<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help with PIX 6.2 interface access &amp; appropriate ACLs for SSH in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-pix-6-2-interface-access-appropriate-acls-for-ssh/m-p/2310906#M345082</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A lot depends on where the 10.1.2.0/24 network is in relation to the Pix. If it is downstream from the inside interface (i.e. beyond the 10.1.1.254 gateway) then a simple:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route inside 10.1.2.0 255.255.255.0 10.1.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will do the trick given that you already have the necessary ssh statement in place. If the 10.1.2.0/24 network is somewhere else, then you may need to adjust access-list and nat statements.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Aug 2013 18:08:20 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2013-08-06T18:08:20Z</dc:date>
    <item>
      <title>Help with PIX 6.2 interface access &amp; appropriate ACLs for SSH</title>
      <link>https://community.cisco.com/t5/network-security/help-with-pix-6-2-interface-access-appropriate-acls-for-ssh/m-p/2310905#M345081</link>
      <description>&lt;P&gt;I'm not very proficient with older PIX 6.2(1) code and I have the following scenario for a customer and was wondering if anyone could please help me.&amp;nbsp; Have interface to access PIX device on 10.1.1.242, which is reachable currently from the 10.1.1.x network, but need to get this configured for the 10.1.2.x network. Also trying to get SSH working correctly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;current interface/nameif config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ_2_XYZ security50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;current interface/IP config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside 10.1.5.254 255.0.0.0&lt;/P&gt;&lt;P&gt;ip address inside 10.1.1.242 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address DMZ_2_XYZ 10.1.11.2 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;current ACL config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_2_XYZ_access_IN permit ip any any &lt;/P&gt;&lt;P&gt;access-list DMZ_2_XYZ_access_IN permit icmp any any &lt;/P&gt;&lt;P&gt;access-group DMZ_2_XYZ_access_IN in interface DMZ_2_XYZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Static config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ_2_XYZ) 10.1.0.0 10.1.0.0 netmask 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current SSH config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ssh 10.1.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 10.1.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 10.3.0.0 255.255.0.0 DMZ_2_XYZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current route statements:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;route inside 10.1.4.0 255.255.255.0 10.1.1.254 1&lt;/P&gt;&lt;P&gt;route DMZ_2_XYZ 10.3.0.0 255.255.0.0 10.1.11.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, from what I know, first of all this needs a static mapping:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,&lt;EM&gt;&lt;STRONG&gt;???&lt;/STRONG&gt;&lt;/EM&gt;) tcp&lt;EM&gt;&lt;STRONG&gt; interface &lt;/STRONG&gt;&lt;/EM&gt;22 10.1.1.242 22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then this needs an ACL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CORP_SSH_ACCESS_IN permit tcp 10.1.2.0 netmask 255.255.255.0 host 10.1.1.242 eq 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;This is where I'm getting hung up&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;a) the PIX doesnt know about the 10.1.2.x network&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i. and does it need a route statement to get back to the 10.1.2.x -- my thoughts are yes, b/c it wont know how to return traffic&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;b) not sure which order to place the interfaces in the "static (X,Y)" area since no interface is bound or connected to 10.1.2.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;c) I'm used to running packet-tracer command on ASA's, so I'm trying to get a quick primer on the "capture" utility on PIX 6.2&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14pt;"&gt;&lt;STRONG&gt;Any help is much appreciated!!!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:22:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-pix-6-2-interface-access-appropriate-acls-for-ssh/m-p/2310905#M345081</guid>
      <dc:creator>Jonathan Wiggins</dc:creator>
      <dc:date>2019-03-12T02:22:11Z</dc:date>
    </item>
    <item>
      <title>Help with PIX 6.2 interface access &amp; appropriate ACLs for SSH</title>
      <link>https://community.cisco.com/t5/network-security/help-with-pix-6-2-interface-access-appropriate-acls-for-ssh/m-p/2310906#M345082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A lot depends on where the 10.1.2.0/24 network is in relation to the Pix. If it is downstream from the inside interface (i.e. beyond the 10.1.1.254 gateway) then a simple:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route inside 10.1.2.0 255.255.255.0 10.1.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will do the trick given that you already have the necessary ssh statement in place. If the 10.1.2.0/24 network is somewhere else, then you may need to adjust access-list and nat statements.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Aug 2013 18:08:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-pix-6-2-interface-access-appropriate-acls-for-ssh/m-p/2310906#M345082</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-08-06T18:08:20Z</dc:date>
    </item>
    <item>
      <title>Help with PIX 6.2 interface access &amp; appropriate ACLs for SSH</title>
      <link>https://community.cisco.com/t5/network-security/help-with-pix-6-2-interface-access-appropriate-acls-for-ssh/m-p/2310907#M345085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;will give that a shot. I'm just not used to the static mapping portion on 6.2 code, and was trying to tap into some hive-knowledge here...&amp;nbsp; off to RTFM &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Aug 2013 18:37:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-pix-6-2-interface-access-appropriate-acls-for-ssh/m-p/2310907#M345085</guid>
      <dc:creator>Jonathan Wiggins</dc:creator>
      <dc:date>2013-08-06T18:37:51Z</dc:date>
    </item>
  </channel>
</rss>

