<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pb conf pix 515 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562428#M498032</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a little pb with my pix.*&lt;/P&gt;&lt;P&gt;I have open the all port between DMZ and INSIDE but the inside users could not connect to the proxy(in DMZ) and open an internet pages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My configuration is : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 7.0(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.38.201 SRV-DC1&lt;/P&gt;&lt;P&gt;name 192.168.38.205 SRV-ANTIVIRUS&lt;/P&gt;&lt;P&gt;name 192.168.38.203 SRV-MAIL&lt;/P&gt;&lt;P&gt;name 192.168.38.202 SRV-DC2&lt;/P&gt;&lt;P&gt;name 192.168.40.10 ISVW&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.2.50 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.39.251 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 30&lt;/P&gt;&lt;P&gt; ip address 192.168.40.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq domain &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq 8080 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq pptp &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any eq smtp any eq smtp &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any eq 8080 any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq 8080 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;monitor-interface Outside&lt;/P&gt;&lt;P&gt;monitor-interface inside&lt;/P&gt;&lt;P&gt;monitor-interface DMZ&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Outside) 1 192.168.2.32-192.168.2.39 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (DMZ) 1 192.168.40.20-192.168.40.50 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.38.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group Outside_access_in in interface Outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.38.0 255.255.255.0 192.168.39.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;username admin password xxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.39.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.38.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.40.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.39.252-192.168.39.254 inside&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512 &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect http &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 09:08:11 GMT</pubDate>
    <dc:creator>hassanimagid</dc:creator>
    <dc:date>2020-02-21T09:08:11Z</dc:date>
    <item>
      <title>Pb conf pix 515</title>
      <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562428#M498032</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a little pb with my pix.*&lt;/P&gt;&lt;P&gt;I have open the all port between DMZ and INSIDE but the inside users could not connect to the proxy(in DMZ) and open an internet pages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My configuration is : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 7.0(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.38.201 SRV-DC1&lt;/P&gt;&lt;P&gt;name 192.168.38.205 SRV-ANTIVIRUS&lt;/P&gt;&lt;P&gt;name 192.168.38.203 SRV-MAIL&lt;/P&gt;&lt;P&gt;name 192.168.38.202 SRV-DC2&lt;/P&gt;&lt;P&gt;name 192.168.40.10 ISVW&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.2.50 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.39.251 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 30&lt;/P&gt;&lt;P&gt; ip address 192.168.40.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq domain &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq 8080 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq pptp &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any eq smtp any eq smtp &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any eq 8080 any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq 8080 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;monitor-interface Outside&lt;/P&gt;&lt;P&gt;monitor-interface inside&lt;/P&gt;&lt;P&gt;monitor-interface DMZ&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Outside) 1 192.168.2.32-192.168.2.39 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (DMZ) 1 192.168.40.20-192.168.40.50 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.38.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group Outside_access_in in interface Outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.38.0 255.255.255.0 192.168.39.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;username admin password xxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.39.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.38.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.40.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.39.252-192.168.39.254 inside&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512 &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect http &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562428#M498032</guid>
      <dc:creator>hassanimagid</dc:creator>
      <dc:date>2020-02-21T09:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: Pb conf pix 515</title>
      <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562429#M498033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From which ip segment in the inside network you are trying to access the proxy server.&lt;/P&gt;&lt;P&gt;There is no nat statements for the inside network 192.168.39.0 /24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should have this statement also to include the inside network in the nat translation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.39.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Aug 2006 14:43:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562429#M498033</guid>
      <dc:creator>vijayasankar</dc:creator>
      <dc:date>2006-08-28T14:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Pb conf pix 515</title>
      <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562430#M498034</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have to PAT the inside subnet to the DMZ otherwise they won't be able to connect to the proxy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore your NAT should look like this&lt;/P&gt;&lt;P&gt;global (Outside) 1 192.168.2.32-192.168.2.39 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;global (DMZ) 2 192.168.40.20-192.168.40.50 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.38.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat (Inside) 2 192.168.38.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this solves your problem and rate please,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Aug 2006 15:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562430#M498034</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2006-08-28T15:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: Pb conf pix 515</title>
      <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562431#M498035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your answers but it's not ok!!&lt;/P&gt;&lt;P&gt;I have installed the soft "ethereal" and the pb is that the proxy couldn't answer to the user.&lt;/P&gt;&lt;P&gt;xx--&amp;gt;8080(of DMZ proxy) ok&lt;/P&gt;&lt;P&gt;8080--&amp;gt;xx(inside port) not ok!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please help me thanks!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Aug 2006 15:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562431#M498035</guid>
      <dc:creator>hassanimagid</dc:creator>
      <dc:date>2006-08-28T15:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: Pb conf pix 515</title>
      <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562432#M498036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From where are the clients are comming? 192.168.39.0 or 192.168.38? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Aug 2006 17:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562432#M498036</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2006-08-28T17:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: Pb conf pix 515</title>
      <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562433#M498037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also did you clear xlate after I sent you applied the config I sent?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Aug 2006 17:40:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562433#M498037</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2006-08-28T17:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: Pb conf pix 515</title>
      <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562434#M498038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client are comming from 192.168.39.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and I clear the xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Aug 2006 09:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562434#M498038</guid>
      <dc:creator>hassanimagid</dc:creator>
      <dc:date>2006-08-29T09:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: Pb conf pix 515</title>
      <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562435#M498039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do a quick test, and see can help:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, DMZ) 192.168.38.0 192.168.38.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside, DMZ) 192.168.39.0 192.168.39.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* delete/add as required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will allow inside &amp;amp; DMZ to talk to each other via respective@original IP Address. Maintain ACL on the DMZ &amp;amp; inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds,&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Aug 2006 11:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562435#M498039</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-08-29T11:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: Pb conf pix 515</title>
      <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562436#M498041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much its OK!!!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Aug 2006 12:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562436#M498041</guid>
      <dc:creator>hassanimagid</dc:creator>
      <dc:date>2006-08-29T12:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: Pb conf pix 515</title>
      <link>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562437#M498043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;看一下能支持中文吗&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Aug 2006 12:14:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pb-conf-pix-515/m-p/562437#M498043</guid>
      <dc:creator>martin0627</dc:creator>
      <dc:date>2006-08-29T12:14:56Z</dc:date>
    </item>
  </channel>
</rss>

