OK, config below without necessary changes (I had to reboot it when I panicked after breaking it). Pix version 6.2, pix model: 515.
I know it would be easier to have the outside interface for internet traffic if I was configuring this from scratch. Unfortunately there are 5 existing VPNs with external sites that all run business critical applications over the VPN so that is not really an option.
Basically, I'm after using the ethernet3 interface (which I'll rename to adsl instead of pix/intf3). I didn't change the security level so it was set to 15.
I only really need to specify by IP address (or range of Ip address) which PC should use the new interface (we are using a proxy server). I also need to nat a couple of the external addresses on the new interface to some internal PCs (for email & a company web server).
If anyone can point me in the right direction then I'd be grateful.
Building configuration...
: Saved
:
PIX Version 6.2(1)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
nameif ethernet3 pix/intf3 security15
enable password
passwd Wasdj/afdaseeekh encrypted
domain-name acme.co.uk
clock timezone GMT/BST 0
clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
Names....... (removed for security)
access-list from_outside permit tcp any host nat_tim eq lotusnotes
access-list from_outside permit icmp any any unreachable
access-list from_outside permit tcp host US_Notes host nat_tim eq ftp
access-list from_dmz permit udp host viruswall any eq domain
access-list from_dmz permit tcp host viruswall any eq www
access-list from_dmz permit tcp host viruswall any eq https
access-list from_dmz permit tcp host viruswall any eq ftp
access-list from_dmz permit tcp host viruswall any eq smtp
access-list from_dmz permit icmp any host viruswall echo-reply
access-list from_dmz permit tcp host viruswall any eq domain
access-list from_dmz permit udp host viruswall host nemo eq 14247
access-list from_dmz permit tcp host proxserver any eq domain
access-list from_dmz permit tcp host proxserver any eq www
access-list from_dmz permit tcp host proxserver any eq https
access-list from_dmz permit tcp host proxserver any eq ftp
access-list from_dmz permit udp host proxserver any eq domain
access-list from_dmz permit tcp host proxserver any eq telnet
access-list 199 permit ip warrington 255.0.0.0 france 255.0.0.0
access-list 199 permit ip warrington 255.0.0.0 germany 255.0.0.0
access-list 199 permit ip warrington 255.0.0.0 sweden 255.0.0.0
access-list 199 permit ip warrington 255.0.0.0 flimby 255.0.0.0
access-list 199 permit ip any remote_users 255.255.255.0
access-list 199 permit icmp any host centennial
access-list 199 permit ip warrington 255.0.0.0 murtosa_net 255.255.255.0
access-list 115 permit ip warrington 255.0.0.0 flimby 255.0.0.0
access-list outside_cryptomap_dyn_20 permit ip any remote_users 255.255.255.0
access-list 101 permit ip warrington 255.0.0.0 france 255.0.0.0
access-list 101 permit ip ukdmz 255.255.255.0 france 255.0.0.0
access-list 111 permit ip warrington 255.0.0.0 germany 255.0.0.0
access-list 112 permit ip warrington 255.0.0.0 sweden 255.0.0.0
access-list outbound permit tcp any any eq domain
access-list outbound permit udp any any eq domain
access-list outbound permit tcp any any eq www
access-list outbound permit tcp any any eq https
access-list outbound permit tcp any any eq ftp
access-list outbound permit tcp host tim host viruswall eq smtp
access-list outbound permit icmp any any
access-list outbound permit tcp host tim any eq lotusnotes
access-list outbound permit ip any france 255.0.0.0
access-list outbound permit ip any sweden 255.0.0.0
access-list outbound permit ip any flimby 255.0.0.0
access-list outbound permit ip any germany 255.0.0.0
access-list outbound permit tcp any host viruswall eq 2033
access-list outbound permit tcp any host viruswall eq 14247
access-list outbound permit tcp host centennial host x.x.x.x eq telnet
access-list outbound permit tcp any any eq 2130
access-list outbound permit tcp any any eq 5081
access-list outbound permit tcp any any eq 4899
access-list outbound permit tcp any any eq lotusnotes
access-list outbound permit tcp host tonym any
access-list outbound permit tcp host centennial any
access-list outbound permit tcp any any eq 1709
access-list outbound permit tcp host tim any eq lpd
access-list outbound permit tcp any host proxserver eq 8080
access-list outbound permit tcp any any eq lpd
access-list outbound permit tcp host edi host mosaic eq pop3
access-list outbound permit tcp host edi host mosaic eq smtp
access-list 116 permit ip warrington 255.0.0.0 murtosa_net 255.255.255.0
pager lines 24
logging on
logging monitor warnings
logging buffered warnings
