<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX ping Internal subnet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126668#M392721</link>
    <description>&lt;P&gt;I have a network with multiple subnet, when I put the ip adress of pix as a gateway, I can not ping the others IP subnets, the ping to outside is correct, and the ping works in the same subnet. Internet connection works, my need is only permit ping between subnets when the inside IP the pix is used as a gateway? thank you for your help.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:47:53 GMT</pubDate>
    <dc:creator>casaic2it</dc:creator>
    <dc:date>2019-03-12T00:47:53Z</dc:date>
    <item>
      <title>PIX ping Internal subnet</title>
      <link>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126668#M392721</link>
      <description>&lt;P&gt;I have a network with multiple subnet, when I put the ip adress of pix as a gateway, I can not ping the others IP subnets, the ping to outside is correct, and the ping works in the same subnet. Internet connection works, my need is only permit ping between subnets when the inside IP the pix is used as a gateway? thank you for your help.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126668#M392721</guid>
      <dc:creator>casaic2it</dc:creator>
      <dc:date>2019-03-12T00:47:53Z</dc:date>
    </item>
    <item>
      <title>PIX ping Internal subnet</title>
      <link>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126669#M392724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If possible, can you share the PIX configurations and give example IP addresses for both source and destination of the ICMP/PING so we can correctly go through your configuration and determine the cause of the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most common reason would naturally be ACL rules, ICMP inspection/fixup, NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 13:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126669#M392724</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-16T13:42:08Z</dc:date>
    </item>
    <item>
      <title>PIX ping Internal subnet</title>
      <link>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126670#M392729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pixfirewall# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name ciscopix.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 10000-20000&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 30000-40000&lt;/P&gt;&lt;P&gt;fixup protocol sip 5001&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip 5061&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.200.0 Avaya&lt;/P&gt;&lt;P&gt;name 208.65.153.251 youtube&lt;/P&gt;&lt;P&gt;object-group service Blocked-UDP-Ports udp&lt;/P&gt;&lt;P&gt;&amp;nbsp; description All ports blocked for Bit Torrent UDP&lt;/P&gt;&lt;P&gt;&amp;nbsp; port-object range 10001 65535&lt;/P&gt;&lt;P&gt;&amp;nbsp; port-object range 1024 1193&lt;/P&gt;&lt;P&gt;&amp;nbsp; port-object range 1195 9999&lt;/P&gt;&lt;P&gt;object-group service BitTorrent-Tracker tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; description TCP Ports used by Bit Torrent for tracker communication&lt;/P&gt;&lt;P&gt;&amp;nbsp; port-object eq 2710&lt;/P&gt;&lt;P&gt;&amp;nbsp; port-object range 6881 6999&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 181.92.15.186 eq smtp&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq 3230&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq 3290&lt;/P&gt;&lt;P&gt;access-list 100 permit udp any any eq 3290&lt;/P&gt;&lt;P&gt;access-list 100 permit udp any any eq 3230&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 141.37.165.125 eq smtp&lt;/P&gt;&lt;P&gt;access-list 100 permit udp host 172.19.44.13 any eq domain&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 172.19.44.13 any eq domain&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 172.19.44.13 any eq smtp&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 141.37.165.123 eq www&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 141.37.165.123 eq smtp&lt;/P&gt;&lt;P&gt;access-list 100 permit udp host 172.19.44.173 any eq domain&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 172.19.44.173 any eq www&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 172.19.44.173 any eq smtp&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 172.19.44.173 eq www&lt;/P&gt;&lt;P&gt;access-list 100 permit udp any any eq 33434&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 172.19.44.13 any eq pop3&lt;/P&gt;&lt;P&gt;access-list 10 deny ip 192.168.201.0 255.255.255.0 host 218.65.153.253&lt;/P&gt;&lt;P&gt;access-list 131 permit host 192.168.201.101&lt;/P&gt;&lt;P&gt;access-list 99 permit ip any host 78.37.108.14&lt;/P&gt;&lt;P&gt;access-list 99 permit ip host 178.37.18.14 any&lt;/P&gt;&lt;P&gt;access-list 99 permit tcp any host 141.37.65.125 eq www&lt;/P&gt;&lt;P&gt;access-list 99 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 99 permit tcp any host 141.37.65.123 eq https&lt;/P&gt;&lt;P&gt;access-list 99 permit tcp any host 141.37.65.123 eq smtp&lt;/P&gt;&lt;P&gt;access-list 99 permit tcp any host 141.37.65.123 eq pop3&lt;/P&gt;&lt;P&gt;access-list 111 permit ip any any&lt;/P&gt;&lt;P&gt;access-list 111 permit icmp any any&lt;/P&gt;&lt;P&gt;no pager&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 198.122.235.17 255.255.255.252&lt;/P&gt;&lt;P&gt;ip address inside 172.19.44.253 255.255.252.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 192.168.2.3 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.201.251 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location Avaya 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 18.15.153.238 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 18.15.153.253 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 41.13.165.125 172.19.44.173 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 41.13.165.123 172.19.44.13 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group 99 in interface outside&lt;/P&gt;&lt;P&gt;routing interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 196.12.235.118 1&lt;/P&gt;&lt;P&gt;route inside 10.0.44.0 255.255.252.0 172.19.44.254 2&lt;/P&gt;&lt;P&gt;route inside 10.0.52.0 255.255.252.0 172.19.44.254 1&lt;/P&gt;&lt;P&gt;route inside 10.148.242.0 255.255.255.0 172.19.44.254 1&lt;/P&gt;&lt;P&gt;route inside 10.148.242.10 255.255.255.255 172.19.44.254 1&lt;/P&gt;&lt;P&gt;route inside 172.19.48.0 255.255.252.0 172.19.44.254 1&lt;/P&gt;&lt;P&gt;route inside 192.168.57.0 255.255.255.0 172.19.44.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-pptp&lt;/P&gt;&lt;P&gt;sysopt connection permit-l2tp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the inside ip address is 172.19.44.251.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 13:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126670#M392729</guid>
      <dc:creator>casaic2it</dc:creator>
      <dc:date>2013-01-16T13:56:59Z</dc:date>
    </item>
    <item>
      <title>PIX ping Internal subnet</title>
      <link>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126671#M392734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure if the "fixup protocol icmp" would help in this situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually with "newer" softwares (minimum 7.0 software on the PIX) this might be achieved with "same-security-traffic permit" commands since in your situation the traffic is first entering the PIX and then its supposed to continue back through the same interface to the other local subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not totally sure what the configuration format would be for 6.3 to get this working or if its even possible in this case. I might be able to test this at some point with some of our older PIX firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best situation would ocfourse be if all the hosts were connected to the router behind the PIX firewall and routing between the local subnets were handled there. Now it seems you have one big subnet between the PIX and the LAN router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I'd imagine your main problem is the fact that PIX firewalls (and Cisco Firewalls in general) dont like a setup where the traffic enters and leaves the same interface. In this case the "inside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 14:28:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126671#M392734</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-16T14:28:14Z</dc:date>
    </item>
    <item>
      <title>PIX ping Internal subnet</title>
      <link>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126672#M392738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, exactly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx a lot, i will wait your test. i have another asa 5510 with the same problem, i will test &lt;/P&gt;&lt;P&gt;same-security-traffic permit" command and let you know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICTMAN&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 15:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126672#M392738</guid>
      <dc:creator>casaic2it</dc:creator>
      <dc:date>2013-01-16T15:51:55Z</dc:date>
    </item>
    <item>
      <title>PIX ping Internal subnet</title>
      <link>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126673#M392741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command I mentioned isnt the full command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are 2 different settings you can enable on the firewall with proper software level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They are&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;same-security-traffic permit inter-interface = This will enable traffic between interfaces with same "security-level" value&lt;/LI&gt;&lt;LI&gt;same-security-traffic permit intra-interface = This will enable traffic to enter and leave through the same interface&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 15:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-ping-internal-subnet/m-p/2126673#M392741</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-16T15:54:31Z</dc:date>
    </item>
  </channel>
</rss>

