Firewall PIX & SSL

I need to activate my (506th) PIX firewall for a part of SSL traffic on ports 993 and 63149. Only use orders led to the to do, or are there additional steps involved. Any help greatly appreciated

TIA

Yes, if you already use lines, you simply add a few lines to the new ports. If you use access lists, you need to change the access lists.

driving permit tcp host x.x.x.x eq 993 everything

driving permit tcp host x.x.x.x eq 63149 everything

where x.x.x.x is the address of the public server.

The following configuration example includes the syntax for lines and access lists:

http://www.Cisco.com/warp/customer/707/28.html

hope this helps,

-Nairi

Tags: Cisco Security

Similar Questions

  • Firewall PIX boots to halfway and crashes

    I have a problem with my 525. PIX, it begins to start and then hangs at this task forever.m do not know whether or not its an ios issue

    CISCO PIX FIREWALL SYSTEMS
    BIOS version shipped 4.3.207 01/02/02 16:12:22.73
    Compiled by Manu
    256 MB OF RAM

    PCI device table.
    Bus Dev Func VendID DevID class Irq
    00 00 00 8086 7192 host Bridge
    00 07 00 8086 7110 ISA Bridge
    00 07 01 8086 7111 IDE controller
    00 07 02 8086 7112 bus Series 9
    00 07 03 8086 7113 PCI Bridge
    00 0D 00 8086 1209 Ethernet 11
    0E 00 00 8086 1209 Ethernet 10
    00 11 00 14E4 5823 co-processor 11
    00 13 00 8086 PCI bridge to PCI B154
    01 04 00 8086 1229 Ethernet 11
    01 05 00 8086 1229 Ethernet 10
    01 07 00 8086 1229 Ethernet 5

    Cisco Secure PIX Firewall (4.2) BIOS #0: Mon Dec 31 08:34:35 PST 2001
    Platform PIX-525
    System Flash = E28F128J3 @ 0xfff00000

    Use BREAK or ESC to interrupt flash boot.
    Use the SPACE to start boot flash immediately.
    Read 102912 bytes of the image of the flash.

    PIX Flash charge assistance

    Initialization of flashfs...
    flashfs [0]: 7 files, 3 folders
    flashfs [0]: 0 orphaned files, orphaned directories 0
    flashfs [0]: Total number of bytes: 16128000
    flashfs [0]: bytes used: 13952512
    flashfs [0]: available bytes: 2175488
    flashfs [0]: initialization complete.

    Start the first image in flash

    Launch of flash image: / image
    ################################################################################
    ################################################################################
    ################################################################################
    ################################################################################
    ################################################################################
    ################################################################################
    ##############
    256 MB OF RAM

    Total network cards found: 5
    mcwa i82559 Ethernet on irq 10 MAC: 001a.a2a4.4dc2
    mcwa i82559 Ethernet to irq 11 MAC: 001a.a2a4.4dc3

    Looks more like a hardware problem with a PCI bus or ethernet card 4 ports.

    Well I guess you have a card ethernet 4 ports, so 6 ports in total, but the device is only to see 5.

    It seems that peripheral 06 is missing on bus 01 so one of the ports on the card 4 ports is not recognized.

    Does it boot ok if you remove that card?

    HTH

    Herbert

  • Firewall PIX to connect to router - link light not on

    I'm trying to connect the PIX501 firewall to our router (router PortMaster) to test the external connection but light not on port 0.

    I used the crossover cable (also try normal cable), also to reboot the router. After the reboot, the light becomes on for a very short time (10 or 20 seconds) and then turned off and never more.

    Anyone know what happened? Any suggestions are welcome.

    See you soon

    Are the PIX or router interfaces to close? If this isn't the case, which are then they fixed on duplex speed? If it has a value of 10, the other 100, they won't come to the top.

    If they do not resolve, try another device on each port (501 and router) to check the status.

  • PIX firewall Image issue

    Hello

    I'm without a firewall PIX 7.0 to 6.3 decommissioning. I faced the problem during the restart of the PIX.

    The error given below,

    Start the first image in flash

    Image must be at least 7-0-0-0 error in the flash file: / pix635.bin

    No bootable Flash image. Please download an image from a network server

    in monitor mode

    CISCO PIX FIREWALL SYSTEMS

    BIOS version shipped 4.3.207 01/02/02 16:12:22.73

    Compiled by Manu

    128 MB OF RAM

    Did you follow the exact downgrade procedure indicated on this link... you point the image as shown 6.3.x

    downgrade tftp://tftpserverip/pix63x.bin

    PIX downgrade procedure 7.x to 6.3.x

    http://www.Cisco.com/en/us/docs/security/ASA/asa70/pix_upgrade/upgrade/guide/pixupgrd.html#wp1810347

    in any case, you can always redownload the 6.3.5 new code in monitor mode.

