1
0
mirror of https://github.com/fwbuilder/fwbuilder synced 2026-03-20 02:07:23 +01:00
fwbuilder/test/pix/firewall23.fw.orig
Vadim Kurland 4d6302a4cc * CompilerDriver_pix_run.cpp (pixNetworkZoneChecks): see SF bug
3213019 "FWSM Network zone and IPv6". Currently we do not support
ipv6 with PIX/ASA and FWSM. If user creates a group to be used as
network zone object and places ipv6 address in it, this address
should be ignored while compiling the policy but this should not
be an error.
2011-04-07 11:05:46 -07:00

127 lines
2.2 KiB
Plaintext
Executable File

!
! This is automatically generated file. DO NOT MODIFY !
!
! Firewall Builder fwb_pix v4.2.0.3519
!
! Generated Thu Apr 7 10:50:16 2011 PDT by vadim
!
! Compiled for pix 6.3
! Outbound ACLs: not supported
! Emulate outbound ACLs: yes
! Generating outbound ACLs: no
! Assume firewall is part of any: yes
!
!# files: * firewall23.fw
!
! lots of different combinations of objects in the NAT rules
! User sets inbound and outbound interfaces in NAT rules
!
! Prolog script:
!
!
! End of prolog script:
!
nameif ethernet0 inside security100
nameif ethernet1 outside security0
nameif ethernet2 dmz security50
no logging buffered
no logging console
no logging timestamp
no logging on
telnet timeout 5
clear ssh
aaa authentication ssh console LOCAL
ssh timeout 5
clear snmp-server
no snmp-server enable traps
clear ntp
no service resetinbound
no service resetoutside
no sysopt connection timewait
no sysopt nodnsalias inbound
no sysopt nodnsalias outbound
floodguard disable
clear xlate
clear static
clear global
clear nat
!################
!
! Rule 0 (NAT)
global (outside) 1 interface
access-list id1641246X21763.0 permit ip 192.168.1.0 255.255.255.0 any
global (dmz) 1 interface
!
!
! Rule 1 (NAT)
!
global (outside) 1 interface
!
!
! Rule 2 (NAT)
!
!
!
! Rule 3 (NAT)
!
!
global (dmz) 1 interface
!
!
!
! Rule 4 (NAT)
access-list id626114X21763.0 permit ip 192.168.1.0 255.255.255.0 any
nat (outside) 1 access-list id626114X21763.0 0 0
!
!
! Rule 5 (NAT)
access-list id36895X21071.0 permit tcp host 192.168.1.1 eq 6667 any
static (inside,outside) tcp interface 6667 access-list id36895X21071.0 0 0
!
! Rule 6 (NAT)
access-list id36809X21071.0 permit tcp host 192.168.1.10 eq 6667 any
!
! Rule 7 (NAT)
access-list id36809X21071.0 permit tcp host 192.168.1.10 eq 6667 any
!
! Rule 8 (NAT)
access-list id36809X21071.0 permit tcp host 192.168.1.10 eq 6667 any
static (inside,outside) tcp interface 6667 access-list id36809X21071.0 0 0
access-list id1641340X21763.1 permit tcp host 192.168.1.10 eq 6667 any
static (inside,dmz) tcp interface 6667 access-list id1641340X21763.1 0 0
!
! Epilog script:
!
! End of epilog script:
!