<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Server Behind PIX Behind Router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571845#M502299</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the PIX log to an internal syslogd:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It builds the TCP Connection then:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Teardown TCP connection 338186 for outside:xx.242.182.165/1330 to inside:10.34.1.10/1723 duration 0:02:01 bytes 0 SYN Timeout&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 18 Apr 2006 16:23:39 GMT</pubDate>
    <dc:creator>slatonisd</dc:creator>
    <dc:date>2006-04-18T16:23:39Z</dc:date>
    <item>
      <title>Server Behind PIX Behind Router</title>
      <link>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571841#M502295</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My goal is to access tcp port 1723 and GRE (IP 47) on a Windows server inside our LAN from the Internet. I am having trouble connecting through the router and PIX. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet &amp;gt; Router &amp;gt; PIX &amp;gt; LAN (Server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router External IP (Serial): xx.216.35.242&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router Internal IP (Ethernet): xx.255.89.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Outside: xx.255.89.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Inside: 10.34.4.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server: 10.34.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote Web Filter: xx.48.253.64 &lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;Router#show run&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 1570 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.2&lt;/P&gt;&lt;P&gt;service timestamps debug uptime&lt;/P&gt;&lt;P&gt;service timestamps log uptime&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname Router&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no logging buffered&lt;/P&gt;&lt;P&gt;no logging console&lt;/P&gt;&lt;P&gt;no logging monitor&lt;/P&gt;&lt;P&gt;enable secret 5 xxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;enable password somepassword&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; ip address xx.255.89.1 255.255.255.128&lt;/P&gt;&lt;P&gt; ip access-group 101 in&lt;/P&gt;&lt;P&gt; half-duplex&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial0/0&lt;/P&gt;&lt;P&gt; ip address xx.216.35.242 255.255.255.252&lt;/P&gt;&lt;P&gt; ip access-group 125 in&lt;/P&gt;&lt;P&gt; ip access-group 125 out&lt;/P&gt;&lt;P&gt; encapsulation frame-relay IETF&lt;/P&gt;&lt;P&gt; service-module t1 clock source internal&lt;/P&gt;&lt;P&gt; service-module t1 timeslots 1-24&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 xx.216.35.241&lt;/P&gt;&lt;P&gt;ip route xx.48.253.64 255.255.255.224 Ethernet0/0&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no logging trap&lt;/P&gt;&lt;P&gt;access-list 11 permit xx.255.89.0 0.0.0.128&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any host xx.48.244.230&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any host xx.164.1.1&lt;/P&gt;&lt;P&gt;access-list 101 deny   tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any&lt;/P&gt;&lt;P&gt;access-list 125 deny   udp any any eq tftp&lt;/P&gt;&lt;P&gt;access-list 125 deny   tcp any any eq 135&lt;/P&gt;&lt;P&gt;access-list 125 deny   udp any any eq 135&lt;/P&gt;&lt;P&gt;access-list 125 deny   udp any any eq netbios-ns&lt;/P&gt;&lt;P&gt;access-list 125 deny   udp any any eq netbios-dgm&lt;/P&gt;&lt;P&gt;access-list 125 deny   tcp any any eq 139&lt;/P&gt;&lt;P&gt;access-list 125 deny   udp any any eq netbios-ss&lt;/P&gt;&lt;P&gt;access-list 125 deny   tcp any any eq 445&lt;/P&gt;&lt;P&gt;access-list 125 deny   tcp any any eq 593&lt;/P&gt;&lt;P&gt;access-list 125 deny   tcp any any eq 4444&lt;/P&gt;&lt;P&gt;access-list 125 permit ip any any&lt;/P&gt;&lt;P&gt;snmp-server community public RO&lt;/P&gt;&lt;P&gt;snmp-server enable traps tty&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; password somepassword&lt;/P&gt;&lt;P&gt; login&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router#&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:50:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571841#M502295</guid>
      <dc:creator>slatonisd</dc:creator>
      <dc:date>2020-02-21T08:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: Server Behind PIX Behind Router</title>
      <link>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571842#M502296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's not much info here but to start I'd check remove the ACLs from the interfaces,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check all your IP addressing and netmasks (server/PIX inside?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check your routing and default gateways&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you mapped a real address for the inside server and allowed those ports through?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Apr 2006 14:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571842#M502296</guid>
      <dc:creator>tholmes</dc:creator>
      <dc:date>2006-04-18T14:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: Server Behind PIX Behind Router</title>
      <link>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571843#M502297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This probably isn't anything with your router. THis is probably a configuration issue with your PIX.  Post your pix config.  P.S., your pix can do the vpn and use radius to authenticate via active directory.  It works quite well, and does not expose your server to the public. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT :  What are you trying to accomplish with access-list 101 on the ethernet interface of the router?  Still, I think it is the firewall that is causing your issue.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure you have a static and the access list to open the ports needed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Apr 2006 14:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571843#M502297</guid>
      <dc:creator>joneschw1</dc:creator>
      <dc:date>2006-04-18T14:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: Server Behind PIX Behind Router</title>
      <link>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571844#M502298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PIX# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(4)&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 10baset&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password &lt;/P&gt;&lt;P&gt;passwd &lt;/P&gt;&lt;P&gt;hostname PIX&lt;/P&gt;&lt;P&gt;domain-name&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol pptp 1723&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host xx.255.89.6 eq pptp&lt;/P&gt;&lt;P&gt;access-list 100 permit gre any host xx.255.89.6&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any host xx.255.89.6&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging host inside 10.34.1.233&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside xx.255.89.2 255.255.255.128&lt;/P&gt;&lt;P&gt;ip address inside 10.34.4.1 255.255.0.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 xx.255.89.10-xx.255.89.126 netmask 255.255.255.128&lt;/P&gt;&lt;P&gt;global (outside) 1 xx.255.89.4 netmask 255.255.255.128&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) xx.255.89.6 10.34.1.10 &lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 70.255.89.1 1&lt;/P&gt;&lt;P&gt;route inside xx.48.253.64 255.255.255.224 10.34.4.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 10.34.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;PIX#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Apr 2006 16:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571844#M502298</guid>
      <dc:creator>slatonisd</dc:creator>
      <dc:date>2006-04-18T16:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Server Behind PIX Behind Router</title>
      <link>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571845#M502299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the PIX log to an internal syslogd:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It builds the TCP Connection then:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Teardown TCP connection 338186 for outside:xx.242.182.165/1330 to inside:10.34.1.10/1723 duration 0:02:01 bytes 0 SYN Timeout&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Apr 2006 16:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571845#M502299</guid>
      <dc:creator>slatonisd</dc:creator>
      <dc:date>2006-04-18T16:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Server Behind PIX Behind Router</title>
      <link>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571846#M502301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found the problem. (Completely my fault on this one.) I had the default gateway of the server set to the wrong router. The PIX logs showed the traffic coming in but not leaving... because of the default gateway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Apr 2006 03:34:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-behind-pix-behind-router/m-p/571846#M502301</guid>
      <dc:creator>slatonisd</dc:creator>
      <dc:date>2006-04-19T03:34:37Z</dc:date>
    </item>
  </channel>
</rss>