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_tech_note09186a0080094a5d.shtml#upbootormon

    Let us know how it works.

    Rgds

    Jorge

  • As a transparent (bypass) PIX firewall?

    I'm doing a school project that involves the use of a firewall PIX between the ISP and the edge of the network router. The goal is to make the network as secure as possible using only the PIX. Ideally, I'd like that it if an attacker could not even see the PIX was there. It made me think if the PIX can act as a transparent firewall, otherwise said, not having all the IPS assigned to the interfaces nor do no routing, simply inspect/forward traffic between inside/outside interface. Otherwise, I'll have to create a small 30 between the ISP and the PIX from the outside, and the border router and the route PIX inside and between them.

    If I do the latter, can you give me advice on how to secure more PIX? Here is my config:

    interface ethernet0 10full

    interface ethernet1 100full

    ethernet0 nameif outside security0

    nameif ethernet1 inside the security100

    activate the password encrypted x

    passwd encrypted x

    pixfirewall hostname

    domain pix.local

    fixup protocol dns-length maximum 512

    No fixup protocol ftp 21

    fixup protocol h323 h225 1720

    fixup protocol h323 ras 1718-1719

    fixup protocol http 80

    fixup protocol rsh 514

    fixup protocol rtsp 554

    fixup protocol sip 5060

    fixup protocol sip udp 5060

    fixup protocol 2000 skinny

    fixup protocol smtp 25

    fixup protocol sqlnet 1521

    fixup protocol tftp 69

    names of

    access-list 100 permit icmp any any echo response

    pager lines 24

    Outside 1500 MTU

    Within 1500 MTU

    IP 10.0.0.1 address outside 255.255.255.252

    IP address inside 10.0.0.5 255.255.255.252

    IP verify reverse path to the outside interface

    IP verify reverse path inside interface

    IP audit name AttackPolicy attack action alarm down reset

    IP audit name InfoPolicy info action alarm down reset

    verification of IP outside the InfoPolicy interface

    interface IP outside the AttackPolicy check

    verification of IP within the InfoPolicy interface

    verification of IP within the AttackPolicy interface

    disable signing verification IP 2000

    disable signing verification IP 2004

    don't allow no history of pdm

    ARP timeout 14400

    NAT (inside) 0 0.0.0.0 0.0.0.0 0 0

    Access-group 100 in external interface

    Route outside 0.0.0.0 0.0.0.0 10.0.0.2 1

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225

    H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00

    Timeout, uauth 0:05:00 absolute

    GANYMEDE + Protocol Ganymede + AAA-server

    RADIUS Protocol RADIUS AAA server

    AAA-server local LOCAL Protocol

    No snmp server location

    No snmp Server contact

    SNMP-Server Community public

    No trap to activate snmp Server

    enable floodguard

    Telnet timeout 5

    SSH timeout 5

    Console timeout 5

    Terminal width 80

    Any help is appreciated! Thank you!

    Chris

    The PIX can now act as a layer 2 firewall, this feature will be in the next major version of the code should be out later this year. For now you will need a small subnet between the ISP and the PIX.

    If you do not want to see the PIX then the first thing is to make sure it does not meet the pings. Use the "icmp" command (http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1026574) for. Make sure you allow ICMP unreachable to the outside interface well and Path MTU Discovery can work properly (http://www.cisco.com/warp/public/105/38.shtml#pmtud_fail).

    Other than that, it seems very good, pretty standard.

  • PIX 501 in the firewall of the Web server

    Hello

    At the suggestion of a colleague, we bought a firewall PIX 501 to protect our new Win2003 web server and a UNIX/Oracle DB server.

    I've never worked with before firewalls.

    Our servers are located in a cage at the ISP and belong to us. There are only two servers providing web site. I have read the documentation in the Getting Started book and it does not answer my question.

    We have 2 web sites with different IP numbers on our web server. Let's say 140.5.5.4 and 140.5.5.5. I understand that I have will redefine the numbers with the firewall (192,...) but I do not understand how the routers at the ISP will be able to route requests for two websites to the firewall when it has one IP number, say 140.5.5.1?

