Scenario Configuring a Cisco PIX Firewall for NAT

The following configuration is installed on a PIX 520. Users from the inside network report to you that they cannot browse the Internet. What is the problem, and what command or commands will rectify the problem?

pix# write terminal nameif ethernet0 outside security0 nameif ethernet1 inside security100 hostname pix fixup protocol ftp 21 fixup protocol http 80 fixup protocol smtp 25 fixup protocol h323 1720 fixup protocol rsh 514 fixup protocol sqlnet 1521

logging timestamp no logging standby logging console debugging no logging monitor logging buffered debugging no logging trap logging facility 20 logging queue 512 interface ethernet0 10full interface ethernet1 10full mtu outside 1500 mtu inside 1500 ip address inside ip address outside route inside route outside no failover failover timeout 0:00:00 failover ip address outside failover ip address inside arp timeout 14400 global (outside) 1 netmask no rip outside passive no rip outside default no rip inside passive no rip inside default timeout xlate 3:00:00 conn 1:00:00 half-closed 0:10:00 udp 0:02:00 timeout rpc 0:10:00 h323 0:05:00 timeout uauth 0:00:00 absolute no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps telnet timeout 5 terminal width 80 : end

0 0

Post a comment