<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco 501 ASA/PIX configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034213#M398660</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for replying Harish.&amp;nbsp; I added those two lines to the config, but I still can't ping 192.168.1.1. I can still get to the outside (10.24.10.1), but not the DMZ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Sep 2012 19:40:43 GMT</pubDate>
    <dc:creator>Famous_20</dc:creator>
    <dc:date>2012-09-28T19:40:43Z</dc:date>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034211#M398658</link>
      <description>&lt;P&gt;I'm having trouble configuring an ASA into a network solution.&amp;nbsp; We have a 501 with the outside interface on 10.24.10.1, the inside interface as 172.18.10.1, and a DMZ on 192.168.1.1. in the DMZ there is a HTTP/FTP/TFTP server connected to 192.168.1.2 on a virtual machine.&amp;nbsp; When on a machine configured to 172.18.10.10 I can ping to the outside interface but not the DMZ. When I am in the DMZ the PIX does block traffic to the inside, but I can't reach the outside interface.&amp;nbsp; When on the outside I am blocked from the inside, but also blocked from the DMZ.&amp;nbsp; I will post the config file below.&amp;nbsp; Any thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group10(config)# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 8.0(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname Group10&lt;/P&gt;&lt;P&gt;enable password 8zN2iKai1VxwjKWN encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; description OUTSIDE&lt;/P&gt;&lt;P&gt; nameif OUTSIDE&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.24.10.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1.1&lt;/P&gt;&lt;P&gt; description DMZ&lt;/P&gt;&lt;P&gt; vlan 100&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1.2&lt;/P&gt;&lt;P&gt; description INSIDE&lt;/P&gt;&lt;P&gt; vlan 200&lt;/P&gt;&lt;P&gt; nameif INSIDE&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.18.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group service webservices tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt;access-list external extended permit tcp 10.0.0.0 255.0.0.0 any eq ftp&lt;/P&gt;&lt;P&gt;access-list external extended permit tcp 10.0.0.0 255.0.0.0 any eq www&lt;/P&gt;&lt;P&gt;access-list internal extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list internal extended permit udp host 172.18.10.1 any eq tftp&lt;/P&gt;&lt;P&gt;access-list dmz extended permit ip any any&lt;/P&gt;&lt;P&gt;no pager&lt;/P&gt;&lt;P&gt;mtu OUTSIDE 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu INSIDE 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any OUTSIDE&lt;/P&gt;&lt;P&gt;icmp permit any DMZ&lt;/P&gt;&lt;P&gt;icmp permit any INSIDE&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (DMZ,OUTSIDE) 10.24.10.3 192.168.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group external in interface OUTSIDE&lt;/P&gt;&lt;P&gt;access-group internal out interface OUTSIDE&lt;/P&gt;&lt;P&gt;access-group dmz in interface DMZ&lt;/P&gt;&lt;P&gt;access-group internal in interface INSIDE&lt;/P&gt;&lt;P&gt;route OUTSIDE 0.0.0.0 0.0.0.0 10.24.10.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access INSIDE&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:774c3a24ef1b4127f4c630cc8fee1c1c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034211#M398658</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2019-03-12T00:00:15Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034212#M398659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Eric&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In PIX, you need to have NAT to communicate with interface to interface, Let us starts trouble shooting from inside to DMZ communication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you do the following and let me know the result&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (INSIDE,DMZ) 10.24.10.0 10.24.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,INSIDE) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 19:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034212#M398659</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-27T19:34:59Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034213#M398660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for replying Harish.&amp;nbsp; I added those two lines to the config, but I still can't ping 192.168.1.1. I can still get to the outside (10.24.10.1), but not the DMZ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 19:40:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034213#M398660</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2012-09-28T19:40:43Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034214#M398661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By design you will not be able to ping 192.168.1.1 but you should be able to ping any dmz servers based on the above nat and proper permission from dmz back to inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 20:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034214#M398661</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-28T20:04:46Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034215#M398662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I tried pinging from the 172.18.10.10 to the CentOS server at 192.168.1.2, but the request timed out. Should I remove anything from the original config after adding those two lines?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 20:14:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034215#M398662</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2012-09-28T20:14:09Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034216#M398663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Eric&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry My mistake&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remove the below and add the new nat line as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (INSIDE,DMZ) 10.24.10.0 10.24.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (INSIDE,DMZ) 172.18.10.0 172.18.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 20:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034216#M398663</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-28T20:22:17Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034217#M398664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, that was done, but the ping request still time out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 20:28:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034217#M398664</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2012-09-28T20:28:09Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034218#M398665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh, I was also looking at the routing table; am I correct to assume that the 192.168.1.0/24 network will not appear here?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 20:30:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034218#M398665</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2012-09-28T20:30:49Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034219#M398666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it should apprear in the routing as connected .&amp;nbsp; see whether the interface DMZ is up and running.. if yes.. also please see&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'show conn'&amp;nbsp; while you are pinging the server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 20:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034219#M398666</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-28T20:33:21Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034220#M398667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, the DMZ interface shows as up.&amp;nbsp; I set continuous ping and did the show conn and the reply was : 0 in use, 310 most . This is the routing table for the 172.18.10.10 machine:&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/8/3/105388-route%20table.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 20:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034220#M398667</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2012-09-28T20:54:54Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034221#M398668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you take show xlate and show route from the PIX and post&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 21:04:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034221#M398668</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-28T21:04:35Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034222#M398669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, this is the xlate:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group10(config)# show xlate&lt;/P&gt;&lt;P&gt;3 in use, 321 most used&lt;/P&gt;&lt;P&gt;Global 192.168.1.0 Local 192.168.1.0&lt;/P&gt;&lt;P&gt;Global 172.18.10.0 Local 172.18.10.0&lt;/P&gt;&lt;P&gt;Global 10.24.10.3 Local 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this is the show route:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group10(config)# show route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 10.24.10.2 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.18.10.0 255.255.255.0 is directly connected, INSIDE&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.24.10.0 255.255.255.0 is directly connected, OUTSIDE&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.0 255.255.255.0 is directly connected, DMZ&lt;/P&gt;&lt;P&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 10.24.10.2, OUTSIDE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 21:11:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034222#M398669</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2012-09-28T21:11:35Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034223#M398670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything looks good now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as a last try, can you try to remove &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (DMZ,INSIDE) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also.. did you try to access any other port other that pinging.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 21:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034223#M398670</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-28T21:23:18Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034224#M398671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need these nat configuration to make it working:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For Inside to DMZ ping:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.18.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For DMZ to inside ping:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (inside,DMZ) 172.18.10.0 172.18.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For DMZ to outside:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 2 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 2 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 21:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034224#M398671</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-09-28T21:30:58Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034225#M398672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun, thanks for your reply.&amp;nbsp; I made the changes as you suggested, but the echo request timed out. I can try putting the 172.18.10.10 machine on another network to see if that might help.&amp;nbsp; I cannot ping from the CentOS server (192.168.1.2) to the outside, eventhough there is a static NAT associated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 21:44:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034225#M398672</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2012-09-28T21:44:25Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034226#M398673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Harish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure what else to try as far as protocols.&amp;nbsp; HTTP is not getting to the DMZ, because when I did give the test machine a 192.168.1.10 address I cannot get to the internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 21:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034226#M398673</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2012-09-28T21:57:04Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034227#M398674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you add this nat, then all your DMZ should b able to access internet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 2 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 2 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;N also please remove the access-group:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group internal out interface OUTSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It doesn't make sense to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 22:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034227#M398674</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-09-28T22:00:03Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034228#M398675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed the line as you instructed, but still no connectivity.&amp;nbsp; As I explained below I gave the client an address of 192.168.1.10/24 with a gateway of 192.168.1.1. This should put me on the DMZ interface of the PIX, or should the gateway be 192.168.1.2, since that is where the SNAT is from the outside?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 22:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034228#M398675</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2012-09-28T22:11:31Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034229#M398676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just for a logical analysis:&amp;nbsp; I configured a test machine at 172.18.10.10, with a default gateway of 172.18.10.1 (the inside of the ASA) Since I have internet connectivity on this machine HTTP is going through the DMZ, since it is not coming directly from the outside interface; however, when I connect a device in the DMZ and give it an IP of 192.168.1.10 and a gateway of 192.168.1.1 I have no internet connectivity.&amp;nbsp; Am I missing something?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 22:27:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034229#M398676</guid>
      <dc:creator>Famous_20</dc:creator>
      <dc:date>2012-09-28T22:27:57Z</dc:date>
    </item>
    <item>
      <title>Cisco 501 ASA/PIX configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034230#M398677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have just simulated your scenario, and please find the following working configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remove all other acls and NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to access&lt;/P&gt;&lt;P&gt;1. Inside to DMZ&lt;/P&gt;&lt;P&gt;2. DMZ-Inside&lt;/P&gt;&lt;P&gt;3.Inside- internet (pc connected outside)&lt;/P&gt;&lt;P&gt;4.DMZ-internet (pc connected outside)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------------------------------&lt;BR /&gt;fixup protocol icmp&lt;/P&gt;&lt;P&gt;interface Ethernet1.2&lt;BR /&gt;description INSIDE&lt;BR /&gt;vlan 200&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1.1&lt;BR /&gt;description DMZ&lt;BR /&gt;vlan 100&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;description OUTSIDE&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.24.10.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 172.18.10.0 255.255.255.0&lt;BR /&gt;nat (dmz) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;static (inside,dmz) 172.18.10.0 172.18.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list dmz-in extended permit ip any any&lt;BR /&gt;access-group dmz-in in interface DMZ&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Sep 2012 07:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-501-asa-pix-configuration/m-p/2034230#M398677</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-29T07:01:40Z</dc:date>
    </item>
  </channel>
</rss>