    Any help is appreciated.

    Thank you, Jerry

    Jerry,

    what you are referring is called port forwarding. Whether you a PIX with a public IP address 12.1.1.1 and your web servers are respectively and 12.1.1.2 12.1.1.3. Port forwarding is really a 2 step process:

    * a static translation of the public IP address of the PIX (12.1.1.1) at the address of the web server (12.1.1.2)...

    static (inside, outside) tcp 12.1.1.1 12.1.1.2 www www netmask 255.255.255.255 0 0

    * an intermediate statement basically "all web requests should be allowed in the pix outside of the interface"...

    driving permit tcp host 12.1.1.1 eq www everything

    Here is a link that will help you to clarify this point:

    www.Cisco.com/warp/Customer/707/28.html

    This should help you get started. Regarding the basic configuration, it takes config examples on the Cisco site, if you have access CCO.

    Let me know if it helps.

    Rob H.

  • How to limit the ICMP on the PIX firewall.

    Guys good day!

    I have a dilemma with regard to limiting ICMP users browsing to other networks such as other demilitarized interns.

    I know that, to allow ICMP to pass through interfaces, you will need to create an ACL such as below:

    access-list DMZACL allow icmp a whole

    Users require this config ping a server on the DMZ, but it is a security risk.

    To minimize, I have a group of objects created in order to identify hosts and networks is allowed to have access to the echo-replies.

    Again, this is a problem since many host who extended pings just to monitor the connectivity server and its application.

    Do you have other ideas guys?

    As to limiting the echo answers on the PIX. As first 5 echo request succeed with 5 echo-replies and the rest would be removed.

    This could be done?

    Thank you

    Chris

    Hello.. I don't think you can do this by using an ACL on the PIX, however, you might be able to stop the ICMP sweeps by activating CODES signatures using the check ip command you... For more information see the link below

    Guidelines of use Cisco Intrusion Detection System (IDS Cisco) provides the following for IP-based systems:

    ? Audit of traffic. The application of signatures will be audited only as part of an active session.

    ? Apply to the verification of an interface.

    ? Supports different auditing policies. Traffic that matches a signature triggers a range of configurable

    actions.

    ? Disables signature verification.

    ? Always turns the shares of a class of signature and allows IDS (information, attack).

    The audit is performed by looking at IP packets to their arrival at an input interface, if a packet triggers

    a signature and the action configured does not have the package, and then the same package may trigger another

    signatures.

    Firewall PIX supports inbound and outbound audit.

    For a complete list signatures of Cisco IDS supported, their wording and whether they are attacking or

    informational messages, see Messages in Log System Cisco PIX Firewall.

    See the User Guide for the Cisco Secure Intrusion Detection System Version 2.2.1 for more information

    on each signature. You can view the? NSDB and Signatures? Chapter of this guide at the following

    website:

    http://www.Cisco.com/univercd/CC/TD/doc/product/iaabu/csids/csids1/csidsug/SIGs.htm

  • Security IOS vs PIX Firewall / ASA

    Could someone point me to some docs on cisco.com in comparing the use of an IOS on a secure router & using a cisco firewall? I want to use a SRI w/fix ios if possible but don't know if I can lock the outside of the network as well as I could with a pix or asa, so I want to make sure I'm doing everything I can and do the right thing. Any help is greatly appreciated.

    Hello

    There is a discussion in this forum on this topic; Check "Firewalling: PIX vs IOS Firewall" last conversation was released January 10, 2006. Let me know then if it helps.

    Rgrds,

    Haitham

  • Difference b/w PIX & router (router with the firewall option)

    Hi all

    I want to know that how we can differ with router (router with the firewall option) PIX bcz can also make Staefull packet filtering. What PIX device that reviewed by the customer to use PIX of the router.

    Thank you best regards &,.

    Guelma

    Hello

    There is a discussion in this forum on this topic; Check "Firewalling: PIX vs IOS Firewall" last conversation was released January 10, 2006. Let me know if it helps.

    Rgrds,

    Haitham

  • Outlook web app on the pix firewall

    Hi guru firewall,.

    Can someone here help me install my firewall cisco to work for external outlook web access. I changed a few settings and do turn internally... However I can't access outside.

    That means, when I open outlook web app on our LAN that it works, but when I try to open it via internet ISP I can not open it... "page not found".

    Pls advice how you it is resolved through the configuration of firewall pix if anyone of you has met the same thing.

