- •Icons Used in This Book
- •Network Security
- •Vulnerabilities
- •Threats
- •Types of Attacks
- •Network Security Policy
- •AVVID and SAFE
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Firewall Technologies
- •Cisco PIX Firewall
- •Foundation Summary
- •The Cisco Secure PIX Firewall
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of the Cisco PIX Firewall
- •Cisco PIX Firewall Models and Features
- •Foundation Summary
- •System Maintenance
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Accessing the Cisco PIX Firewall
- •Installing a New Operating System
- •Upgrading the Cisco PIX OS
- •Creating a Boothelper Diskette Using a Windows PC
- •Auto Update Support
- •Password Recovery
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How the PIX Firewall Handles Traffic
- •Address Translation
- •Translation Versus Connection
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Access Modes
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •TurboACL
- •Object Grouping
- •Advanced Protocol Handling
- •Foundation Summary
- •Syslog
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How Syslog Works
- •How Log Messages Are Organized
- •How to Read System Log Messages
- •Disabling Syslog Messages
- •Foundation Summary
- •Cisco PIX Firewall Failover
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •What Causes a Failover Event
- •What Is Required for a Failover Configuration
- •Failover Monitoring
- •Stateful Failover
- •LAN-Based Failover
- •Foundation Summary
- •Virtual Private Networks
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of VPN Technologies
- •Cisco VPN Client
- •PPPoE Support
- •Foundation Summary
- •Scenario
- •Completed PIX Configurations
- •PIX Device Manager
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •PDM Overview
- •PIX Firewall Requirements to Run PDM
- •Foundation Summary
- •Content Filtering with the Cisco PIX Firewall
- •“Do I Know This Already?” Quiz
- •Filtering Java Applets
- •Filtering ActiveX Objects
- •Filtering URLs
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of AAA and the Cisco PIX Firewall
- •Cisco Secure Access Control Server (CSACS)
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Specifying Your AAA Servers
- •Troubleshooting Your AAA Setup
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Multimedia Support on the Cisco PIX Firewall
- •Attack Guards
- •PIX Firewall’s Intrusion Detection Feature
- •ip verify reverse-path Command
- •Foundation Summary
- •Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
- •Chapter 1
- •Chapter 2
- •Chapter 3
- •Chapter 4
- •Chapter 5
- •Chapter 6
- •Chapter 7
- •Chapter 8
- •Chapter 9
- •Chapter 10
- •Chapter 11
- •Chapter 12
- •Chapter 13
- •Chapter 14
- •Chapter 15
- •Appendix B
- •What’s Wrong with This Picture?
Translation Versus Connection 79
Bidirectional Network Address Translation
Cisco PIX Firewall software version 6.2 allows NAT of external source IP addresses for packets traveling from the outside interface to an inside interface. All the functionality available with traditional nat, pat, and static commands is available bidirectionally.
Translation Versus Connection
A single user on a workstation located on the internal network is connecting to his webbased e-mail, making an online stock purchase, researching a new software package that he intends to buy, and backing up a database at a remote branch office. How many connections does he have going from his workstation? It is difficult to tell, because many of these tasks require multiple connections between the source and destination. How many translated sessions does he have going? One.
Most configurations create a single translated session, and from that session the user can create multiple connections. It is possible to create multiple translated sessions. This normally occurs when the internal node is accessing resources via different network segments all attached to the firewall (such as outside, DMZ1, DMZ2, and so on).
Translation occurs at the network layer (Layer 3) of the OSI model and deals only with packets. Connections, however, deal with the transport layer (Layer 4). Therefore, connections can be considered a subset of a single translation. It is possible to troubleshoot both translation and connection issues. It is recommended that you verify translation before attempting to troubleshoot a connection problem, because the connection cannot be established if the translation has not occurred.
The command used to troubleshoot translations is xlate. You can see the translation table by using the command show xlate, or you can clear the table with clear xlate. Any time you make a change to the translation table, it is a good idea to clear xlate. This forces the translation slots to drop, and the Cisco PIX Firewall rebuilds the translation table. If you do not run the clear xlate command, the system does not drop the translation slots until they time out, which is 3 hours by default. The following commands can make a change to the translation table:
•nat
•global
•static
•route
•alias
•conduit
80 Chapter 5: Understanding Cisco PIX Firewall Translation and Connections
Table 5-2 documents the options and arguments that come into play with the show xlate and clear xlate commands.
