<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 515E DMZ for accessing internal network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626684#M1036051</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my configuration - per-se&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security4&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip any 2XX.XXX.XXX.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ITS_splitTunnelAcl permit ip 1XX.0.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 1XX.0.0.0 255.255.255.0 ATL 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 1XX.0.0.0 255.255.255.0 1XX.0.1.0 255.255.255.XXX &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 1XX.0.0.0 255.255.255.0 1XX.0.2.0 255.255.255.XXX &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip any LAX 255.255.255.XXX &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit ip 1XX.0.0.0 255.255.255.0 ATL 255.255.255.0&lt;/P&gt;&lt;P&gt;IP address outside 2XX.XXX.XXX.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip address inside 1XX.0.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip address DMZ&lt;/P&gt;&lt;P&gt;ip local pool Here 1XX.0.1.1-1XX.0.1.50&lt;/P&gt;&lt;P&gt;ip local pool There 1XX.0.2.1-1XX.0.2.10&lt;/P&gt;&lt;P&gt;ip local pool LAX 1XX.201.1.1-1XX.201.1.5&lt;/P&gt;&lt;P&gt;global (outside) 1 2XX.XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 1 1XX.0.0.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 2XX.XXX.XXX.XXX 1&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my dilemna is this:&lt;/P&gt;&lt;P&gt;1. I need to have two sets of outside (internet) IPs to be able to access my network and servers.&lt;/P&gt;&lt;P&gt;2. I was looking at trying to use the same configuration on port 0/1 on the 0/2 (DMZ) with a couple of modifcations. I am giving it a different inside IP and DHCP pool. &lt;/P&gt;&lt;P&gt;When I attempt this I cannot access the original network, however I can access the internet. VPN does work, however it gets to the inside of the PIX but not the network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 15 Jan 2007 16:03:02 GMT</pubDate>
    <dc:creator>fbwomack1</dc:creator>
    <dc:date>2007-01-15T16:03:02Z</dc:date>
    <item>
      <title>PIX 515E DMZ for accessing internal network</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626682#M1036010</link>
      <description>&lt;P&gt;I have a PIX 515E - the DMZ port is not used presently. I am changing ISPs. I already have the new ISP components connected and running as advertised. I want to verify all is going to work correctly with my static routes and the new ISP before cancelling the old ISP. I am wanting to connect the new ISP to the DMZ port to test the static routes. Is this possible and if so, what type of additional statements should to be added to give the DMZ FULL access to the network?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626682#M1036010</guid>
      <dc:creator>fbwomack1</dc:creator>
      <dc:date>2019-03-11T09:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E DMZ for accessing internal network</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626683#M1036023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will need to configure NAT and an ACL. It may not work anyway, where is your default route pointing to?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2007 14:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626683#M1036023</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-01-15T14:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E DMZ for accessing internal network</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626684#M1036051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my configuration - per-se&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security4&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip any 2XX.XXX.XXX.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ITS_splitTunnelAcl permit ip 1XX.0.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 1XX.0.0.0 255.255.255.0 ATL 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 1XX.0.0.0 255.255.255.0 1XX.0.1.0 255.255.255.XXX &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 1XX.0.0.0 255.255.255.0 1XX.0.2.0 255.255.255.XXX &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip any LAX 255.255.255.XXX &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 permit ip 1XX.0.0.0 255.255.255.0 ATL 255.255.255.0&lt;/P&gt;&lt;P&gt;IP address outside 2XX.XXX.XXX.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip address inside 1XX.0.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip address DMZ&lt;/P&gt;&lt;P&gt;ip local pool Here 1XX.0.1.1-1XX.0.1.50&lt;/P&gt;&lt;P&gt;ip local pool There 1XX.0.2.1-1XX.0.2.10&lt;/P&gt;&lt;P&gt;ip local pool LAX 1XX.201.1.1-1XX.201.1.5&lt;/P&gt;&lt;P&gt;global (outside) 1 2XX.XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 1 1XX.0.0.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 2XX.XXX.XXX.XXX 1&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my dilemna is this:&lt;/P&gt;&lt;P&gt;1. I need to have two sets of outside (internet) IPs to be able to access my network and servers.&lt;/P&gt;&lt;P&gt;2. I was looking at trying to use the same configuration on port 0/1 on the 0/2 (DMZ) with a couple of modifcations. I am giving it a different inside IP and DHCP pool. &lt;/P&gt;&lt;P&gt;When I attempt this I cannot access the original network, however I can access the internet. VPN does work, however it gets to the inside of the PIX but not the network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2007 16:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626684#M1036051</guid>
      <dc:creator>fbwomack1</dc:creator>
      <dc:date>2007-01-15T16:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E DMZ for accessing internal network</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626685#M1036069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;  First PIX ver 6.x does not support dual ISP. In order to test if the second ISP is working correctly what you have to do is the below. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Give the DMZ interface an IP on the new ISP subnet&lt;/P&gt;&lt;P&gt;ip address DMZ "IP ON NEW SUBNET"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- NAT inside users on the DMZ for testing:&lt;/P&gt;&lt;P&gt;no global (outside) 1 2XX.XXX.XXX.XXX nat&lt;/P&gt;&lt;P&gt;no (inside) 1 1XX.0.0.0 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;global (DMZ) 2 "New Public Subnet"&lt;/P&gt;&lt;P&gt;nat (inside) 2  1XX.0.0.0 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3- Change the routing to point to the new ISP:&lt;/P&gt;&lt;P&gt;no route outside 0.0.0.0 0.0.0.0 2XX.XXX.XXX.XXX 1 &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 "New ISP Gateway"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4- Clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After done with the testing swap the config back to the old ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note that the above will cause down time so it is better to do the test after working hours,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you need further assistance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate your rating,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2007 18:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626685#M1036069</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2007-01-15T18:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E DMZ for accessing internal network</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626686#M1036087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you solved my issue in trying to use the DMZ port - in that I cannot do it without shutting down the network since I use ver 6.3 (5). We work 24/7/365. The network cannot be down for more than a few minutes and then it shouldnt be our (the IT dept) fault.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll look at getting another firewall and trying it that way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your rapid responses.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2007 19:01:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626686#M1036087</guid>
      <dc:creator>fbwomack1</dc:creator>
      <dc:date>2007-01-15T19:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E DMZ for accessing internal network</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626687#M1036104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I do understand the critical environment you have. What you can also do is upgrade to Ver 7.0 if you PIX supports it and perform the tests. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  In either ways, I am glad I could help and thanks for the rating,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you need anything further,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 18:19:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-dmz-for-accessing-internal-network/m-p/626687#M1036104</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2007-01-16T18:19:06Z</dc:date>
    </item>
  </channel>
</rss>

