<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port forwarding SSL on my PIX 501 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744276#M1021977</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am back attempting to resolve my problem ? here is what I have done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have isolated my SSL issue by using my Lab PIX.  I notice that in a lab setting I can connect to my SSL Concentrator.  Which is accomplished with a wireless hub with a public IP on the outside (&amp;amp; Internet Access) and my internal network on the inside (172 network).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, when I have someone attempt to connect from outside the office (and on the Internet somewhere)?there connection times out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my ACL:&lt;/P&gt;&lt;P&gt;hufcor2# sh access-list&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)&lt;/P&gt;&lt;P&gt;            alert-interval 300&lt;/P&gt;&lt;P&gt;access-list 101; 1 elements&lt;/P&gt;&lt;P&gt;access-list 101 line 1 permit tcp any interface outside eq https (hitcnt=2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I blocking?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Jun 2007 19:35:17 GMT</pubDate>
    <dc:creator>hufcor</dc:creator>
    <dc:date>2007-06-27T19:35:17Z</dc:date>
    <item>
      <title>Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744265#M1021959</link>
      <description>&lt;P&gt;I am attempting to configure my PIX 501 to port forward SSL traffic from the Internet to my SSL Concentrator located inside my network ? which has an address of 172.20.1.201&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the PIX, I entered the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (inside,outside) tcp interface 443 172.20.1.201 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I set my ACL to ?any any? to see if that was the cause ? however ? I still cannot make the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I resolve this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744265#M1021959</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2019-03-11T10:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744266#M1021960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need following commands in your configuration-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (inside,outside) tcp interface 443 172.20.1.201 443 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outin permit tcp any interface outside eq 443&lt;/P&gt;&lt;P&gt;access-group outin in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**You may replace "outin" with access-list applied on outside interface in your configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if you already have these commands in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If yes, do you see "hitcnt" incrementing if you use-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show access-list outin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to access concentrator locally, from 172.20.x.x subnet ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2007 22:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744266#M1021960</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-06-19T22:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744267#M1021962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No luck,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From my browser ? I receive a message stating it timed out.  Here is what my current ACL looks like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)&lt;/P&gt;&lt;P&gt;            alert-interval 300&lt;/P&gt;&lt;P&gt;access-list noNAT; 1 elements&lt;/P&gt;&lt;P&gt;access-list noNAT line 1 permit ip any any (hitcnt=0)&lt;/P&gt;&lt;P&gt;access-list 101; 1 elements&lt;/P&gt;&lt;P&gt;access-list 101 line 1 permit ip any any (hitcnt=0)&lt;/P&gt;&lt;P&gt;access-list 101 line 2 permit tcp any interface outside eq https (hitcnt=0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had NAT turned off because I had issue back when I set up my VPN connections.  It has been working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Leo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jun 2007 00:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744267#M1021962</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2007-06-20T00:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744268#M1021963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am still attempting to resolve my connectivity issue.  Below is what my current ACL?s look like.  I mentioned in my previous posting that I use the PIX solely for VPN connections (and it works).  However, I currently have the need to bring in my SSL Concentrator ? but ? I cannot connect to the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had someone assist me with the VPN connection (a few years ago) and now reviewing my ACL?s, I thing my ?noNAT? statement is causing issues.  But, I don?t want to trade one problem for another (meaning my VPN currently works).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your assistance would be greatly appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)&lt;/P&gt;&lt;P&gt;            alert-interval 300&lt;/P&gt;&lt;P&gt;access-list noNAT; 1 elements&lt;/P&gt;&lt;P&gt;access-list noNAT line 1 permit ip any any (hitcnt=0)&lt;/P&gt;&lt;P&gt;access-list 101; 1 elements&lt;/P&gt;&lt;P&gt;access-list 101 line 1 permit ip any any (hitcnt=0)&lt;/P&gt;&lt;P&gt;access-list 101 line 2 permit tcp any interface outside eq https (hitcnt=0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jun 2007 21:12:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744268#M1021963</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2007-06-21T21:12:19Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744269#M1021966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you doing &lt;A class="jive-link-custom" href="https://" target="_blank"&gt;https://&lt;/A&gt; 172.20.1.201 or &lt;A class="jive-link-custom" href="https://pix.outside.interface.ip" target="_blank"&gt;https://pix.outside.interface.ip&lt;/A&gt; ? Which do you want to do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your noNAT acl is likely the problem here. Is there a reason you need it to be any any? With that exemption in place the static will not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could simple make it like this instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list noNAT permit ip any &lt;REMOTE.VPN.SUBNET&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/REMOTE.VPN.SUBNET&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jun 2007 22:08:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744269#M1021966</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-21T22:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744270#M1021967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I reduced my ACL to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall(config)# sh access-list&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)&lt;/P&gt;&lt;P&gt;            alert-interval 300&lt;/P&gt;&lt;P&gt;access-list 101; 1 elements&lt;/P&gt;&lt;P&gt;access-list 101 line 1 permit tcp any interface outside eq https (hitcnt=0)&lt;/P&gt;&lt;P&gt;pixfirewall(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From outside the network ? I attempted to communicate with my SSL by typing:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://" target="_blank"&gt;https://&lt;/A&gt;&lt;PUBLIC ip=""&gt; - My browser returns the message ?The connection has timed out?.&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I just attempted to connect via the inside port (using &lt;A class="jive-link-custom" href="https://172.1.20.201" target="_blank"&gt;https://172.1.20.201&lt;/A&gt;).  This address takes me to the PDM (PIX Device Manager).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jun 2007 23:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744270#M1021967</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2007-06-21T23:23:54Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744271#M1021969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi   ..  can you post you configuration removing any sensitive info ..  