<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 501 interconnectivity in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-interconnectivity/m-p/782342#M495541</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"there is no response to a machine on the inside network from outside."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well I dont see it on the config but if you have not changed it the outisde interface by default is has security of 0  and inside has 100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That means thanks to the ASA (adaptive Security Algorithm) any interface with a high security level can communicate with a low security level but not the other way around. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now  there will be no response because you are doing only nat. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To get a inside machine to respond requests from outside you need to create a static translation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ex:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 10.0.0.1 ftp-data  192.168.2.1 ftp-data netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;This static command will allow any ftp-data request made on outside interface 10.0.0.1 to be forward to interface inside ip 192.168.2.1 port 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also keep in mind to add an access-list for that to happen because the outside interface does not accept any thing from out side. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the case you want to open the outside to receive request for the static above you do &lt;/P&gt;&lt;P&gt;ex:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_TO_INSIDE extended permit tcp any interface outside eq ftp-data&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 10 Jun 2007 14:51:26 GMT</pubDate>
    <dc:creator>Rodrigo Gurriti</dc:creator>
    <dc:date>2007-06-10T14:51:26Z</dc:date>
    <item>
      <title>PIX 501 interconnectivity</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-interconnectivity/m-p/782341#M495538</link>
      <description>&lt;P&gt;My problem is that the Inside and outside network defined are working fine but independently,  Although from the PIX console there is response from either side but there is no response to a machine on the inside network from outside. Please someone help in this regard. an erly response is anticipated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the existing config goes like this:-&lt;/P&gt;&lt;P&gt;: Saved       &lt;/P&gt;&lt;P&gt;: &lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512                                     &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21                     &lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720                             &lt;/P&gt;&lt;P&gt;fixup protocol h323 ras                        &lt;/P&gt;&lt;P&gt;fixup protocol http 80                      &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514                      &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;object-group network inside&lt;/P&gt;&lt;P&gt;  network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network in&lt;/P&gt;&lt;P&gt;  network-object 192.168.2.1 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group network out&lt;/P&gt;&lt;P&gt;  network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp interface inside interface outside&lt;/P&gt;&lt;P&gt;access-list acl_outbound permit ip any any&lt;/P&gt;&lt;P&gt;access-list acl_outbound permit tcp any any&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside permit icmp any any&lt;/P&gt;&lt;P&gt;access-list inside permit ip any any&lt;/P&gt;&lt;P&gt;access-list outbound permit tcp any host 192.168.2.1&lt;/P&gt;&lt;P&gt;access-list outbound permit icmp any host 192.168.2.1&lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 192.168.2.1 eq www                                                          &lt;/P&gt;&lt;P&gt;pager lines 40              &lt;/P&gt;&lt;P&gt;mtu outside 1500                &lt;/P&gt;&lt;P&gt;mtu inside 1500               &lt;/P&gt;&lt;P&gt;ip address outside 192.168.1.2 255.255.255.0                            ip address inside 192.168.2.1 255.255.255.0                            ip audit info action alarm                          &lt;/P&gt;&lt;P&gt;ip audit attack action alarm                            &lt;/P&gt;&lt;P&gt;pdm location 192.168.2.0 255.255.255.0 inside                                   &lt;/P&gt;&lt;P&gt;pdm group inside inside                       &lt;/P&gt;&lt;P&gt;pdm group in inside                   &lt;/P&gt;&lt;P&gt;pdm group out outside                     &lt;/P&gt;&lt;P&gt;pdm history enable                  &lt;/P&gt;&lt;P&gt;arp timeout 14400                 &lt;/P&gt;&lt;P&gt;global (outside) 10 interface                             &lt;/P&gt;&lt;P&gt;global (inside) 50 192.x.2.10-192.168.2.45 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 50 192.x.2.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.2.1 192.168.2.1 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.1 255.255.255.255 192.168.2.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt noproxyarp outside&lt;/P&gt;&lt;P&gt;telnet 192.168.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.2.10-192.168.2.40 inside&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.x is the internal network and 1.x is hte outside network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:33:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-interconnectivity/m-p/782341#M495538</guid>
      <dc:creator>pravinthali</dc:creator>
      <dc:date>2020-02-21T09:33:51Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 interconnectivity</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-interconnectivity/m-p/782342#M495541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"there is no response to a machine on the inside network from outside."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well I dont see it on the config but if you have not changed it the outisde interface by default is has security of 0  and inside has 100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That means thanks to the ASA (adaptive Security Algorithm) any interface with a high security level can communicate with a low security level but not the other way around. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now  there will be no response because you are doing only nat. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To get a inside machine to respond requests from outside you need to create a static translation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ex:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 10.0.0.1 ftp-data  192.168.2.1 ftp-data netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;This static command will allow any ftp-data request made on outside interface 10.0.0.1 to be forward to interface inside ip 192.168.2.1 port 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also keep in mind to add an access-list for that to happen because the outside interface does not accept any thing from out side. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the case you want to open the outside to receive request for the static above you do &lt;/P&gt;&lt;P&gt;ex:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_TO_INSIDE extended permit tcp any interface outside eq ftp-data&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2007 14:51:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-interconnectivity/m-p/782342#M495541</guid>
      <dc:creator>Rodrigo Gurriti</dc:creator>
      <dc:date>2007-06-10T14:51:26Z</dc:date>
    </item>
  </channel>
</rss>

