<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access rules @ ASDM PIX 515 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302481#M343535</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just make sure that the Client is connected to the physical port &lt;STRONG&gt;"internal"&lt;/STRONG&gt; (Ethernet0) and the Server is connected to &lt;STRONG&gt;"external"&lt;/STRONG&gt; (Ethernet1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There should be no problem with the firewalls routing as all networks are directly connected. Just make sure they are connected to the correct physical interface and are configured with the correct IP address and network mask.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client should have the default gateway set to 192.168.100.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server should have the default gateway set to 10.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should pretty much be it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 Sep 2013 16:40:49 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-09-04T16:40:49Z</dc:date>
    <item>
      <title>Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302471#M343525</link>
      <description>&lt;H5 style="font-size: 11px; color: #000000; margin: 0px 0px 5px; word-wrap: break-word; font-weight: normal; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 14px; background-color: #ffffff;"&gt;Hello ! &lt;/H5&gt;&lt;H5 style="font-size: 11px; color: #000000; margin: 0px 0px 5px; word-wrap: break-word; font-weight: normal; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 14px; background-color: #ffffff;"&gt;I would like to ask for a help. I need to configure pix firewall 515E @ ASDM to : allow only http traffic from any source/destination between internal port (192.168.1.0/24) and outside (10.0.0.0/8). I have added for both ports (internal &amp;amp; external) rules to permint outgoing and incoming http traffic , but no success.Any time I try to simulate traffic with Packet Tracer some implicit rule catch my http packet and drop it.&lt;/H5&gt;&lt;H5 style="font-size: 11px; color: #000000; margin: 0px 0px 5px; word-wrap: break-word; font-weight: normal; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 14px; background-color: #ffffff;"&gt;NAT is not used , because firewall is set to transfer traffic without address translation. &lt;/H5&gt;&lt;H5 style="font-size: 11px; color: #000000; margin: 0px 0px 5px; word-wrap: break-word; font-weight: normal; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 14px; background-color: #ffffff;"&gt;Thanks !&lt;/H5&gt;&lt;P&gt; Stefan&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302471#M343525</guid>
      <dc:creator>Stefan Drotar</dc:creator>
      <dc:date>2019-03-12T02:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302472#M343526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be easier to check the actual problem if you could provide us with the CLI format configuration of the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if there is any sensitive information you could remove those.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 12:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302472#M343526</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-04T12:29:53Z</dc:date>
    </item>
    <item>
      <title>Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302473#M343527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well here the CLI output of running config.:&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 7.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif internal&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif external&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.0.0.1 255.0.0.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif mgmt&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.1.251 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list external_access_out extended permit tcp any eq www any eq www &lt;/P&gt;&lt;P&gt;access-list external_access_in extended permit tcp any eq www any eq www &lt;/P&gt;&lt;P&gt;access-list internal_access_in extended permit tcp any eq www any eq www &lt;/P&gt;&lt;P&gt;access-list internal_access_out extended permit tcp any eq www any eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu internal 1500&lt;/P&gt;&lt;P&gt;mtu external 1500&lt;/P&gt;&lt;P&gt;mtu mgmt 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group internal_access_in in interface internal&lt;/P&gt;&lt;P&gt;access-group internal_access_out out interface internal&lt;/P&gt;&lt;P&gt;access-group external_access_in in interface external&lt;/P&gt;&lt;P&gt;access-group external_access_out out interface external&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 mgmt&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 mgmt&lt;/P&gt;&lt;P&gt;http 192.168.1.254 255.255.255.255 internal&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:d1f415fe5f3e74fd0fd80ffb05a3d348&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I apologize for my small knowledges I am just CCNA 1,2 done. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 13:05:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302473#M343527</guid>
      <dc:creator>Stefan Drotar</dc:creator>
      <dc:date>2013-09-04T13:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302474#M343528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a couple of problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First one is that you have configured all interfaces with the same &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value. This essentially means that traffic will be blocked whatever ACL you configure on the interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way around this is to use &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally better choice might be changing the internal interfaces &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; to the usual value of &lt;STRONG&gt;"100"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then there is also problem with the ACL. No HTTP connection will have both the source and the destination port as TCP/80. Also since this is a Statefull Firewall we dont need to take into consideration return traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would suggest the following modifications to the firewall configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;clear configure access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;clear configure access-list&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above commands will first remove all the ACLs from the interfaces and it will then remove all the ACLs from the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this add the new configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INTERNAL-IN remark Only permit HTTP traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INTERNAL-IN permit tcp any any eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group INTERNAL-IN in interface internal&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list EXTERNAL-IN remark Only permit HTTP traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list EXTERNAL-IN permit tcp any any eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group EXTERNAL-IN in interface external&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Do notice that will only allow HTTP traffic from behind either interface. All other traffic will be blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if this didnt solve the problem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 14:41:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302474#M343528</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-04T14:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302475#M343529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have other networks than those configured on the interface then you will need to confiugre Static routes for them. You also have no default route configured on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I take it this is some test setup perhaps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 14:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302475#M343529</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-04T14:44:28Z</dc:date>
