Firewall Wizards mailing list archives

PIX DMZ inter-access via outside IP address


From: "Keith Anderson" <keith () purescience com>
Date: Thu, 4 Dec 2003 15:57:57 -0700


This one is driving me crazy... if someone can help, I'd greatly appreciate
it.

I've got a client with a PIX 520, four interfaces, with the following
configuration:

  Interface 0, the "outside" with public IP address 1.1.1.x (not their
actual address range)
     connected to a Cisco 3640 router, T1 to the Internet, router address
1.1.1.1

  Interface 1, the "inside", the executives (about 10 workstations)
     several Cisco Catalyst switches, all layer 2

  Interface 2, the DMZ with two servers (1.1.1.3 and 1.1.1.4)
     one Cisco Catalyst switch

  Interface 3, the "inside2", the rest of the company (about 60
workstations)
     several Cisco Catalyst switches, all layer 2

In order to support their applications, the two servers must be accessible
by everyone in the company AND the Internet by both IP address AND domain
name.

* Systems on the inside, inside2 and the Internet can reach the servers
using their public 1.1.x.x addresses just fine.

* Systems on the inside and inside2 can reach the servers using their
192.168 addresses also, just fine, although this is not required.

* All systems on the inside, inside2 and DMZ can access the Internet without
problems.

The PIX can ping everything on all interfaces.  No connectivity problems.

THE KILLER PROBLEM: The two servers in the DMZ CAN NOT access each other
using their public Internet addresses.  They can use their 192.168 addresses
just fine, but not their public addresses.

For the last week or so, I've been getting around this using HOST entries
(these are Windows servers), but we are about to add a lot of servers,
virtual hosts and other devices, and HOST entries will not work.

Thanks in advance to anyone that can help with this.


Here are the relevant entries in the PIX configuration:

! the interfaces
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 DMZ security10
nameif ethernet3 inside2 security40
ip address outside 1.1.1.9 255.255.248.0
ip address inside 10.48.0.1 255.255.0.0
ip address DMZ 192.168.1.1 255.255.0.0
ip address inside2 10.10.10.1 255.255.0.0

! address pools
global (outside) 1 1.1.1.10-1.1.1.249 netmask 255.255.240.0
global (outside) 1 1.1.1.250 netmask 255.255.240.0
global (DMZ) 1 192.168.1.2-192.168.1.249 netmask 255.255.0.0
global (DMZ) 1 192.168.0.250 netmask 255.255.0.0
global (inside2) 1 10.10.0.2-10.10.0.249 netmask 255.255.0.0
global (inside2) 1 10.10.0.250 netmask 255.255.0.0

! NAT
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
nat (DMZ) 1 0.0.0.0 0.0.0.0 0 0
nat (inside2) 1 0.0.0.0 0.0.0.0 0 0

! Grant access to the DMZ from the other interfaces using the outside
addresses
sysopt nodnsalias inbound
alias (inside) 1.1.1.3 192.168.1.3 255.255.255.255
alias (inside2) 1.1.1.3 192.168.1.3 255.255.255.255
alias (inside) 1.1.1.4 192.168.1.4 255.255.255.255
alias (inside2) 1.1.1.4 192.168.1.4 255.255.255.255

! Static mappings to allow everyone to access the DMZ servers
static (inside,DMZ) 192.168.1.3 192.168.1.3 netmask 255.255.255.0 0 0
static (inside2,DMZ) 192.168.1.3 192.168.1.3 netmask 255.255.255.255 0 0
static (DMZ,outside) 1.1.1.3 192.168.1.3 netmask 255.255.255.255 0 0
static (inside,DMZ) 192.168.1.4 192.168.1.4 netmask 255.255.255.0 0 0
static (inside2,DMZ) 192.168.1.4 192.168.1.4 netmask 255.255.255.255 0 0
static (DMZ,outside) 1.1.1.4 192.168.1.4 netmask 255.255.255.255 0 0

! This is in the lab only to make sure traffic flow isn't being stopped
! In the production PIX, access-lists are used to permit only needed ports
conduit permit icmp any any
conduit permit ip any any

! default route to the 3640
route outside 0.0.0.0 0.0.0.0 1.1.1.1 1




Here is the Cisco 3640 route information:

ip route 0.0.0.0 0.0.0.0 up.stream.pro.vider
ip route 1.1.1.0 255.255.255.0 1.1.1.9


_______________________________________________
firewall-wizards mailing list
firewall-wizards () honor icsalabs com
http://honor.icsalabs.com/mailman/listinfo/firewall-wizards


Current thread: