<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Pix 6.3 inbound access without &amp;quot;statics&amp;quot; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778750#M1005062</link>
    <description>&lt;P&gt;Having some difficulties with a pix 6.3&lt;/P&gt;&lt;P&gt;facing the task to provide inbound onnections from lower security interfaces to several network segments behind the Pix's inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure what my options are to provide translations for inbound connections without using static nat entries for every network. &lt;/P&gt;&lt;P&gt;Have read several posts overhere discussing the no nat-control feature, however as far as i know this is only applicable to Pix 7. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also tried using "Nat 0 access-list #" configurations but seems this won't eliminate the need to provide specific static entries for inside networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks for sharing your thoughts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 10:11:00 GMT</pubDate>
    <dc:creator>dkrijgsman</dc:creator>
    <dc:date>2019-03-11T10:11:00Z</dc:date>
    <item>
      <title>Cisco Pix 6.3 inbound access without "statics"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778750#M1005062</link>
      <description>&lt;P&gt;Having some difficulties with a pix 6.3&lt;/P&gt;&lt;P&gt;facing the task to provide inbound onnections from lower security interfaces to several network segments behind the Pix's inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure what my options are to provide translations for inbound connections without using static nat entries for every network. &lt;/P&gt;&lt;P&gt;Have read several posts overhere discussing the no nat-control feature, however as far as i know this is only applicable to Pix 7. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also tried using "Nat 0 access-list #" configurations but seems this won't eliminate the need to provide specific static entries for inside networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks for sharing your thoughts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778750#M1005062</guid>
      <dc:creator>dkrijgsman</dc:creator>
      <dc:date>2019-03-11T10:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 6.3 inbound access without "statics"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778751#M1005064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should be able to provide inbound access to internal networks without using static commands if following set of commands are used-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip any any&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These ACLs are currently opening IP access, so you may tighten this based on your requirements. Keep in mind that we are not translating internal networks to any different IP addresses, hence, outside hosts will use the real IP address of internal hosts to make inbound connections through PIX. Also, you will not see any translation entry in "show xlate" output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2007 19:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778751#M1005064</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-05-08T19:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 6.3 inbound access without "statics"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778752#M1005066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vibor &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this still apply if the connection is being made from the outside in ie the connection is initiated from the outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see how your commands above would allow internal clients not to be natted when they initiate connections out but not how the commands would allow connections to be initiated from outside to in. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2007 19:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778752#M1005066</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-05-08T19:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 6.3 inbound access without "statics"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778753#M1005070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this would allow inbound connections also, becuase nat exemtion or nat 0 with access-list is bidirectional like your static commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2007 19:51:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778753#M1005070</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-05-08T19:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 6.3 inbound access without "statics"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778754#M1005073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmmz, than i made the wrong assumptions, cause i was asking myself the same question as Jon. I did use a nat 0 access-list configuration, but i've put it on the outside interface, like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list test&lt;/P&gt;&lt;P&gt;access-list test permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i'll try to configure it on the inside and will test again. I've Tightened security with access-lists on all interfaces, so security after translation/exemption has been taken care off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so far&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2007 20:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778754#M1005073</guid>
      <dc:creator>dkrijgsman</dc:creator>
      <dc:date>2007-05-08T20:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 6.3 inbound access without "statics"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778755#M1005076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vibhor,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also found these explanations within the command reference:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/mr.htm#wp1163222" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/mr.htm#wp1163222&lt;/A&gt; is stating:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following example shows use of the nat 0 access-list command (NAT exemption) to permit internal host 10.1.1.15, which is accessible through the inside interface, to bypass NAT when connecting to outside host 10.2.1.3. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat permit ip host 10.1.1.15 host 10.2.1.3&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following commands use NAT exemption on a PIX Firewall with three interfaces: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list all-ip-packet permit ip 0 0 0 0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list all-ip-packet&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list all-ip-packet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would seem to me Jon has a point afterall. Let me test to verify things :-).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2007 20:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778755#M1005076</guid>
      <dc:creator>dkrijgsman</dc:creator>
      <dc:date>2007-05-08T20:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 6.3 inbound access without "statics"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778756#M1005079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No i don't have a point and Vibhor is spot on. I have just tested this in our lab and using Vibhor's commands it works as he stated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks Vibhor, i have been using Pix firewalls for a few years now and was not aware that this command was bi-directional. You live and learn ! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 05:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778756#M1005079</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-05-09T05:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 6.3 inbound access without "statics"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778757#M1005081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for verifying things.&lt;/P&gt;&lt;P&gt;Vibhor thanks for your great help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dennis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2007 07:17:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778757#M1005081</guid>
      <dc:creator>dkrijgsman</dc:creator>
      <dc:date>2007-05-09T07:17:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 6.3 inbound access without "statics"</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778758#M1005086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly Indicate for below scenario, Static necessary or not for Inbound Conncetion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not able to access my Inside Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside 192.168.1.3 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address inside 3.142.125.2 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no_nat_inside permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_acl permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_acl permit ip 192.168.1.0 255.255.255.0 host 192.168.1.102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_acl permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_acl permit ip 3.142.0.0 255.255.0.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no_nat_inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.102 3.142.125.10 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside_acl in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2007 11:47:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-3-inbound-access-without-quot-statics-quot/m-p/778758#M1005086</guid>
      <dc:creator>jahangeer_abdul</dc:creator>
      <dc:date>2007-05-11T11:47:33Z</dc:date>
    </item>
  </channel>
</rss>

