<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 501 problem... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-problem/m-p/473523#M530316</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well that worked perfectly.  Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 29 Nov 2005 03:42:31 GMT</pubDate>
    <dc:creator>ryan</dc:creator>
    <dc:date>2005-11-29T03:42:31Z</dc:date>
    <item>
      <title>PIX 501 problem...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-problem/m-p/473521#M530311</link>
      <description>&lt;P&gt;Ok I am about to pull out my hair over this.  I have a PIX 501 setup at a remote office.  I will have a tunnel setup to connect back out other office which uses a PIX 501 also.  At this point I am not conecerned about the VPN tunnel.  Basically PC's that have 192.168.5.x address will use the tunnel and pc's that have 192.168.7.x address will simply be able to get onto the internet via the DSL that the PIX uses.  The PIX has a static public ip address on the external interface.  The internal interface has an ip of 192.168.5.1.  I have one machine plugged into the pix with an ip of 192.168.7.50 subnet of 255.255.248.0 and a gw of 192.168.5.1.  From this machine I try and ping anything on the internet and get request timed out.  I also cannot surf.  It was my understanding that PIX's allow all outbound traffic which really has me confused.  So I told the inside computer to ping a linux box on the net back at my main office and watched.  That  linux box indeed get's the packet and replies back yet the internal host is not getting the reply.  If I ssh onto the pix I can ping anything on the internet and it replies just fine.  So somewhere on the pix something is stopping traffic and I have no idea what.  I have tried adding some acess-list to no avail.  I am new to this and would really appreciate any help.  Here is my config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(4)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;hostname houston&lt;/P&gt;&lt;P&gt;domain-name &amp;lt;bleh.com&amp;gt;&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 80 permit ip 192.168.5.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 80 permit ip 192.168.5.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 50 permit icmp any any&lt;/P&gt;&lt;P&gt;access-list 50 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list 50 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list 50 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 50 permit tcp any interface outside eq www&lt;/P&gt;&lt;P&gt;access-list 50 permit tcp any interface outside eq domain&lt;/P&gt;&lt;P&gt;access-list 50 permit icmp any any source-quench&lt;/P&gt;&lt;P&gt;access-list 50 permit icmp any any parameter-problem&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside &amp;lt;pix wan ip&amp;gt; 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.5.1 255.255.248.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 &amp;lt;dsl modem ip/pix gateway&amp;gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 80&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group 50 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 &amp;lt;dsl modem ip/pix gateway&amp;gt; 1&lt;/P&gt;&lt;P&gt;route inside 192.168.5.0 255.255.255.0 192.168.5.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.7.0 255.255.255.0 192.168.5.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set strong esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map site2 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map site2 10 match address 80&lt;/P&gt;&lt;P&gt;crypto map site2 10 set peer &amp;lt;peer ip&amp;gt;&lt;/P&gt;&lt;P&gt;crypto map site2 10 set transform-set strong&lt;/P&gt;&lt;P&gt;crypto map site2 interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key &amp;lt;removed&amp;gt; address &amp;lt;peer ip&amp;gt; netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 8 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 8 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 8 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 8 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 8 lifetime 86400&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:32:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-problem/m-p/473521#M530311</guid>
      <dc:creator>ryan</dc:creator>
      <dc:date>2020-02-21T08:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 problem...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-problem/m-p/473522#M530314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is probably your problem:&lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 &lt;DSL modem="" ip=""&gt; &lt;/DSL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change it to:&lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The global command defines what IP address all outgoing packets will be PAT'd to.  If you PAT them to the same address as your outside ADSL gateway, then when they return they'll be destined for that IP address, and the gateway will get them and think, "huh, what am I supposed to do with this", and drop it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By using the keyword "interface" on the global command the PIX will PAT everything to it's own outside interface's IP address, so the reply's will come back to that IP address and the PIX will know to forward them on internally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove your two "route inside ...." commands also, they're not needed and will just confuse things.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2005 05:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-problem/m-p/473522#M530314</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2005-11-28T05:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 problem...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-problem/m-p/473523#M530316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well that worked perfectly.  Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2005 03:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-problem/m-p/473523#M530316</guid>
      <dc:creator>ryan</dc:creator>
      <dc:date>2005-11-29T03:42:31Z</dc:date>
    </item>
  </channel>
</rss>

