<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX NAT issues or something like it in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-nat-issues-or-something-like-it/m-p/464576#M530376</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure Remote access VPN to terminate on your PIX firewall and give access to the servers on inside/DMZ to the external users. By this way, you also secure the data traffic flowing through the service provider. You can refer to the configuration guide of the PIX firewall for more information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if you require any more help on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RAj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Nov 2005 05:57:03 GMT</pubDate>
    <dc:creator>sachinraja</dc:creator>
    <dc:date>2005-11-25T05:57:03Z</dc:date>
    <item>
      <title>PIX NAT issues or something like it</title>
      <link>https://community.cisco.com/t5/network-security/pix-nat-issues-or-something-like-it/m-p/464575#M530374</link>
      <description>&lt;P&gt;I have an issue where I need to bring a network into our network but because of that fact I can't route 172.x.x.x addresses through our provider (British Telecom Private Network)I need to figure out a way to nat a zone to another. The group is coming from 164.39.x.x and 145.78.x.x addresses destined for 172.x.x.x. I have The zones involved are CORPNET, I-DMZ and E-DMZ. CORPNET is the group coming in and I-DMZ and E-DMZ are where the servers reside that they need to get to.The zones are configured with security as follows:&lt;/P&gt;&lt;P&gt;CORPNET 65&lt;/P&gt;&lt;P&gt;I-DMZ 20&lt;/P&gt;&lt;P&gt;E-DMZ 40&lt;/P&gt;&lt;P&gt;I have a nat (CORPNET) 1 0.0.0.0 0.0.0.0 to allow CORPNET 10.0.100.64/26 to access other zones on our network and so far it seems to work fine. Any ideas?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-nat-issues-or-something-like-it/m-p/464575#M530374</guid>
      <dc:creator>wr3500</dc:creator>
      <dc:date>2020-02-21T08:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX NAT issues or something like it</title>
      <link>https://community.cisco.com/t5/network-security/pix-nat-issues-or-something-like-it/m-p/464576#M530376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure Remote access VPN to terminate on your PIX firewall and give access to the servers on inside/DMZ to the external users. By this way, you also secure the data traffic flowing through the service provider. You can refer to the configuration guide of the PIX firewall for more information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if you require any more help on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RAj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2005 05:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-nat-issues-or-something-like-it/m-p/464576#M530376</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2005-11-25T05:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: PIX NAT issues or something like it</title>
      <link>https://community.cisco.com/t5/network-security/pix-nat-issues-or-something-like-it/m-p/464577#M530378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since they are part of the company we prefer not to VPN them in. We would prefer that they come in like any other zone. They are directly connected having to only pass through the FWSM to get inside. They are considered trusted traffic just not as trusted as say onsite users.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Nov 2005 04:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-nat-issues-or-something-like-it/m-p/464577#M530378</guid>
      <dc:creator>wr3500</dc:creator>
      <dc:date>2005-11-26T04:54:26Z</dc:date>
    </item>
  </channel>
</rss>

