Hmmmm, how can I answer that question, and not sound ignorant... Dunno. Probably not.
We have static translations set up on a one for one basis for our 10.10.10.x addresses to translate to our public addresses. And we have a number of incoming access list entries that send incoming traffic on certian IP's to certian interfaces, (Inside or DMZ). But I dont quite know how to NAT 10.10.10.x to 192.168.1.x, espically when we are using DNS names. I could run a seperate DNS zone for these, but I assumed that outbound traffic would translate from 10.10.10.x to the public address, hit the router one hop upline, and come back to the firewall as inbound traffic and get sent to the appropriate interface.
Here is the relevent sections of the config. I replaced our public addresses with xxx.xxx.x
Here is the current PIX configuration. I have highlighted the areas I am confused about.
: Written by enable_15 at 16:41:26.851 CDT Fri Apr 25 2003
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 DMZ security10
global (outside) 10 XXX.XXX.X.83-XXX.XXX.X.88
global (outside) 10 interface
global (DMZ) 10 interface
nat (inside) 10 0.0.0.0 0.0.0.0 0 0
static (inside,outside) XXX.XXX.X.68 10.10.10.10 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.69 10.10.10.70 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.70 10.10.10.71 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.71 10.10.10.72 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.72 10.10.10.73 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.82 10.10.10.83 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.74 10.10.10.78 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.76 10.10.10.77 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.92 10.10.10.92 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.94 10.10.10.94 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.81 10.10.10.80 netmask 255.255.255.255 0 0
static (inside,outside) XXX.XXX.X.67 10.10.10.11 netmask 255.255.255.255 0 0
static (DMZ,outside) XXX.XXX.X.93 192.168.1.93 netmask 255.255.255.255 0 0
static (DMZ,outside) XXX.XXX.X.91 192.168.1.91 netmask 255.255.255.255 0 0
static (DMZ,inside) XXX.XXX.X.93 192.168.1.93 netmask 255.255.255.255 0 0
static (DMZ,outside) XXX.XXX.X.90 192.168.1.90 netmask 255.255.255.255 0 0
static (DMZ,outside) XXX.XXX.X.73 192.168.1.73 netmask 255.255.255.255 0 0
static (DMZ,outside) XXX.XXX.X.78 192.168.1.78 netmask 255.255.255.255 0 0
static (inside,DMZ) 10.10.10.80 10.10.10.80 netmask 255.255.255.255 0 0
static (inside,DMZ) 10.10.10.73 10.10.10.73 netmask 255.255.255.255 0 0
static (DMZ,outside) XXX.XXX.X.88 192.168.1.88 netmask 255.255.255.255 0 0
static (inside,DMZ) 10.10.10.83 10.10.10.83 netmask 255.255.255.255 0 0
conduit permit tcp host XXX.XXX.X.94 object-group MailServer any
conduit permit tcp host XXX.XXX.X.93 object-group MailServer any
conduit permit tcp host XXX.XXX.X.93 eq 3389 any
conduit permit tcp host XXX.XXX.X.78 eq 3389 any
conduit permit tcp host XXX.XXX.X.88 eq 3389 any
conduit permit tcp host XXX.XXX.X.91 object-group MailServer any
conduit permit tcp host XXX.XXX.X.91 eq 3389 any
conduit permit tcp host XXX.XXX.X.70 eq citrix-ica any
conduit permit tcp host XXX.XXX.X.71 eq citrix-ica any
conduit permit tcp host XXX.XXX.X.72 eq citrix-ica any
conduit permit tcp host XXX.XXX.X.81 eq citrix-ica any
conduit permit tcp host XXX.XXX.X.82 eq https any
conduit permit tcp host XXX.XXX.X.82 eq 3306 any
conduit permit tcp host XXX.XXX.X.82 eq citrix-ica any
conduit permit tcp host XXX.XXX.X.74 eq citrix-ica any
conduit permit tcp host XXX.XXX.X.74 eq https any
conduit permit tcp host XXX.XXX.X.82 eq
conduit permit tcp host XXX.XXX.X.82 eq smtp any
conduit permit tcp host XXX.XXX.X.76 eq citrix-ica any
conduit permit tcp host XXX.XXX.X.81 eq https any
conduit permit tcp host XXX.XXX.X.82 eq domain any
conduit permit udp host XXX.XXX.X.82 eq domain any
conduit permit tcp host XXX.XXX.X.68 eq domain any
conduit permit udp host XXX.XXX.X.68 eq domain any
conduit permit tcp host XXX.XXX.X.69 eq citrix-ica any
conduit permit tcp host XXX.XXX.X.92 eq https any
conduit permit tcp host XXX.XXX.X.92 eq
conduit permit tcp host XXX.XXX.X.68 eq
conduit permit tcp host XXX.XXX.X.94 eq
conduit permit tcp host XXX.XXX.X.94 eq https any
conduit permit tcp host XXX.XXX.X.94 eq smtp any
conduit permit tcp host XXX.XXX.X.93 object-group FTPserver any
conduit permit tcp host XXX.XXX.X.90 object-group DataWhse any
conduit permit tcp host XXX.XXX.X.73 object-group MailServer any
conduit permit tcp host XXX.XXX.X.78 object-group MailServer any
conduit permit tcp host XXX.XXX.X.88 object-group MailServer any
conduit deny tcp any any range 1433 1434
conduit deny udp any any range 1433 1434
outbound 1 deny 0.0.0.0 0.0.0.0 1604 udp
outbound 2 permit 192.168.1.78 255.255.255.255 3389 tcp
apply (inside) 1 outgoing_src
apply (inside) 2 outgoing_dest
route outside 0.0.0.0 0.0.0.0 XXX.XXX.X.65 1
timeout xlate 3:00:00
Thanks for the interest..