logging trap warnings
logging host dmz viruswall
logging host inside tonym
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
interface ethernet3 auto
mtu outside 1500
mtu inside 1500
mtu dmz 1500
mtu pix/intf3 1500
ip address outside xxx.xxx.xxx.xxx 255.255.255.254
ip address inside 100.100.200.50 255.0.0.0
ip address dmz 172.16.0.1 255.255.255.0
ip address pix/intf3 127.0.0.1 255.255.255.255
ip audit name inbound-attack attack action alarm drop reset
ip audit name inbound-info info action alarm
ip audit interface outside inbound-info
ip audit interface outside inbound-attack
ip audit info action alarm
ip audit attack action alarm
ip audit signature 2000 disable
ip local pool nbuk 172.16.254.1-172.16.254.100
ip local pool tonym vpn_tonym
no failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
failover ip address dmz 0.0.0.0
failover ip address pix/intf3 0.0.0.0
pdm lines
pdm logging warnings 150
pdm history enable
arp timeout 14400
global (outside) 1 x.x.x.x netmask 255.255.255.240
nat (inside) 0 access-list 199
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
nat (dmz) 1 0.0.0.0 0.0.0.0 0 0
static (dmz,outside) tcp proxserver 8080 proxserver 8080 netmask 255.255.255.255
0 250
static (inside,outside) nat_bos bos netmask 255.255.255.255 255 0
static (inside,outside) nat_tim tim netmask 255.255.255.255 255 0
static (inside,outside) nat_nemo nemo netmask 255.255.255.255 255 0
static (dmz,outside) nat_viruswall viruswall netmask 255.255.255.255 25 0
static (inside,outside) nat_eric eric netmask 255.255.255.255 255 0
static (inside,dmz) 100.100.200.0 100.100.200.0 netmask 255.255.255.0 0 0
access-group from_outside in interface outside
access-group outbound in interface inside
access-group from_dmz in interface dmz
route outside 0.0.0.0 0.0.0.0 internet_router 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server 130.88.200.6 source outside
http server enable
http vpn_tonym 255.255.255.255 outside
http 100.100.200.51 255.255.255.255 inside
http tonym 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
tftp-server dmz viruswall c:\pix
floodguard enable
sysopt security fragguard
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set pixset esp-des esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set pixset
crypto map testmap 10 ipsec-isakmp
crypto map testmap 10 match address 101
crypto map testmap 10 set peer x.x.x.x
crypto map testmap 10 set transform-set pixset
crypto map testmap 30 ipsec-isakmp
crypto map testmap 30 match address 111
crypto map testmap 30 set peer x.x.x.x
crypto map testmap 30 set transform-set pixset
crypto map testmap 50 ipsec-isakmp
crypto map testmap 50 match address 112
crypto map testmap 50 set peer x.x.x.x
crypto map testmap 50 set transform-set pixset
crypto map testmap 70 ipsec-isakmp
crypto map testmap 70 match address 115
crypto map testmap 70 set peer x.x.x.x
crypto map testmap 70 set transform-set pixset
crypto map testmap 80 ipsec-isakmp
crypto map testmap 80 match address 116
crypto map testmap 80 set peer murtosa_firewall
crypto map testmap 80 set transform-set pixset
crypto map testmap 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map testmap interface outside
isakmp enable outside
isakmp key ******** address x.x.x.x netmask 255.255.255.255
isakmp key ******** address x.x.x.x netmask 255.255.255.255
isakmp key ******** address x.x.x.x netmask 255.255.255.255
isakmp key ******** address x.x.x.x netmask 255.255.255.255
isakmp key ******** address murtosa_firewall netmask 255.255.255.255
isakmp identity address
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash sha
isakmp policy 20 group 2
isakmp policy 20 lifetime 28800
vpngroup tonym address-pool tonym
vpngroup tonym idle-time 1800
vpngroup tonym password ********
vpngroup johnm address-pool nbuk
vpngroup johnm idle-time 1800
vpngroup johnm password ********
vpngroup miker address-pool nbuk
vpngroup miker idle-time 1800
vpngroup miker password ********
vpngroup johnl address-pool nbuk
vpngroup johnl idle-time 1800
vpngroup johnl password ********
vpngroup markb address-pool nbuk
vpngroup markb idle-time 1800
vpngroup markb password ********
vpngroup denniss address-pool nbuk
vpngroup denniss idle-time 1800
vpngroup denniss password ********
vpngroup tonyw idle-time 1800
vpngroup tonyw password ********
vpngroup martinb address-pool nbuk
vpngroup martinb idle-time 1800
vpngroup martinb password ********
telnet vpn_tonym 255.255.255.255 outside
telnet bos 255.255.255.255 inside
telnet 100.100.200.51 255.255.255.255 inside
telnet tonym 255.255.255.255 inside
telnet centennial 255.255.255.255 inside
telnet 100.100.200.109 255.255.255.255 inside
telnet timeout 15
ssh timeout 15
terminal width 80