<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Urgent! Natting Issue on Pix 501 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699620#M529469</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having an issue on my Pix 501- ver. 6.3(5) firewall when host 192.168.1.2 accessing any website, no website is opening and when i issue command &lt;STRONG&gt;sh xlate &lt;/STRONG&gt;so don't see anything and i think i must enable natting on this firewall as same as on ASA nat-control but i don't know what is the cause and why the traffic is not goes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly see below all details and give me any solution to pass inside traffic to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;hostname PIX501&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 110.34.33.124 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 110.34.33.125&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;conduit permit icmp any any&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 110.34.33.97 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;username saeed password xAmbVBkAB7NsAEuT encrypted privilege 15&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:9dd55a301a22073d9ed3313b674cfbb6&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# sh nat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# sh global&lt;/P&gt;&lt;P&gt;global (outside) 1 110.34.33.125&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# sh access-list&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;/P&gt;&lt;P&gt;access-list outbound; 1 elements&lt;/P&gt;&lt;P&gt;access-list outbound line 1 permit tcp 192.168.1.0 255.255.255.0 any eq www (hitcnt=0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# sh xlate&lt;/P&gt;&lt;P&gt;0 in use, 0 most used&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 20:49:11 GMT</pubDate>
    <dc:creator>saeedccie</dc:creator>
    <dc:date>2019-03-11T20:49:11Z</dc:date>
    <item>
      <title>Urgent! Natting Issue on Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699620#M529469</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having an issue on my Pix 501- ver. 6.3(5) firewall when host 192.168.1.2 accessing any website, no website is opening and when i issue command &lt;STRONG&gt;sh xlate &lt;/STRONG&gt;so don't see anything and i think i must enable natting on this firewall as same as on ASA nat-control but i don't know what is the cause and why the traffic is not goes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly see below all details and give me any solution to pass inside traffic to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;hostname PIX501&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 110.34.33.124 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 110.34.33.125&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;conduit permit icmp any any&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 110.34.33.97 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;username saeed password xAmbVBkAB7NsAEuT encrypted privilege 15&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:9dd55a301a22073d9ed3313b674cfbb6&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# sh nat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# sh global&lt;/P&gt;&lt;P&gt;global (outside) 1 110.34.33.125&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# sh access-list&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;/P&gt;&lt;P&gt;access-list outbound; 1 elements&lt;/P&gt;&lt;P&gt;access-list outbound line 1 permit tcp 192.168.1.0 255.255.255.0 any eq www (hitcnt=0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# sh xlate&lt;/P&gt;&lt;P&gt;0 in use, 0 most used&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:49:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699620#M529469</guid>
      <dc:creator>saeedccie</dc:creator>
      <dc:date>2019-03-11T20:49:11Z</dc:date>
    </item>
    <item>
      <title>Urgent! Natting Issue on Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699621#M529470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If there is no hitcount, that means that the traffic is not even hitting the PIX firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the host to ensure that the default gateway is correct, ip address and subnet mask is correctly configured. Also, does it have any DNS setting configured?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using external DNS server, then you might want to allow DNS traffic through the PIX firewall as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to see if you can browse the internet by ip address instead of name to see where the problem is.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2011 05:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699621#M529470</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-06-23T05:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: Urgent! Natting Issue on Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699622#M529471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On client here is the settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP: 192.168.1.2&lt;/P&gt;&lt;P&gt;Sub: 255.255.255.0&lt;/P&gt;&lt;P&gt;Gate-Way: 192.168.1.1&lt;/P&gt;&lt;P&gt;DNS: No dns but i applied 192.168.1.1 but still not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont have any such DNS, can i put the ISP dns?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This host can ping inside interface but unable to pass traffic from inside to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Update:&lt;/P&gt;&lt;P&gt;============&lt;/P&gt;&lt;P&gt;I just enter ISP dns on the client side but still same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Onething more see here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# ping 110.34.33.124&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110.34.33.124 response received -- 0ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110.34.33.124 response received -- 0ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110.34.33.124 response received -- 0ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX501(config)# ping 110.34.33.125&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110.34.33.125 NO response received -- 1000ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110.34.33.125 NO response received -- 1000ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 110.34.33.125 NO response received -- 1000ms&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2011 05:27:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699622#M529471</guid>
      <dc:creator>saeedccie</dc:creator>
      <dc:date>2011-06-23T05:27:06Z</dc:date>
    </item>
    <item>
      <title>Re: Urgent! Natting Issue on Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699623#M529474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Of course you would need to DNS, and you can't use 192.168.1.1 because PIX does not act as a DNS server.&lt;/P&gt;&lt;P&gt;Please configre the ISP DNS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just take the access-group off for now while you are still testing:&lt;/P&gt;&lt;P&gt;no access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also, you won't be able to ping 110.34.33.125 as it's a virtual IP.&lt;/P&gt;&lt;P&gt;Test to see if you can ping 110.34.33.97 from the host, if you can, that means you have connectivity through the PIX.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2011 05:40:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699623#M529474</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-06-23T05:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: Urgent! Natting Issue on Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699624#M529475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, when putting the DNS and disabling the &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group outbound in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then working fine and when again enabling above command &lt;STRONG&gt;then not working&lt;/STRONG&gt; so please help me what should i do to apply the access-list. is there any issue with the access-list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Onething more can i put my local dns server so is it work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Onething more why Tab button is not working - i mean completing the command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2011 05:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699624#M529475</guid>
      <dc:creator>saeedccie</dc:creator>
      <dc:date>2011-06-23T05:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Urgent! Natting Issue on Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699625#M529476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would have to configure access-list to allow DNS traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add the following for DNS:&lt;/P&gt;&lt;P&gt;access-list outbound permit udp 192.168.1.0 255.255.255.0 any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For any of the traffic that you would like to allow outbound, once you configure the access-group, you would need to explicitly configure each traffic to go outbound.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2011 06:08:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/urgent-natting-issue-on-pix-501/m-p/1699625#M529476</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-06-23T06:08:54Z</dc:date>
    </item>
  </channel>
</rss>