    Any help is greatly appreciated.

    Best regards

    Jeric

    Jeric,

    I am very surprised to read this thread. I really appreciate your effort to do this task.

    I said, listen to me, don't forget to add a statement static so that this works, but I'm not saying you port coz I'm still looking for it.

    I had a good conversation with our cisco consultant Ken. I show him the config and it's what Ken told me to do.

    We lack this static entry.

    public static tcp (indoor, outdoor) interface www inside_mail_server www netmask 255.255.255.255 0 0

    also add to this list of access

    ACL_OUT list access permit tcp any host 203.125.100.246 eq www

    Pls let me know the result. Hope that the system will work.

    PLS, do not forget to 'Clearly Xlate' and save it.

    See you soon.

    Dennis

  • Helps to configure the pix firewall 507e for e-mail access

    Dear experts,

    I called our provider cisco and ask for technical help regarding our current problem as we know on our set-up.

    She told me to convey my concern to the Cisco TAC. My friends told me to post it here under discussion Netpro.

    I am writing today to ask a few questions about my pix 506 firewall configuration.

    To give the implementation Details pls find below and attached seizures of the show tech command.

    We have subscribed the service DSL and Singtel give us 2 addresses valid public IP that is 203.125.100.246 255.255.255.252.

    I used 203.125.100.246 for my external interface of my firewall pix and singtel assign 203.125.100.245 to the DSL router. In this case, we will only use PAT for internet connection.

    Currently he works very well our Mail Server is resided in the Singtel Office having the ip address of 165.21.111.22. Not work that we can receive and deliver electronic mail on the internet, and we can also surf the internet.

    Now we intend to put our mail in our own network server, because sometimes we encounter slowness on receiving and sending emails. Pls check on the IP address below

    Our LAN IP address is 192.168.1.X 255.255.255.0

    default gateway, which is the IP address of the firewall pix inside interface is 192.168.1.1

    The new mail server IP address is 192.168.1.4.

    Here's what I've done so far.

    I created a static mapping for my mail server is here

    public static 203.125.100.246 (inside, outside) 192.168.1.4 mask subnet 255.255.255.255 0 0

    and modify the access list to allow smtp on our networks.

    192.168.2.0 ip access list ACL_OUT permit 255.255.255.0 any

    ACL_OUT list access permit icmp any host 203.125.100.246

    ACL_OUT list access permit tcp any host 203.125.100.246 eq smtp

    ACL_OUT list access permit tcp any host 203.125.100.246 eq pop3

    ACL_OUT list access permit udp any host 203.125.100.246 EQ field

    Access-group ACL_OUT in interface outside

    After doing it... I have loss all the internet connection, the email does not work... so I deleted immediately. because it causes network failure.

    I have rather edit it and create a static map like this.

    public static 203.125.100.246 (exterior, Interior) 192.168.1.4 mask subnet 255.255.255.255 0 0

    and modify the access list to allow smtp on our networks.

    192.168.2.0 ip access list ACL_OUT permit 255.255.255.0 any

    ACL_OUT list access permit icmp any host 203.125.100.246

    ACL_OUT list access permit tcp any host 203.125.100.246 eq smtp

    ACL_OUT list access permit tcp any host 203.125.100.246 eq pop3

    ACL_OUT list access permit udp any host 203.125.100.246 EQ field

    Access-group ACL_OUT in interface outside

    Saw what it did not cause a failure of network or interruption. I thought that it will already work with the config, I keep it and this is the current config now... But when I change the POP and SMTP settings so that it points on 192.168.1.4 which is the new mail server on our LAN. his does not work.

    To this day, we are in a discussion with my boss or not possible to create a static mapping on our new mail server address 192.168.1.4 to 203.125.100.246 which is already assigned as external IP address and is used for PAT.

    We are asking your help to know how to set up our internal mail server statically match our public IP address that is already used for PAT.

    Please check attached the tech release see the.

    Thank you very much!

    I'd appreciate your quick response.

    Your truth.

    Dennis Pelea

    Dennis,

    Can you please send to me your configuration full pix (unscrew sensitive information) to [email protected] / * /

    I am puzzled, why this configuration does not for you. I have several clients who use a public ip address for external intf more than several other services that use this single ip address.

