Hi,

Assuming you only have one IP on the external interface try the following

Global (outside) 10 interface
Nat (inside) 10 0 0
static (inside,outside) tcp interface www  www
netmask 255.255.255.255

access-list out-in permit tcp any host  eq www

Of course this would be to allow people on the Internet to access a WWW
server on the external IP address, which is your single routable IP.

But it sounds like the trouble your having is with user's reaching your web
server over a vpn tunnel??  Is this correct?  If so I would suspect you
haven't got a "NAT 0" statement to not nat packets from your web server to
the far side of the tunnel...  basically, without seeing your config you
need to have a line of code that tells the PIX what traffic not to nat,
specifically traffic that is going into the vpn tunnel to the far side.
This can be the same access-list that you define for traffic that will bring
up the tunnel - using the line of code like such:

nat (inside) 0 access-list NONAT
access-list NONAT permit ip  mask  mask

hope this helps.

C

-----Original Message-----
From: eo [mailto:[EMAIL PROTECTED]]
Sent: 16 July 2002 04:56
To: [EMAIL PROTECTED]
Subject: Pix internal access [7:48886]


Hello,
        
        Normally I wouldn't ask this but cisco's documentation on pix is far
from 
acceptable. 

What I am trying to  do is simple. I have a pix 501 here with a single
public
static ip on outside and a private network in the range of 10.251.35.0/24.

The pix is setup to nat the internal network out to the internet... This
works
fine. It also has a functional ipsec tunnel to a cisco vpn concentrator
which
works just dandy. The folks at the main site have requested that I open port

80 for web access internally. Noting that the network inside is PAT'd, there

will have to be a 'static' map to make this function... right..

I wont paste the entire config here unless requested but will give you the 
basic rundown.

I use access-list 101 to define two different subnets just to define 
interesting traffic for my crypto map. That works just fine.

if my external IP is 192.168.1.1, I (according to CCO and Pix configuration 
books) have to:

Add a static mapping as such:

static (inside,outside) 192.168.1.1 10.251.35.1 (I've done a few variants of

this)

Then enforce this with an acl as such:

access-list 102 permit tcp any host 192.168.1.1 eq www

then

access-group 102 in interface outside    to apply it

Now if I do this, it drops everything. I run logging console debugging and
see
tons and tons of drops for tcp, udp and ipsec. All network conectivity comes

to a total halt. 

So I tried to implement the acl like the old way I do my ciscos to make sure

by allowing ip any any and protocol 50 any any.  - Nothing

I also get a huge mess of errors stating that port mapping has failed, both 
IP's are correct and reachable.

I've tried every thing I can think of but the thing will not behave.
Conduits
and acl's. Once again, I wont touch my crypto map acl because I don't want
it
futzing with my tunnel and makes very little sense to me.

Has anyone gotten this kind of "Static" mapping working in a Pat'd/ipsec'd 
system? If so, how?

I will provide any needed information upon request.

Thanks a bunch in advance for any interest.

        
eo
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.

This footnote also confirms that this email message has been swept for the
presence of computer viruses.

For more information contact [EMAIL PROTECTED]

phone + 353 1 4093000

fax + 353 1 4093001

**********************************************************************




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=48893&t=48886
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to