<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco PIX 501 Firewall Config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-501-firewall-config/m-p/2001074#M401768</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know this is an old firewall but its just a simple firewall I need, my question is this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not getting any internet with my current config, see below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show conf&lt;BR /&gt; : Saved&lt;BR /&gt; : Written by enable_15 at 00:52:17.182 UTC Fri Jul 20 2012&lt;BR /&gt; PIX Version 6.3(5)&lt;BR /&gt; interface ethernet0 auto shutdown&lt;BR /&gt; interface ethernet1 100full&lt;BR /&gt; nameif ethernet0 outside security0&lt;BR /&gt; nameif ethernet1 inside security100&lt;BR /&gt; enable password PVSASRJovmamnVkD encrypted&lt;BR /&gt; passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt; hostname bmi-501-fw-1&lt;BR /&gt; domain-name buildmeit.internal&lt;BR /&gt; fixup protocol dns maximum-length 512&lt;BR /&gt; fixup protocol ftp 21&lt;BR /&gt; fixup protocol h323 h225 1720&lt;BR /&gt; fixup protocol h323 ras 1718-1719&lt;BR /&gt; fixup protocol http 80&lt;BR /&gt; fixup protocol rsh 514&lt;BR /&gt; fixup protocol rtsp 554&lt;BR /&gt; fixup protocol sip 5060&lt;BR /&gt; fixup protocol sip udp 5060&lt;BR /&gt; fixup protocol skinny 2000&lt;BR /&gt; fixup protocol smtp 25&lt;BR /&gt; fixup protocol sqlnet 1521&lt;BR /&gt; fixup protocol tftp 69&lt;BR /&gt; names&lt;BR /&gt; access-list allow_ping permit icmp any any echo-reply&lt;BR /&gt; access-list allow_ping permit icmp any any source-quench&lt;BR /&gt; access-list allow_ping permit icmp any any unreachable&lt;BR /&gt; access-list allow_ping permit icmp any any time-exceeded&lt;BR /&gt; pager lines 24&lt;BR /&gt; mtu outside 1500&lt;BR /&gt; mtu inside 1500&lt;BR /&gt; ip address outside 78.XX.XXX.XXX 255.255.240.0&lt;BR /&gt; ip address inside 10.52.100.123 255.255.255.0&lt;BR /&gt; ip audit info action alarm&lt;BR /&gt; ip audit attack action alarm&lt;BR /&gt; pdm history enable&lt;BR /&gt; arp timeout 14400&lt;BR /&gt; nat (inside) 101 0.0.0.0 0.0.0.0 0 0&lt;BR /&gt; access-group allow_ping in interface outside&lt;BR /&gt; access-group allow_ping in interface inside&lt;BR /&gt; route inside 10.52.0.0 255.255.0.0 10.52.100.123 1&lt;BR /&gt; timeout xlate 3:00:00&lt;BR /&gt; timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt; timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt; timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt; timeout uauth 0:05:00 absolute&lt;BR /&gt; aaa-server TACACS+ protocol tacacs+&lt;BR /&gt; aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt; aaa-server TACACS+ deadtime 10&lt;BR /&gt; aaa-server RADIUS protocol radius&lt;BR /&gt; aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt; aaa-server RADIUS deadtime 10&lt;BR /&gt; aaa-server LOCAL protocol local&lt;BR /&gt; http server enable&lt;BR /&gt; http 10.52.10.0 255.255.255.0 inside&lt;BR /&gt; http 10.52.66.0 255.255.255.0 inside&lt;BR /&gt; no snmp-server location&lt;BR /&gt; no snmp-server contact&lt;BR /&gt; snmp-server community public&lt;BR /&gt; no snmp-server enable traps&lt;BR /&gt; floodguard enable&lt;BR /&gt; telnet timeout 5&lt;BR /&gt; ssh timeout 5&lt;BR /&gt; management-access inside&lt;BR /&gt; console timeout 0&lt;BR /&gt; terminal width 80&lt;BR /&gt; Cryptochecksum:f8f18bf2b944dddfaf3d83e6c1e1c57c&lt;BR /&gt; bmi-501-fw-1#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I missing, if I try and ping 8.8.8.8 it times out, any suggestions?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:33:24 GMT</pubDate>
    <dc:creator>harrisgirls</dc:creator>
    <dc:date>2019-03-11T23:33:24Z</dc:date>
    <item>
      <title>Cisco PIX 501 Firewall Config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-firewall-config/m-p/2001074#M401768</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know this is an old firewall but its just a simple firewall I need, my question is this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not getting any internet with my current config, see below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show conf&lt;BR /&gt; : Saved&lt;BR /&gt; : Written by enable_15 at 00:52:17.182 UTC Fri Jul 20 2012&lt;BR /&gt; PIX Version 6.3(5)&lt;BR /&gt; interface ethernet0 auto shutdown&lt;BR /&gt; interface ethernet1 100full&lt;BR /&gt; nameif ethernet0 outside security0&lt;BR /&gt; nameif ethernet1 inside security100&lt;BR /&gt; enable password PVSASRJovmamnVkD encrypted&lt;BR /&gt; passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt; hostname bmi-501-fw-1&lt;BR /&gt; domain-name buildmeit.internal&lt;BR /&gt; fixup protocol dns maximum-length 512&lt;BR /&gt; fixup protocol ftp 21&lt;BR /&gt; fixup protocol h323 h225 1720&lt;BR /&gt; fixup protocol h323 ras 1718-1719&lt;BR /&gt; fixup protocol http 80&lt;BR /&gt; fixup protocol rsh 514&lt;BR /&gt; fixup protocol rtsp 554&lt;BR /&gt; fixup protocol sip 5060&lt;BR /&gt; fixup protocol sip udp 5060&lt;BR /&gt; fixup protocol skinny 2000&lt;BR /&gt; fixup protocol smtp 25&lt;BR /&gt; fixup protocol sqlnet 1521&lt;BR /&gt; fixup protocol tftp 69&lt;BR /&gt; names&lt;BR /&gt; access-list allow_ping permit icmp any any echo-reply&lt;BR /&gt; access-list allow_ping permit icmp any any source-quench&lt;BR /&gt; access-list allow_ping permit icmp any any unreachable&lt;BR /&gt; access-list allow_ping permit icmp any any time-exceeded&lt;BR /&gt; pager lines 24&lt;BR /&gt; mtu outside 1500&lt;BR /&gt; mtu inside 1500&lt;BR /&gt; ip address outside 78.XX.XXX.XXX 255.255.240.0&lt;BR /&gt; ip address inside 10.52.100.123 255.255.255.0&lt;BR /&gt; ip audit info action alarm&lt;BR /&gt; ip audit attack action alarm&lt;BR /&gt; pdm history enable&lt;BR /&gt; arp timeout 14400&lt;BR /&gt; nat (inside) 101 0.0.0.0 0.0.0.0 0 0&lt;BR /&gt; access-group allow_ping in interface outside&lt;BR /&gt; access-group allow_ping in interface inside&lt;BR /&gt; route inside 10.52.0.0 255.255.0.0 10.52.100.123 1&lt;BR /&gt; timeout xlate 3:00:00&lt;BR /&gt; timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt; timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt; timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt; timeout uauth 0:05:00 absolute&lt;BR /&gt; aaa-server TACACS+ protocol tacacs+&lt;BR /&gt; aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt; aaa-server TACACS+ deadtime 10&lt;BR /&gt; aaa-server RADIUS protocol radius&lt;BR /&gt; aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt; aaa-server RADIUS deadtime 10&lt;BR /&gt; aaa-server LOCAL protocol local&lt;BR /&gt; http server enable&lt;BR /&gt; http 10.52.10.0 255.255.255.0 inside&lt;BR /&gt; http 10.52.66.0 255.255.255.0 inside&lt;BR /&gt; no snmp-server location&lt;BR /&gt; no snmp-server contact&lt;BR /&gt; snmp-server community public&lt;BR /&gt; no snmp-server enable traps&lt;BR /&gt; floodguard enable&lt;BR /&gt; telnet timeout 5&lt;BR /&gt; ssh timeout 5&lt;BR /&gt; management-access inside&lt;BR /&gt; console timeout 0&lt;BR /&gt; terminal width 80&lt;BR /&gt; Cryptochecksum:f8f18bf2b944dddfaf3d83e6c1e1c57c&lt;BR /&gt; bmi-501-fw-1#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I missing, if I try and ping 8.8.8.8 it times out, any suggestions?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:33:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-firewall-config/m-p/2001074#M401768</guid>
      <dc:creator>harrisgirls</dc:creator>
      <dc:date>2019-03-11T23:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco PIX 501 Firewall Config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-firewall-config/m-p/2001075#M401769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are a couple of things wrong with that setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) I don't remember the old syntax exactly but I think your Ethernet0 is shutdown.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Your NAT is broken. Add the following line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;global (outside) 101 interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Your ACL doesn't allow the needed traffic. Change it the following way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list INSIDE-IN permit udp any any eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list INSIDE-IN permit tcp any any eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list INSIDE-IN permit tcp any any eq 21&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list INSIDE-IN permit icmp any any echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-group &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;INSIDE-IN &lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;in interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that ACL you can make DNS, HTTP, FTP and also ping to the outside. If you need more, just add more lines with the needed ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Source-quench is nothing that should be allowed anywhere:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no access-list allow_ping permit icmp any any source-quench&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and last but not least:&lt;/P&gt;&lt;P&gt;5) The PIX 501 is unsupported since many years. Devices like that shouldn't be connected to the internet any more ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 22:02:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-firewall-config/m-p/2001075#M401769</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-22T22:02:19Z</dc:date>
