<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Sentinel through pix 506 to Zyxel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786980#M1004098</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is configuration on my PIX:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5) &lt;/P&gt;&lt;P&gt;interface ethernet0 auto &lt;/P&gt;&lt;P&gt;interface ethernet1 auto &lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;hostname PIX &lt;/P&gt;&lt;P&gt;domain-name intranet.luceat.it &lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512 &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21 &lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720 &lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719 &lt;/P&gt;&lt;P&gt;fixup protocol http 80 &lt;/P&gt;&lt;P&gt;fixup protocol ils 389 &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514 &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554 &lt;/P&gt;&lt;P&gt;fixup protocol sip 5060 &lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060 &lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000 &lt;/P&gt;&lt;P&gt;fixup protocol smtp 25 &lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521 &lt;/P&gt;&lt;P&gt;fixup protocol tftp 69 &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list nonat permit ip any 10.0.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat permit ip any 10.0.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat permit ip any 10.0.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;ip address outside xx.xx.xx.xx 255.255.255.248 &lt;/P&gt;&lt;P&gt;ip address inside 192.168.2.101 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip audit info action alarm &lt;/P&gt;&lt;P&gt;ip audit attack action alarm &lt;/P&gt;&lt;P&gt;ip local pool Networking 10.0.1.1-10.0.1.10 &lt;/P&gt;&lt;P&gt;ip local pool Mobile 10.0.2.1-10.0.2.10 &lt;/P&gt;&lt;P&gt;ip local pool Comm 10.0.3.1-10.0.3.10 &lt;/P&gt;&lt;P&gt;pdm location 192.168.2.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;pdm location 10.0.1.0 255.255.255.0 outside &lt;/P&gt;&lt;P&gt;pdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xx.zz 1 &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 &lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 &lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;http server enable &lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;http 10.0.1.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community public &lt;/P&gt;&lt;P&gt;no snmp-server enable traps &lt;/P&gt;&lt;P&gt;floodguard enable &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRSET esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set TRSET &lt;/P&gt;&lt;P&gt;crypto map VPN 10 ipsec-isakmp dynamic dynmap &lt;/P&gt;&lt;P&gt;crypto map VPN interface outside &lt;/P&gt;&lt;P&gt;isakmp enable outside &lt;/P&gt;&lt;P&gt;isakmp identity address &lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20 &lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des &lt;/P&gt;&lt;P&gt;isakmp policy 10 hash sha &lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2 &lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400 &lt;/P&gt;&lt;P&gt;vpngroup Networking address-pool ONE &lt;/P&gt;&lt;P&gt;vpngroup Networking dns-server 192.168.2.1 &lt;/P&gt;&lt;P&gt;vpngroup Networking wins-server 192.168.2.1 &lt;/P&gt;&lt;P&gt;vpngroup Networking default-domain intranet &lt;/P&gt;&lt;P&gt;vpngroup Networking idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup Networking password ZZZZZZZZZZZZZZZZZZZ &lt;/P&gt;&lt;P&gt;vpngroup Mobile address-pool TWO &lt;/P&gt;&lt;P&gt;vpngroup Mobile dns-server 192.168.2.2 &lt;/P&gt;&lt;P&gt;vpngroup Mobile wins-server 192.168.2.2 &lt;/P&gt;&lt;P&gt;vpngroup Mobile default-domain intranet &lt;/P&gt;&lt;P&gt;vpngroup Mobile idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup Mobile password XXXXXXXXXXXXXXXXXX &lt;/P&gt;&lt;P&gt;vpngroup Comm address-pool THREE &lt;/P&gt;&lt;P&gt;vpngroup Comm dns-server 192.168.2.2 &lt;/P&gt;&lt;P&gt;vpngroup Comm wins-server 192.168.2.2 &lt;/P&gt;&lt;P&gt;vpngroup Comm default-domain intranet &lt;/P&gt;&lt;P&gt;vpngroup Comm idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup Comm password WWWWWWWWWWW &lt;/P&gt;&lt;P&gt;telnet 192.168.2.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;telnet timeout 5 &lt;/P&gt;&lt;P&gt;ssh timeout 5 &lt;/P&gt;&lt;P&gt;management-access inside &lt;/P&gt;&lt;P&gt;console timeout 0 &lt;/P&gt;&lt;P&gt;terminal width 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea or solution???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 May 2007 18:30:41 GMT</pubDate>
    <dc:creator>sgozio</dc:creator>
    <dc:date>2007-05-24T18:30:41Z</dc:date>
    <item>
      <title>SSH Sentinel through pix 506 to Zyxel</title>
      <link>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786979#M1004096</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have one PIX 506e, on inside lan there is one PC client, on this client there is SSH Sentinel VPN Client software for connect this PC to a Remote lan protected by Zyxel Router/firewall.&lt;/P&gt;&lt;P&gt;When I activate Sentinel software,&lt;/P&gt;&lt;P&gt;VPN Tunnel goes ON but the taffic doesn't work, for example is not possible to ping any host.&lt;/P&gt;&lt;P&gt;If I remove PIX 506 and I connect PC directly to the Router, VPN Tunnel goes ON and any host of remote Lan respond to Ping. Zyxel support suggest to verify Port 500 and port 68.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:20:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786979#M1004096</guid>
      <dc:creator>sgozio</dc:creator>
      <dc:date>2019-03-11T10:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Sentinel through pix 506 to Zyxel</title>
      <link>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786980#M1004098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is configuration on my PIX:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5) &lt;/P&gt;&lt;P&gt;interface ethernet0 auto &lt;/P&gt;&lt;P&gt;interface ethernet1 auto &lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;hostname PIX &lt;/P&gt;&lt;P&gt;domain-name intranet.luceat.it &lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512 &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21 &lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720 &lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719 &lt;/P&gt;&lt;P&gt;fixup protocol http 80 &lt;/P&gt;&lt;P&gt;fixup protocol ils 389 &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514 &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554 &lt;/P&gt;&lt;P&gt;fixup protocol sip 5060 &lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060 &lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000 &lt;/P&gt;&lt;P&gt;fixup protocol smtp 25 &lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521 &lt;/P&gt;&lt;P&gt;fixup protocol tftp 69 &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list nonat permit ip any 10.0.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat permit ip any 10.0.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat permit ip any 10.0.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;ip address outside xx.xx.xx.xx 255.255.255.248 &lt;/P&gt;&lt;P&gt;ip address inside 192.168.2.101 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip audit info action alarm &lt;/P&gt;&lt;P&gt;ip audit attack action alarm &lt;/P&gt;&lt;P&gt;ip local pool Networking 10.0.1.1-10.0.1.10 &lt;/P&gt;&lt;P&gt;ip local pool Mobile 10.0.2.1-10.0.2.10 &lt;/P&gt;&lt;P&gt;ip local pool Comm 10.0.3.1-10.0.3.10 &lt;/P&gt;&lt;P&gt;pdm location 192.168.2.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;pdm location 10.0.1.0 255.255.255.0 outside &lt;/P&gt;&lt;P&gt;pdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xx.zz 1 &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 &lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 &lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;http server enable &lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;http 10.0.1.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community public &lt;/P&gt;&lt;P&gt;no snmp-server enable traps &lt;/P&gt;&lt;P&gt;floodguard enable &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRSET esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set TRSET &lt;/P&gt;&lt;P&gt;crypto map VPN 10 ipsec-isakmp dynamic dynmap &lt;/P&gt;&lt;P&gt;crypto map VPN interface outside &lt;/P&gt;&lt;P&gt;isakmp enable outside &lt;/P&gt;&lt;P&gt;isakmp identity address &lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20 &lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des &lt;/P&gt;&lt;P&gt;isakmp policy 10 hash sha &lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2 &lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400 &lt;/P&gt;&lt;P&gt;vpngroup Networking address-pool ONE &lt;/P&gt;&lt;P&gt;vpngroup Networking dns-server 192.168.2.1 &lt;/P&gt;&lt;P&gt;vpngroup Networking wins-server 192.168.2.1 &lt;/P&gt;&lt;P&gt;vpngroup Networking default-domain intranet &lt;/P&gt;&lt;P&gt;vpngroup Networking idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup Networking password ZZZZZZZZZZZZZZZZZZZ &lt;/P&gt;&lt;P&gt;vpngroup Mobile address-pool TWO &lt;/P&gt;&lt;P&gt;vpngroup Mobile dns-server 192.168.2.2 &lt;/P&gt;&lt;P&gt;vpngroup Mobile wins-server 192.168.2.2 &lt;/P&gt;&lt;P&gt;vpngroup Mobile default-domain intranet &lt;/P&gt;&lt;P&gt;vpngroup Mobile idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup Mobile password XXXXXXXXXXXXXXXXXX &lt;/P&gt;&lt;P&gt;vpngroup Comm address-pool THREE &lt;/P&gt;&lt;P&gt;vpngroup Comm dns-server 192.168.2.2 &lt;/P&gt;&lt;P&gt;vpngroup Comm wins-server 192.168.2.2 &lt;/P&gt;&lt;P&gt;vpngroup Comm default-domain intranet &lt;/P&gt;&lt;P&gt;vpngroup Comm idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup Comm password WWWWWWWWWWW &lt;/P&gt;&lt;P&gt;telnet 192.168.2.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;telnet timeout 5 &lt;/P&gt;&lt;P&gt;ssh timeout 5 &lt;/P&gt;&lt;P&gt;management-access inside &lt;/P&gt;&lt;P&gt;console timeout 0 &lt;/P&gt;&lt;P&gt;terminal width 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea or solution???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 18:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786980#M1004098</guid>
      <dc:creator>sgozio</dc:creator>
      <dc:date>2007-05-24T18:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Sentinel through pix 506 to Zyxel</title>
      <link>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786981#M1004100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update:&lt;/P&gt;&lt;P&gt;I enable log and find this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;305006: portmap translation creation failed for protocol 50 src inside:192.168.2.169 dst outside:88.xx.123.zz &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2007 07:18:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786981#M1004100</guid>
      <dc:creator>sgozio</dc:creator>
      <dc:date>2007-05-25T07:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Sentinel through pix 506 to Zyxel</title>
      <link>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786982#M1004102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please help me...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2007 12:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786982#M1004102</guid>
      <dc:creator>sgozio</dc:creator>
      <dc:date>2007-05-25T12:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Sentinel through pix 506 to Zyxel</title>
      <link>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786983#M1004104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ensure the vpn client and remote endpoint support nat-traversal. If they do not, you must disable nat-t on your pix and enable fixup protocol esp-ike. This would allow for 1 connection and 1 connection only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no isakmp nat-traversal&lt;/P&gt;&lt;P&gt;fixup protocol esp-ike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2007 12:57:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-sentinel-through-pix-506-to-zyxel/m-p/786983#M1004104</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-25T12:57:57Z</dc:date>
    </item>
  </channel>
</rss>

