<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Site to Site PIX cannot access Internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063852#M399589</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Traffic comming over vpn (from pix 501) will arrive on the outside interface of the pix 515; in order to reach the internet traffic&amp;nbsp; will have&amp;nbsp; to exit&amp;nbsp; on the same outside interface in which entered. This is not allowed in PIX/ASA unless you configure hairpining, which I'm afraid it is supported only in version 7 or above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;check out this doc:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080734db7.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080734db7.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 09 Sep 2012 16:17:15 GMT</pubDate>
    <dc:creator>oszkari</dc:creator>
    <dc:date>2012-09-09T16:17:15Z</dc:date>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063850#M399587</link>
      <description>&lt;P&gt;We have a PIX 501 that is in a remote office and is connected to a PIX 515. The remote office can access all network resources without an issue. The PIX 501 however cannot access the Internet. We used to use a proxy server for Internet access on the 192.168.1.x subnet however that as been decommissioned and replaced with a different solution, so there is no longer a proxy server. Internet access works everywhere else on our network, the problem is any PIX FWs that are in remote offices and connected site to site to the 515 cannot access the Internet. We have several that have the same issue, Below is the configurations of one of the 501 and the 515:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX 501&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(4) &lt;/P&gt;&lt;P&gt;interface ethernet0 auto &lt;/P&gt;&lt;P&gt;interface ethernet1 100full &lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;enable password k4HlcGX2lC1ypFOm encrypted &lt;/P&gt;&lt;P&gt;passwd y5Nu/Nt1/5dK8Iuf encrypted &lt;/P&gt;&lt;P&gt;hostname cpd &lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512 &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21 &lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720 &lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719 &lt;/P&gt;&lt;P&gt;fixup protocol http 80 &lt;/P&gt;&lt;P&gt;fixup protocol ils 389 &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514 &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 55 &lt;/P&gt;&lt;P&gt;fixup protocol sip 5060 &lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060 &lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000 &lt;/P&gt;&lt;P&gt;fixup protocol smtp 25 &lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521 &lt;/P&gt;&lt;P&gt;fixup protocol tftp 69 &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;access-list permit-in permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list permit-in permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list encrypt permit ip 172.16.38.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list no-encrypt permit ip 172.16.38.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;logging console debugging &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;ip address outside 192.168.50.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip address inside 172.16.38.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip audit info action alarm &lt;/P&gt;&lt;P&gt;ip audit attack action alarm &lt;/P&gt;&lt;P&gt;pdm logging informational 100 &lt;/P&gt;&lt;P&gt;pdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-encrypt &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;access-group permit-in in interface outside &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.50.254 1 &lt;/P&gt;&lt;P&gt;route outside 172.16.33.0 255.255.255.0 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route outside 192.168.1.0 255.255.255.0 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route outside 192.168.5.0 255.255.255.0 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 &lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community public &lt;/P&gt;&lt;P&gt;no snmp-server enable traps &lt;/P&gt;&lt;P&gt;floodguard enable &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;sysopt ipsec pl-compatible &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set cpd-strong esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 10 ipsec-isakmp &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 10 match address encrypt&lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 10 set peer 65.x.x.x&lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 10 set transform-set cpd-strong&lt;/P&gt;&lt;P&gt;crypto map cpd-vpn interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 65.x.x.x netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption aes&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.38.1-172.16.38.20 inside&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:35fcceb4b56&lt;/P&gt;&lt;P&gt;cb82fe67f3&lt;/P&gt;&lt;P&gt;9e760a2ec1&lt;/P&gt;&lt;P&gt;c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config from the PIX 515:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3) &lt;/P&gt;&lt;P&gt;interface ethernet0 auto &lt;/P&gt;&lt;P&gt;interface ethernet1 auto &lt;/P&gt;&lt;P&gt;interface ethernet2 auto shutdown &lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz security10 &lt;/P&gt;&lt;P&gt;enable password k4HlcGX2lC1ypFOm encrypted &lt;/P&gt;&lt;P&gt;passwd y5Nu/Nt1/5dK8Iuf encrypted &lt;/P&gt;&lt;P&gt;hostname cpd-fw-bs &lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512 &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21 &lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720 &lt;/P&gt;&lt;P&gt;fixup protocol h323 ras &lt;/P&gt;&lt;P&gt;fixup protocol http 80 &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514 &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554 &lt;/P&gt;&lt;P&gt;fixup protocol sip 5060 &lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060 &lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000 &lt;/P&gt;&lt;P&gt;fixup protocol smtp 25 &lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521 &lt;/P&gt;&lt;P&gt;fixup protocol tftp 69 &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;access-list encrypt-co permit ip any 172.16.35.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no-encrypt permit ip any 172.16.35.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no-encrypt permit ip any 172.16.36.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no-encrypt permit ip any 172.16.38.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list encrypt-bo permit ip any 172.16.36.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list encrypt-sv permit ip any 172.16.38.