that would help in providing you with the help you need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2007 00:14:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744271#M1021969</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2007-06-22T00:14:09Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744272#M1021971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is basically what it looks like.  I went back and added my original ACL?s (Prior to this afternoons edits) and make my VPN functional.  However, now that is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall(config)# sh run&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name mydomain.com&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any interface outside eq https&lt;/P&gt;&lt;P&gt;access-list noNAT permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside ***.***.***.*** 255.255.255.***&lt;/P&gt;&lt;P&gt;ip address inside 172.20.1.225 255.255.0.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool myPOOL 172.20.1.126-172.20.1.130&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp ***.***.***.*** https 172.20.1.225 https netmask 255.2&lt;/P&gt;&lt;P&gt;55.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 ***.***.***.*** 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set mySET esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map myDYN 10 set transform-set mySET&lt;/P&gt;&lt;P&gt;crypto map myMAP 10 ipsec-isakmp dynamic myDYN&lt;/P&gt;&lt;P&gt;crypto map myMAP interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup myGROUP idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup tmorad idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup airwall address-pool myPOOL&lt;/P&gt;&lt;P&gt;vpngroup airwall split-tunnel 101&lt;/P&gt;&lt;P&gt;vpngroup airwall idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup airwall password ********&lt;/P&gt;&lt;P&gt;vpngroup andyslaptop address-pool myPOOL&lt;/P&gt;&lt;P&gt;vpngroup andyslaptop split-tunnel 101&lt;/P&gt;&lt;P&gt;vpngroup andyslaptop idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup andyslaptop password ********&lt;/P&gt;&lt;P&gt;vpngroup sharon address-pool myPOOL&lt;/P&gt;&lt;P&gt;vpngroup sharon split-tunnel 101&lt;/P&gt;&lt;P&gt;vpngroup sharon idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup sharon password ********&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;pixfirewal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2007 00:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744272#M1021971</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2007-06-22T00:40:52Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744273#M1021972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To get your vpn to work again you need &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list noNAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but as long as the acl is "any any" the static will not work for your ssl. Also, make your static like this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https 172.20.1.225 https netmask 255.2 &lt;/P&gt;&lt;P&gt;55.255.255 0 0 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2007 02:04:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744273#M1021972</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-22T02:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744274#M1021974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cleared out what I had ? in regards to NAT and for the moment ? I am just focusing on getting the SSL to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I entered the following commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https 172.20.1.225 https netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any interface outside eq 443&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which for the first time ? I got a reading on the hitcnt (2).  However, my browser still timed out.  It gives me the error: The connection has timed out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jun 2007 23:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744274#M1021974</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2007-06-22T23:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744275#M1021976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi  ..  Ok so the static NAT is configured as it should now and you are able to see hits on the respective access list entry. Now you need to make sure that the packets are actually reaching your ssl server once the firewall forwards them. You can use the below command on your firewall &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show local-host 172.20.1.225  ..  you should be able to see some information about TCP attempts to your SSL server from the outside host.   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next ..  check your SSL logs if you have any ..  otherwise you could get ethereal and see whether you are getting those request on your server. If you are then you need to make sure that the return packets from the SSL server are routed correctly to the firewall (you might have a routing issue here). If you can't see any request reaching your SSL server, then the issue can be isolated to something between the firewall and you server  ..  you will need to check what could be in the middle ( you could also have a routing or access issue there)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps   ..  !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Jun 2007 10:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744275#M1021976</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2007-06-23T10:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744276#M1021977</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am back attempting to resolve my problem ? here is what I have done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have isolated my SSL issue by using my Lab PIX.  I notice that in a lab setting I can connect to my SSL Concentrator.  Which is accomplished with a wireless hub with a public IP on the outside (&amp;amp; Internet Access) and my internal network on the inside (172 network).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, when I have someone attempt to connect from outside the office (and on the Internet somewhere)?there connection times out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my ACL:&lt;/P&gt;&lt;P&gt;hufcor2# sh access-list&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)&lt;/P&gt;&lt;P&gt;            alert-interval 300&lt;/P&gt;&lt;P&gt;access-list 101; 1 elements&lt;/P&gt;&lt;P&gt;access-list 101 line 1 permit tcp any interface outside eq https (hitcnt=2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I blocking?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jun 2007 19:35:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744276#M1021977</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2007-06-27T19:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744277#M1021978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the static command you have in place?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jun 2007 19:37:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744277#M1021978</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-27T19:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding SSL on my PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744278#M1021979</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you! Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That resolved it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside 0.0.0.0 0.0.0.0 ***.***.***.17 1 OTHER static&lt;/P&gt;&lt;P&gt;outside ***.***.***.16 255.255.255.248 ***.***.***.18 1 CONNECT static&lt;/P&gt;&lt;P&gt;inside 172.*.*.* 255.255.0.0 172.*.*.225 1 CONNECT static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had to add the route to my ISP Gateway (the *.*.*.17 address).  Before I did that ? it worked ? but only between my lab LAN and our production LAN.  However, when I had someone try it off the property ? it failed.  Since, adding the default route ? all is well!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2007 00:13:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-ssl-on-my-pix-501/m-p/744278#M1021979</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2007-06-30T00:13:26Z</dc:date>
    </item>
  </channel>
</rss>

