<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco VPN Client behind Cisco PIX 501 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671613#M1026363</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have opened port 3389 and it made no difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 11 Feb 2007 13:39:42 GMT</pubDate>
    <dc:creator>gsutton45</dc:creator>
    <dc:date>2007-02-11T13:39:42Z</dc:date>
    <item>
      <title>Cisco VPN Client behind Cisco PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671609#M1026358</link>
      <description>&lt;P&gt;Here is the situation: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have Windows XP SP1 machines behind a Cisco PIX 501 (version 6.3(5)) using the Cisco VPN Client v4.0.4(D). &lt;/P&gt;&lt;P&gt;These machines successfully connect to a VPN concentrator on another network using IPsec/UDP. &lt;/P&gt;&lt;P&gt;Once connected the machines launch Remote Desktop Connection but are unable to connect to the desired server (via IP address or host name). &lt;/P&gt;&lt;P&gt;If I remove the Cisco PIX from the network, the RDC connection is made without problems. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know what I need to change in the PIX configuration to allow the RDC communication? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;P&gt;******&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password  encrypted&lt;/P&gt;&lt;P&gt;passwd  encrypted&lt;/P&gt;&lt;P&gt;hostname &lt;/P&gt;&lt;P&gt;domain-name &lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 172.23.24.100 iwojima&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any any eq 6881&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any any eq 6882&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any any eq 1987&lt;/P&gt;&lt;P&gt;access-list outside_in permit udp any any eq 1987&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside dhcp setroute&lt;/P&gt;&lt;P&gt;ip address inside 172.23.24.240 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location iwojima 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www iwojima www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 6881 iwojima 6881 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 6882 iwojima 6882 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ssh iwojima ssh netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 1987 172.23.24.110 1987 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface 1987 172.23.24.110 1987 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.23.24.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;tftp-server inside iwojima /&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;fragment chain 1&lt;/P&gt;&lt;P&gt;telnet 172.23.24.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 172.23.24.51-172.23.24.69 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 12.127.16.67 12.127.17.72&lt;/P&gt;&lt;P&gt;dhcpd wins iwojima&lt;/P&gt;&lt;P&gt;dhcpd lease 86400&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:31:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671609#M1026358</guid>
      <dc:creator>gsutton45</dc:creator>
      <dc:date>2019-03-11T09:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VPN Client behind Cisco PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671610#M1026359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI ..  is suggest to check two things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.- make sure the servers on the other network know how to get back to the IP pool allocated to the remote VPN clients ..  return packets should be routed to the Concentrator.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.-  Check that the remote vpn on the concentrator has NAT-Transparency enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Feb 2007 01:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671610#M1026359</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2007-02-11T01:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VPN Client behind Cisco PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671611#M1026360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Fernando,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I have no control over the remote network or the servers on it.  If I understand you suggestions correctly, both pertain to configuration of the remote network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Feb 2007 01:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671611#M1026360</guid>
      <dc:creator>gsutton45</dc:creator>
      <dc:date>2007-02-11T01:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VPN Client behind Cisco PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671612#M1026361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you should open the port for RDP in your ACL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Feb 2007 08:26:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671612#M1026361</guid>
      <dc:creator>jain.nitin</dc:creator>
      <dc:date>2007-02-11T08:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VPN Client behind Cisco PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671613#M1026363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have opened port 3389 and it made no difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Feb 2007 13:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-vpn-client-behind-cisco-pix-501/m-p/671613#M1026363</guid>
      <dc:creator>gsutton45</dc:creator>
      <dc:date>2007-02-11T13:39:42Z</dc:date>
    </item>
  </channel>
</rss>

