
2-32
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 2 Establishing Connectivity
Basic Configuration Examples
no failover
arp timeout 14400
nat (inside) 0 209.165.201.8 255.255.255.248
static (dmz,outside) 209.165.201.2 209.165.201.19 netmask 255.255.255.248
access-group acl_out in interface outside
access-group ping_acl in interface inside
access-group ping_acl in interface dmz
route outside 0.0.0.0 0.0.0.0 209.165.201.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00
udp 0:02:00 rpc 0:10:00 h323 0:05:00
sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
no snmp-server location
no snmp-server contact
snmp-server community public
Three Interfaces with NAT and PAT
In Figure 2-8, the PIX Firewall has three interfaces and these attributes:
• Address translation is performed between the interfaces.
• A web server on the DMZ interface is publicly accessible. The name command maps its host address
to the name “webserver.”
• The inside network has private addresses (10.0.0.0), the DMZ interface has RFC 1597 addresses
(192.168.0.0), and the outside network has legal, registered addresses (209.165.201.0).
• TCP and UDP connections from the inside are allowed to go out on the DMZ and outside.
• An inside host has been given Telnet access to the PIX Firewall console.
Figure 2-8 Three Interfaces with NAT and PAT
Internet
Outside
Inside
10.0.0.100 10.0.0.99 192.168.0.2 192.168.0.3
209.165.201.3209.165.201.2
192.168.0.110.0.0.3
209.165.201.1
209.165.201.4
DMZ
34782
The network has the following IP addresses and network masks:
• Outside network interface address: 209.165.201.4, network mask: 255.255.255.224
• Allowable global and static addresses on the outside network: 209.165.201.5-209.165.201.30,
network mask: 255.255.255.224
• Inside network interface address: 10.0.0.3, network mask: 255.0.0.0
• DMZ network interface address: 192.168.0.1, network mask: 255.255.255.0
Comentarios a estos manuales