<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 506E Access-list problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810046#M1003957</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, in your original post you said you wanted to ping from dmz to vlan 4. Which is what the statements I posted would allow. Does this part at least work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please post your entire config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 29 May 2007 17:01:41 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2007-05-29T17:01:41Z</dc:date>
    <item>
      <title>PIX 506E Access-list problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810043#M1003954</link>
      <description>&lt;P&gt;I configured a PIX 506E with two internal vlans.  One vlan is called DMZ and the other is called vlan4.  I want a device on vlan DMZ to ping a device on vlan4.  In order to make this possible, I needed to create an access.  However, I can not get my access-list to work correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a snapshot of my configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet1 vlan2 logical&lt;/P&gt;&lt;P&gt;interface ethernet1 vlan4 logical&lt;/P&gt;&lt;P&gt;nameif vlan4 vlan4 security4&lt;/P&gt;&lt;P&gt;nameif vlan2 dmz security50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list INTERNAL permit ip any 10.0.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list INTERNAL permit ip any 10.0.30.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list INTERNAL permit ip any any &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group INTERNAL in interface vlan4&lt;/P&gt;&lt;P&gt;access-group INTERNAL in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even with this access-list that permit ALL traffic, I am unable to ping one end from another.  The odd thing to me is that I do see matches after I try to ping an interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ccess-list cached ACL log flows: total 0, denied 0 (deny-flow-max 1024)&lt;/P&gt;&lt;P&gt;            alert-interval 300&lt;/P&gt;&lt;P&gt;access-list INTERNAL; 3 elements&lt;/P&gt;&lt;P&gt;access-list INTERNAL line 1 permit ip any 10.0.20.0 255.255.255.0 (hitcnt=8) &lt;/P&gt;&lt;P&gt;access-list INTERNAL line 2 permit ip any 10.0.30.0 255.255.255.0 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list INTERNAL line 3 permit ip any any (hitcnt=2) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there something I am forgetting to do in order to make the communication across two vlans possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:21:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810043#M1003954</guid>
      <dc:creator>jon.axe</dc:creator>
      <dc:date>2019-03-11T10:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506E Access-list problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810044#M1003955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need this as traffic from higher to lower security is allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-group INTERNAL in interface dmz &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add these to ping vlan4 from DMZ...&lt;/P&gt;&lt;P&gt;no access-group INTERNAL in interface vlan4 &lt;/P&gt;&lt;P&gt;access-list vlan4_in permit icmp any &lt;DMZ_NETWORK&gt; &lt;MASK&gt; echo-reply&lt;/MASK&gt;&lt;/DMZ_NETWORK&gt;&lt;/P&gt;&lt;P&gt;access-group vlan4 in interface vlan4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2007 14:48:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810044#M1003955</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-29T14:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506E Access-list problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810045#M1003956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've made the changes but it still does not work quite right.  If I ping from the Vlan4 network to the Vlan2 network I see the ping come across the PIX but the machine that orginated the the ping does not receive a return packet.  I believe this is due that each vlan is running PAT on the outside interface's IP address.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example I saw the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;36: ICMP echo-request from vlan4:10.0.30.2 to xxx.xxx.15.58 ID=512 seq=16896 length=40&lt;/P&gt;&lt;P&gt;37: ICMP echo-request: translating vlan4:10.0.30.2/512 to outside:xxx.xxx.15.52/2&lt;/P&gt;&lt;P&gt;38: ICMP echo-reply from outside:xxx.xxx.15.58 to xxx.xxx.15.52 ID=2 seq=16896 length=40&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you think PAT is preventing me from pinging 10.0.30.x to 10.0.20.x?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2007 16:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810045#M1003956</guid>
      <dc:creator>jon.axe</dc:creator>
      <dc:date>2007-05-29T16:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506E Access-list problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810046#M1003957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, in your original post you said you wanted to ping from dmz to vlan 4. Which is what the statements I posted would allow. Does this part at least work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please post your entire config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2007 17:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810046#M1003957</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-29T17:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506E Access-list problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810047#M1003958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Below is the config with the passwords and snmp info removed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 vlan2 logical&lt;/P&gt;&lt;P&gt;interface ethernet1 vlan4 logical&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif vlan2 dmz security50&lt;/P&gt;&lt;P&gt;nameif vlan4 vlan4 security4&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list vlan4_in permit icmp any 10.0.30.0 255.255.255.0 echo-reply&lt;/P&gt;&lt;P&gt;access-list vlan4_in permit icmp any 10.0.20.0 255.255.255.0 echo-reply&lt;/P&gt;&lt;P&gt;access-list vlan4_in permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;icmp permit any vlan4&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside xxx.xxx.15.52 255.255.255.128&lt;/P&gt;&lt;P&gt;no ip address inside&lt;/P&gt;&lt;P&gt;ip address dmz 10.0.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address vlan4 10.0.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (vlan4) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group vlan4_in in interface vlan4&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.15.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2007 17:18:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810047#M1003958</guid>
      <dc:creator>jon.axe</dc:creator>
      <dc:date>2007-05-29T17:18:01Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506E Access-list problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810048#M1003959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe PAT is causing my issue.  Is it possible for me to create an ACL statement that will block the use of NAT for traffic that flows directly from Vlan 2 to Vlan 4 and vice versa?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2007 19:10:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810048#M1003959</guid>
      <dc:creator>jon.axe</dc:creator>
      <dc:date>2007-05-30T19:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506E Access-list problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810049#M1003960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you ping from dmz to vlan4?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way your current acl is now, you would not be able to ping from .30 to .20. Just add this ace&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vlan4_in permit icmp any 10.0.20.0 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2007 19:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810049#M1003960</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-30T19:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506E Access-list problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810050#M1003961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still doesn't work and here is why:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;57: ICMP echo-request from dmz:10.0.20.2 to 10.0.30.2 ID=512 seq=2304 length=40&lt;/P&gt;&lt;P&gt;58: ICMP echo-request from vlan4:10.0.30.2 to xx.xx.36.248 ID=512 seq=2816 length=10&lt;/P&gt;&lt;P&gt;59: ICMP echo-request: translating vlan4:10.0.30.2/512 to outside:xx.xx.15.52/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to disable NAT when 10.0.20.2 pings 10.0.30.2 and vice versa but I'm having trouble writing an ACL that will do that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2007 16:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810050#M1003961</guid>
      <dc:creator>jon.axe</dc:creator>
      <dc:date>2007-05-31T16:50:21Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506E Access-list problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810051#M1003962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list nat0 permit ip host 10.0.20.2 host 10.0.30.2&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list nat0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2007 16:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810051#M1003962</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-31T16:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506E Access-list problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810052#M1003963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's the answer I was looking for.  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed the commands around a little bit but it works very well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat permit ip 10.0.20.0 255.255.255.0 10.0.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Specified what should be NAT'd in better detail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 1 10.0.20.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (vlan4) 1 10.0.30.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2007 18:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-list-problems/m-p/810052#M1003963</guid>
      <dc:creator>jon.axe</dc:creator>
      <dc:date>2007-05-31T18:08:14Z</dc:date>
    </item>
  </channel>
</rss>

