<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Pix 501 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613787#M497737</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have a pix 501 and I need to let Exchange traffic through. I had done this before and it worked for me, but this time its not working. I cannot telnet to port 25.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help. See below for my configuration. I am sure its something easy, but I cannot see it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kidscampus# sh config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 16:59:07.852 UTC Mon Sep 4 2006&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;hostname kidscampus&lt;/P&gt;&lt;P&gt;domain-name kcycenter.org&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.&lt;/P&gt;&lt;P&gt;access-list 90 permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 60.32.25.34 eq smtp&lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 60.32.25.34 eq www&lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 60.32.25.35 eq 3389&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 60.32.25.33 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool kids 10.10.10.20-10.10.10.40&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 90&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 60.32.25.35 192.168.1.2 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group 90 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 60.32.25.38 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set strong esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 match address 90&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 set peer 69.224.215.122&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 set transform-set strong&lt;/P&gt;&lt;P&gt;crypto map toOSC interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 69.224.215.122 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp policy 9 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 9 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 9 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 9 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 9 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup kcyc address-pool kids&lt;/P&gt;&lt;P&gt;vpngroup kcyc dns-server 192.168.1.2&lt;/P&gt;&lt;P&gt;vpngroup kcyc wins-server 192.168.1.2&lt;/P&gt;&lt;P&gt;vpngroup kcyc default-domain kcycenter.org&lt;/P&gt;&lt;P&gt;vpngroup kcyc split-tunnel nonat&lt;/P&gt;&lt;P&gt;vpngroup kcyc split-dns 192.168.1.2 206.13.29.12&lt;/P&gt;&lt;P&gt;vpngroup kcyc idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup kcyc password ********&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 600&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxx&lt;/P&gt;&lt;P&gt;kidscampus#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 09:09:36 GMT</pubDate>
    <dc:creator>ciscopaul</dc:creator>
    <dc:date>2020-02-21T09:09:36Z</dc:date>
    <item>
      <title>Cisco Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613787#M497737</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have a pix 501 and I need to let Exchange traffic through. I had done this before and it worked for me, but this time its not working. I cannot telnet to port 25.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help. See below for my configuration. I am sure its something easy, but I cannot see it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kidscampus# sh config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 16:59:07.852 UTC Mon Sep 4 2006&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;hostname kidscampus&lt;/P&gt;&lt;P&gt;domain-name kcycenter.org&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.&lt;/P&gt;&lt;P&gt;access-list 90 permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 60.32.25.34 eq smtp&lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 60.32.25.34 eq www&lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 60.32.25.35 eq 3389&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 60.32.25.33 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool kids 10.10.10.20-10.10.10.40&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 90&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 60.32.25.35 192.168.1.2 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group 90 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 60.32.25.38 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set strong esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 match address 90&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 set peer 69.224.215.122&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 set transform-set strong&lt;/P&gt;&lt;P&gt;crypto map toOSC interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 69.224.215.122 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp policy 9 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 9 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 9 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 9 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 9 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup kcyc address-pool kids&lt;/P&gt;&lt;P&gt;vpngroup kcyc dns-server 192.168.1.2&lt;/P&gt;&lt;P&gt;vpngroup kcyc wins-server 192.168.1.2&lt;/P&gt;&lt;P&gt;vpngroup kcyc default-domain kcycenter.org&lt;/P&gt;&lt;P&gt;vpngroup kcyc split-tunnel nonat&lt;/P&gt;&lt;P&gt;vpngroup kcyc split-dns 192.168.1.2 206.13.29.12&lt;/P&gt;&lt;P&gt;vpngroup kcyc idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup kcyc password ********&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 600&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxx&lt;/P&gt;&lt;P&gt;kidscampus#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613787#M497737</guid>
      <dc:creator>ciscopaul</dc:creator>
      <dc:date>2020-02-21T09:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613788#M497738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) You need to have a static nat for your mail server. I guess the public ip of the mail server is 60.32.25.34. Create a static nat for the private ip of the mail server to get natted to 60.32.25.34. using "static( inside, outside)..." statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 60.32.25.34 &lt;PRIVATE ip=""&gt; netmask 255.255.255.255 0 0&lt;/PRIVATE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Kindly remove the following lines.&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 90 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the ACL 90 needs to be corrected suitably.&lt;/P&gt;&lt;P&gt;The access-list that you apply to the outside interface should look like.&lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 60.32.25.34 eq smtp &lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 60.32.25.34 eq www &lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 60.32.25.35 eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could see that you have also included the following lines in the ACL 90 to match for the crypto map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 90 permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove those lines from ACL 90 and Create a separate ACL to match for the crypto map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 91 permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now include nat 0 for this ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And call this ACL in your crypto map.&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 match address 91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is not inline with your requirement, let us know what you would like to achieve and we will help you out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. Please rate the post if it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Sep 2006 03:38:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613788#M497738</guid>
