Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations TouchToneTommy on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Recent content by tbissett

  1. tbissett

    Dumb - and somewhat basic- routing question

    The scenario: A router receives (not advertises) the following routes: 10.1.1.0/24 via BGP 10.0.0.0/8 via EIGRP The question: Assuming admin distances, weights, etc. are at their defaults, will traffic desinted for 10.1.1.x use the BGP route because of the longer subnet mask (more specific...
  2. tbissett

    Where are VPN ACL's normally configured ???

    You would control traffic using access-lists on the INSIDE interface of the each firewall. Let's say you have an IP range behind on firewall that is 192.168.1.0 and the IP range on the opposite end is 172.16.1.0. If you wanted to restrict only SMTP and POP3 going through the VPN tunnel, but...
  3. tbissett

    How to properly update PDM

    No, upgrading the PDM does not reset the PIX to factory defaults, and you do not have to reconfigure the PIX after upgrading. The first time you launch the upgraded PDM, it is going to add a bunch of 'PDM Location' statements in the PIX. These are used by the PDM to sort out which networks/IPs...
  4. tbissett

    How to properly update PDM

    Upgrading the PDM does not erase your backup image. To upgrade the PDM, you will need to be running a TFTP server (not FTP, but TFTP). A free server is available from http://support.solarwinds.net/updates/New-customerFree.cfm?ProdId=52 Once you have a TFTP server running, and you have the PDM...
  5. tbissett

    Restricting site-to-site VPN traffic

    Last time I tried, my impression was that you couldn't do it by editing the crypto map. That was a while ago, however. In any case, I did it by implementing outbound access-lists on the inside interface of each firewall. So, on the local subnet firewall, it might appear something like this to...
  6. tbissett

    NAT-Issue with PIX

    It depends on the version of your PIX OS. Newer versions (6.3(3) I think) allow you to use the static command to map from higher to lower. In addition to: static (dmz,outside) <outside ip> <dmz ip> add the following to map the public IP to your internal network: static (dmz,inside) <outside ip>...
  7. tbissett

    PIX 506E question

    If you do as you described above, then there is absolutely no need for a firewall in the first place as you will be allowing all traffic from the outside to the inside - the reason you install a firewall is to PREVENT all traffic from the outside to the inside. That said, you can provide access...
  8. tbissett

    PIX 7 access-list removal

    The 7.0 command is: clear configure access-list <access-list name> Just in case you haven't seen the doc, this is documented on Page 9 in the "Guide for PIX 6.2 and 6.3 Users Upgrading to Cisco PIX Software Version 7.0' document, which is actually a pretty good read overall...
  9. tbissett

    Access-group inbound statement

    Yes, that is exactly why. TCP is connection-oriented, and the PIX firewall keeps track of the connection state to allow ACK traffic back in (hence the term stateful inspection). ICMP, on the other hand ititiates traffic from both ends. Your inside station initiates an echo-request, and the...
  10. tbissett

    pix 501 access-list

    My gut reaction is it's a DNS issue. If you implement the access-list and your users have the ISP servers set for their DNS, DNS requests would be denied. You would need to add an additional line to the access-list permitting DNS services, like this: access-list inside_out deny tcp host...
  11. tbissett

    Pix 515R multiple ISP question

    Not totally sure what you mean by "natively." If you mean "without having to add a router or other piece of equipment," then the answer is no. The PIX can have only one default route. If your connections are T1, you can put a router in front of the PIX, then use BGP for two connections. We do...
  12. tbissett

    Track Changes in Pix

    There is a CiscoWorks Firewall/VPN manager (sold separately) that does what you need. If you want something that doesn't cost $$$, look at RANCID - http://www.shrubbery.net/rancid/ - which was created for routers/switches, but my understanding is it can be hacked for use with PIXes as well...
  13. tbissett

    ISAKMP error message

    My initial guess: It's not in ISAKMP but in IPSEC. Tht would explain why a "show isakmp sa" looks good temporarily, then drops. Perhaps your IPSEC security association attributes are not matching up between the two devices, or the network lists on both ends do not match?
  14. tbissett

    pix and inside routes

    Did you set up the VLANs directly on the inside interface? If yes, then no inside routes should be needed. Did you define the first VLAN as "physical" in your commands? This tags packets with 802.1q Also as an FYI, the use of VLAN 1 should be avoided. VALN1 is central to an attack known as...
  15. tbissett

    RADIUS server recommendations

    We use Funk's Steel-Belted RADIUS with AD and it works well. A 30-day fully functional demo is available. Go to http://www.funk.com

Part and Inventory Search

Back
Top