- Posts: 1390
- Thank you received: 0
Multiple Port Forwarding @ PIX 6.3
17 years 6 months ago #21733
by Smurf
Wayne Murphy
Firewall.cx Team Member
www.firewall.cx
Now working for a Security Company called Sec-1 Ltd in the UK, for any
Penetration Testing work visit www.sec-1.com or PM me for details.
Replied by Smurf on topic Re: Multiple Port Forwarding @ PIX 6.3
Its an interesting thought however i don't think it can include ports within the Access-List. According to my book "Cisco ASA and PIX Firewall Handbook, by David Hucaby, ISBM 1-58705-158-3";
Therefore, if host A is going to the 10.50.0.0/16 network, it gets translated to 192.168.254.50 otherwise it gets translated to 192.168.254.100
Host A = 192.168.100.100
[code:1]access-list hostApolicy50 permit ip host 192.168.100.100 10.50.0.0 255.255.0.0
static (inside,outside) 192.168.254.50 access-list hostApolicy50 0 0
static (inside,outside) 192.168.254.100 192.168.100.100 netmask 255.255.255.255 0 0[/code:1]
If ACL hostApolicy50 matches and permits traffic, Host A is translated to 192.168.254.50
Therefore, if host A is going to the 10.50.0.0/16 network, it gets translated to 192.168.254.50 otherwise it gets translated to 192.168.254.100
Wayne Murphy
Firewall.cx Team Member
www.firewall.cx
Now working for a Security Company called Sec-1 Ltd in the UK, for any
Penetration Testing work visit www.sec-1.com or PM me for details.
Time to create page: 0.111 seconds