<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX Firewall Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-firewall-configuration/m-p/653585#M1028532</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Cindy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly clarify about your setup.&lt;/P&gt;&lt;P&gt;Where is the segment 172.1.1.0/24 located physically.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are they residing behind your inside interface of the firewall and you want to protect access to SAP server from this segment.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not a good design. &lt;/P&gt;&lt;P&gt;As the source and destination segments are in your inside network, You cannot make this traffic to pass through firewall. ( unless you are using vlan segmentation of zones in your firewall, which i suppose not the case in your setup)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you want to achive?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want firewall protection for the SAP server from 172.1.1.0/24 segment, then you need to redesign the way in which your firewall is deployed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont want firewall protection for the sap server from the 172.1.1.0/24 segment, then you need to check the way routing is configured from the segment 172.1.1.0/24 till the sap server and do necessary changes, so that traffic from 172.1.1.0/24 segment will reach the SAP server with out passing through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly revert back with more details on your setup/requirement to us, if the above explanation doesn't apply to your network/needs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Jan 2007 08:50:18 GMT</pubDate>
    <dc:creator>vijayasankar</dc:creator>
    <dc:date>2007-01-19T08:50:18Z</dc:date>
    <item>
      <title>PIX Firewall Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-configuration/m-p/653582#M1028529</link>
      <description>&lt;P&gt;Gurus,&lt;/P&gt;&lt;P&gt;I have a question here. Lets say if there is one router (18.10.3.2) connected to 18.10.3.1 of PIX FW interface, and there is 172.1.1.0/24 network to come in to 18.10.3.10/24 (SAP Server) from the router, (routing : 0.0.0.0 0.0.0.0 18.10.3.1 ),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to apply permit list on the PIX Inside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am i suppose to apply on 18.10.3.1(inside) interface ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-configuration/m-p/653582#M1028529</guid>
      <dc:creator>cindylee27</dc:creator>
      <dc:date>2019-03-11T09:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Firewall Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-configuration/m-p/653583#M1028530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Cindy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where is the network 172.1.1.0/24. Is it outside your PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, you need to apply the ACL on the outside interface of the pix, in the incoming direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;P&gt;In your acl outside_acl, you need to allow the segment 172.1.1.0/24 to access 18.10.3.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_acl permit ip 172.1.1.0 255.255.255.0 host 18.10.3.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This acl will allow ip level access to the sap server from the segment 172.1.1.0/24.&lt;/P&gt;&lt;P&gt;Ideally you should be allowing only the relevant TCP port from 172.1.1.0/24 to your SAP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Revert back to us if you need further clarification. &lt;/P&gt;&lt;P&gt;Hope this helps. Kindly rate the post if it was helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2007 08:27:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-configuration/m-p/653583#M1028530</guid>
      <dc:creator>vijayasankar</dc:creator>
      <dc:date>2007-01-19T08:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Firewall Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-configuration/m-p/653584#M1028531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Vijay,&lt;/P&gt;&lt;P&gt;The network (172.1.1.0/24) comes to the inside interface of 18.10.3.1 PIX Inside Interface, but to 18.10.3.10 (SAP Server) which resides on the INSIDE Interface VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I am not too if the traffic will flow in to firewall as the route is to go firewall first,before going to 18.10.3.10 SAP Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2007 08:34:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-configuration/m-p/653584#M1028531</guid>
      <dc:creator>cindylee27</dc:creator>
      <dc:date>2007-01-19T08:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Firewall Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-configuration/m-p/653585#M1028532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Cindy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly clarify about your setup.&lt;/P&gt;&lt;P&gt;Where is the segment 172.1.1.0/24 located physically.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are they residing behind your inside interface of the firewall and you want to protect access to SAP server from this segment.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not a good design. &lt;/P&gt;&lt;P&gt;As the source and destination segments are in your inside network, You cannot make this traffic to pass through firewall. ( unless you are using vlan segmentation of zones in your firewall, which i suppose not the case in your setup)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you want to achive?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want firewall protection for the SAP server from 172.1.1.0/24 segment, then you need to redesign the way in which your firewall is deployed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont want firewall protection for the sap server from the 172.1.1.0/24 segment, then you need to check the way routing is configured from the segment 172.1.1.0/24 till the sap server and do necessary changes, so that traffic from 172.1.1.0/24 segment will reach the SAP server with out passing through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly revert back with more details on your setup/requirement to us, if the above explanation doesn't apply to your network/needs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2007 08:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-configuration/m-p/653585#M1028532</guid>
      <dc:creator>vijayasankar</dc:creator>
      <dc:date>2007-01-19T08:50:18Z</dc:date>
    </item>
  </channel>
</rss>

