<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic cisco pix 525 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868340#M491902</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i need to check that ports 443 and 8443 are open on my DMZ VLAN IP Address 10.1.24.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please could some post the commands i need to use whilst using telnet to access my firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin Lee &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:58:21 GMT</pubDate>
    <dc:creator>kevleets38re</dc:creator>
    <dc:date>2019-03-11T21:58:21Z</dc:date>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868340#M491902</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i need to check that ports 443 and 8443 are open on my DMZ VLAN IP Address 10.1.24.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please could some post the commands i need to use whilst using telnet to access my firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin Lee &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:58:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868340#M491902</guid>
      <dc:creator>kevleets38re</dc:creator>
      <dc:date>2019-03-11T21:58:21Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868341#M491903</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the following commands on the CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run access-list | in eq 443&lt;/P&gt;&lt;P&gt;show run access-list | in eq 8443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This shoudl tell you if you ahve any access-list which allows these ports. Moreover you can also check:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To see if you have any translation for the traffic or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 13:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868341#M491903</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-12-02T13:15:29Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868342#M491904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks for the response&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i type show run access-list | in eq 443 and press enter i get nothing just goes to next line&lt;/P&gt;&lt;P&gt;does this mean the ports are blocked?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 13:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868342#M491904</guid>
      <dc:creator>kevleets38re</dc:creator>
      <dc:date>2011-12-02T13:39:12Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868343#M491905</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide me the output of "show run access-group"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, if you do not get any output it means that the pot is not open, moreover you can also search by ip address, lets say you want to open the port for ip address 1.1.1.1, then search:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show arun access-list | in 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it will tell yu if there are any ports open gfor the IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 13:45:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868343#M491905</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-12-02T13:45:13Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868344#M491906</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; here is the output from&amp;nbsp; the command show run access-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User Access Verification&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;Type help or '?' for a list of available commands.&lt;/P&gt;&lt;P&gt;uk-000-pix-01&amp;gt; ena&lt;/P&gt;&lt;P&gt;Password: ***********&lt;/P&gt;&lt;P&gt;uk-000-pix-01# show run access-group&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password DFtm/2Q.o6oMVwUh encrypted&lt;/P&gt;&lt;P&gt;passwd DFtm/2Q.o6oMVwUh encrypted&lt;/P&gt;&lt;P&gt;hostname uk-000-pix-01&lt;/P&gt;&lt;P&gt;domain-name uca.co.uk&lt;/P&gt;&lt;P&gt;clock summer-time BST recurring last Sun Mar 2:00 last Sun Oct 2:00&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;no fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.1.24.5 uk-000-exch-003&lt;/P&gt;&lt;P&gt;name 10.1.24.6 uk-000-mm-001&lt;/P&gt;&lt;P&gt;name 10.1.24.7 uk-000-mm-002&lt;/P&gt;&lt;P&gt;name 10.1.24.8 uk-000-web-001&lt;/P&gt;&lt;P&gt;name 10.1.24.9 uk-000-isa-001&lt;/P&gt;&lt;P&gt;name 10.1.24.10 uk-000-isa-002&lt;/P&gt;&lt;P&gt;name 10.1.10.0 VPNVLAN&lt;/P&gt;&lt;P&gt;name 10.1.8.0 StudentVLAN110&lt;/P&gt;&lt;P&gt;name 10.1.22.0 Internet&lt;/P&gt;&lt;P&gt;name 10.1.4.0 StudentVLAN100&lt;/P&gt;&lt;P&gt;name 10.1.12.0 StudentVLAN120&lt;/P&gt;&lt;P&gt;name 10.0.0.0 ServerVlan20&lt;/P&gt;&lt;P&gt;name 10.1.6.0 StudentVLAN105&lt;/P&gt;&lt;P&gt;name 10.1.20.0 ServiceVLAN&lt;/P&gt;&lt;P&gt;name 10.1.2.0 VLAN2NotUsed&lt;/P&gt;&lt;P&gt;name 10.1.24.0 DMZVLAN60&lt;/P&gt;&lt;P&gt;name 10.1.36.0 PIXVLAN500&lt;/P&gt;&lt;P&gt;name 10.1.28.0 TelephonyVLAN80&lt;/P&gt;&lt;P&gt;name 10.1.24.41 uk-000-ras-001&lt;/P&gt;&lt;P&gt;name 10.1.24.29 uk-000-web-003&lt;/P&gt;&lt;P&gt;name 10.1.24.30 uk-000-cmis-004&lt;/P&gt;&lt;P&gt;name 10.1.14.0 THINCLIENT125&lt;/P&gt;&lt;P&gt;name 10.0.4.0 StudentVlan130&lt;/P&gt;&lt;P&gt;name 10.0.6.0 MacVlan25&lt;/P&gt;&lt;P&gt;object-group service FirstClass tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; description Required for Mike Griffiths FirstClass MLE Client&lt;/P&gt;&lt;P&gt;&amp;nbsp; port-object eq 510&lt;/P&gt;&lt;P&gt;access-list in permit ip host 10.1.9.4 any&lt;/P&gt;&lt;P&gt;access-list in permit tcp StudentVLAN105 255.255.254.0 any eq 1394&lt;/P&gt;&lt;P&gt;access-list in remark MacVLAN25 Outbound&lt;/P&gt;&lt;P&gt;access-list in permit ip