<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Replacing PIX 515Ewith a new one in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709204#M1035275</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;just for information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside 10.10.1.96 255.255.255.224 10.10.1.99 1 CONNECT static&lt;/P&gt;&lt;P&gt;this one is network that  outside card belong to, this network is used&lt;/P&gt;&lt;P&gt;for server publishing and static statements&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside 10.10.2.128 255.255.255.128 10.10.2.99 1 OTHER static&lt;/P&gt;&lt;P&gt;this one is another network added in order to permit client natting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But thing I can't understand, is that configuration is up and running on&lt;/P&gt;&lt;P&gt;old PIX 515E (6.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks anyway&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Nov 2006 16:00:22 GMT</pubDate>
    <dc:creator>albertobrivio42</dc:creator>
    <dc:date>2006-11-24T16:00:22Z</dc:date>
    <item>
      <title>Replacing PIX 515Ewith a new one</title>
      <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709200#M1035269</link>
      <description>&lt;P&gt;Dear ALL,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going to replace a PIX 515E running 6.1 with a new Unresticted PIX515E running 6.3, so I can&lt;/P&gt;&lt;P&gt;work offline with the old one to run all update tasks.&lt;/P&gt;&lt;P&gt;Configurations are exactly the same, but when I replace PIX , the new one does not run properly:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;natted clients seem browsing internet correctly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clients mapped with static don't run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;web server are not browseable from outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please, anyone of you could give me any ideas ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;											Regards&lt;/P&gt;&lt;P&gt;											&lt;/P&gt;&lt;P&gt;										   Alberto Brivio&lt;/P&gt;&lt;P&gt;										   &lt;/P&gt;&lt;P&gt;										   P.S.  Failover is stopped&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709200#M1035269</guid>
      <dc:creator>albertobrivio42</dc:creator>
      <dc:date>2019-03-11T09:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing PIX 515Ewith a new one</title>
      <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709201#M1035270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you share the configuration, or at least the one with static and access-list (specifically the one applied on Outside interface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. natted clients seem browsing internet correctly &lt;/P&gt;&lt;P&gt;- nat/global pair works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. clients mapped with static don't run &lt;/P&gt;&lt;P&gt;- could be anything, i.e wrong ip mapping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. web server are not browseable from outside &lt;/P&gt;&lt;P&gt;- could be static map problem, or ACL on outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Nov 2006 10:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709201#M1035270</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-24T10:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing PIX 515Ewith a new one</title>
      <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709202#M1035272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;below you can find conf.: I've replaced public class of addresses with&lt;/P&gt;&lt;P&gt;10.10.1.0 and 10.10.2.0&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;interface ethernet3 auto&lt;/P&gt;&lt;P&gt;interface ethernet4 auto&lt;/P&gt;&lt;P&gt;interface ethernet5 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz1 security10&lt;/P&gt;&lt;P&gt;nameif ethernet3 dmz2 security20&lt;/P&gt;&lt;P&gt;nameif ethernet4 dmz3 security30&lt;/P&gt;&lt;P&gt;nameif ethernet5 failover security40&lt;/P&gt;&lt;P&gt;hostname mypix&lt;/P&gt;&lt;P&gt;domain-name mypix.com&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list acl-inbound permit icmp any any&lt;/P&gt;&lt;P&gt;access-list acl-inbound permit ip any any&lt;/P&gt;&lt;P&gt;access-list acl-outbound permit icmp any any&lt;/P&gt;&lt;P&gt;access-list acl-outbound permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any dmz1&lt;/P&gt;&lt;P&gt;icmp permit any dmz2&lt;/P&gt;&lt;P&gt;icmp permit any dmz3&lt;/P&gt;&lt;P&gt;icmp permit any failover&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz1 1500&lt;/P&gt;&lt;P&gt;mtu dmz2 1500&lt;/P&gt;&lt;P&gt;mtu dmz3 1500&lt;/P&gt;&lt;P&gt;mtu failover 1500&lt;/P&gt;&lt;P&gt;ip address outside 10.10.1.99 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip address dmz1&lt;/P&gt;&lt;P&gt;no ip address dmz2&lt;/P&gt;&lt;P&gt;no ip address dmz3&lt;/P&gt;&lt;P&gt;no ip address failover&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;no failover ip address outside&lt;/P&gt;&lt;P&gt;no failover ip address inside&lt;/P&gt;&lt;P&gt;no failover ip address dmz1&lt;/P&gt;&lt;P&gt;no failover ip address dmz2&lt;/P&gt;&lt;P&gt;no failover ip address dmz3&lt;/P&gt;&lt;P&gt;no failover ip address failover&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.18 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 10.10.2.128-10.10.2.254 netmask 255.255.255.128&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;alias (inside) 192.168.0.15 10.10.1.105 255.255.255.255&lt;/P&gt;&lt;P&gt;alias (inside) 192.168.0.230 10.10.1.98 255.255.255.255&lt;/P&gt;&lt;P&gt;alias (inside) 192.168.0.85 10.10.1.115 255.255.255.255&lt;/P&gt;&lt;P&gt;alias (inside) 192.168.0.84 10.10.1.113 255.255.255.255&lt;/P&gt;&lt;P&gt;alias (inside) 192.168.0.244 10.10.1.102 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.103 192.168.0.28 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.105 192.168.0.15 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.125 192.168.0.97 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.110 192.168.0.24 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.98 192.168.0.230 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.111 192.168.0.56 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.113 192.168.0.84 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.109 192.168.0.18 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.112 192.168.0.57 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.115 192.168.0.85 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.114 192.168.1.53 netmask 255.255.255.255 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.104 192.168.0.86 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.106 192.168.0.26 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.102 192.168.0.251 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group acl-inbound in interface outside&lt;/P&gt;&lt;P&gt;access-group acl-outbound in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.10.1.97 1&lt;/P&gt;&lt;P&gt;route outside 10.10.2.128 255.255.255.128 10.10.1.99 1&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;sysopt connection permit-pptp&lt;/P&gt;&lt;P&gt;sysopt connection permit-l2tp&lt;/P&gt;&lt;P&gt;sysopt noproxyarp outside&lt;/P&gt;&lt;P&gt;sysopt noproxyarp inside&lt;/P&gt;&lt;P&gt;sysopt noproxyarp dmz1&lt;/P&gt;&lt;P&gt;sysopt noproxyarp dmz2&lt;/P&gt;&lt;P&gt;sysopt noproxyarp dmz3&lt;/P&gt;&lt;P&gt;sysopt noproxyarp failover&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Nov 2006 11:18:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709202#M1035272</guid>
