<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX url-server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501677#M530011</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;please post the config with public ip masked.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 04 Dec 2005 21:45:28 GMT</pubDate>
    <dc:creator>jackko</dc:creator>
    <dc:date>2005-12-04T21:45:28Z</dc:date>
    <item>
      <title>PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501669#M529991</link>
      <description>&lt;P&gt;I have a n2h2 server at headquarters. I want remote offices to query this server when making web requests. HQ has PIX 515e and remote office 501. Works no problem in HQ but remote offices log 110001. No route. Each of the remote office have VPN tunnel back to HQ. I can browse to the n2h2 to/from remote office. Connect to the port, ping, etc. So I know I can get from a &amp;lt;-&amp;gt; b. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 120&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 22.22.22.22 1&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;URL Server Status:&lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt;10.10.10.10              DOWN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Log indicates No route {n2h2 IP} from {pix inside IP}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am just missing something obvious. I have tried configuring the url-server on the inside and outside. same result. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any info is greatly appreciated.   &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:34:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501669#M529991</guid>
      <dc:creator>gmcmanus93</dc:creator>
      <dc:date>2020-02-21T08:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501670#M529994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it seems to me that you need to define the interesting traffic for vpn connectivity for the URL server IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interesting traffic should source from pix and destine to URL server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you ping the URL server from the remote pix? i guess not, due to the fact that interesting traffic is between LANs and not from PIX to LAn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Nadeem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2005 05:23:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501670#M529994</guid>
      <dc:creator>nkhawaja</dc:creator>
      <dc:date>2005-12-04T05:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501671#M529995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as mentioned from the previous post, i guess the remote pix 501 needs to be included as part of the crypto traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g. the existing acl should look like&lt;/P&gt;&lt;P&gt;access-list no_nat permit ip &lt;REMOTE office="" net=""&gt; &lt;REMOTE office="" net="" mask=""&gt;  &lt;/REMOTE&gt;&lt;/REMOTE&gt;&lt;/P&gt;&lt;P&gt;access-list vpnl2l permit ip &lt;REMOTE office="" net=""&gt; &lt;REMOTE office="" net="" mask=""&gt;  &lt;/REMOTE&gt;&lt;/REMOTE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the remote office pix, add:&lt;/P&gt;&lt;P&gt;access-list vpnl2l permit ip host &lt;PIX public="" interface="" ip=""&gt;  &lt;/PIX&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the head office pix, add:&lt;/P&gt;&lt;P&gt;access-list vpnl2l permit ip   host &lt;PIX public="" interface="" ip=""&gt;&lt;/PIX&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2005 10:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501671#M529995</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-12-04T10:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501672#M529998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Replied by: nkhawaja - CCIE - Dec 3, 2005, 9:23pm PST&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I can ping the server. I can also browse to it and telnet to the port. All traffic from remote office has no issues getting from the remote subnet to the HQ thru normal means, such as mapped drives, browsing etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Replied by: jackko - Security and Network Consultant, Trilogy Computer Systems Pty Ltd, Australia - Dec 4, 2005, 2:12am PST&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, there is a tunnel setup between the remote and HQ. I have tried setting the url-server both inside and outside, same error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No route to {websense server IP in HQ} from {inside IP of remote PIX}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote office is configured as a split tunnel. It appears to be a routing issue but just not sure what line would correct it since I can get to the server by simply browing, telneting to the port the app uses, etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know this. The web request is never making it outside the pix to HQ from the remote since i do not see any connections from pix but I do see a connection when i telnet to the port. So i know i can get from server (remote) to server (hq).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current Access-list(remote)&lt;/P&gt;&lt;P&gt;access-list 120 permit ip 192.168.0.0 255.255.0.0 10.10.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;conduit permit ip 10.10.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current Access-list (HQ)&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.0.0.0 255.0.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2005 15:31:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501672#M529998</guid>
