From: Chris Fike on
Hello,

Please bear with me, I'm helping with an office transition from one
company to another. In the process the old company wiped the
configuration of the PIX 506. I'm trying to get everything up and
running again.

We have a Cisco 2950 switch with 2 vlans (10 and 20). Port 24 is the
trunk port, set as 802.1Q trunking.

On the PIX, I can get vlan 1 to work fine. VLAN 2, I can ping the
router, but can't get to the internet. VLAN2 from my understanding was
setup to allow some videoconferencing equipment to work.

here's part of the configuration:

PIX Version 6.3(5)
interface ethernet0 10full
interface ethernet1 auto
interface ethernet1 vlan20 logical
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif vlan20 DMZ security50

access-list 100 permit tcp any host xx.xx.xx.2 eq smtp
access-list 100 permit tcp any interface outside eq www
access-list 100 permit tcp any interface outside eq https
access-list 100 permit tcp any interface outside eq 3389

ip address outside xx.xx.xx.2 255.255.255.248
ip address inside 172.30.40.254 255.255.255.0
ip address DMZ 172.30.70.254 255.255.255.0

global (outside) 10 interface

static (inside,outside) tcp interface www 172.30.40.2 www netmask
255.255.255.25
5 0 0
static (inside,outside) tcp interface 3389 172.30.40.2 3389 netmask
255.255.255.
255 0 0
access-group 100 in interface outside
route outside 0.0.0.0 0.0.0.0 xx.xx.xx.1 1
route inside 172.30.40.0 255.255.255.255 172.30.40.254 1

I feel as though it's an access list/group issue, but I can't for the
life of me get it figured out.

From: Walter Roberson on
In article <1160586041.840303.208940(a)e3g2000cwe.googlegroups.com>,
Chris Fike <cfike(a)mac.com> wrote:

> VLAN 2, I can ping the router, but can't get to the internet.

>PIX Version 6.3(5)
>interface ethernet0 10full
>interface ethernet1 auto
>interface ethernet1 vlan20 logical
>nameif ethernet0 outside security0
>nameif ethernet1 inside security100
>nameif vlan20 DMZ security50

>access-list 100 permit tcp any host xx.xx.xx.2 eq smtp
>access-list 100 permit tcp any interface outside eq www
>access-list 100 permit tcp any interface outside eq https
>access-list 100 permit tcp any interface outside eq 3389

>ip address outside xx.xx.xx.2 255.255.255.248

The first line of your ACL refers to host xx.xx.xx.2, and
your ip address outside is given as xx.xx.xx.2 . If those are the
same IP address, then your first line must be rewritten as

access-list 100 permit tcp any interface outside eq smtp

>ip address inside 172.30.40.254 255.255.255.0
>ip address DMZ 172.30.70.254 255.255.255.0

>global (outside) 10 interface

>static (inside,outside) tcp interface www 172.30.40.2 www netmask 255.255.255.255 0 0
>static (inside,outside) tcp interface 3389 172.30.40.2 3389 netmask 255.255.255.255 0 0
>access-group 100 in interface outside

>route outside 0.0.0.0 0.0.0.0 xx.xx.xx.1 1
>route inside 172.30.40.0 255.255.255.255 172.30.40.254 1

That route inside statement is redundant: it would be put in place
automatically because of the 'ip address inside' (the range is
the same as the inside address range, and the destination IP is
the same as the PIX inside interface IP.)


>I feel as though it's an access list/group issue, but I can't for the
>life of me get it figured out.

The reason your VLAN2 cannot reach the outside is that you have
not established any translation for it, at least not in the part
you have shown. You haven't established any translation for most inside
hosts either.

Try,

nat (inside) 10 172.30.40.0 255.255.255.0
nat (DMZ) 10 172.30.70.0 255.255.255.0

> VLAN 2, I can ping the router, but can't get to the internet.

You wouldn't be able to ping the router if you didn't have some
kind of translation already in place.

If you are trying to ping from inside or DMZ to outside hosts, I
would recommend that you add

access-list 100 permit icmp any any echo-reply
access-list 100 permit icmp any any unreachable
access-list 100 permit icmp any any time-exceeded

These are needed because the PIX cannot reliably determine that
any particular icmp message is a "response" to traffic that went
outwards, so you have to configure the PIX as if the desirable
icmp are "new" traffic inwards.
From: Chris Fike on

Ok,

Followed your suggestions and both vlans work as well as the video
conferencing.

Thank you very much.

As far as this comment:

The reason your VLAN2 cannot reach the outside is that you have
> not established any translation for it, at least not in the part
> you have shown. You haven't established any translation for most inside
> hosts either.

Do I need to establish translation for the individual hosts? Keep in
mind I've never claimed to be a Cisco expert.