    Thank you / Jay

  • Several connections of client XAuth of PIX 506th

    Hi, we have Cisco PIX 506th, fully updated:

    Cisco PIX Firewall Version 6.3 (5)

    Cisco PIX Device Manager Version 3.0 (4)

    We have two customers with Cisco (routers with VPN and PIX firewall IOS). I can't make two IPSec connections for them using XAuth (they allowed Xauth). I see that we have only one VPN connection with extended authentication (XAuth) called "Easy VPN. When I am trying to set up a new one it replaces just my old connection. If I shouldn't use this firewall PIX Easy VPN Client, how can I use extended authentication (XAuth) I found no option for this? Is this supported? At 25 connections how to only IPSec connections without XAuth authentication data sheet?

    as far as I know, you may need an additional device. as mentioned, the reason being a single unit can act as a client for two ezvpn ezvpn different servers.

    Otherwise, you must return to the type of vpn. that is, to set up lan - lan.

  • problems with vpn firewall/proxy configuration

    Hello

    I want to access vpn through firewall/proxy (Client VPN) client-side.

    I installed the vpn gateway as firewall pix 515 using Microsoft CA IKE SA.

    I want to establish the vpn tunnel to my vpn through a proxy/firewall client.

    I tried in some places of vpn client where the firewall acts as a linux machine in which he allowed with the ipsec and NAT esp feature. Its works perfectly. But only one concurrent vpn client. Also the first tunnel vpn disconnects when the second user tries without knowing the first established tunnel.

    I heard that we can drive this problem using "NAT Taversal" mode which is available in version ios 6.3 as concentrator 3000 Cisco pix.

    I want to know how NAT Traversal can solve my problem in which multiple concurrent users without support nat esp in a configuration only one simultaneous user without support nat esp in a configuration of firewall/proxy or firewall/proxy.

    Thank you

    Karthikeyan V

    The VPN client is able to detect that he's been through a NAT/PAT device on the way to the hub/PIX, and then if both ends support it, they will automatically start NAT - T and encapsulate the IPSec packets in UDP port 4500 packets. These can then be NAT would properly and you will not get disconnections or problems you currently see.

    You don't see that a client can connect and customers being disconnected when the other connects it is your PAT instrument cannot process the ISAKMP and IPSec packets correctly. It is a fairly common symptom.

    PIX v6.3 code will support NAT - T, should be available in March sometime.

  • PIX with VPN to Checkpoint with overlapping subnets

    I have a client with a PIX runs code 6.3.

    They need establish an IPSec Tunnel for one of its customers with a Checkpoint firewall.

    Both organizations use 10.1.0.0/16 and I'd like to nat to 10.180.0.0 Home Office 16 and the remote client to 10.181.0.0.

    The document on the site Web of Cisco PIX and VPN concentrators is less useful. I don't think the text describing the image is correct.

    Help with ACL and static NAT is greatly appreciated.

    Frederik

    Apologies, should have asked. Which office has the pix and the control point. I write this as if the two ends were firewall pix so that's fine and we can see if that helps.

    Remote endpoint

    ==========

    NAT 10.1.0.0 ip access list allow 255.255.255.0 host 10.180.1.103

    NAT (inside) 3 access list NAT

    Global (outside) 10.181.0.0 255.255.0.0

    NOTE: You could really just NAT addresses 10.1.x.x from source to a global IP address rather than the whole 10.181.0.0/16 up to you.

    Your card crypto access list must then refer to the addressing of Natted 10.181.x.x rather than the 10.1.0.0 address.

    vpntraffic list access ip 10.181.0.0 255.255.0.0 allow host 10.180.1.103

    Main office

    ===========

    crpyto-access list should read

    vpntraffic list allowed access host 10.180.1.103 ip 10.181.0.0 255.255.0.0

    And you will need a static translation for client access

    public static 10.180.1.103 (Interior, exterior) 10.1.1.103 netmask 255.255.255.255

    Does that help?

    Jon

  • Server FTP with PIX

    Hi all

    We are experincing a problem with access to our FTP server located behind the firewall PIX from the internal network by its public IP address while it is accessible from the external network.

    I tried the command alias, but it did not work...

    Your help is appreiciated extremely...

    Hello abaghir,

    I hope you do a nat for the ftp server be visible on the public IP address outside... right? or the server has a public IP itself assigned...

    If it's a natted IP address, you cannot access the server through the public IP address of the inside. The public IP address won't be visible inside. external network, you can see the server on its public IP address. Inside, you can only ftp to the server on its private IP address.

    I hope this helps... all the best...

    REDA

Maybe you are looking for