      <dc:creator>gmcmanus93</dc:creator>
      <dc:date>2005-12-04T15:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501673#M530000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes we understand you can ping from network to network. what we want to know is that you can ping the server from the remote PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2005 15:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501673#M530000</guid>
      <dc:creator>nkhawaja</dc:creator>
      <dc:date>2005-12-04T15:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501674#M530002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No reponse received&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went ahead and added icmp permit any {interfaces}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp trace log.&lt;/P&gt;&lt;P&gt;&lt;FROM remote="" pix=""&gt;&lt;/FROM&gt;&lt;/P&gt;&lt;P&gt;22: ICMP echo request (len 32 id 9233 seq 0) pix-public-IP &amp;gt; HQserver-IP&lt;/P&gt;&lt;P&gt;        HQserver-IP NO response received -- 1000ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;send a ping from HQ pix and remote pix logs:&lt;/P&gt;&lt;P&gt;36: ICMP echo-request from outside:vpn-interface-IP to remote-pix-inside-ip ID=4388 seq=2 length=40&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2005 16:49:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501674#M530002</guid>
      <dc:creator>gmcmanus93</dc:creator>
      <dc:date>2005-12-04T16:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501675#M530005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you need to Modify your interesting traffic on HQ and remote PIX so that remote PIX can ping to the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;see the earlier email on a sample config&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2005 16:55:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501675#M530005</guid>
      <dc:creator>nkhawaja</dc:creator>
      <dc:date>2005-12-04T16:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501676#M530008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have used this example:&lt;/P&gt;&lt;P&gt;e.g. the existing acl should look like &lt;/P&gt;&lt;P&gt;access-list no_nat permit ip &lt;REMOTE office="" net=""&gt; &lt;REMOTE office="" net="" mask=""&gt;   &lt;/REMOTE&gt;&lt;/REMOTE&gt;&lt;/P&gt;&lt;P&gt;access-list vpnl2l permit ip &lt;REMOTE office="" net=""&gt; &lt;REMOTE office="" net="" mask=""&gt;   &lt;/REMOTE&gt;&lt;/REMOTE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the remote office pix, add: &lt;/P&gt;&lt;P&gt;access-list vpnl2l permit ip host &lt;PIX public="" interface="" ip=""&gt;   &lt;/PIX&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the head office pix, add: &lt;/P&gt;&lt;P&gt;access-list vpnl2l permit ip   host &lt;PIX public="" interface="" ip=""&gt;&lt;/PIX&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;..but still unable to get a ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No route to url-server-ip from inside-pix-ip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2005 19:01:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501676#M530008</guid>
      <dc:creator>gmcmanus93</dc:creator>
      <dc:date>2005-12-04T19:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501677#M530011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;please post the config with public ip masked.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2005 21:45:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501677#M530011</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-12-04T21:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501678#M530014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I really appreciate your assistance and advice with this. Here are the configs prior to any changes. Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&lt;HQ pix=""&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/HQ&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 vpn security75&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.0.0.0 255.0.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu vpn 1500&lt;/P&gt;&lt;P&gt;ip address outside public-ip 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 10.10.10.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address vpn 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip local pool vpn_pool 172.16.254.1-172.16.254.250&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (vpn) 1 192.168.1.254&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (vpn) 0 access-list nonat&lt;/P&gt;&lt;P&gt;static (inside,outside) public-ip 10.10.10.20 netmask 255.255.255.255 1000 500&lt;/P&gt;&lt;P&gt;conduit permit icmp any any&lt;/P&gt;&lt;P&gt;conduit permit ip 10.36.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 public-ip 1&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 10.10.10.1 1&lt;/P&gt;&lt;P&gt;route vpn 192.168.0.0 255.255.0.0 192.168.1.2 1&lt;/P&gt;&lt;P&gt;url-server (inside) vendor n2h2 host n2h2-inside-ip port 4005 timeout 10 protocol TCP&lt;/P&gt;&lt;P&gt;url-cache src_dst 128KB&lt;/P&gt;&lt;P&gt;filter url http host-ip 255.255.255.255 0.0.0.0 0.0.0.0 allow&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;url-block block 128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&lt;REMOTE pix=""&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/REMOTE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 120 permit ip 192.168.15.0 255.255.255.0 10.36.