    </item>
    <item>
      <title>Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302476#M343530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni ! &lt;/P&gt;&lt;P&gt;Firstly, thanks very much for your answer. &lt;/P&gt;&lt;P&gt;Yes, this is just some school project where I check firewall performance. For that reason I need to configure firewall with mentioned interfaces and rules about http service. Everything else ought to be in default mode and no other network is beyound firewall interfaces so no static or any routing is required.&amp;nbsp; The traffic simulated here is common&amp;nbsp; http client- server communication process . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 15:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302476#M343530</guid>
      <dc:creator>Stefan Drotar</dc:creator>
      <dc:date>2013-09-04T15:36:53Z</dc:date>
    </item>
    <item>
      <title>Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302477#M343531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Were you able to test the configuration changes and get the connections to work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 15:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302477#M343531</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-04T15:42:29Z</dc:date>
    </item>
    <item>
      <title>Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302478#M343532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Helo, &lt;/P&gt;&lt;P&gt;our&amp;nbsp; university-laboratory just bought a device which can emulate clients or even client-server traffic.&amp;nbsp; For example, eth0 generates clients requests and eht1 of the device is waiting for generated requests. And now , the firewall is in the middle of mentioned ports &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, I have just done changes you recommended but no success at all. I paste here config again: &lt;/P&gt;&lt;P&gt;PIX Version 7.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif internal&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif external&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.0.0.1 255.0.0.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif mgmt&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.1.251 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list INTERNAL-IN remark Only permit HTTP traffic&lt;/P&gt;&lt;P&gt;access-list INTERNAL-IN extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list EXTERNAL-IN remark Only permit HTTP traffic&lt;/P&gt;&lt;P&gt;access-list EXTERNAL-IN extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu internal 1500&lt;/P&gt;&lt;P&gt;mtu external 1500&lt;/P&gt;&lt;P&gt;mtu mgmt 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group INTERNAL-IN in interface internal&lt;/P&gt;&lt;P&gt;access-group EXTERNAL-IN in interface external&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 mgmt&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 mgmt&lt;/P&gt;&lt;P&gt;http 192.168.1.254 255.255.255.255 internal&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:000ce33fe38ed23a52556df44dace546&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just used&amp;nbsp; "&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;" instead of different port security levels , because it is more similar to default config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Stefan &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 15:55:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302478#M343532</guid>
      <dc:creator>Stefan Drotar</dc:creator>
      <dc:date>2013-09-04T15:55:28Z</dc:date>
    </item>
    <item>
      <title>Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302479#M343533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are the default gateway configuration correct&amp;nbsp; on both sides of the PIX so that the traffic is first forwarded to the PIX and then back to the PIX from the other network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any hitcounts on the ACLs when you use command &lt;STRONG&gt;"show access-list"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could always also check what the ASDM says in the Monitoring section when you try to initiate the connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh and I just noticed, you were talking about network 192.168.1.0/24 which is not behind &lt;STRONG&gt;"internal"&lt;/STRONG&gt; interface but actually &lt;STRONG&gt;"management" &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 16:01:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302479#M343533</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-04T16:01:07Z</dc:date>
    </item>
    <item>
      <title>Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302480#M343534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is sending to wrong interface. destination port should be "external" not "mgmt" (management). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt; Through-the-device packet to/from management-only network is denied: tcp source "internal":192.168.100.174/46718 destination "mgmt":192.168.1.1/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it just found more match with 192.168.1.0/24 interface so it routes to that port. But I need to packets be forwarded only between "internal" port- clients and "external&lt;SPAN style="font-size: 10pt;"&gt;" port- servers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks !&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Stefan&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 16:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302480#M343534</guid>
      <dc:creator>Stefan Drotar</dc:creator>
      <dc:date>2013-09-04T16:32:42Z</dc:date>
    </item>
    <item>
      <title>Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302481#M343535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just make sure that the Client is connected to the physical port &lt;STRONG&gt;"internal"&lt;/STRONG&gt; (Ethernet0) and the Server is connected to &lt;STRONG&gt;"external"&lt;/STRONG&gt; (Ethernet1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There should be no problem with the firewalls routing as all networks are directly connected. Just make sure they are connected to the correct physical interface and are configured with the correct IP address and network mask.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client should have the default gateway set to 192.168.100.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server should have the default gateway set to 10.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should pretty much be it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 16:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302481#M343535</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-04T16:40:49Z</dc:date>
    </item>
    <item>
      <title>Access rules @ ASDM PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302482#M343536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi , &lt;/P&gt;&lt;P&gt;yes I am thinking about that software which emulates http get- requests just generate wrong destination IP addess,because ASDM says that destination address is denied and destination address is my management port.&lt;/P&gt;&lt;P&gt;Show interface commnad&amp;nbsp; confirmed that physical connections are alright and&amp;nbsp; up-up links as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will contact my teachet about this issue. &lt;/P&gt;&lt;P&gt;Thanks a lot !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best,&lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 16:51:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-asdm-pix-515/m-p/2302482#M343536</guid>
      <dc:creator>Stefan Drotar</dc:creator>
      <dc:date>2013-09-04T16:51:30Z</dc:date>
    </item>
  </channel>
</rss>

