Avatar billede _et Praktikant
30. november 2005 - 20:25 Der er 3 kommentarer og
2 løsninger

Ingen hits på acces-list tæller

Jeg har nogle problemer med at jeg ikke får mail, www finder serveren men timer out.

Jeg kan ikke se der er noget galt i min opsætning, men det må der være.

Jeg får ingen counts på min smtp regl, men fint på min www regl.
( Det skal dog nævnes at når jeg får en firewall tester til at teste min ip, så for jeg hit på smtp reglen MEN også kun sådan.)

Kan i umiddelbart se nogle fejl i denne config:

R-PIXwall(config)# wr ter
Building configuration...
: Saved
:
PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password encrypted
passwd encrypted
hostname R-PIXwall
domain-name r.local
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 192.168.1.251 PIX-inderside
name 192.168.1.250 HW__Zyxel_Wireless_router
name 192.168.1.245 Server__Mail
name 192.168.1.244 Server__WWW
name 192.168.1.240 Server__Base
name 192.168.1.6 PC__ET-Mobil
name 192.168.1.3 PC__Workstation
name 62.243.x.y Server__France-Vacance
name 85.235.x.y public
object-group service Serverporte tcp
  port-object eq ssh
  port-object eq https
  port-object eq www
object-group service Serverporte-udp udp
  port-object eq www
object-group network Computerer
  description kun internet relaterede ting
  network-object PC__Workstation 255.255.255.255
  network-object PC__ET-Mobil 255.255.255.255
  network-object Server__Base 255.255.255.255
object-group network Serverer
  description kun server relateret
  network-object Server__Base 255.255.255.255
  network-object Server__WWW 255.255.255.255
  network-object Server__Mail 255.255.255.255
  network-object PIX-inderside 255.255.255.255
object-group network Net-Hardware
  description Router, WIFI og Firewall og andet der p├Ñtager sig en IP.
  network-object HW__Zyxel_Wireless_router 255.255.255.255
  network-object PIX-inderside 255.255.255.255
access-list Outside-In permit tcp any any eq www log 7
access-list Outside-In permit tcp any any eq https log
access-list Outside-In permit tcp any any eq 8901 log 7
access-list Outside-In permit tcp any any eq smtp log 7
access-list Outside-In permit icmp any any echo-reply log
access-list Outside-In permit icmp any any time-exceeded log
access-list Outside-In permit udp any any eq 3389 log
access-list Outside-In permit tcp any any eq 3389 log
access-list Outside-In permit tcp any eq 3390 host public eq 3390 log
access-list Outside-In deny ip any any log
pager lines 50
logging on
logging trap debugging
logging facility 23
logging device-id hostname
logging host inside Server__Base
logging host inside 192.168.1.28
logging host inside 192.168.1.29
icmp permit host Server__France-Vacance echo-reply outside
icmp permit any outside
icmp permit any inside
mtu outside 1500
mtu inside 1500
ip address outside dhcp setroute
ip address inside PIX-inderside 255.255.255.0
ip audit name Test-1 attack action alarm
ip audit name Test-2 info action alarm
ip audit interface outside Test-2
ip audit interface outside Test-1
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.1.0 255.255.255.255 inside
pdm location PC__Workstation 255.255.255.255 inside
pdm location PC__ET-Mobil 255.255.255.255 inside
pdm location Server__Base 255.255.255.255 inside
pdm location Server__WWW 255.255.255.255 inside
pdm location Server__Mail 255.255.255.255 inside
pdm location HW__Zyxel_Wireless_router 255.255.255.255 inside
pdm location Server__France-Vacance 255.255.255.255 outside
pdm location 192.168.1.96 255.255.255.240 outside
pdm group Computerer inside
pdm group Serverer inside
pdm group Net-Hardware inside
pdm logging alerts 10
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
alias (inside) Server__WWW public 255.255.255.255
static (inside,outside) tcp interface www Server__WWW www netmask 255.255.255.255 0 0
static (inside,outside) tcp interface smtp Server__Mail smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp interface https Server__WWW https netmask 255.255.255.255 0 0
static (inside,outside) tcp public 3389 Server__Base 3389 netmask 255.255.255.255 0 0
static (inside,outside) udp public 3389 Server__Base 3389 netmask 255.255.255.255 0 0
static (inside,outside) tcp public 3390 PC__Workstation 3389 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 8901 Server__WWW 8901 netmask 255.255.255.255 0 0
access-group Outside-In in interface outside
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
ntp server 130.226.1.2 source outside prefer
http server enable
http 192.168.1.0 255.255.255.0 inside
http 192.168.1.0 255.255.255.255 inside
snmp-server host inside Server__Base poll
snmp-server location lan
snmp-server contact t
snmp-server community public
snmp-server enable traps
floodguard enable
sysopt noproxyarp inside
crypto ipsec transform-set TRANS_ESP_3DES_MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set TRANS_ESP_3DES_MD5 mode transport
isakmp enable outside
isakmp key ******** address 0.0.0.0 netmask 0.0.0.0
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh 192.168.1.0 255.255.255.0 inside
ssh timeout 30
management-access outside
console timeout 0
vpdn username thr password *********
vpdn enable outside
dhcpd address 192.168.1.2-192.168.1.33 inside
dhcpd wins Server__Base
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain lan.r.local
dhcpd auto_config outside
dhcpd enable inside
username plov password  encrypted privilege 15
terminal width 80
Cryptochecksum:
: end
[OK]
R-PIXwall(config)#
Avatar billede jens_bach Nybegynder
30. november 2005 - 22:33 #1
den skulle være ok, det kan være den ikke scanner port 25 tcp

prøv eventuelt og debug pakkerne på outside interfacet når du telnet'er til den!

? hvor for du din ip fra ?
Avatar billede _et Praktikant
02. december 2005 - 19:17 #2
ip fra energi randers.

Jeg har prøvet at telnette til den, men der sker intet når det sker indenfra. Så jeg vil lige prøve at få en makker til at gøre det udefra her i weekenden
Avatar billede jens_bach Nybegynder
06. december 2005 - 15:43 #3
fik du det til og virke
Avatar billede _et Praktikant
25. december 2005 - 23:35 #4
Ja det var noget så latterligt, som min isp der have skiftet min ip.
Fra x.x.x.15 til x.x.x.16, og det havde jeg ikke lige fanget.

kast et svar, så deler vi i porten.
Avatar billede jens_bach Nybegynder
30. december 2005 - 22:49 #5
;)
Avatar billede Ny bruger Nybegynder

Din løsning...

Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.

Loading billede Opret Preview
Kategori
IT-kurser om Microsoft 365, sikkerhed, personlig vækst, udvikling, digital markedsføring, grafisk design, SAP og forretningsanalyse.

Log ind eller opret profil

Hov!

For at kunne deltage på Computerworld Eksperten skal du være logget ind.

Det er heldigvis nemt at oprette en bruger: Det tager to minutter og du kan vælge at bruge enten e-mail, Facebook eller Google som login.

Du kan også logge ind via nedenstående tjenester