<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pix 501 dropping devices from network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-dropping-devices-from-network/m-p/2103239#M395409</link>
    <description>&lt;P&gt;Hi All.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having a quirky problem with a PIX 501 and was wondering if anyone had any ideas.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recently I've pulled a PIX 501 out of a closet (having never been used) and configured it for a VPN with my PIX 506e at an offsite location. This offsite location has a PC, Printer, Access Point, and remote VOIP phone. The VPN itself works great, but periodically the PIX just drops some network devices, specifically the Access Point and the Firewall. Both devices stay off until I reboot it (through an SSH connection) they then spring back to life.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before I go buy another firewall only to have the same thing happen I was wondering if it could be a config issue. Or is this most likely a hardware problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password W.42MAXXZHhUnW7N encrypted&lt;/P&gt;&lt;P&gt;passwd tVCAzWYvj2lO5MWD encrypted&lt;/P&gt;&lt;P&gt;hostname Firewall1&lt;/P&gt;&lt;P&gt;domain-name domain.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.111.0 255.255.255.0 192.168.112.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.111.0 255.255.255.0 192.168.114.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list RemoteVPN permit ip 192.168.111.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging console debugging&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging host inside 192.168.112.95&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 111.111.111.111 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.111.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 111.111.111.111 255&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_3DES esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map newmap 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map newmap 10 match address RemoteVPN&lt;/P&gt;&lt;P&gt;crypto map newmap 10 set peer 113.111.111.11&lt;/P&gt;&lt;P&gt;crypto map newmap 10 set transform-set ESP_3DES&lt;/P&gt;&lt;P&gt;crypto map newmap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 113.111.111.11 netmask 255.255.255.248&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 20&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.111.10-192.168.111.40 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.112.5 8.8.8.8&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;username cwcchicago password NcrNMAXXMuaQjZ.I encrypted privilege 15&lt;/P&gt;&lt;P&gt;username CWCChicago password WZyMAXXX9wrptdcx encrypted privilege 2&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;BR /&gt;&lt;/PRE&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:25:04 GMT</pubDate>
    <dc:creator>cwcadmin1</dc:creator>
    <dc:date>2019-03-12T00:25:04Z</dc:date>
    <item>
      <title>Pix 501 dropping devices from network</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-dropping-devices-from-network/m-p/2103239#M395409</link>
      <description>&lt;P&gt;Hi All.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having a quirky problem with a PIX 501 and was wondering if anyone had any ideas.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recently I've pulled a PIX 501 out of a closet (having never been used) and configured it for a VPN with my PIX 506e at an offsite location. This offsite location has a PC, Printer, Access Point, and remote VOIP phone. The VPN itself works great, but periodically the PIX just drops some network devices, specifically the Access Point and the Firewall. Both devices stay off until I reboot it (through an SSH connection) they then spring back to life.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before I go buy another firewall only to have the same thing happen I was wondering if it could be a config issue. Or is this most likely a hardware problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password W.42MAXXZHhUnW7N encrypted&lt;/P&gt;&lt;P&gt;passwd tVCAzWYvj2lO5MWD encrypted&lt;/P&gt;&lt;P&gt;hostname Firewall1&lt;/P&gt;&lt;P&gt;domain-name domain.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.111.0 255.255.255.0 192.168.112.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.111.0 255.255.255.0 192.168.114.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list RemoteVPN permit ip 192.168.111.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging console debugging&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging host inside 192.168.112.95&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 111.111.111.111 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.111.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 111.111.111.111 255&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP_3DES esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map newmap 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map newmap 10 match address RemoteVPN&lt;/P&gt;&lt;P&gt;crypto map newmap 10 set peer 113.111.111.11&lt;/P&gt;&lt;P&gt;crypto map newmap 10 set transform-set ESP_3DES&lt;/P&gt;&lt;P&gt;crypto map newmap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 113.111.111.11 netmask 255.255.255.248&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 20&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.111.10-192.168.111.40 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.112.5 8.8.8.8&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;username cwcchicago password NcrNMAXXMuaQjZ.I encrypted privilege 15&lt;/P&gt;&lt;P&gt;username CWCChicago password WZyMAXXX9wrptdcx encrypted privilege 2&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;BR /&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:25:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-dropping-devices-from-network/m-p/2103239#M395409</guid>
      <dc:creator>cwcadmin1</dc:creator>
      <dc:date>2019-03-12T00:25:04Z</dc:date>
    </item>
    <item>
      <title>Pix 501 dropping devices from network</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-dropping-devices-from-network/m-p/2103240#M395413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried other troubleshooting? like; 'clear arp', try to ping the AP, take captures, see logs, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX firewall is getting to end of support, but further troubleshooting needs to be performed at the moment you have the issue to confirm if this is harware of software. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2012 03:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-dropping-devices-from-network/m-p/2103240#M395413</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-11-20T03:49:29Z</dc:date>
    </item>
    <item>
      <title>Pix 501 dropping devices from network</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-dropping-devices-from-network/m-p/2103241#M395419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Felipe, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for responding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried the following things to no avail:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Clearing ARP - ARP doesn't have a listing for the disconnected devices once their dropped.&lt;/LI&gt;&lt;LI&gt;Set up a Syslog server on debug mode and looked for some sort of indication as to why these were dropping.&lt;/LI&gt;&lt;LI&gt;Looked at licensing issue with &lt;SPAN style="text-decoration: underline;"&gt;show local-host&lt;/SPAN&gt; but it did not report any denied traffic&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the devices drop neither VPN traffic nor local LAN traffic can ping them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't have a good means of capturing traffic, nothing I have in this location has a monitor port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The timing on the dropping of theses devices is inconsistent as well. It can be anywhere from 30 minutes to 3 days. Lately it seems less than 24 hours passes by before they're dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;- Jim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2012 15:39:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-dropping-devices-from-network/m-p/2103241#M395419</guid>
      <dc:creator>cwcadmin1</dc:creator>
      <dc:date>2012-11-20T15:39:39Z</dc:date>
    </item>
  </channel>
</rss>