MacVlan25 255.255.254.0 any&lt;/P&gt;&lt;P&gt;access-list in remark ServerVLAN20 out&lt;/P&gt;&lt;P&gt;access-list in permit ip ServerVlan20 255.255.254.0 any&lt;/P&gt;&lt;P&gt;access-list in remark DMZVLAN60 out&lt;/P&gt;&lt;P&gt;access-list in permit ip DMZVLAN60 255.255.254.0 any&lt;/P&gt;&lt;P&gt;access-list in remark Internal PIX VLAN500 out&lt;/P&gt;&lt;P&gt;access-list in permit ip PIXVLAN500 255.255.254.0 any&lt;/P&gt;&lt;P&gt;access-list in permit ip VLAN2NotUsed 255.255.254.0 any&lt;/P&gt;&lt;P&gt;access-list in remark Cisco Telephoney VLAN80 out&lt;/P&gt;&lt;P&gt;access-list in permit ip TelephonyVLAN80 255.255.254.0 any&lt;/P&gt;&lt;P&gt;access-list in remark Block Everything else&lt;/P&gt;&lt;P&gt;access-list in deny ip any any&lt;/P&gt;&lt;P&gt;access-list out permit ip any host 10.1.9.4&lt;/P&gt;&lt;P&gt;access-list out remark OWA Access&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.22 eq https&lt;/P&gt;&lt;P&gt;access-list out remark Inbound Email&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.24 eq smtp&lt;/P&gt;&lt;P&gt;access-list out remark Inbound Email&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.23 eq smtp&lt;/P&gt;&lt;P&gt;access-list out remark PPTP VPN access to W2000 RAS server&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.41 eq pptp&lt;/P&gt;&lt;P&gt;access-list out remark PPTP VPN access to W2000 RAS server&lt;/P&gt;&lt;P&gt;access-list out permit gre any host 10.51.144.41&lt;/P&gt;&lt;P&gt;access-list out remark Sharepoint Intranet&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.29 eq www&lt;/P&gt;&lt;P&gt;access-list out remark Sharepoint Intranet&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.29 eq https&lt;/P&gt;&lt;P&gt;access-list out remark Electronic Registration&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.30 eq www&lt;/P&gt;&lt;P&gt;access-list out remark Electronic Registration&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.30 eq https&lt;/P&gt;&lt;P&gt;access-list out remark Testing&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list out remark Testing&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list out remark Testing&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list out remark Testing&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list out remark Testing&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any source-quench&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.28 eq 3389&lt;/P&gt;&lt;P&gt;access-list out remark HTTP to 10.51.144.31&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.31 eq www&lt;/P&gt;&lt;P&gt;access-list out remark RDP to 10.51.144.31&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.31 eq 3389&lt;/P&gt;&lt;P&gt;access-list out remark Inbound to MacVLAN25&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip any PIXVLAN500 255.255.255.192&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_20 permit ip any PIXVLAN500 255.255.255.192&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 10.51.144.21 255.255.240.0&lt;/P&gt;&lt;P&gt;ip address inside 10.1.36.4 255.255.254.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool supportpool 10.1.36.30-10.1.36.40&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;failover ip address outside 10.51.144.40&lt;/P&gt;&lt;P&gt;failover ip address inside 10.1.36.5&lt;/P&gt;&lt;P&gt;pdm location 10.1.36.20 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.36.30 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location ServerVlan20 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location VLAN2NotUsed 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location StudentVLAN100 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location StudentVLAN105 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location StudentVLAN110 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location VPNVLAN 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location StudentVLAN120 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location ServiceVLAN 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location Internet 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location uk-000-exch-003 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location uk-000-mm-001 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location uk-000-mm-002 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location uk-000-web-001 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location uk-000-isa-001 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location uk-000-isa-002 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.24.28 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location uk-000-web-003 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location uk-000-cmis-004 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.24.31 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.24.32 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.24.33 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.24.34 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.24.35 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.24.36 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.24.37 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.24.38 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.24.39 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location uk-000-ras-001 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location DMZVLAN60 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.26.0 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location TelephonyVLAN80 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.30.0 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location THINCLIENT125 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location