<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: totaly lost with pix in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683357#M1034912</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem that you have is very simple. It's a port service problem, Microsoft outlook uses a RPC service ports (1025 - 65535) and the OWA (Outlook Web Access) uses http and https ports. The solution is open the follow ports:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP:&lt;/P&gt;&lt;P&gt;range 1024 65535&lt;/P&gt;&lt;P&gt;42,80,88,135,137,138,379,390,443,445,691,993,domain,i,imap4,ldap,ldaps,netbios-ssn,pop3,smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;UDP:&lt;/P&gt;&lt;P&gt;88,389,3368,3369,3389,domain,netbios-dgm, netbios-ns,ntp,nameserver,445,636,135,139,1512&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it solve your problem, and excuseme for my bad english.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Jan 2007 15:43:34 GMT</pubDate>
    <dc:creator>darwintovar</dc:creator>
    <dc:date>2007-01-22T15:43:34Z</dc:date>
    <item>
      <title>totaly lost with pix</title>
      <link>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683353#M1034897</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have a pix 515e with the following config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ  Exhange server and a web server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal a lot of servers and workstation. When i try to browse the network i cannot see the server in the DMZ. People cannot connect to the exchange server with webmail and outlook.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am total lost, can somebody help me out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683353#M1034897</guid>
      <dc:creator>jeftavaneijk</dc:creator>
      <dc:date>2019-03-11T09:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: totaly lost with pix</title>
      <link>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683354#M1034901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At the first sight config looks ok (statics and ACLs are configured)&lt;/P&gt;&lt;P&gt;Can you turn on logging&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try to access DMZ servers&lt;/P&gt;&lt;P&gt;and than check logs with command&lt;/P&gt;&lt;P&gt;show logg&lt;/P&gt;&lt;P&gt;M.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2006 09:04:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683354#M1034901</guid>
      <dc:creator>m.sir</dc:creator>
      <dc:date>2006-12-11T09:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: totaly lost with pix</title>
      <link>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683355#M1034904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;106023: Deny udp src DMZ:192.168.11.4/16941 dst inside:192.168.10.4/53 by access-group "dmz"&lt;/P&gt;&lt;P&gt;106023: Deny udp src DMZ:192.168.11.4/16941 dst inside:192.168.10.3/53 by access-group "dmz"&lt;/P&gt;&lt;P&gt;106023: Deny udp src DMZ:192.168.11.4/1025 dst inside:192.168.10.4/53 by access-group "dmz"&lt;/P&gt;&lt;P&gt;106023: Deny udp src DMZ:192.168.11.4/16941 dst inside:192.168.10.4/53 by access-group "dmz"&lt;/P&gt;&lt;P&gt;30.2/51740 (192.168.10.2/51740)&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 29362 for DMZ:192.168.11.4/2594 (192.168.11.4/2594) to inside:192.168.10.2/51741 (192.168.10.2/51741)&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 29363 for DMZ:192.168.11.4/2594 (192.168.11.4/2594) to inside:192.168.10.2/51742 (192.168.10.2/51742)&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 29364 for DMZ:192.168.11.4/2594 (192.168.11.4/2594) to inside:192.168.10.2/51744 (192.168.10.2/51744)&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 29365 for DMZ:192.168.11.4/2594 (192.168.11.4/2594) to inside:192.168.10.2/51746 (192.168.10.2/51746)&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 29366 for DMZ:192.168.11.4/2594 (192.168.11.4/2594) to inside:192.168.10.2/51743 (192.168.10.2/51743&lt;/P&gt;&lt;P&gt;305005: No translation group found for tcp src inside:192.168.14.133/1949 dst outside:84.53.136.74/80&lt;/P&gt;&lt;P&gt;305005: No translation group found for tcp src inside:192.168.14.133/1950 dst outside:84.53.136.33/80&lt;/P&gt;&lt;P&gt;305005: No translation group found for tcp src inside:192.168.14.178/1048 dst outside:84.53.136.74/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;305005: No translation group found for tcp src inside:192.168.14.133/1949 dst outside:84.53.136.74/80&lt;/P&gt;&lt;P&gt;305005: No translation group found for tcp src inside:192.168.14.133/1950 dst outside:84.53.136.33/80&lt;/P&gt;&lt;P&gt;305005: No translation group found for tcp src inside:192.168.14.178/1048 dst outside:84.53.136.74/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2006 09:34:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683355#M1034904</guid>
      <dc:creator>jeftavaneijk</dc:creator>
      <dc:date>2006-12-11T09:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: totaly lost with pix</title>
      <link>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683356#M1034906</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Add:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow your whole Inside segment to be able to access DMZ. If needed for access-control for specifici access, apply access-list on inside interface to strictly allow inside hosts to access your DMZ's email server via the allowed port, example TCP 25 (smtp), http &amp;amp; https (tcp 80 &amp;amp; 443) for webmail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit tcp any host 192.168.11.4 eq smtp --&amp;gt; permit smtp access. Assuming 192.168.11.4 is your email server in DMZ&lt;/P&gt;&lt;P&gt;access-list inside permit tcp any host 192.168.11.4 eq www --&amp;gt; allow webmail (via port 80) to pass through&lt;/P&gt;&lt;P&gt;access-list inside permit tcp any host 192.168.11.4 eq https --&amp;gt; allow secure http (https) to pass throuh&lt;/P&gt;&lt;P&gt;access-list inside deny ip any 192.168.11.0 255.255.255.0 --&amp;gt; deny other inside hosts from connecting to other DMZ's hosts, except for the 3 services above&lt;/P&gt;&lt;P&gt;access-list inside permit ip any any --&amp;gt; allow inside hosts to connect to other segment, i.e internet/outside segment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside in interface inside --&amp;gt; bind acl to inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should also modify the following acl on DMZ to rectify the first 4 deny logs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;existing : access-list dmz permit udp any eq domain any eq domain &lt;/P&gt;&lt;P&gt;change to:  access-list dmz permit udp any any eq domain --&amp;gt; to allow DMZ's 192.168.11.4 to talk to DNS server on inside segment. &lt;/P&gt;&lt;P&gt;The source port on DMZ server can be anything,as long as the destination port is correctly pointing to UDP 53.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2006 10:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683356#M1034906</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-11T10:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: totaly lost with pix</title>
      <link>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683357#M1034912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem that you have is very simple. It's a port service problem, Microsoft outlook uses a RPC service ports (1025 - 65535) and the OWA (Outlook Web Access) uses http and https ports. The solution is open the follow ports:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP:&lt;/P&gt;&lt;P&gt;range 1024 65535&lt;/P&gt;&lt;P&gt;42,80,88,135,137,138,379,390,443,445,691,993,domain,i,imap4,ldap,ldaps,netbios-ssn,pop3,smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;UDP:&lt;/P&gt;&lt;P&gt;88,389,3368,3369,3389,domain,netbios-dgm, netbios-ns,ntp,nameserver,445,636,135,139,1512&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it solve your problem, and excuseme for my bad english.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jan 2007 15:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/totaly-lost-with-pix/m-p/683357#M1034912</guid>
      <dc:creator>darwintovar</dc:creator>
      <dc:date>2007-01-22T15:43:34Z</dc:date>
    </item>
  </channel>
</rss>