      <dc:creator>vijayasankar</dc:creator>
      <dc:date>2006-09-07T03:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613789#M497740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;VJ,&lt;/P&gt;&lt;P&gt;thanks for much for your reply.&lt;/P&gt;&lt;P&gt;I tried all your solutions and my exchange server still does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the actual ip address is 75.32.25.34 &lt;/P&gt;&lt;P&gt;when I tried to send an e-mail, it does not go through and when I do telnet 75.32.25.34 25,&lt;/P&gt;&lt;P&gt;it failed too.&lt;/P&gt;&lt;P&gt;Please respond as soon as you can,&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Paul Hong&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2006 22:36:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613789#M497740</guid>
      <dc:creator>ciscopaul</dc:creator>
      <dc:date>2006-09-08T22:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613790#M497741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need port redirection with statics as you have one outside address mapped to two inside servers - www and smtp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove this static:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 60.32.25.34 &lt;PRIVATE ip=""&gt; netmask 255.255.255.255 0 0 &lt;/PRIVATE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add these two static statements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) tcp 60.32.25.34 smtp &lt;PRIVATE_IP&gt; smtp netmask 255.255.255.255&lt;/PRIVATE_IP&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) tcp 60.32.25.34 www &lt;PRIVATE_IP&gt; www netmask 255.255.255.255&lt;/PRIVATE_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Sep 2006 23:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613790#M497741</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2006-09-08T23:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613791#M497742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul,&lt;/P&gt;&lt;P&gt;Thanks for the update. &lt;/P&gt;&lt;P&gt;Kindly post the current config ( excluding any sensitive details). We would like to have a look at the current configuration to see if any further corrections are needed to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Sep 2006 16:04:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613791#M497742</guid>
      <dc:creator>vijayasankar</dc:creator>
      <dc:date>2006-09-09T16:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613792#M497743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the current config,&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 12:23:54.429 UTC Sat Sep 9 2006&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;hostname kidscampus&lt;/P&gt;&lt;P&gt;domain-name kcycenter.org&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names         &lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 75.32.25.34 eq smtp &lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 75.32.25.34 eq www &lt;/P&gt;&lt;P&gt;access-list 90 permit tcp any host 75.32.25.35 eq 3389 &lt;/P&gt;&lt;P&gt;access-list 91 permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 75.32.25.33 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool kids 10.10.10.20-10.10.10.40&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 91&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 75.32.25.34 www 192.168.1.2 www netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 75.32.25.34 smtp 192.168.1.2 smtp netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group 90 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 75.32.25.38 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set strong esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map toOSC 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 match address 91&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 set peer 69.224.215.122&lt;/P&gt;&lt;P&gt;crypto map toOSC 20 set transform-set strong&lt;/P&gt;&lt;P&gt;crypto map toOSC interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 69.224.215.122 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;isakmp policy 9 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 9 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 9 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 9 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 9 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup kcyc address-pool kids&lt;/P&gt;&lt;P&gt;vpngroup kcyc dns-server 192.168.1.2&lt;/P&gt;&lt;P&gt;vpngroup kcyc wins-server 192.168.1.2&lt;/P&gt;&lt;P&gt;vpngroup kcyc default-domain kcycenter.org&lt;/P&gt;&lt;P&gt;vpngroup kcyc split-tunnel nonat&lt;/P&gt;&lt;P&gt;vpngroup kcyc split-dns 192.168.1.2 206.13.29.12&lt;/P&gt;&lt;P&gt;vpngroup kcyc idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup kcyc password ********&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxx&lt;/P&gt;&lt;P&gt;kidscampus(config)# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Sep 2006 18:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613792#M497743</guid>
      <dc:creator>ciscopaul</dc:creator>
      <dc:date>2006-09-09T18:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613793#M497744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ..  the config seems Ok. Is the SMTP service OK ..?  have you tested telnet 192.168.1.2 25 from an inside host ..? if it works then check its default gateway  .. because you need to make sure that the return traffic from the internet goes out by 192.168.1.1 ( PIX inside interface) .. also make sure the mail server is not blocking anything .. coming on smtp nor www.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Sep 2006 21:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613793#M497744</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2006-09-09T21:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613794#M497745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes,&lt;/P&gt;&lt;P&gt;everything is ok on the inside.&lt;/P&gt;&lt;P&gt;I can send e-mails internally and receive internally.&lt;/P&gt;&lt;P&gt;Telnet 192.168.1.2 25 works good inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Sep 2006 22:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613794#M497745</guid>
      <dc:creator>ciscopaul</dc:creator>
      <dc:date>2006-09-09T22:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613795#M497746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;mmm ...  Can you do a ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate and then post &lt;/P&gt;&lt;P&gt;show access-list 90 and &lt;/P&gt;&lt;P&gt;show local-host 192.168.1.2  while performing telnet attempts on port 25 to the mail server from the internet .. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Sep 2006 06:37:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613795#M497746</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2006-09-10T06:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613796#M497747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As your PAT configuration is working, can you replace the existing static translations with these two and let us know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.1.2 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.1.2 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Sep 2006 20:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/613796#M497747</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2006-09-10T20:12:29Z</dc:date>
    </item>
  </channel>
</rss>