StudentVlan130 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm location MacVlan25 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.23 uk-000-mm-001 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.22 uk-000-exch-003 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.24 uk-000-mm-002 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.26 uk-000-web-001 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.25 uk-000-isa-001 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.27 uk-000-isa-002 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.28 10.1.24.28 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.29 uk-000-web-003 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.30 uk-000-cmis-004 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.31 10.1.24.31 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.32 10.1.24.32 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.33 10.1.24.33 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.34 10.1.24.34 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.35 10.1.24.35 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.36 10.1.24.36 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.37 10.1.24.37 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.38 10.1.24.38 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.39 10.1.24.39 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.51.144.41 uk-000-ras-001 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group out in interface outside&lt;/P&gt;&lt;P&gt;access-group in in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.51.144.1 1&lt;/P&gt;&lt;P&gt;route inside ServerVlan20 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside 10.0.2.0 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside StudentVlan130 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside MacVlan25 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside VLAN2NotUsed 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside StudentVLAN100 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside StudentVLAN105 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside StudentVLAN110 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside VPNVLAN 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside StudentVLAN120 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside THINCLIENT125 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside ServiceVLAN 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside Internet 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside DMZVLAN60 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside 10.1.26.0 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside TelephonyVLAN80 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;route inside 10.1.30.0 255.255.254.0 10.1.36.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.1.36.20 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;http ServerVlan20 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community r34dm3&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup support address-pool supportpool&lt;/P&gt;&lt;P&gt;vpngroup support idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup support password ********&lt;/P&gt;&lt;P&gt;telnet ServiceVLAN 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;telnet PIXVLAN500 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;telnet ServerVlan20 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:57f956c09b7730949707861f66ba5570&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;uk-000-pix-01#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 14:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868344#M491906</guid>
      <dc:creator>kevleets38re</dc:creator>
      <dc:date>2011-12-02T14:08:05Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868345#M491907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For what Ip address do you want to open the ports, in your config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list out permit ip any host 10.1.9.4&lt;/P&gt;&lt;P&gt;access-list out remark OWA Access&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.22 eq https&lt;/P&gt;&lt;P&gt;access-list out remark Inbound Email&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.24 eq smtp&lt;/P&gt;&lt;P&gt;access-list out remark Inbound Email&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.23 eq smtp&lt;/P&gt;&lt;P&gt;access-list out remark PPTP VPN access to W2000 RAS server&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.41 eq pptp&lt;/P&gt;&lt;P&gt;access-list out remark PPTP VPN access to W2000 RAS server&lt;/P&gt;&lt;P&gt;access-list out permit gre any host 10.51.144.41&lt;/P&gt;&lt;P&gt;access-list out remark Sharepoint Intranet&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.29 eq www&lt;/P&gt;&lt;P&gt;access-list out remark Sharepoint Intranet&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.29 eq https&lt;/P&gt;&lt;P&gt;access-list out remark Electronic Registration&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.30 eq www&lt;/P&gt;&lt;P&gt;access-list out remark Electronic Registration&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.30 eq https&lt;/P&gt;&lt;P&gt;access-list out remark Testing&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list out remark Testing&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list out remark Testing&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list out remark Testing&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list out remark Testing&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any source-quench&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.28 eq 3389&lt;/P&gt;&lt;P&gt;access-list out remark HTTP to 10.51.144.31&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.31 eq www&lt;/P&gt;&lt;P&gt;access-list out remark RDP to 10.51.144.31&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.31 eq 3389&lt;/P&gt;&lt;P&gt;access-list out remark Inbound to MacVLAN25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see 443 is open for 10.51.144.30, 10.51.144.29, 10.51.144.22 and 10.1.9.4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are these the IP's for which you want to open the ports for???????