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;mtu dmz 1500 &lt;/P&gt;&lt;P&gt;ip address outside 65.x.x.x 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip address inside 172.16.33.254 &lt;/P&gt;&lt;P&gt;ip address dmz 127.0.0.1 255.255.255.255 &lt;/P&gt;&lt;P&gt;ip audit info action alarm &lt;/P&gt;&lt;P&gt;ip audit attack action alarm &lt;/P&gt;&lt;P&gt;pdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-encrypt &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) 65.x.x.x 192.168.5.15 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group permit-in in interface outside &lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 172.16.33.253 1 &lt;/P&gt;&lt;P&gt;route outside 65.x.x.x 255.255.255.255 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route outside 65.x.x.x 255.255.255.255 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route outside 65.x.x.x 255.255.255.255 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route outside 168.x.x.x 255.255.255.255 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route inside 172.16.0.0 255.255.0.0 172.16.33.253 1 &lt;/P&gt;&lt;P&gt;route outside 172.16.35.0 255.255.255.0 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route outside 172.16.36.0 255.255.255.0 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route outside 172.16.38.0 255.255.255.0 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 172.16.33.253 1 &lt;/P&gt;&lt;P&gt;route inside 192.168.5.0 255.255.255.0 172.16.33.253 1 &lt;/P&gt;&lt;P&gt;route outside 216.x.x.x 255.255.255.255 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route outside 216.x.x.x 255.255.255.255 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;route outside 216.x.x.x 255.255.255.255 65.x.x.x 1 &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 &lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community public &lt;/P&gt;&lt;P&gt;no snmp-server enable traps &lt;/P&gt;&lt;P&gt;floodguard enable &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;sysopt ipsec pl-compatible &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set cpd-strong esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 10 ipsec-isakmp &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 10 match address encrypt-co &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 10 set peer 65.x.x.x &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 10 set transform-set cpd-strong &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 20 ipsec-isakmp &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 20 match address encrypt-bo &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 20 set peer 65.x.x.x &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 20 set transform-set cpd-strong &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 20 set transform-set cpd-strong &lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 30 match address encrypt-sv&lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 30 set peer 65.x.x.x&lt;/P&gt;&lt;P&gt;crypto map cpd-vpn 30 set transform-set cpd-strong&lt;/P&gt;&lt;P&gt;crypto map cpd-vpn interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 65.x.x.x netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp key ******** address 65.x.x.x netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp key ******** address 65.x.x.x netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption aes&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 192.168.5.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 172.16.33.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:17301fe229f&lt;/P&gt;&lt;P&gt;3b066da905&lt;/P&gt;&lt;P&gt;466f7875bf&lt;/P&gt;&lt;P&gt;2&lt;/P&gt;&lt;P&gt;: end&lt;SPAN id="mce_marker"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks all.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:51:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063850#M399587</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2019-03-11T23:51:51Z</dc:date>
    </item>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063851#M399588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey ,&lt;/P&gt;&lt;P&gt;two solutions are available here :&lt;/P&gt;&lt;P&gt;1- The remote side can access internet via its local ISP and in this case you need to modify the crypto access list :&lt;/P&gt;&lt;P&gt;no permit ip local_net any&lt;/P&gt;&lt;P&gt;and add more specific subnets :&lt;/P&gt;&lt;P&gt;permit ip local_net remote_net&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- the remote side can go through the l2l tunnel and then access the internet using the ISP at your side . for this to work you need to configure haipinning :&lt;/P&gt;&lt;P&gt;nat (outside) 1 subnet_at_remote_side&lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;plus &lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH .&lt;/P&gt;&lt;P&gt;MOhammad.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Sep 2012 16:05:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063851#M399588</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2012-09-09T16:05:32Z</dc:date>
    </item>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063852#M399589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Traffic comming over vpn (from pix 501) will arrive on the outside interface of the pix 515; in order to reach the internet traffic&amp;nbsp; will have&amp;nbsp; to exit&amp;nbsp; on the same outside interface in which entered. This is not allowed in PIX/ASA unless you configure hairpining, which I'm afraid it is supported only in version 7 or above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;check out this doc:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080734db7.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080734db7.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Sep 2012 16:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063852#M399589</guid>
      <dc:creator>oszkari</dc:creator>
      <dc:date>2012-09-09T16:17:15Z</dc:date>
    </item>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063853#M399590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Actually the Internet access is out 192.168.5.1.&amp;nbsp; Here is what it looks like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[PIX 501] ----------------------------VPN-------------------[PIX 515]-----------------------[Catalyst Switch 0.0.0.0 0.0.0.0 192.168.5.1]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats what it looks like visually. So traffic coming from the 501 needs to hit the switch to go out 192.168.5.1 for Internet traffic, however it never gets there. I have captured the traffic on the switch and I dont see any of the web requests. So I think the problem is the 515. Am I headed down the right path?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Sep 2012 20:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063853#M399590</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-09-09T20:32:13Z</dc:date>
