config looks correct.  check with your next hop router outside of the 
firewall to ensure that routes for your inside network are available.

>From: "Brian Whalen" 
>Reply-To: "Brian Whalen" 
>To: [EMAIL PROTECTED]
>Subject: Re: how to disable NAT in PIX firewall (both insid [7:29405]
>Date: Tue, 18 Dec 2001 11:57:04 -0500
>
>Though I am not a PIX pro, if you don't want nat, are you sure you got the
>right product for your needs??
>
>Brian "Sonic" Whalen
>Success = Preparation + Opportunity
>
>
>On Mon, 17 Dec 2001, David Tran wrote:
>
> > Hi Everyone,
> >
> > I am having problem setting up a network in this scenario
> >
> > with my PIX515-UR firewall running version 6.1(1) with pdm
> >
> > version 1.1(2).
> >
> > I have a network with REGISTERED IP addresses. The
> >
> > "inside" interface of the PIX is on the 129.174.1.0/24
> >
> > network with IP address of 129.174.1.254. The "outside"
> >
> > interface of the PIX is on the 66.61.46.0/24 network with
> >
> > IP address of 66.61.46.120. The "inside" interface has
> >
> > a security level of 100 and the "outside" interface has
> >
> > security level of 0. On the "inside" internal network, I
> >
> > have 10 workstations range from 129.174.1.1-10. These
> >
> > workstations have the default gateway point to the
> >
> > "inside" interface of the PIX.
> >
> > I understand that for machines from the "inside"
> >
> > network to access the Internet, the command "nat"
> >
> > and global must be used. However, since I all of my
> >
> > machines have valid (aka registered IP addresses), I
> >
> > want to disabe NAT completely. For, example,
> >
> > I want machine 129.174.1.1 to be able to browse and
> >
> > ping any machines on the Internet. At the same time,
> >
> > I don't want users from the Internet to be able to access
> >
> > any of the workstations on the "inside" interface. I have
> >
> > been searching for documentation on Cisco website
> >
> > but it seems likemost of the example have to do with NAT
> >
> > enable. There are a few examples that will disable NAT
> >
> > but it is relatedto VPN which is something I don't want.
> >
> > Furthermore, most of the examples fill with errors and
> >
> > pretty worthless (for PIX anyway). If anyone has done
> >
> > this before, let me know. I also include a copy of the config.
> >
> > Thanks.
> >
> > David
> >
> > PIX Version 6.1(1)
> >
> > nameif ethernet0 outside security0
> >
> > nameif ethernet1 inside security100
> >
> > nameif ethernet2 dmz security50
> >
> > enable password sdfkjfdjjdfjksdf encrypted
> >
> > passwd sdfjksdfkjsdfjksjf encrypted
> >
> > hostname ciscopix
> >
> > fixup protocol ftp 21
> >
> > fixup protocol http 80
> >
> > fixup protocol h323 1720
> >
> > fixup protocol rsh 514
> >
> > fixup protocol rtsp 554
> >
> > fixup protocol smtp 25
> >
> > fixup protocol sqlnet 1521
> >
> > fixup protocol sip 5060
> >
> > fixup protocol skinny 2000
> >
> > names
> >
> > access-list no-nat-list permit ip any any
> >
> > access-list no-nat-list permit icmp any any
> >
> > pager lines 24
> >
> > interface ethernet0 auto
> >
> > interface ethernet1 auto
> >
> > interface ethernet2 auto
> >
> > mtu outside 1500
> >
> > mtu inside 1500
> >
> > mtu dmz 1500
> >
> > ip address outside 66.61.46.120 255.255.255.0
> >
> > ip address inside 129.174.1.254 255.255.255.0
> >
> > ip address dmz 127.0.0.1 255.255.255.255
> >
> > ip audit info action alarm
> >
> > ip audit attack action alarm
> >
> > no failover
> >
> > failover timeout 0:00:00
> >
> > failover poll 15
> >
> > failover ip address outside 0.0.0.0
> >
> > failover ip address inside 0.0.0.0
> >
> > failover ip address dmz 0.0.0.0
> >
> > pdm history enable
> >
> > arp timeout 14400
> >
> > nat (inside) 0 129.174.1.0 255.255.255.0
> >
> > static (inside, outside) 129.174.1.0 129.174.1.0
> >
> > conduit permit ip any any
> >
> > conduit permit icmp any any
> >
> > route outside 0.0.0.0 0.0.0.0 66.61.46.254 1
> >
> > timeout xlate 3:00:00
> >
> > timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323
>0:05:00
> > sip
> >
> > 0:30:00 sip_media 0:02:00
> >
> > timeout uauth 0:05:00 absolute
> >
> > aaa-server TACACS+ protocol tacacs+
> >
> > aaa-server RADIUS protocol radius
> >
> > no snmp-server location
> >
> > no snmp-server contact
> >
> > snmp-server community public
> >
> > no snmp-server enable traps
> >
> > floodguard enable
> >
> > no sysopt route dnat
> >
> > telnet timeout 5
> >
> > ssh timeout 5
> >
> > terminal width 80
s

_________________________________________________________________
MSN Photos is the easiest way to share and print your photos: 
http://photos.msn.com/support/worldwide.aspx




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=29502&t=29405
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to