<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Strange PIX behavior - can't access all protocols from high  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698643#M496874</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this a typo?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 172.18.34.0 255.255.255.0 192.168.1.0 255.255.255.0 --&amp;gt; shouldn't it be 192.168.100.0 instead of 192.168.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume you want to do nonat for traffic from inside to DMZ and if it is, then correct the ACL and let us know if it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Nov 2006 21:37:53 GMT</pubDate>
    <dc:creator>sundar.palaniappan</dc:creator>
    <dc:date>2006-11-02T21:37:53Z</dc:date>
    <item>
      <title>Strange PIX behavior - can't access all protocols from high to low security</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698641#M496870</link>
      <description>&lt;P&gt;I have a 515 with four active interfaces (three hardware and one VLAN).  I have a DMZ interface with security level set to 6.  From the inside network (security 100) I can only access hosts on the DMZ using the HTTP protocol.  Ping and telnet do not work while they do work when I am connected directly to the DMZ network.  The DMZ network is flat and all hosts have the PIX as their DGW.  Below is a copy of the current config.  Am I missing something?  This should not be that hard!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(4)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 vlan11 logical&lt;/P&gt;&lt;P&gt;interface ethernet2 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 grandhome security6&lt;/P&gt;&lt;P&gt;nameif vlan11 guest security99&lt;/P&gt;&lt;P&gt;hostname DBADAPIX&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name xx.xx.167.101 QualityAirPC_OUTSIDE&lt;/P&gt;&lt;P&gt;name 192.168.100.90 QualityAirPC&lt;/P&gt;&lt;P&gt;access-list rdvvpn permit ip 172.18.34.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 172.18.34.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host QualityAirPC_OUTSIDE eq https&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap errors&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu grandhome 1500&lt;/P&gt;&lt;P&gt;ip address outside xx.xx.167.97 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 172.18.34.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address grandhome 192.168.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address guest 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (grandhome) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.18.34.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (grandhome) 1 192.168.100.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (guest) 1 192.168.10.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (grandhome,outside) QualityAirPC_OUTSIDE QualityAirPC netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.167.102 1&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set rdvvpnset esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map rdvvpnmap 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map rdvvpnmap 10 match address rdvvpn&lt;/P&gt;&lt;P&gt;crypto map rdvvpnmap 10 set peer xx.xx.71.66&lt;/P&gt;&lt;P&gt;crypto map rdvvpnmap 10 set transform-set ESP-DES-SHA&lt;/P&gt;&lt;P&gt;crypto map rdvvpnmap 10 set security-association lifetime seconds 43200 kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map rdvvpnmap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address xx.xx.71.66 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;dhcpd address 172.18.34.100-172.18.34.199 inside&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.100.100-192.168.100.109 grandhome&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.10.100-192.168.10.199 guest&lt;/P&gt;&lt;P&gt;dhcpd dns 64.x.37.x.39.140.42&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;dhcpd enable grandhome&lt;/P&gt;&lt;P&gt;dhcpd enable guest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:16:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698641#M496870</guid>
      <dc:creator>mikeb</dc:creator>
      <dc:date>2020-02-21T09:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: Strange PIX behavior - can't access all protocols from high</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698642#M496872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;to allow the pings to come back you need to allow the traffic.  it is not allowed by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;apply this acl to the dmz interface in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz-&amp;gt;in permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list dmz-&amp;gt;in permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list dmz-&amp;gt;in permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your trying to ping the dmz interface from the inside you can't.  Telneting to that interface isn't allowed either unless through an ipsec tunnel.  You should be able to telnet to a server in the dmz with no problem.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Nov 2006 20:18:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698642#M496872</guid>
      <dc:creator>cpembleton</dc:creator>
      <dc:date>2006-11-02T20:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: Strange PIX behavior - can't access all protocols from high</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698643#M496874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this a typo?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 172.18.34.0 255.255.255.0 192.168.1.0 255.255.255.0 --&amp;gt; shouldn't it be 192.168.100.0 instead of 192.168.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume you want to do nonat for traffic from inside to DMZ and if it is, then correct the ACL and let us know if it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Nov 2006 21:37:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698643#M496874</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2006-11-02T21:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: Strange PIX behavior - can't access all protocols from high</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698644#M496876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, that access list is for a VPN that I have on this PIX that is not included in the config I posted because I ran out of space!  I just left the relavant parts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mb&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Nov 2006 22:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698644#M496876</guid>
      <dc:creator>mikeb</dc:creator>
      <dc:date>2006-11-02T22:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: Strange PIX behavior - can't access all protocols from high</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698645#M496877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you add this static command to the configuration. This would cause the inside hosts to access the DMZ with their own addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,grandhome) 172.18.34.0 172.18.34.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Nov 2006 22:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698645#M496877</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2006-11-02T22:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: Strange PIX behavior - can't access all protocols from high</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698646#M496880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This was it.  I didn't think this was needed but obviously it is.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Nov 2006 14:49:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-behavior-can-t-access-all-protocols-from-high-to-low/m-p/698646#M496880</guid>
      <dc:creator>mikeb</dc:creator>
      <dc:date>2006-11-03T14:49:40Z</dc:date>
    </item>
  </channel>
</rss>

