Technically, the Pix doesn't work with destination / source.  The syntax is:

usage: [no] conduit deny|permit <protocol> <g_ip> <g_mask>
                [<operator> <port> [<port>]] <f_ip> <f_mask>
                [<operator> <port> [<port>]]
             conduit deny|permit icmp <g_ip> <g_mask>
                <f_ip> <f_mask> [<icmp_type>]

Where g = global address and f = foreign address.

However, Rodgers, you are right, and I stand corrected.  The proper line
should be:

conduit permit tcp host 128.200.111.150 eq 150 host 128.200.111.100

Sorry for the confusion, I need to remember not to post until I've had my
coffee.  

K
-----
Kristopher B. Climie, CCNP, CCDP

> From: [EMAIL PROTECTED] ("Rodgers Moore")
> Organization: GroupStudy.com Discussion Groups
> Newsgroups: groupstudy.cisco
> Date: 12 Sep 2000 08:47:50 -0400
> Subject: Re: pix
> 
> The PIX does it backwards to the rest of Cisco.  In conduits, it's
> destination, source not the other way around.
> 
> Rodgers Moore
> 
> ""Kristopher B. Climie"" <[EMAIL PROTECTED]> wrote in message
> 8pl3cd$8cu$[EMAIL PROTECTED]">news:8pl3cd$8cu$[EMAIL PROTECTED]...
>> It looks to me that you conduit is wrong.  Your line is "conduit permit
> tcp
>> host 128.200.111.100 eq 135 host 128.200.111.150 eq 135"  In plain english
>> what this says is, "Let any traffic originating from 128.200.111.100 on
> TCP
>> port 135 go to server 128.200.111.150, to TCP port 135."  The key to the
>> reason that it is not working is the first "eq 135".  Personally, I have
> not
>> found a way to specify what the originating port is at the server.
> Usually
>> the source port is a randomly generated port number, and the important one
>> is the destination port.  The line should read, "conduit permit tcp host
>> 128.200.111.100 host 128.200.111.150 eq 135"
>> 
>> K
>> 
>> -----
>> 
>> Kristopher B. Climie, CCNP, CCPD
>> 
>> <[EMAIL PROTECTED]> wrote in message
>> D528DF24AEBCD311A17700508B92CBBF101F47@NEWMAN">news:D528DF24AEBCD311A17700508B92CBBF101F47@NEWMAN...
>>> Hi,
>>> 
>>> You need to add a static statement to the internal server but
> something
>>> that goes like that:
>>> Static (inside,outside/dmz-I didn't really understood from you mail
> where
>> it
>>> is located) 10.10.1.150 10.10.1.150.
>>> The conduit you already have.
>>> The static statement that I wrote actually say that IP address can be
>> reach
>>> but the appropriate conduit.
>>> This is the way I usually do it.
>>> 
>>> 
>>> GIL
>>> CCNA,CCDA
>>> 
>>> -----Original Message-----
>>> From: SH Wesson [mailto:[EMAIL PROTECTED]]
>>> Sent: ??? ??? 11 ?????? 2000 13:14
>>> To: [EMAIL PROTECTED]
>>> Subject: pix
>>> 
>>> 
>>> I am using a Cisco PIX 520 with an inside interface and an outside
>>> interface.  I have
>>> the following scenario:
>>> 
>>> Internal server has an address of 10.10.1.150, the external server has
> an
>> ip
>>> 
>>> address
>>> of 128.200.111.100.  The external server is in the dmz zone.  The
> internal
>>> server has
>>> been assigned a global address 0f 128.200.111.150 that maps to the
> inside
>>> server
>>> of ip address 10.10.1.150.  I want the external server of
> 128.200.111.100
>> to
>>> 
>>> be able to
>>> communicate with the inside server only through port 135.
>>> 
>>> I assigned a static ip address to the inside host with the following
>>> command:
>>> 
>>> static (inside,outside) 128.200.111.150 10.10.1.150 netmask
>> 255.255.255.255
>>> 0 0
>>> 
>>> 
>>> I assigned the permission for the external server to be able to access
> the
>>> inside
>>> server only via port 135 using the following command.
>>> 
>>> conduit permit tcp host 128.200.111.100 eq 135 host 128.200.111.150 eq
> 135
>>> 
>>> 
>>> Is this the right way of doing it?  If I'm doing it wrong, can someone
>> show
>>> me how to do this.
>>> 
>>> Thanks.
>>> 
> _________________________________________________________________________
>>> Get Your Private, Free E-mail from MSN Hotmail at
> http://www.hotmail.com.
>>> 
>>> Share information about yourself, create your own public profile at
>>> http://profiles.msn.com.
>>> 
>>> **NOTE: New CCNA/CCDA List has been formed. For more information go to
>>> http://www.groupstudy.com/list/Associates.html
>>> _________________________________
>>> UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
>>> FAQ, list archives, and subscription info: http://www.groupstudy.com
>>> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>>> This email was scanned using ESPG @ PubliCom Haifa.
>>> 
>>> **NOTE: New CCNA/CCDA List has been formed. For more information go to
>>> http://www.groupstudy.com/list/Associates.html
>>> _________________________________
>>> UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
>>> FAQ, list archives, and subscription info: http://www.groupstudy.com
>>> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>>> 
>> 
>> 
>> **NOTE: New CCNA/CCDA List has been formed. For more information go to
>> http://www.groupstudy.com/list/Associates.html
>> _________________________________
>> UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
>> FAQ, list archives, and subscription info: http://www.groupstudy.com
>> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>> 
> 
> 
> **NOTE: New CCNA/CCDA List has been formed. For more information go to
> http://www.groupstudy.com/list/Associates.html
> _________________________________
> UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
> FAQ, list archives, and subscription info: http://www.groupstudy.com
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> 

**NOTE: New CCNA/CCDA List has been formed. For more information go to
http://www.groupstudy.com/list/Associates.html
_________________________________
UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
FAQ, list archives, and subscription info: http://www.groupstudy.com
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to