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 120 permit ip 192.168.15.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside public-ip.26 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.15.1 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 120&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;conduit permit icmp any any&lt;/P&gt;&lt;P&gt;conduit permit esp any any&lt;/P&gt;&lt;P&gt;conduit permit ip 10.36.0.0 255.255.0.0 192.168.15.0 255.255.255.0&lt;/P&gt;&lt;P&gt;conduit permit ip 192.168.1.0 255.255.255.0 192.168.15.0 255.255.255.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 public-ip.25 1&lt;/P&gt;&lt;P&gt;url-server (inside) vendor n2h2 host n2h2-inside-ip port 4005 timeout 10 protocol TCP&lt;/P&gt;&lt;P&gt;filter url http host-ip 255.255.255.255 0.0.0.0 0.0.0.0 allow&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set name esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map name 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map name 10 match address 120&lt;/P&gt;&lt;P&gt;crypto map name 10 set peer public-concentrator-ip&lt;/P&gt;&lt;P&gt;crypto map name 10 set transform-set name&lt;/P&gt;&lt;P&gt;crypto map name 10 set security-association lifetime seconds 3600 kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map name interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key * address public-concentrator-ip netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp keepalive 10 5&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 14400&lt;/P&gt;&lt;P&gt;url-block block 128&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2005 22:56:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501678#M530014</guid>
      <dc:creator>gmcmanus93</dc:creator>
      <dc:date>2005-12-04T22:56:49Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501679#M530016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;on the hq pix,&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.0.0.0 255.0.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.0.0.0 255.0.0.0 host  public-ip.26&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the remote pix,&lt;/P&gt;&lt;P&gt;access-list 120 permit ip 192.168.15.0 255.255.255.0 10.36.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list 120 permit ip 192.168.15.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 120 permit ip host public-ip.26 10.36.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 120 permit ip host public-ip.26 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;further, the "url-server" command on the remote pix should be "url-server (outside)" rather than "url-server (inside)".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Dec 2005 23:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501679#M530016</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-12-04T23:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501680#M530020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have tried these settings and it still doesnt work. I had tried setting the url-server "inside" and "outside" but same result. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;304008: LEAVING ALLOW mode, URL Server is up&lt;/P&gt;&lt;P&gt;110001: No route to 10.36.81.9 from 192.168.15.1&lt;/P&gt;&lt;P&gt;304006: URL Server 10.36.81.9 not responding&lt;/P&gt;&lt;P&gt;304006: URL Server 10.36.81.9 not responding&lt;/P&gt;&lt;P&gt;110001: No route to 10.36.81.9 from 192.168.15.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2005 02:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501680#M530020</guid>
      <dc:creator>gmcmanus93</dc:creator>
      <dc:date>2005-12-05T02:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501681#M530023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Further log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see this event in the concentrator.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2207 12/05/2005 14:02:54.940 SEV=5 IKE/34 RPT=5872 public-ip.26&lt;/P&gt;&lt;P&gt;Group [public-ip.26]&lt;/P&gt;&lt;P&gt;Received local IP Proxy Subnet data in ID Payload:&lt;/P&gt;&lt;P&gt; Address 10.36.0.0, Mask 255.255.0.0, Protocol 0, Port 0&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;22210 12/05/2005 14:02:54.940 SEV=4 IKE/61 RPT=18700 public-ip.26&lt;/P&gt;&lt;P&gt;Group [public-ip.26]&lt;/P&gt;&lt;P&gt;Tunnel rejected: Policy not found for Src:public-ip.26, Dst: 10.36.0.0!&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;22212 12/05/2005 14:02:54.940 SEV=4 IKEDBG/97 RPT=44758 public-ip.26 &lt;/P&gt;&lt;P&gt;Group [public-ip.26]&lt;/P&gt;&lt;P&gt;QM FSM error (P2 struct &amp;amp;0x1d5c3ec, mess id 0x7a2386f9)!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Dec 2005 20:29:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501681#M530023</guid>
      <dc:creator>gmcmanus93</dc:creator>
      <dc:date>2005-12-05T20:29:14Z</dc:date>
    </item>
    <item>
      <title>Re: PIX url-server</title>
      <link>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501682#M530025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jakko. Thanks for the response. I had all the access-list in correctly. The resolve was simply setting up management interface inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pix&amp;gt; man i&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and setting the "url-server" back to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2005 17:02:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-url-server/m-p/501682#M530025</guid>
      <dc:creator>gmcmanus93</dc:creator>
      <dc:date>2005-12-21T17:02:51Z</dc:date>
    </item>
  </channel>
</rss>