    </item>
    <item>
      <title>Cisco PIX 501 Firewall Config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-firewall-config/m-p/2001076#M401770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Thanks for the reply, I've managed to sort it now with the following config below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt; interface ethernet1 100full&lt;/P&gt;&lt;P&gt; nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt; nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt; hostname bmi-501-fw-1&lt;/P&gt;&lt;P&gt; domain-name buildmeit.internal&lt;/P&gt;&lt;P&gt; fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt; fixup protocol ftp 21&lt;/P&gt;&lt;P&gt; fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt; fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt; fixup protocol http 80&lt;/P&gt;&lt;P&gt; fixup protocol rsh 514&lt;/P&gt;&lt;P&gt; fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt; fixup protocol sip 5060&lt;/P&gt;&lt;P&gt; fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt; fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt; fixup protocol smtp 25&lt;/P&gt;&lt;P&gt; fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt; fixup protocol tftp 69&lt;/P&gt;&lt;P&gt; access-list PERMIT_IN deny tcp any any&lt;/P&gt;&lt;P&gt; access-list PERMIT_IN deny ip any any&lt;/P&gt;&lt;P&gt; access-list PERMIT_IN deny udp any any&lt;/P&gt;&lt;P&gt; access-list PERMIT_OUT permit tcp any any&lt;/P&gt;&lt;P&gt; access-list PERMIT_OUT permit ip any any&lt;/P&gt;&lt;P&gt; access-list PERMIT_OUT permit udp any any&lt;/P&gt;&lt;P&gt; access-list PERMIT_OUT permit icmp any any&lt;/P&gt;&lt;P&gt; pager lines 24&lt;/P&gt;&lt;P&gt; mtu outside 1500&lt;/P&gt;&lt;P&gt; mtu inside 1500&lt;/P&gt;&lt;P&gt; ip address outside XXX.XX.XXX.XXX 255.255.240.0&lt;/P&gt;&lt;P&gt; ip address inside 10.52.100.123 255.255.255.0&lt;/P&gt;&lt;P&gt; global (outside) 1 interface&lt;/P&gt;&lt;P&gt; outside interface address added to PAT pool&lt;/P&gt;&lt;P&gt; nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt; access-group PERMIT_IN in interface outside&lt;/P&gt;&lt;P&gt; access-group PERMIT_OUT in interface inside&lt;/P&gt;&lt;P&gt; route outside 0.0.0.0 0.0.0.0 XX.XX.XXX.1 1&lt;/P&gt;&lt;P&gt; route inside 10.52.0.0 255.255.0.0 10.52.100.123 1&lt;/P&gt;&lt;P&gt; wr mem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards to point 5 where you say devices like this shouldnt be used, I know its an unsupported device but what other reasons should I not be using it, its a good\simple firewall - i'd rather use this than say...........a horrible netgear!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 22:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-firewall-config/m-p/2001076#M401770</guid>
      <dc:creator>harrisgirls</dc:creator>
      <dc:date>2012-07-22T22:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco PIX 501 Firewall Config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-firewall-config/m-p/2001077#M401771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the last point you just should keep in mind, that the software probably has a couple of security-related bugs that won't get fixed any more. For your very simplistic firewall they are perhaps not relevant, but just don't forget it when you try to do more with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your PERMIT-OUT ACL, you don't need tcp, udp and icmp if you allow IP. IP includes all these protocols. The PERMIT-IN ACL is not really needed in your scenario as traffic from a lower security level to a higher level is denied by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 07:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-firewall-config/m-p/2001077#M401771</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-23T07:53:25Z</dc:date>
    </item>
  </channel>
</rss>

