<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pix 515e cant access web server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370901#M308775</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have another option, if you actually move the device to a DMZ interface on the PIX you can actually configure something called destination NAT(outside NAT), that way you can map the outside IP to the server, let me know your thoughts and if you need help configuring this I can help out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address DMZ 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp interface www 10.0.0.2 www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) tcp interface www 172.16.1.2 www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 69.x.x.x 172.16.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everthing else should stay the same.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Nov 2013 22:59:21 GMT</pubDate>
    <dc:creator>jumora</dc:creator>
    <dc:date>2013-11-19T22:59:21Z</dc:date>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370896#M308766</link>
      <description>&lt;P&gt;I have a pix 151e with port fowarding internet users can access our webserver but clients on the inside cant how do i fix this so both inside and outside clients can access our webserver? i am including my confg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also outside ip is 69.x.x.x inside is 10.0.0.1 and webserver is 10.0.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)145&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto shutdown&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 intf2 security4&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;hostname quill&lt;/P&gt;&lt;P&gt;domain-name dyndns.org&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any interface outside eq www&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging host inside 10.0.0.2&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu intf2 1500&lt;/P&gt;&lt;P&gt;ip address outside dhcp setroute&lt;/P&gt;&lt;P&gt;ip address inside 10.0.0.1 255.0.0.0&lt;/P&gt;&lt;P&gt;no ip address intf2&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;pdm location 10.0.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 10.0.0.2 www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.0.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:0a8dc14f551cb9dbc20157c7023d2cab&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370896#M308766</guid>
      <dc:creator>ktherrien</dc:creator>
      <dc:date>2019-03-12T03:06:00Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370897#M308767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see people have viewed but know ones answered yet please i need to beable to have inside clients talk to the webserver i dont know why i cant&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 07:16:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370897#M308767</guid>
      <dc:creator>ktherrien</dc:creator>
      <dc:date>2013-11-19T07:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370898#M308768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are running a very old software on a very old hardware.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding what you are attempting to do is connect to the public IP address directly from your LAN network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally this would be done with 2 different NAT configurations and also a command that supports the traffic to enter and leave the same interface. In this case the traffic to the Web servers public IP address would go to &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface and head back through the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface to the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that your software level (6.3) doesnt support the configuration command we need (&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;) which was introduced in software 7.0(1)&amp;nbsp; (essentially the next software level from yours) and therefore I don't see a way to enable what you are asking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding it should not work without the above mentioned command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then again if you want to try then this should enable you to connect to the internal server with public IP address in a bit newer software&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (inside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,inside) tcp &lt;PUBLIC ip=""&gt; 80 &lt;SERVER internal="" ip=""&gt; 80 netmask 255.255.255.255&lt;/SERVER&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"global"&lt;/STRONG&gt; command (together with the existing &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command) is meant to do Dynamic PAT for the users when their connection takes an U-turn on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface effectively PATing them to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface IP address. This is needed for the fact that the firewall can see the whole TCP conversation. Without the source translation it would not see it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"static"&lt;/STRONG&gt; command is meant to do Static PAT (Port Forward) so that for port TCP/80 connections from the internal network to the public IP address will be forwarded back to the internal server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 08:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370898#M308768</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-19T08:28:24Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370899#M308769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;The PIX 6.3 has an option called DNS doctoring that what it does is doctor the DNS query reponse and change the external address on that response for the private, the problem is that you only have one IP address and it is obtained via DHCP and you need a static one to one NAT to do this configuration. Suggestion would be to follow Jouni suggestion and upgrade the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration85/guide/access_filter.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration85/guide/access_filter.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 10.5pt 0cm 5.25pt -7.2pt;"&gt;&lt;STRONG&gt;Memory Requirements&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0.75pt 0cm 4.5pt;"&gt;If you are using a PIX 515/515E running PIX Version 6.2/6.3, you must increase your memory before upgrading to PIX Version 8.0(X). This version requires at least 64 MB of RAM for Restricted (R) licenses and 128 MB of RAM for Unrestricted (UR) and Failover (FO) licenses. &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Memory Upgrade Information for PIX 515/515E Appliances&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Memory upgrades are only required for the PIX-515 and PIX-515E appliances. See this table for the part numbers you need in order to upgrade the memory on these appliances.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;The part number is dependent on the license installed on the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="0" cellspacing="1" style="width: 60.0%; background: white; padding: px;" width="60%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD colspan="2" style="width: .3pt; background: #CCCCFF; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P align="center" style="margin-bottom: 0.0001pt; text-align: center;"&gt;&lt;STRONG&gt;Current Appliance Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD colspan="2" style="width: .3pt; background: #CCCCFF; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P align="center" style="margin-bottom: 0.0001pt; text-align: center;"&gt;&lt;STRONG&gt;Upgrade Solution&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: .3pt; background: #CCCCFF; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;&lt;STRONG&gt;Platform License&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; background: #CCCCFF; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;&lt;STRONG&gt;Total Memory (before upgrade)&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; background: #CCCCFF; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;&lt;STRONG&gt;Part Number&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; background: #CCCCFF; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;&lt;STRONG&gt;Total Memory (after upgrade)&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: .3pt; background: #CCCCFF; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;&lt;STRONG&gt;Restricted (R)&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;32 MB&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;PIX-515-MEM-32=&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;64 MB&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: .3pt; background: #CCCCFF; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;&lt;STRONG&gt;Unrestricted (UR)&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;32 MB&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;PIX-515-MEM-128=&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;128 MB&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: .3pt; background: #CCCCFF; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;&lt;STRONG&gt;Failover-Only (FO)&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;64 MB&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;PIX-515-MEM-128=&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: .3pt; padding: 2.25pt 2.25pt 2.25pt 2.25pt;" width="0"&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;128 MB&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3 style="margin-top: 10.5pt; margin-right: 0cm; margin-bottom: 5.25pt; margin-left: -7.2pt;"&gt;Software Requirements&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0.75pt 0cm 4.5pt;"&gt;Version 8.0(X) requires the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 5.25pt 18pt; text-indent: -18pt;"&gt;•The minimum software version required before upgrading to PIX Version 8.0(X) is PIX Version 7.2. If you are running a PIX version earlier than Version 6.2, you must first upgrade to PIX Version 6.2 or PIX Version 6.3 before you can upgrade to PIX Version 7.2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 16:26:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370899#M308769</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-19T16:26:52Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370900#M308772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought of another way to get this working, you can modify hostfile on local DNS server or on the PCs to point to the internal IP address of the server so you don't have to configure anything on the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.howtogeek.com/howto/27350/"&gt;http://www.howtogeek.com/howto/27350/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 20:48:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370900#M308772</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-19T20:48:18Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370901#M308775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have another option, if you actually move the device to a DMZ interface on the PIX you can actually configure something called destination NAT(outside NAT), that way you can map the outside IP to the server, let me know your thoughts and if you need help configuring this I can help out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address DMZ 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp interface www 10.0.0.2 www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) tcp interface www 172.16.1.2 www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 69.x.x.x 172.16.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everthing else should stay the same.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 22:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370901#M308775</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-19T22:59:21Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370902#M308777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was looking in to that but dont know how to do dmz can the clients on the inside interface access the server on the dmz and how do i give the dmz full internet access?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 02:25:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370902#M308777</guid>
      <dc:creator>ktherrien</dc:creator>
      <dc:date>2013-11-20T02:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370903#M308778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;also if i run &lt;/P&gt;&lt;P&gt;static (DMZ,inside) 69.x.x.x 172.16.1.2 netmask 255.255.255.255 i get kicked out of telnet and cant get back in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i see in that command you have 69.x.x.x is that what i use? as thats our public ip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 02:36:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370903#M308778</guid>
      <dc:creator>ktherrien</dc:creator>
      <dc:date>2013-11-20T02:36:07Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370904#M308780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you need to put the public IP there, I just put that there since I don´t have your IP. Did you move the server to the DMZ????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 15:00:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370904#M308780</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-20T15:00:56Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370905#M308782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, sorry I did not see the post where you were asking how you would give access to Internet from the DMZ, actually when I sent you the configuration example it included all that.&lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 16:57:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370905#M308782</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-20T16:57:20Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370906#M308783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about the access-list?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 19:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370906#M308783</guid>
      <dc:creator>ktherrien</dc:creator>
      <dc:date>2013-11-20T19:15:05Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370907#M308785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It worked you were very helpful thank you. I will be upgrading to version 8 at the end of the month will this new configuration still be valid?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 19:27:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370907#M308785</guid>
      <dc:creator>ktherrien</dc:creator>
      <dc:date>2013-11-20T19:27:51Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370908#M308787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Security levels allow traffic from inside to DMZ plus the PAT that I put on the configuration example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside has a security level of 100 and DMZ has a security level of 50&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 2. ACLs allow traffic from outside to DMZ. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You already created an ACE applied to the outside that in conjuntion with the static PAT allows the traffic through from the outside to the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.Traffic from the server to the Internet is allowed based on security levels and because of the PAT command that I put in on the example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please read the next document that explains how security levels work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/pix/pix63/configuration/guide/bafwcfg.html#wp1112321"&gt;http://www.cisco.com/en/US/docs/security/pix/pix63/configuration/guide/bafwcfg.html#wp1112321&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 19:31:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370908#M308787</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-20T19:31:55Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370909#M308788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the configuration will still be valid!!!&lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate the assistance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 19:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370909#M308788</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-20T19:32:47Z</dc:date>
    </item>
    <item>
      <title>Pix 515e cant access web server</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370910#M308790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also reply to the response that Jouni gave you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for letting us help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 19:33:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-cant-access-web-server/m-p/2370910#M308790</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-20T19:33:52Z</dc:date>
    </item>
  </channel>
</rss>