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 14:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868345#M491907</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-12-02T14:18:07Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868346#M491908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; i want to open it for internal ip address 10.1.24.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for you help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kev &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 14:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868346#M491908</guid>
      <dc:creator>kevleets38re</dc:creator>
      <dc:date>2011-12-02T14:23:21Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868347#M491909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need these commands then:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.1.24.30 eq 443&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.1.24.30 eq 8443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's all you need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 14:30:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868347#M491909</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-12-02T14:30:08Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868348#M491910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks but those commands didnt work, when i type them i get type help or ? for a list available commands&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 14:39:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868348#M491910</guid>
      <dc:creator>kevleets38re</dc:creator>
      <dc:date>2011-12-02T14:39:05Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868349#M491911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you send a screenshot of it, the commands are correct, you just need to amke sure you are in the config terminal to issue the commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 14:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868349#M491911</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-12-02T14:41:39Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868350#M491912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi varun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i re did those commands in configure mode and i think it worked because when i did it a second time(i forgot to send to output file) i get this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User Access Verification&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;Type help or '?' for a list of available commands.&lt;/P&gt;&lt;P&gt;uk-000-pix-01&amp;gt; enable&lt;/P&gt;&lt;P&gt;Password: ***********&lt;/P&gt;&lt;P&gt;uk-000-pix-01# configure termial&lt;/P&gt;&lt;P&gt;Usage:&amp;nbsp; configure terminal&lt;/P&gt;&lt;P&gt;uk-000-pix-01# configure terminal&lt;/P&gt;&lt;P&gt;uk-000-pix-01(config)# access-list out permit tcp any host 10.1.24.30 eq 443&lt;/P&gt;&lt;P&gt;ACE not added. Possible duplicate entry&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;has that port been allowed succesfully now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kev&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 14:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868350#M491912</guid>
      <dc:creator>kevleets38re</dc:creator>
      <dc:date>2011-12-02T14:54:48Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868351#M491913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do "show access-list out" and check if you seen any access-list already been added, you can also add teh access-list for port 8443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Dec 2011 15:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868351#M491913</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-12-02T15:29:34Z</dc:date>
    </item>
    <item>
      <title>cisco pix 525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868352#M491914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a number of the rules are there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list out remark Electronic Registration&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.30 eq www&lt;/P&gt;&lt;P&gt;access-list out remark Electronic Registration&lt;/P&gt;&lt;P&gt;access-list out permit tcp any host 10.51.144.30 eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would advise that you run a "show access-list out", this will give you a full output of all the ace's for your perusal. If you wish to add the rule the you can either add the rule at the top, the bottom or where so ever you wish. The command you need is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list out line x permit tcp any host 10.51.144.30 eq 8443 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where is x is the line number of the ace you wish to insert it in. However, I would reccomend that you create a group "tcp_web"&lt;/P&gt;&lt;P&gt;with the ports, 80, 443 and 8443 and then apply the acl against the object group. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ju&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Dec 2011 03:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-525/m-p/1868352#M491914</guid>
      <dc:creator>ju_mobile</dc:creator>
      <dc:date>2011-12-03T03:17:02Z</dc:date>
    </item>
  </channel>
</rss>