    </item>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063854#M399591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right, I missed your default route&amp;nbsp; on 515 going towards the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you want to do the NAT on 515 for the networks behind 501 or you have a&amp;nbsp; NAT device after the Catalyst sw which can/will take care of the NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Sep 2012 21:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063854#M399591</guid>
      <dc:creator>oszkari</dc:creator>
      <dc:date>2012-09-09T21:07:40Z</dc:date>
    </item>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063855#M399592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The default route on the 515 lands the traffic into the Catalyst sw. The Catalyst sw default route goes to 192.168.5.1 which is another PIX. NAT is done there for the remote subnet for the 501 with this statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 192.168.5.150&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.38.0 255.255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route&amp;nbsp; (inside) 172.16.38.0 255.255.255.0 [Catalyst sw IP]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats what it looks like.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Sep 2012 21:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063855#M399592</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-09-09T21:14:38Z</dc:date>
    </item>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063856#M399593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that case your pix515 config looks alright. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do a show crypto ipsec sa on the 515 do you see the encap/decap counters incrementing? &lt;/P&gt;&lt;P&gt;Do you see anything on the logs of pix 515 when you initate&amp;nbsp; an nternet connection from behind&amp;nbsp; the 501 subnet?&lt;/P&gt;&lt;P&gt;Can you do a packet capture on the PIX515 inside interface and&amp;nbsp; see whether the packets leave the interface or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Sep 2012 22:22:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063856#M399593</guid>
      <dc:creator>oszkari</dc:creator>
      <dc:date>2012-09-09T22:22:59Z</dc:date>
    </item>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063857#M399594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I do see the encap/decap counters incrementing. I dont see anthing in the syslog with traffic coming from the 501. What are the commands for the packet capture?&amp;nbsp; To explain this visually, let me draw out another crude diagram &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[PIX 501] ----------------------------VPN-------------------[PIX 515]-------172.16.33.x-vlan---------------[Catalyst Switch 192.168.5.x]---------&amp;nbsp; [PIX 192.168.5.1]--------------------------INTERNET&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could it be related to natting the traffic coming from the 501 and then natting again at the 5.1 PIX?&amp;nbsp; Also I noticed that if I removed the following line from the 501:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list encrypt permit ip 172.16.38.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And replaced it with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list encrypt permit ip 172.16.38.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I had Internet access but the Internet access was not traversing the tunnel but going out the remote office DSL, so the PIX was in a split tunnel mode once the above was changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another item to note, all of my PIX's are affected by this but not an ASA 5505 that is in a remote office. I was thinking NAT-T?&amp;nbsp; What do you all think? Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 23:42:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063857#M399594</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-09-11T23:42:28Z</dc:date>
    </item>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063858#M399595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Check out this link for the capture command:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/c.html#wp1053548"&gt;http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/c.html#wp1053548&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;If&amp;nbsp; you put back the original config you should see traffic coming from 172.16.38.0 255.255.255.0 and leaving the&lt;SPAN style="font-size: 11.818181991577148px;"&gt; PIX 515&amp;nbsp; inside interface. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I don't think it is NAT-T related, if it was NAT-T issue then you wouldn't see encaps/decaps counters incrementing on the PIX 515.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering why do you want to tunnel the internet traffic through the HO? Especially that you took the proxy out of the picture.&amp;nbsp; Those pix501 have pretty low VPN troughput capacity (2-3Mbps), probably you could benefit more from a split tunneling solution. Use the VPN for business traffic only and keep the internet traffic local to the branch.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 02:51:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063858#M399595</guid>
      <dc:creator>oszkari</dc:creator>
      <dc:date>2012-09-12T02:51:22Z</dc:date>
    </item>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063859#M399596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the reply. I am concerned about the security with the split tunnel. What are your thoughts there?&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 03:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063859#M399596</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-09-12T03:21:12Z</dc:date>
    </item>
    <item>
      <title>Site to Site PIX cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063860#M399597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unless you have some device in the HO wich does layer&amp;nbsp; 5-7 inspection of the traffic there is no point to send the Internet traffic there.&amp;nbsp; There is no difference in the protection offered by an 501 or&amp;nbsp; an 515 pix.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 03:26:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-pix-cannot-access-internet/m-p/2063860#M399597</guid>
      <dc:creator>oszkari</dc:creator>
      <dc:date>2012-09-12T03:26:23Z</dc:date>
    </item>
  </channel>
</rss>

