread: