<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Noob question: IP routing [PIX515E] in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155153#M359228</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried addint the NAT0 rules I suggested originally?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean the rules that will tell the PIX that it isnt supposed to do any NAT on the traffic. From what I understood the device infront of the PIX handles the NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So lets say you want the network 192.168.1.0/24 to go through the PIX wihtout any NAT then you could configure this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 remark NO NAT for LAN network&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 192.168.1.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understood the situation correctly you now only have the switch and workstation(s) behind the PIX "inside" interface? If there is only the network 192.168.1.0/24 behind the PIX then that above NAT0 configuration should be enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also your default route shouldnt point to the device itself&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no route outside 0.0.0.0 0.0.0.0 192.168.0.2 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as I and Julio have said. You will never be able to ping the PIX "outside" interface IP address from behind the "inside" of the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 31 Mar 2013 16:06:05 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-03-31T16:06:05Z</dc:date>
    <item>
      <title>Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155139#M359214</link>
      <description>&lt;P&gt;Forgive me for I know this is probably Routing 101.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know it has to do something with routing, but can't seem to figure out why it isn't working.&lt;/P&gt;&lt;P&gt;PIX Version 7.1(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname PIX515E&lt;/P&gt;&lt;P&gt;domain-name LEDUC.LOCAL&lt;/P&gt;&lt;P&gt;enable password KImMvv.HAzqvR6HP encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name LEDUC.LOCAL&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:b7e0f1e67acdbeccf8d614f5ac31faf4&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't ping from 192.168.1.0 network. I can ping 192.168.0.2, but nothing past it. I'm having the same issue on my 2600.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155139#M359214</guid>
      <dc:creator>nateleduc</dc:creator>
      <dc:date>2019-03-12T01:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155140#M359215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you cant ping from 192.168.1.0/24 to the internet right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add the following and let me know &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol ICMP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it works then I will explain&amp;nbsp; you know what you were missing &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 22:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155140#M359215</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-30T22:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155141#M359216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want the 2 networks to communicate between eachother directly without any NAT then I would suggest adding the following configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ICMP Inspection&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT0 Between the Networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Allow ICMP from Outside to Inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN permit icmp 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should enable ICMP between both of the private networks. If you want something else done please clarify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 22:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155141#M359216</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-30T22:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155142#M359217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a a device (filter/NAT) at 192.168.0.1, I can't ping it from the 192.168.1.0 network. I have a NAT already set up, I don't want to have two setup unless it's needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also adding &lt;SPAN style="font-size: 10pt;"&gt;"fixup protocol icmp " returned with &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;INFO: converting 'fixup protocol icmp ' to MPF commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still not able to &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 22:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155142#M359217</guid>
      <dc:creator>nateleduc</dc:creator>
      <dc:date>2013-03-30T22:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155143#M359218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration removes NAT between these 2 networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want that the LAN network of 192.168.1.0/24 isnt NATed at all to any destination network (and the router would do the actual NAT) then you can modify the above configuration like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 192.168.1.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because of you "security-level" values the traffic fron "inside" to "outside" should already be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to confirm it with ACL you can always add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN remark Allow All Traffic from LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN permit ip 192.168.1.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group INSIDE-IN in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 22:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155143#M359218</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-30T22:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155144#M359219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont have a default route configured though it shouldnt affect pinging directly connected networks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though you naturally need it for any traffic headed off your network &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 22:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155144#M359219</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-30T22:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155145#M359220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping the default gateway or the device provided by your ISP IP address from the ASA itself??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping from a PC on the inside to the ASA inside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping from a PC to the default gateway or the ISP IP device address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 22:51:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155145#M359220</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-30T22:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155146#M359221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you all for the replies, I appreciate them all. Here is a what my network looks like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eth0 - DHCP&lt;/P&gt;&lt;P&gt;&lt;FILTER&gt;&lt;/FILTER&gt;&lt;/P&gt;&lt;P&gt;Eth1 -192.168.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eth0 - 192.168.0.2&lt;/P&gt;&lt;P&gt;&lt;PIX515E&gt;&lt;/PIX515E&gt;&lt;/P&gt;&lt;P&gt;eth1 - 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eth0 - 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;CISCO 2600=""&gt;&lt;/CISCO&gt;&lt;/P&gt;&lt;P&gt;eth1 - 192.168.3.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping 192.168.1.1 from the 2600, although I can't ping 192.168.0.2 or 192.168.0.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The filter (192.168.0.1) doesn't have any problems and passes through traffic no problem. I've tested it alone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added &lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 &lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;in the PIX515E&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;From the PIX I can ping 192.168.0.1 and 192.168.1.2.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;From the 2600 I can ping 192.168.1.1 but not 192.168.0.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;confusion, confusion everywhere.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 23:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155146#M359221</guid>
      <dc:creator>nateleduc</dc:creator>
      <dc:date>2013-03-30T23:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155147#M359222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding you shouldnt be able to PING an PIX interface IP address from behind anywhere else other than that said interface. That is why your statement that you can ping the 192.168.0.2 from the 2600 seems strange to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have one more network behind the PIX you will naturally need a route for it on the PIX also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 192.168.3.0 255.255.255.0 192.168.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you would have to make NAT0 rules for that network also just like with the 192.168.1.0/24 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though if I understood you correctly this wasnt the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would check that all the needed static routes are in place and that you have done the above suggest configurations. Maybe you can copy/paste your current configuration here again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jouni Forss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 23:55:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155147#M359222</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-30T23:55:36Z</dc:date>
    </item>
    <item>
      <title>Re:Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155148#M359223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Sorry folk I just dont get it. Is there a way you could set a diagram so Jounni and I can have a better picture of how your network look like...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 00:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155148#M359223</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-31T00:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155149#M359224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should do, see attached. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;From the PIX I can ping 192.168.0.1 and 192.168.1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;From the 2600 I can ping 192.168.1.1 but not 192.168.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Pretty much ignore the 192.168.2.X network for now. I'll get to that later.&lt;/P&gt;&lt;P&gt; &lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/7/0/133074-network.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 04:53:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155149#M359224</guid>
      <dc:creator>nateleduc</dc:creator>
      <dc:date>2013-03-31T04:53:49Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155150#M359225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;for the 2600&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 695 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.3&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname 2600&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable secret 5 $1$bmO1$/LuQ62za7Clv79MMfG1FR/&lt;/P&gt;&lt;P&gt;enable password cisco2600&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no aaa new-model&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;no ip routing&lt;/P&gt;&lt;P&gt;no ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address 192.168.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; half-duplex&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1/0&lt;/P&gt;&lt;P&gt; ip address 192.168.3.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; password ******&lt;/P&gt;&lt;P&gt; login&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 695 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.3&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname 2600&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable secret 5 $1$bmO1$/LuQ62za7Clv79MMfG1FR/&lt;/P&gt;&lt;P&gt;enable password cisco2600&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no aaa new-model&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;no ip routing&lt;/P&gt;&lt;P&gt;no ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address 192.168.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; half-duplex&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1/0&lt;/P&gt;&lt;P&gt; ip address 192.168.3.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; password *******&lt;/P&gt;&lt;P&gt; login&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For the PIX515E&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 7.1(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname PIX515E&lt;/P&gt;&lt;P&gt;domain-name LEDUC.LOCAL&lt;/P&gt;&lt;P&gt;enable password KImMvv.HAzqvR6HP encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name LEDUC.LOCAL&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:b7e0f1e67acdbeccf8d614f5ac31faf4&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 04:55:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155150#M359225</guid>
      <dc:creator>nateleduc</dc:creator>
      <dc:date>2013-03-31T04:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155151#M359226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the 2600 you should be able to ping 192.168.0.1, Are you able to do it???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will never be able to ping 192.168.0.2 as it's a far end interface, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;"For security purposes the security appliance does&amp;nbsp; not support far-end interface ping, that is pinging the IP address of&amp;nbsp; the outside interface from the inside network."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Source: &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/trouble.html" rel="nofollow" style="border-collapse: collapse; list-style: none; outline: none; color: #2f6681; text-decoration: none;"&gt;http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/trouble.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you need to add the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the PIX:&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;policy-map global_policy&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0 0&amp;nbsp; Default_gateway_ip_address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the 2600&lt;/P&gt;&lt;P&gt;ip routing &lt;/P&gt;&lt;P&gt;Ip route 0 0 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface fast 0/0&lt;/P&gt;&lt;P&gt;ip route-cache&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface fast 1/0&lt;/P&gt;&lt;P&gt;ip route-cache &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 07:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155151#M359226</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-31T07:20:14Z</dc:date>
    </item>
    <item>
      <title>Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155152#M359227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm removing the 2600, as it doesn't serves a purpose anymore. I still cannot ping 192.168.0.2. Here is my current config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 7.1(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname PIX515E&lt;/P&gt;&lt;P&gt;domain-name LEDUC.LOCAL&lt;/P&gt;&lt;P&gt;enable password KImMvv.HAzqvR6HP encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name LEDUC.LOCAL&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:b7e0f1e67acdbeccf8d614f5ac31faf4&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From my workstation I can ping 192.168.1.1 , but nothing further&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 15:57:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155152#M359227</guid>
      <dc:creator>nateleduc</dc:creator>
      <dc:date>2013-03-31T15:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155153#M359228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried addint the NAT0 rules I suggested originally?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean the rules that will tell the PIX that it isnt supposed to do any NAT on the traffic. From what I understood the device infront of the PIX handles the NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So lets say you want the network 192.168.1.0/24 to go through the PIX wihtout any NAT then you could configure this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 remark NO NAT for LAN network&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 192.168.1.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understood the situation correctly you now only have the switch and workstation(s) behind the PIX "inside" interface? If there is only the network 192.168.1.0/24 behind the PIX then that above NAT0 configuration should be enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also your default route shouldnt point to the device itself&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no route outside 0.0.0.0 0.0.0.0 192.168.0.2 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as I and Julio have said. You will never be able to ping the PIX "outside" interface IP address from behind the "inside" of the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 16:06:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155153#M359228</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-31T16:06:05Z</dc:date>
    </item>
    <item>
      <title>Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155154#M359229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to be clear, I will won't be able to ping 192.168.0.2, although I should be able to ping 192.168.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added the above with no luck:&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 7.1(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname PIX515E&lt;/P&gt;&lt;P&gt;domain-name LEDUC.LOCAL&lt;/P&gt;&lt;P&gt;enable password KImMvv.HAzqvR6HP encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name LEDUC.LOCAL&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 remark NO NAT for LAN network&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 extended permit ip 192.168.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:b7e0f1e67acdbeccf8d614f5ac31faf4&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="font-size: 10pt;"&gt;If I understood the situation correctly you now only have the switch and workstation(s) behind the PIX "inside" interface? If there is only the network 192.168.1.0/24 behind the PIX then that above NAT0 configuration should be enough."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;~Correct, the network is as follows&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Filter &amp;lt;-&amp;gt; PIX515E &amp;lt;-&amp;gt; switch&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;with the switch being on the 192.168.1.0/24 network&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;FYI, I can't ping anything past 192.168.1.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 16:24:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155154#M359229</guid>
      <dc:creator>nateleduc</dc:creator>
      <dc:date>2013-03-31T16:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155155#M359230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment I dont see a reason for this in the PIX configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you make sure that the Filter Device has a route for the network 192.168.1.0/24 pointing towards 192.168.0.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is because when a host from the address for example 192.168.1.100 sends ICMP to 192.168.0.1 there will be NO NAT as we configured. Therefore the Filter Device will need to have a return route for the ICMP traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So could you make sure that the Filter Device has a route for 192.168.1.0/24 pointing towards the PIX "outside" interface IP 192.168.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 16:28:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155155#M359230</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-31T16:28:44Z</dc:date>
    </item>
    <item>
      <title>Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155156#M359231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Forgive me for my ignorance, But the filter works fine on its own, meaning if I plug up a workstation to eth1 (192.168.0.1) and give it a static IP it passes throguh traffic and responds to pings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay so basicly I need to ssh into my filter and add a return path to the 192.168.1.x network correct? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I'm getting at is possible a triangular routing problem &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 16:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155156#M359231</guid>
      <dc:creator>nateleduc</dc:creator>
      <dc:date>2013-03-31T16:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155157#M359232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a host directly connected to the Filter Device (which to my understanding is your Internet edge device) then there is naturally no problem with the connectivity of the host and the Filter Device as they are connected to the same network 192.168.0.0/24. They both see the network as directly connected so naturally they can communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when you have added the PIX to the setup and you have an additional network of 192.168.1.0/24 behind the PIX then naturally the Filter Device needs to have a route for the network 192.168.1.0/24 because otherwise it is just going to forward all traffic towards its default route which I imagine is the default route to the Internet/ISP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to my understanding if you dont already have a route for the network 192.168.1.0/24 configured on the Filter Device then you have to add that to the device and point that route towards the PIX "outside" interface IP address of 192.168.0.2. Otherwise the traffic simply wont work from the workstation to the Filter Device WHEN the PIX is connected to the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 16:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155157#M359232</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-31T16:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: Noob question: IP routing [PIX515E]</title>
      <link>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155158#M359233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agree with Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It got to be that the Filter device does not have a route back to you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If by any chance you do not know how to create a route on that layer 3 device do the following and let us know&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside)&amp;nbsp; 1 0 0 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this all traffic being source from the Inside interface when reaching another host on the outside interface it will look like the outside interface IP address, then the filter will be able to route the traffic back as it knows where the outside interface it's ( On one of it's directly connected networks)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Mar 2013 17:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/noob-question-ip-routing-pix515e/m-p/2155158#M359233</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-31T17:27:16Z</dc:date>
    </item>
  </channel>
</rss>