Table 5-2 |
show/clear xlate Command Options |
|
|
|
|
|
|
|
Command Option |
Description |
|
|
|
|
|
|
detail |
|
If specified, displays the translation type and |
|
|
|
interface information. |
|
|
|
|
|
[global | local ip1[-ip2] [netmask mask] |
Displays active translations by global IP address or |
|
|
|
|
local IP address using the network mask to qualify |
|
|
|
the IP address. |
|
|
|
|
|
interface if1 [,if2] [,ifn] |
Displays active translations by interface. |
|
|
|
|
|
|
lport | gport port [-port] |
Displays active translations by local and global |
|
|
|
|
ports. |
|
|
|
|
|
state |
|
Displays active translations by state (use the |
|
|
|
translation flags listed in Table 5-3). |
Table 5-3 |
|
|
|
Translation Flags |
|
||
|
|
|
|
|
Flag |
Description |
|
|
|
|
|
|
s |
Static translation slot |
|
|
|
|
|
|
d |
Dumps the translation slot on the next cleaning cycle |
|
|
|
|
|
|
r |
Port map translation (PAT) |
|
|
|
|
|
|
n |
No randomization of TCP sequence number |
|
|
|
|
|
|
o |
Outside address translations |
|
|
|
|
|
|
i |
Inside address translations |
|
|
|
|
|
|
D |
DNS A RR rewrite |
|
|
|
|
|
|
I |
Identity translation from nat0 |
|
|
|
|
|
If you cannot clear xlate, it is possible (but not preferred) to clear the translation table by doing a reload, or by rebooting the PIX.
The command used to troubleshoot connections is show conn. This command displays the number and status of all active TCP connections for the specific options selected. Table 5- 4 lists the many options for the show conn command.
|
|
|
Translation Versus Connection 81 |
|
|
|
|
Table 5-4 |
show conn Command Options |
|
|
|
|
|
|
|
Command Option |
Description |
|
|
|
|
|
|
count |
|
Displays the number of used connections (its |
|
|
|
accuracy depends on the volume and type of traffic). |
|
|
|
|
|
detail |
|
Displays the specified translation type and interface |
|
|
|
information. |
|
|
|
|
|
foreign | local ip [-ip2] netmask mask |
Displays active connections by foreign or local IP |
|
|
|
|
address and qualifies connections by network mask. |
|
|
|
|
|
fport | lport port1 [-port2] |
Displays foreign or local active connections by port. |
|
|
|
|
|
|
protocol tcp | udp | protocol |
Displays active connections by protocol type. |
|
|
|
|
|
|
state |
|
Displays active connections by their current state |
|
|
|
(see Table 5-5). |
Table 5-5 |
|
|
|
Connection Flags |
|
||
|
|
|
|
|
Flag |
Description |
|
|
|
|
|
|
U |
Up |
|
|
|
|
|
|
f |
Inside FIN |
|
|
|
|
|
|
F |
Outside FIN |
|
|
|
|
|
|
r |
Inside acknowledged FIN |
|
|
|
|
|
|
R |
Outside acknowledged FIN |
|
|
|
|
|
|
s |
Awaiting outside SYN |
|
|
|
|
|
|
S |
Awaiting inside SYN |
|
|
|
|
|
|
M |
SMTP data |
|
|
|
|
|
|
T |
TCP SIP connection |
|
|
|
|
|
|
I |
Inbound data |
|
|
|
|
|
|
O |
Outbound data |
|
|
|
|
|
|
q |
SQL*Net data |
|
|
|
|
|
|
d |
Dump |
|
|
|
|
|
|
P |
Inside back connection |
|
|
|
|
|
|
E |
Outside back connection |
|
|
|
|
|
|
G |
Group |
|
|
|
|
|
|
a |
Awaiting outside ACK to SYN |
|
|
|
|
|
|
A |
Awaiting inside ACK to SYN |
|
|
|
|
|
|
B |
Initial SYN from outside |
|
continues
82 Chapter 5: Understanding Cisco PIX Firewall Translation and Connections
Table 5-5 Connection Flags (Continued)
Flag |
Description |
R |
RPC |
|
|
H |
H.323 |
|
|
T |
UDP SIP connection |
|
|
m |
SIP media connection |
|
|
t |
SIP transient connection |
|
|
D |
DNS |
|
|
Configuring DNS Support
It is not necessary to configure DNS support on the Cisco PIX Firewall. By default, the PIX identifies each outbound DNS request and allows only a single response to that request. The internal host can query several DNS servers for a response, and the PIX allows the outbound queries. However, the PIX allows only the first response to pass through the firewall. All subsequent responses to the original query are dropped.