On 19 Jun 2000, at 15:14, Ben Nagy wrote:

> Is it a known problem that the PIX 515-UR with sw 4.4(4) is braindead as a
> router?
> 
> I am experiencing a complete failure to route between different networks if the
> traffic doesn't traverse the PIX (in other words routing back out of the
> interface on which the PIX recieved the packet). In addition, I had almost no
> luck in getting to PIX to route to networks if it had acquired those routes via
> RIP - I'd occasionally get one packet back, seemingly at random (I couldn't find
> any set of actions that led to it, anyway).[1]

Yep, I had exactly the same problem when I first put mine in and tried getting 
my dmz servers to use my public DNS servers which had global outside 
addresses listed, and the servers couldn't connect to any other server in the 
dmz. Took me a while to work out what was happening (even messed around 
with the alias command to try to get it working) and ended up running 
separate DNS servers.

I've got an outstanding issue with Cisco on using 1 PIX to act as a firewall for 
2 different ISP connections (so one set of servers hangs off one ISP and the 
rest hang off the other) and the PIX refuses to route packets that came in on 
my ISP2 interface back to that interface, they always go out through the 
ISP1 interface. This is a real pain and after weeks of going through my PIX 
reseller to try to find out if it was possible they told me that the Cisco PIX 
guy they'd been dealing with told them I could put a router between the PIX 
and my ISP routers and use that to route back to the correct router, but that 
would require a Cisco router guy for config details. I told my reseller this 
weeks ago when I first started because I posted to this list and to the 
comp.security.firewalls group asking the same question and got a detailed 
reply back about using an intermediate router, but Cisco seemed to ignore 
this in the message my reseller relayed to them.
 
> Other than that, for those who are interested, I found the general PIX
> configuration philosophy extremely logical and sensible. Certainly as a
> framework to make it hard for admins to misconfigure their firewalls it made a
> lot of sense. The not-quite-IOS syntax takes a bit of getting used to though,
> and the outbound / apply syntax is a tad arcane.

One thing I would like to have seen would be a way of grouping internal IPs 
for use on the outbound lists. The current syntax allows single or ranges of 
IPs, but I have IPs spread all over my network that need the same 
permissions. With the existing outbound structure I'd have to have outbound 
rules for each individual machine, and that will really eat into the 2000 rule 
limit. The only answer I got out of Cisco about this was that I'd need to move 
my IPs around in my network so that everyone who needed the same 
access would be placed on sequential addresses. Unfortunately this would 
involve a lot of work to readdress the whole company and also go through our 
main business server which uses IP plus name/password based security. 
Maybe if Cisco are listening they might consider this for the next PIX OS?

Dan

---
D.C. Crichton                 email: [EMAIL PROTECTED]
Senior Systems Analyst        tel:   +44 (0)121 706 6000
Computer Manuals Ltd.         fax:   +44 (0)121 606 0477

Computer book info on the web:
   http://computer-manuals.co.uk/
Want to earn money? Join our affiliate scheme!
   http://computer-manuals.co.uk/affiliate/
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to