<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pix 525 interface communication question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814964#M456513</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; THANK YOU SO MUCH!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been messing with this on and off for weeks and couln't make it work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My users on eth5 can now access OWA on domain withought access to anything else!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now all I have left to do is create A records on the domain controller on that interface to point the traffic via host name and that's it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anything else you can see in my config that I should do differantly?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 18 Jan 2012 20:18:51 GMT</pubDate>
    <dc:creator>Chris Mickle</dc:creator>
    <dc:date>2012-01-18T20:18:51Z</dc:date>
    <item>
      <title>Pix 525 interface communication question</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814960#M456505</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to PIX and Cisco.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a PIX 525 ver 8.0(2) Unrestricted that I need some help configuring.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First, the unit has 6 interfaces, one outside (eth0) and five inside (eth1-eth5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a block of 5 static IPs from my ISP and am using NAT on all 5 interfaces to route traffic from specific WAN IPs to each inside interface (I believe this is called hairpinning).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN IP xxx.xxx.xxx.153 is NATed to eth1&lt;/P&gt;&lt;P&gt;WAN IP xxx.xxx.xxx.154 is NATed to eth2&lt;/P&gt;&lt;P&gt;and so on...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside is eth0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My domain network is on interface eth1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FTP server on interface eth2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interfaces eth3 and eth4 are for testing perposes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another group of users is on eth5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On my domain network (eth1) there is an Excahnge server that users on eth5 need to access. They only need access to the OWA site using ports 80 and 443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been able to get the users access by changeing the security level on eth5 to the same or higher level as eth1, but this gives them total access. I have tried to create access rules and static routes to restrict communication to only the nessissary ports, but it doesn't work. The only way I can give them access is by increasing the security level of eth5 and this is unacceptable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please tell me what I am doing wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you need me to post the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:16:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814960#M456505</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-03-11T22:16:13Z</dc:date>
    </item>
    <item>
      <title>Pix 525 interface communication question</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814961#M456509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post your configuration because as you explain it an ACL inside direction on Eth5 should be able to restrict that traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 19:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814961#M456509</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T19:14:17Z</dc:date>
    </item>
    <item>
      <title>Pix 525 interface communication question</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814962#M456511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks very much for looking at this for me!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Took me a few minutes to scrubb the config, but here it is...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 8.0(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname xxxxxxxx&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xxx.xxx.xxx.153 255.255.255.248 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif domain&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif ftp&lt;/P&gt;&lt;P&gt; security-level 60&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet3&lt;/P&gt;&lt;P&gt; nameif test&lt;/P&gt;&lt;P&gt; security-level 80&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet4&lt;/P&gt;&lt;P&gt; nameif internet&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.3.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet5&lt;/P&gt;&lt;P&gt; nameif chuly&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 192.168.4.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;time-range IPBlocked&lt;/P&gt;&lt;P&gt; absolute end 01:12 28 October 2010&lt;/P&gt;&lt;P&gt; periodic daily 0:00 to 23:59&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq smtp &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq https &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq pop3 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.154 eq ftp &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq 5000 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit udp any host xxx.xxx.xxx.154 eq 7707 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit udp any host xxx.xxx.xxx.154 eq 7708 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit udp any host xxx.xxx.xxx.154 eq 7717 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit udp any host xxx.xxx.xxx.154 eq 28852 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit udp any host xxx.xxx.xxx.154 eq 20560 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.154 eq 20560 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.154 eq 8075 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.154 eq 28852 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.154 eq www &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq 587 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq www &lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any host xxx.xxx.xxx.157 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit udp any host xxx.xxx.xxx.154 eq 20800 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit udp any host xxx.xxx.xxx.154 eq 20810 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit udp any host xxx.xxx.xxx.154 eq 28960 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.154 eq 28960 &lt;/P&gt;&lt;P&gt;access-list 301 extended permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list 401 extended permit ip 192.168.4.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu domain 1500&lt;/P&gt;&lt;P&gt;mtu ftp 1500&lt;/P&gt;&lt;P&gt;mtu test 1500&lt;/P&gt;&lt;P&gt;mtu internet 1500&lt;/P&gt;&lt;P&gt;mtu chuly 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm-602.