Question : PIX 515e fw questions

Good morning to all.
I have some problems with my Cisco PIX 515e configuration and I'd appreciate your help.
My internal network is 192.168.1.0/24 connected to the FW inside interface (the PIX is doing NATing). The inside int. address is 192.168.1.101. The outside interface with the address 66.X.X.170 is connected to a small Cisco router's inside port . The routable network there 66.X.X.170/29, port's adderss is 66.X.X.169. The default route is outside 0.0.0.0 0.0.0.0 66.X.X.169 1 OTHER static. I also created the rules to allow echo-reply to get in and I permitted to ping both FW interfaces from the inside.
Q1: The users can get out OK. I can ping 192.168.1.101 from the stations and from PIX no problem. I can ping yahoo.com from the stations. I can ping both interfaces from PIX no problem. I CANNOT ping the gateway (66.X.X.169) or yahoo.com (by the address) from PIX (OK from the stations). I CANNOT ping the outside interface (66.X.X.170) from the stations. It's like the outside interface is not letting the pings out (or in?). What am I doing wrong?
Q2.: I have to kill the internet connection for some of the users (management requirement:(. I created the object on the inside int. with the internal IP address to test it. The access rule I am creating is (translated by PDM):
access-list inside_access_in deny ip host 192.168.1.23  any
access-group inside_access_in in interface inside
As soon as I hit Apply, all internet is cut for everyone (even pings are stopped). What am I missing?
Q3: There is a host on the outside interface with the address 66.X.X.168, which I didn't create. When I ping it from the inside station the reply comes from 66.X.X.169??? What is it?
I truly appreciate any help. Thank you for your time.
The current configuration is below:

nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security40
enable password 2Tu2KsO8sbJlB.Bj encrypted
passwd 2Tu2KsO8sbJlB.Bj encrypted
hostname FW
domain-name ***.com
clock timezone EST -5
clock summer-time EDT recurring
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
names        
name 192.168.1.0 Internal
name 66.X.X.168 Internet         <-- ???
name 192.168.1.16 amccabe
name 192.168.1.99 WebCamera
object-group service email tcp
  port-object eq pop3
  port-object eq pop2
  port-object eq smtp
object-group network NoInternet
  description To deny internet
  network-object 192.168.1.23 255.255.255.255
object-group service WebCamera tcp-udp
  port-object eq 3650
  port-object eq 5066
  port-object eq 3550
  port-object eq 4550
  port-object eq 5550
access-list outside_access_in permit icmp any any echo-reply
access-list outside_access_in permit icmp any any traceroute
access-list outside_access_in permit icmp any any unreachable
access-list outside_access_in permit icmp any any time-exceeded
access-list outside_access_in permit icmp any any timestamp-reply
access-list outside_access_in permit icmp any any information-reply
access-list outside_access_in permit icmp any any mask-reply
access-list outside_access_in permit tcp any host 66.X.X.172 object-group WebCamera
access-list outside_access_in permit udp any host 66.X.X.172 object-group WebCamera
pager lines 24
logging on
interface ethernet0 auto
interface ethernet1 100full
interface ethernet2 100full shutdown
icmp permit Internal 255.255.255.0 outside
icmp permit any inside
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip address outside 66.X.X.170 255.255.255.248
ip address inside 192.168.1.101 255.255.255.0
ip address dmz 127.0.0.1 255.255.255.255
ip verify reverse-path interface outside
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.1.23 255.255.255.255 inside
pdm location 192.168.1.3 255.255.255.255 inside
pdm location 192.168.1.4 255.255.255.255 inside
pdm location 0.0.0.0 255.255.255.248 outside
pdm location amccabe 255.255.255.255 inside
pdm location WebCamera 255.255.255.255 inside
pdm location 66.X.X.0 255.255.255.0 outside
pdm location 66.X.X.172 255.255.255.255 outside
pdm group NoInternet inside
pdm logging errors 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 dns 0 0
static (inside,outside) 66.X.X.172 WebCamera netmask 255.255.255.255 0 0
static (outside,inside) WebCamera 66.X.X.172 netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 66.X.X.169 1
route outside 66.X.X.172 255.255.255.255 WebCamera 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authentication serial console LOCAL
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
aaa authorization command LOCAL
ntp server 192.168.1.3 source inside prefer
http server enable
http 192.168.1.3 255.255.255.255 inside
http 192.168.1.4 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
tftp-server inside 192.168.1.3 c:\tftp-root
floodguard enable
sysopt noproxyarp inside
no sysopt route dnat
isakmp enable inside
isakmp identity address
isakmp policy 10 authentication rsa-sig
isakmp policy 10 encryption des
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
telnet 192.168.1.3 255.255.255.255 inside
telnet timeout 5
ssh 192.168.1.3 255.255.255.255 inside
ssh timeout 5
username fwadmin password cQCgz/2psOeHGpOw encrypted privilege 15
privilege show level 0 command version
privilege show level 0 command curpriv
privilege show level 3 command pdm
privilege show level 3 command blocks
privilege show level 3 command ssh
privilege configure level 3 command who
privilege show level 3 command isakmp
privilege show level 3 command ipsec
privilege show level 3 command vpdn
privilege show level 3 command local-host
privilege show level 3 command interface
privilege show level 3 command ip
privilege configure level 3 command ping
privilege configure level 5 mode enable command configure
privilege show level 5 command running-config
privilege show level 5 command privilege
privilege show level 5 command clock
privilege show level 5 command ntp
terminal width 80
Cryptochecksum:179683a8ef8149355e311733c60a7dde
: end
[OK]

Answer : PIX 515e fw questions

Q1:>I CANNOT ping the outside interface (66.X.X.170) from the stations.
Can't do it anyway. You can only ping the outside interface from the outside. That's just the way the PIX works.

Q2: you have to add another rule to the outbound acl:
access-list inside_access_in deny ip host 192.168.1.23  any
access-list inside_access_in permit ip any any

Q3: >host on the outside interface with the address 66.X.X.168
.168 is the network address with the subnet mask on the outside interface. If you ping a network address, all stations 'may' reply. In your case, .169 is the router's interface, and since .170 is your PIX interface, you can't get a reply from it (see Q1)

Hope this helps!

Random Solutions  
 
programming4us programming4us