<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix 501Telnet Access From Wan Side in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501telnet-access-from-wan-side/m-p/809236#M1007844</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe that in order for the Pix 501 to allow a telnet session to the Outside interface, that the traffic be IPSEC protected.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the Pix 6.3 command reference guide, p404:  "The telnet command lets you specify which hosts can access the PIX Firewall console with Telnet. You can enable Telnet to the PIX Firewall on all interfaces. However, the PIX Firewall enforces that all Telnet traffic to the outside interface be IPSec protected. Therefore, to enable Telnet session to the outside interface, configure IPSec on the outside interface to include IP traffic generated by the PIX Firewall and enable Telnet on the outside interface."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since Telnet isn't secure, you might want to consider using SSH instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Carl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Apr 2007 13:59:47 GMT</pubDate>
    <dc:creator>1cmerchant</dc:creator>
    <dc:date>2007-04-09T13:59:47Z</dc:date>
    <item>
      <title>Pix 501Telnet Access From Wan Side</title>
      <link>https://community.cisco.com/t5/network-security/pix-501telnet-access-from-wan-side/m-p/809235#M1007841</link>
      <description>&lt;P&gt;I want to access my pix firewall from internet with telnet . In front of  my pix i have a modem.Modem has 192.168.2.1 and my pix wan interface has 192.168.2.2.I made port forwarding from my modem to pix for port 23 but it doesn't work.Here is my running-config. Thank for help.&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;hostname DesatDenizli&lt;/P&gt;&lt;P&gt;domain-name desat.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp any any eq pop3 &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp any any eq 3389 &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp any any eq 9080 &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit udp any any eq 110 &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit udp any any eq 25 &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit udp any any eq 3389 &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit udp any any eq 9080 &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit udp any any eq 443 &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.11 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.15 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.17 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.18 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.20 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.21 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.22 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.24 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.26 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.27 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.1.29 any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 192.168.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 192.168.1.22 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.x.x.2.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.22 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community netvizyon&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.10-192.168.1.100 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 213.243.1.40 213.243.1.42&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;[OK]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:57:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501telnet-access-from-wan-side/m-p/809235#M1007841</guid>
      <dc:creator>ufuk-guler</dc:creator>
      <dc:date>2019-03-11T09:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501Telnet Access From Wan Side</title>
      <link>https://community.cisco.com/t5/network-security/pix-501telnet-access-from-wan-side/m-p/809236#M1007844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe that in order for the Pix 501 to allow a telnet session to the Outside interface, that the traffic be IPSEC protected.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the Pix 6.3 command reference guide, p404:  "The telnet command lets you specify which hosts can access the PIX Firewall console with Telnet. You can enable Telnet to the PIX Firewall on all interfaces. However, the PIX Firewall enforces that all Telnet traffic to the outside interface be IPSec protected. Therefore, to enable Telnet session to the outside interface, configure IPSec on the outside interface to include IP traffic generated by the PIX Firewall and enable Telnet on the outside interface."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since Telnet isn't secure, you might want to consider using SSH instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Carl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2007 13:59:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501telnet-access-from-wan-side/m-p/809236#M1007844</guid>
      <dc:creator>1cmerchant</dc:creator>
      <dc:date>2007-04-09T13:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501Telnet Access From Wan Side</title>
      <link>https://community.cisco.com/t5/network-security/pix-501telnet-access-from-wan-side/m-p/809237#M1007845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is not possible unless is IPSec protected. Please check the link below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/tz.htm#wp1025921" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/tz.htm#wp1025921&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I recommend to use ssh instead, check the link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/s.htm#wp1026535" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/s.htm#wp1026535&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Franco Zamora&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2007 03:34:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501telnet-access-from-wan-side/m-p/809237#M1007845</guid>
      <dc:creator>fzamora</dc:creator>
      <dc:date>2007-04-10T03:34:50Z</dc:date>
    </item>
  </channel>
</rss>