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 2 xxx.xxx.xxx.154&lt;/P&gt;&lt;P&gt;global (outside) 3 xxx.xxx.xxx.155&lt;/P&gt;&lt;P&gt;global (outside) 4 xxx.xxx.xxx.156&lt;/P&gt;&lt;P&gt;global (outside) 5 xxx.xxx.xxx.157&lt;/P&gt;&lt;P&gt;nat (domain) 0 access-list 301&lt;/P&gt;&lt;P&gt;nat (domain) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (ftp) 2 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (test) 3 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (internet) 4 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (chuly) 0 access-list 401&lt;/P&gt;&lt;P&gt;nat (chuly) 5 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (ftp,outside) tcp xxx.xxx.xxx.154 ftp 192.168.1.2 ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) udp xxx.xxx.xxx.154 7708 192.168.1.2 7708 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) udp xxx.xxx.xxx.154 7707 192.168.1.2 7707 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) udp xxx.xxx.xxx.154 7717 192.168.1.2 7717 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) udp xxx.xxx.xxx.154 28852 192.168.1.2 28852 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) udp xxx.xxx.xxx.154 20560 192.168.1.2 20560 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) tcp xxx.xxx.xxx.154 20560 192.168.1.2 20560 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) tcp xxx.xxx.xxx.154 8075 192.168.1.2 8075 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) tcp xxx.xxx.xxx.154 28852 192.168.1.2 28852 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) tcp xxx.xxx.xxx.154 www 192.168.1.2 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface smtp 192.168.0.3 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface 5000 192.168.0.10 5000 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface https 192.168.0.3 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface pop3 192.168.0.3 pop3 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface 587 192.168.0.3 587 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface www 192.168.0.3 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) udp xxx.xxx.xxx.154 28960 192.168.1.2 28960 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) udp xxx.xxx.xxx.154 20810 192.168.1.2 20810 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) udp xxx.xxx.xxx.154 20800 192.168.1.2 20800 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (ftp,outside) tcp xxx.xxx.xxx.154 28960 192.168.1.2 28960 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (chuly,outside) xxx.xxx.xxx.157 192.168.4.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.158 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 domain&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.255.0 domain&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.255.0 domain&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;ntp server 207.46.197.32 source outside prefer&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm-602.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 19:26:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814962#M456511</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2012-01-18T19:26:13Z</dc:date>
    </item>
    <item>
      <title>Pix 525 interface communication question</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814963#M456512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,chuly) exchangeserver_ip exchangeserver_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list chuly_in permit tcp any host exchangeserver_ip eq xx(Port needs to be access)&lt;/P&gt;&lt;P&gt;access-list chuly_in permit tcp any host exchangeserver_ip eq xx(Port needs to be access)&lt;/P&gt;&lt;P&gt;access-list chuly_in permit tcp any host exchangeserver_ip eq xx(Port needs to be access)&lt;/P&gt;&lt;P&gt;access-list chuly_in deny ip any host&amp;nbsp; exchangeserver_ip &lt;/P&gt;&lt;P&gt;access-list chuly_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group chuly_in in interface chuly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all the posts that are helpful!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 19:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814963#M456512</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T19:53:36Z</dc:date>
    </item>
    <item>
      <title>Pix 525 interface communication question</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814964#M456513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; THANK YOU SO MUCH!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been messing with this on and off for weeks and couln't make it work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My users on eth5 can now access OWA on domain withought access to anything else!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now all I have left to do is create A records on the domain controller on that interface to point the traffic via host name and that's it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anything else you can see in my config that I should do differantly?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 20:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814964#M456513</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2012-01-18T20:18:51Z</dc:date>
    </item>
    <item>
      <title>Pix 525 interface communication question</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814965#M456514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad I could help!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, reading the configuration and based on what you were looking for I think your configuration is fine the way it is now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 20:31:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814965#M456514</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T20:31:43Z</dc:date>
    </item>
    <item>
      <title>Pix 525 interface communication question</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814966#M456515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks again...I do have one more question actually...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does the following do specifically?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list chuly_in permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 20:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814966#M456515</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2012-01-18T20:33:56Z</dc:date>
    </item>
    <item>
      <title>Pix 525 interface communication question</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814967#M456516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is going to allow all ip traffic coming from the chuly host to any other host on another interface, except for the deny rule we configured before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 20:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814967#M456516</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T20:50:00Z</dc:date>
    </item>
    <item>
      <title>Pix 525 interface communication question</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814968#M456517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; ok I see...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;one more thing and then that is it I promiss &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,chuly) exchangeserver_ip exchangeserver_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why are the IPs the same for this static rule?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (domain,chuly) 192.168.0.3 192.168.0.3&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 20:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814968#M456517</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2012-01-18T20:53:46Z</dc:date>
    </item>
    <item>
      <title>Pix 525 interface communication question</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814969#M456518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are doing in this case a Identity nat translation so users on the other interface( chuly) will go to the real ip address of the server ( domain interface), we could also translate it to a different ip address if that were the setup you were looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate posts that help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 21:23:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-interface-communication-question/m-p/1814969#M456518</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-18T21:23:57Z</dc:date>
    </item>
  </channel>
</rss>