      <dc:creator>albertobrivio42</dc:creator>
      <dc:date>2006-11-24T11:18:01Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing PIX 515Ewith a new one</title>
      <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709203#M1035273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I noticed 2 static route with same admin distance value exist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.10.1.97 1 &lt;/P&gt;&lt;P&gt;route outside 10.10.2.128 255.255.255.128 10.10.1.99 1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When accessing the internet, which gateway is used, and for outsider to access your servers mapped to Public IPs, which incoming gateway is used?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- The alias command+static+noproxyarp looks ok.&lt;/P&gt;&lt;P&gt;- The ACL and interface bind looks ok. But I believed you should put specific destination servers and service ports for "acl-inbound" acl, i.e:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl-inbound permit tcp any host 10.10.1.103 eq www&lt;/P&gt;&lt;P&gt;access-list acl-inbound permit tcp any host 10.10.1.105 eq 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Nov 2006 14:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709203#M1035273</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-24T14:44:47Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing PIX 515Ewith a new one</title>
      <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709204#M1035275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;just for information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside 10.10.1.96 255.255.255.224 10.10.1.99 1 CONNECT static&lt;/P&gt;&lt;P&gt;this one is network that  outside card belong to, this network is used&lt;/P&gt;&lt;P&gt;for server publishing and static statements&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside 10.10.2.128 255.255.255.128 10.10.2.99 1 OTHER static&lt;/P&gt;&lt;P&gt;this one is another network added in order to permit client natting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But thing I can't understand, is that configuration is up and running on&lt;/P&gt;&lt;P&gt;old PIX 515E (6.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks anyway&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Nov 2006 16:00:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709204#M1035275</guid>
      <dc:creator>albertobrivio42</dc:creator>
      <dc:date>2006-11-24T16:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing PIX 515Ewith a new one</title>
      <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709205#M1035277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The config is fine, it will not working if it is for routing to inside segment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you identify which server(s) you map statically with public IPs but not able to access out or access by users from internet? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Nov 2006 16:36:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709205#M1035277</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-24T16:36:30Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing PIX 515Ewith a new one</title>
      <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709206#M1035282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(10.10.1.98  in real config ia a public address !)&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.1.98 192.168.0.230 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inside server 192.168.0.230 can't access to  and it's not reachable&lt;/P&gt;&lt;P&gt;from internet&lt;/P&gt;&lt;P&gt;But any client who is natting  by global specified in configuration can access&lt;/P&gt;&lt;P&gt;internet without problems.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Nov 2006 16:53:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709206#M1035282</guid>
      <dc:creator>albertobrivio42</dc:creator>
      <dc:date>2006-11-24T16:53:21Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing PIX 515Ewith a new one</title>
      <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709207#M1035284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Outside interface IP is running 10.10.1.99, while route to 10.10.2.128 (see route outside line 2) also pointing to 10.10.1.99.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should be replaced with outside/internet router Faste interface facing PIX, not PIX own interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for route statement (2 x route outside), it's best to put specific (longest match) first before the general route, as general route will take everything into it (PIX not smart in routing):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 10.10.2.128 255.255.255.128 10.10.1.xx  ---&amp;gt; change this to other internet router intf IP&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.10.1.97&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Nov 2006 23:46:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709207#M1035284</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-25T23:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing PIX 515Ewith a new one</title>
      <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709208#M1035289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Test with only "route outside 0.0.0.0 0.0.0.0 10.10.1.97" statement and physical connection works fine, i.e &lt;/P&gt;&lt;P&gt;in/out access for 192.168.0.230 via "static (inside,outside) 10.10.1.98 192.168.0.230 netmask 255.255.255.255" was ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2nd test with outside interface IP change to .100 did not go well. The change was to suit 2nd route statement that point to PIX own interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may not related to the routing, but try to remove the "sysopt noproxyarp outside" line t isolate this issue (not tested-limited time).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It'll be good to put in the config one by one, and see/test where the choking point started.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2006 00:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709208#M1035289</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-27T00:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing PIX 515Ewith a new one</title>
      <link>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709209#M1035292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I didn't forget this conversation.&lt;/P&gt;&lt;P&gt;Finally, I got solution by two steps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first one, the most important, was to power down / power up switch where outside zone is attached to: without this action &lt;/P&gt;&lt;P&gt;nothing was running.&lt;/P&gt;&lt;P&gt;Second one, in order to avoid random nat problem, I had  to permit proxyarp on outside segment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;																		Regards&lt;/P&gt;&lt;P&gt;																			&lt;/P&gt;&lt;P&gt;																		Alberto Brivio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Dec 2006 08:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replacing-pix-515ewith-a-new-one/m-p/709209#M1035292</guid>
      <dc:creator>albertobrivio42</dc:creator>
      <dc:date>2006-12-04T08:56:13Z</dc:date>
    </item>
  </channel>
</rss>

