<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Redirect web trafic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747794#M1008903</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First excuse my bad english.&lt;/P&gt;&lt;P&gt;I've a problem. I want redirect external web trafic to my web server on lan (inside). I test configuration with privates IP (see below my basic configuration). My web server is ok but that's not work, impossible to join web server from any computer on outside side.&lt;/P&gt;&lt;P&gt;I forgot something, but what ????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JLE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 7.2(2)14 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname pix&lt;/P&gt;&lt;P&gt;domain-name test.com&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.1.240 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name test.be&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any eq www host 192.168.2.2 eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (inside) 2 192.168.2.2 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 0.0.0.0 www 192.168.2.2 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.10 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.2.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect http &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:53:08 GMT</pubDate>
    <dc:creator>tagadapouette</dc:creator>
    <dc:date>2019-03-11T09:53:08Z</dc:date>
    <item>
      <title>Redirect web trafic</title>
      <link>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747794#M1008903</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First excuse my bad english.&lt;/P&gt;&lt;P&gt;I've a problem. I want redirect external web trafic to my web server on lan (inside). I test configuration with privates IP (see below my basic configuration). My web server is ok but that's not work, impossible to join web server from any computer on outside side.&lt;/P&gt;&lt;P&gt;I forgot something, but what ????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JLE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 7.2(2)14 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname pix&lt;/P&gt;&lt;P&gt;domain-name test.com&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.1.240 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name test.be&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any eq www host 192.168.2.2 eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (inside) 2 192.168.2.2 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 0.0.0.0 www 192.168.2.2 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.10 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.2.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect http &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:53:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747794#M1008903</guid>
      <dc:creator>tagadapouette</dc:creator>
      <dc:date>2019-03-11T09:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect web trafic</title>
      <link>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747795#M1008911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you mean you want your web server to be reachable via the Outside IP of your PIX?  If so, you need to modify both your ACL and your static statements to read:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq www&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.2.2 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2007 17:53:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747795#M1008911</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-03-28T17:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect web trafic</title>
      <link>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747796#M1008917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey there ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure what is the private IP address of the webserver (it seems 192.168.2.2 though) and what is the public address from which it will be accessed. For now, please implement following commands-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear config static&lt;/P&gt;&lt;P&gt;no access-group outside_access_in in interface outside &lt;/P&gt;&lt;P&gt;clear config access-list outside_access_in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, as I'm not aware of the IP address which will be used by the outside hosts to access the server, I'll assume that outside hosts will use x.x.x.x to access the web server and the private IP address of web server is 192.168.2.2. For this scenario, commands would be-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 192.168.2.2&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host x.x.x.x eq 80&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are looking to use the IP address on outside interface of PIX to access the internal webserver, the command set would be-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 80 192.168.2.2 80&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any interface outside eq 80&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. Let me know how this goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2007 17:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747796#M1008917</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-03-28T17:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect web trafic</title>
      <link>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747797#M1008925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your users would ring ya phone bell crazy once you do a cl xlate..so better watch it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cl xlate loc 192.168.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the above would not cl the entire xlate entries&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2007 18:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747797#M1008925</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2007-03-28T18:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect web trafic</title>
      <link>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747798#M1008931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks all for your replies. &lt;/P&gt;&lt;P&gt;Yes, IP of my web server is 192.168.2.2&lt;/P&gt;&lt;P&gt;Yes I want my web server to be reachable via the outside IP of my PIX.&lt;/P&gt;&lt;P&gt;I'll try all your suggestions tomorow (it's too late : 20h45 in Belgium. Not enough time in a day)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps another question: I want to configure VPN access (for Windows vpn client) with PPTP (no longer exists?) or L2TP. I used the wizard, but one more time it's impossible to make a vpn connection. Have you a link with step by step guide?&lt;/P&gt;&lt;P&gt;Sorry, it' my first firewall and that's not realy easy to configure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JLE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2007 19:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747798#M1008931</guid>
      <dc:creator>tagadapouette</dc:creator>
      <dc:date>2007-03-28T19:04:18Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect web trafic</title>
      <link>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747799#M1008939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if there is one single PPTP  client trying to go outside then use following commands :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy &lt;/P&gt;&lt;P&gt;class inspection_default &lt;/P&gt;&lt;P&gt;inspect pptp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;see if it helps &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2007 19:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747799#M1008939</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2007-03-28T19:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect web trafic</title>
      <link>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747800#M1008944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a link which should be helpful-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring the Cisco Secure PIX Firewall to Use PPTP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a0080143a5d.shtml" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a0080143a5d.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2007 19:18:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747800#M1008944</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-03-28T19:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect web trafic</title>
      <link>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747801#M1008950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PPTP termination on the PIX is not available starting with version 7.0.  It is available in versions 6.3 and lower.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PPTP over IPSec is available.  See the following TAC doc for configuration steps:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807213a7.shtml" target="_blank"&gt;http://cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807213a7.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2007 19:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747801#M1008950</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-03-28T19:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: Redirect web trafic</title>
      <link>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747802#M1008956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great all is ok now!!&lt;/P&gt;&lt;P&gt;Thanks to all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JLE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2007 12:24:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/redirect-web-trafic/m-p/747802#M1008956</guid>
      <dc:creator>tagadapouette</dc:creator>
      <dc:date>2007-03-29T12:24:29Z</dc:date>
    </item>
  </channel>
</rss>

