alias
Administer overlapping addresses with dual NAT. Also permits inside interface access to a DNS server
on a perimeter interface.
establish
Permit return connections on ports other than those used for the originating connection based on an
established connection.
outbound id except
Create an access list to control outbound connections.
static [used for inbound PAT]
Funnel inbound connections through a single IP address.
nat [( if_name )] 0 access-list acl_name
Associate an access list with network address translation (NAT).
If used only for VPN purposes, PDM parses and ignores this command. Note: When encountered in a
configuration, PDM will display a dialog box to specify its purpose. If used for non-VPN use or, mixed
with VPN and non-VPN use, Monitor Only mode will be entered.
Unsupported Command Combinations Causing Monitor Only Mode
:In addition, the following command combinations will cause PDM to enter the
Monitor Only mode
when detected in the configuration:
aaa command with the match option appearing in the configuration with other aaa commands that contain the include or exclude options.
For example, the following commands would not be parsed by PDM:
access-list 101 permit tcp any any
aaa authentication include http inside 1.1.1.1 255.255.255.255 0.0.0.0 0.0.0.0 portal
aaa accounting match 101 inside portal
You can fix this by changing aaa commands exclusively to either the match acl style or to the include/exclude style.
●
access-list—Certain combinations of access control lists are unsupported.
Combining the access-list and access-group command statements with conduit and/or outbound command statements. For example,
the following commands appearing anywhere in the configuration (not necessarily together) would not be parsed by PDM:
access-list 101 permit ip 172.21.3.0 255.255.0.0 172.22.2.0 255.255.0.0
access-group 101 in interface outside
conduit permit icmp any any
❍
Using an ACL (access control list) for multiple interfaces. For example, the access-list eng permit ip any server1 255.255.255.255
access-group eng in interface perim
access-group eng in interface outside
❍
Using an ACL name for multiple purposes such as in an access-group command statement and in an aaa command statement. For
example, the following commands would not be parsed by PDM:
access-list acl_out permit tcp 10.16.1.0 255.255.255.0 209.165.201.0 255.255.255.224
access-group acl_out in interface outside
aaa authentication match acl_out outside AuthIn
❍
In this example, the access-list command statement is applied to the outside interface by the access-group command. The same ACL
name cannot then be used by the aaa command statement. You can fix this example by creating an access-list command statement
without an accompanying access-group command statement and then applying that to the aaa command statement. For example:
access-list acl_out2 permit tcp 10.16.1.0 255.255.255.0 209.165.201.0 255.255.255.224
aaa authentication match acl_out2 outside AuthIn
Using an ACL for multiple purposes (such as authentication, authorization, or accounting). For example, the following command
statements cannot be parsed by PDM:
access-list acl_out2 permit tcp 10.16.1.0 255.255.255.0 209.165.201.0 255.255.255.224
aaa authentication match acl_out2 outside AuthIn
aaa authorization match acl_out2 outside AuthIn
❍
In this example, the access-list command statement is applied to the outside interface by the aaa authentication command. Using the
acl_out2 ACL name for both authentication and authorization cannot be parsed by PDM. You can fix this by creating another
access-list command statement the same as the first and applying that in the aaa authorization command. For example:
access-list acl_out2 permit tcp 10.16.1.0 255.255.255.0 209.165.201.0 255.255.255.224
access-list acl_out3 permit tcp 10.16.1.0 255.255.255.0 209.165.201.0 255.255.255.224
aaa authentication match acl_out2 outside AuthIn
aaa authorization match acl_out3 outside AuthIn
●
outbound
Any outbound command statement that contains the except option. In most cases, you should be able to rewrite the outbound
command statements using the permit or deny options to eliminate the use of the except option. Once the except option is replaced
with permit or deny, PDM functions normally.
❍
Applying an outbound command statement group to multiple interfaces. For example, the following would not be parsed by PDM:
❍
●
Summary of Contents for PIX 520 - PIX Firewall 520
Page 45: ...Copyright 2001 Cisco Systems Inc ...
Page 68: ...Copyright 2001 Cisco Systems Inc ...
Page 74: ...Copyright 2001 Cisco Systems Inc ...
Page 87: ...Copyright 2001 Cisco Systems Inc ...
Page 92: ...Copyright 2001 Cisco Systems Inc ...
Page 108: ......
Page 184: ......
Page 197: ...Copyright 2001 Cisco Systems Inc ...
Page 200: ......
Page 232: ...Copyright 2001 Cisco Systems Inc ...
Page 246: ...Copyright 2001 Cisco Systems Inc ...