happytheman
MIS
Can anyone shed some light on the configuration issue that is preventing me from utilizing the PDM? I understand that a named ACL on inside as well as outside interfaces, but I am unsure how to fix this, clean it up and make it more efficient (as I did not configure it). Thanks for any advice.
Happy
: Saved
: Written by enable_15 at 09:11:54.302 UTC Fri Apr 6 2007
PIX Version 6.3(5)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxxxxxxxxxxxxxx encrypted
passwd xxxxxxxxxxxxxxxx encrypted
hostname Brighthouse501
domain-name xxxxxxxxxxx.local
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 10.69.51.0 Location1
name 10.69.40.0 Location2
name 10.69.16.0 Location3
name 10.69.96.0 internet_vlan
name 10.69.60.0 location4
name 209.16.118.96 isp
name 10.69.43.0 location5
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.1.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.1.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.1.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.1.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.1.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.2.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.3.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.12.0 255.255.255.0
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.2.0 255.255.255.0
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.3.0 255.255.255.0
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.12.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.2.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.3.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.12.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.2.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.3.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.12.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.2.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.3.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.12.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.6.0 255.255.255.0
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.6.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.6.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.6.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.6.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.11.0 255.255.255.0
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.11.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.11.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.11.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.11.0 255.255.255.0
pager lines 24
logging on
logging timestamp
logging trap notifications
logging host inside 10.69.40.20
icmp permit any echo-reply outside
icmp permit any echo-reply inside
icmp permit any inside
mtu outside 1500
mtu inside 1500
ip address outside 209.16.118.98 255.255.255.248
ip address inside 10.69.43.22 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 0.0.0.0 255.255.255.252 outside
pdm location Location3 255.255.240.0 inside
pdm location Location2 255.255.254.0 inside
pdm location Location1 255.255.255.0 inside
pdm location internet_vlan 255.255.255.240 inside
pdm location location5 255.255.255.0 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list ACL1
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group ACL1 in interface outside
route outside 0.0.0.0 0.0.0.0 209.16.118.97 1
route inside Location3 255.255.254.0 10.69.96.1 1
route inside Location3 255.255.240.0 10.69.96.1 1
route inside 10.69.17.0 255.255.255.0 10.69.96.1 1
route inside Location2 255.255.254.0 10.69.96.1 1
route inside Location1 255.255.255.240 10.69.96.1 1
route inside Location1 255.255.255.0 10.69.96.1 1
route inside location4 255.255.255.0 10.69.96.1 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http internet_vlan 255.255.255.240 inside
http Location2 255.255.254.0 inside
http Location3 255.255.240.0 inside
http location5 255.255.255.0 inside
snmp-server host inside 10.69.40.13
no snmp-server location
no snmp-server contact
snmp-server community xxxxxxxxxxxx
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ACL1tunnel esp-3des esp-md5-hmac
crypto ipsec security-association lifetime seconds 900
crypto map remoteACL1 40 ipsec-isakmp
crypto map remoteACL1 40 match address ACL1
crypto map remoteACL1 40 set pfs group2
crypto map remoteACL1 40 set peer 67.78.142.50
crypto map remoteACL1 40 set transform-set ACL1tunnel
crypto map remoteACL1 40 set security-association lifetime seconds 3600 kilobytes 4608000
crypto map remoteACL1 interface outside
isakmp enable outside
isakmp key xxxxxxxxxxxx address 67.78.142.50 netmask 255.255.255.255
isakmp policy 8 authentication pre-share
isakmp policy 8 encryption 3des
isakmp policy 8 hash md5
isakmp policy 8 group 2
isakmp policy 8 lifetime 86400
telnet internet_vlan 255.255.255.240 inside
telnet Location2 255.255.254.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
terminal width 80
banner login This system is for the use of authorized users only. Unauthorized access is prohibited by Public Law 99-474, The Computer Fraud and Abuse Act of 1986, and can result in administrative, disciplinary or criminal proceedings.
Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxx
: end
Happy
: Saved
: Written by enable_15 at 09:11:54.302 UTC Fri Apr 6 2007
PIX Version 6.3(5)
interface ethernet0 100full
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxxxxxxxxxxxxxx encrypted
passwd xxxxxxxxxxxxxxxx encrypted
hostname Brighthouse501
domain-name xxxxxxxxxxx.local
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 10.69.51.0 Location1
name 10.69.40.0 Location2
name 10.69.16.0 Location3
name 10.69.96.0 internet_vlan
name 10.69.60.0 location4
name 209.16.118.96 isp
name 10.69.43.0 location5
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.1.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.1.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.1.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.1.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.1.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.2.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.3.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.12.0 255.255.255.0
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.2.0 255.255.255.0
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.3.0 255.255.255.0
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.12.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.2.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.3.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.12.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.2.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.3.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.12.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.2.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.3.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.12.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.6.0 255.255.255.0
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.6.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.6.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.6.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.6.0 255.255.255.0
access-list ACL1 permit ip location4 255.255.255.0 10.10.11.0 255.255.255.0
access-list ACL1 permit ip internet_vlan 255.255.255.240 10.10.11.0 255.255.255.0
access-list ACL1 permit ip Location1 255.255.255.0 10.10.11.0 255.255.255.0
access-list ACL1 permit ip Location3 255.255.255.0 10.10.11.0 255.255.255.0
access-list ACL1 permit ip 10.69.17.0 255.255.255.0 10.10.11.0 255.255.255.0
pager lines 24
logging on
logging timestamp
logging trap notifications
logging host inside 10.69.40.20
icmp permit any echo-reply outside
icmp permit any echo-reply inside
icmp permit any inside
mtu outside 1500
mtu inside 1500
ip address outside 209.16.118.98 255.255.255.248
ip address inside 10.69.43.22 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 0.0.0.0 255.255.255.252 outside
pdm location Location3 255.255.240.0 inside
pdm location Location2 255.255.254.0 inside
pdm location Location1 255.255.255.0 inside
pdm location internet_vlan 255.255.255.240 inside
pdm location location5 255.255.255.0 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list ACL1
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group ACL1 in interface outside
route outside 0.0.0.0 0.0.0.0 209.16.118.97 1
route inside Location3 255.255.254.0 10.69.96.1 1
route inside Location3 255.255.240.0 10.69.96.1 1
route inside 10.69.17.0 255.255.255.0 10.69.96.1 1
route inside Location2 255.255.254.0 10.69.96.1 1
route inside Location1 255.255.255.240 10.69.96.1 1
route inside Location1 255.255.255.0 10.69.96.1 1
route inside location4 255.255.255.0 10.69.96.1 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http internet_vlan 255.255.255.240 inside
http Location2 255.255.254.0 inside
http Location3 255.255.240.0 inside
http location5 255.255.255.0 inside
snmp-server host inside 10.69.40.13
no snmp-server location
no snmp-server contact
snmp-server community xxxxxxxxxxxx
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ACL1tunnel esp-3des esp-md5-hmac
crypto ipsec security-association lifetime seconds 900
crypto map remoteACL1 40 ipsec-isakmp
crypto map remoteACL1 40 match address ACL1
crypto map remoteACL1 40 set pfs group2
crypto map remoteACL1 40 set peer 67.78.142.50
crypto map remoteACL1 40 set transform-set ACL1tunnel
crypto map remoteACL1 40 set security-association lifetime seconds 3600 kilobytes 4608000
crypto map remoteACL1 interface outside
isakmp enable outside
isakmp key xxxxxxxxxxxx address 67.78.142.50 netmask 255.255.255.255
isakmp policy 8 authentication pre-share
isakmp policy 8 encryption 3des
isakmp policy 8 hash md5
isakmp policy 8 group 2
isakmp policy 8 lifetime 86400
telnet internet_vlan 255.255.255.240 inside
telnet Location2 255.255.254.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
terminal width 80
banner login This system is for the use of authorized users only. Unauthorized access is prohibited by Public Law 99-474, The Computer Fraud and Abuse Act of 1986, and can result in administrative, disciplinary or criminal proceedings.
Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxx
: end