If you are using split tunneling, did you add a route to your DMZ in your split tunnel ACL? If your inside subnet is being NAT/PATed, did you add a line to your NAT 0 ACL permitting the VPN pool to DMZ? If you don't know how to do/check these please post your config.
I know that the Pix doesn't like traffic going from the DMZ to the External interface (e.g. if a machine has 192.168.2.100, and then points to it's external internet interface xxx.xxx.xxx.100), is there a way to allow such a request?
Or do I need to rebuild the DMZ DNS server so all such requests to xxx.xxx.xxx.100 are sent instead to 192.168.2.100 - if you see what I mean.
I don't understand what you're asking. Hosts on the DMZ should be able to access anything on the outside interface (i.e. Internet) if they initiate the traffic. This is because the security level of the DMZ is greater than the outside.
If you're talking about having a public IP on the outside be mapped to your DMZ IP then yes, this is possible and not very difficult to do. In fact you're doing it with many IPs with your "static" commands in your config. No server rebuild is necessary, add the static mapping commands and allow DNS to your DNS server's outside IP address in the outside_access_in ACL.
I think I understand, and the answer is "no". A server on the DMZ cannot reference itself, or any other DMZ computer, by ther "outside" addresses.
The rule is that a packet will not exit the interface on which it arrives. It can be a pain.
Generally, I suggest using DNS names instead. If you use your ISP's DNS server, then the DNS aliasing will handle it (but you need all your servers in the public DNS). Better, set up your own DNS server with names resolving to the internal addresses, then use your ISP's server for just your public servers.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.