<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: browsing inside network from outside network on pix in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440474#M530564</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;please excuse me for misunderstanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you mentioned "isa is member of the domain which is INSIDE of the pix" and at the same time "the problem is the ISA cannot browse the network INSIDE".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assuming the requirement is to permit isa (from the pix outside) inbound access, then a static nat and an inbound acl are required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;static (outside,inside) &lt;ISA ip=""&gt; &lt;ISA ip=""&gt; netmask 255.255.255.255&lt;/ISA&gt;&lt;/ISA&gt;&lt;/P&gt;&lt;P&gt;access-list inbound permit ip &lt;PIX inside="" net=""&gt; host &lt;ISA ip=""&gt;&lt;/ISA&gt;&lt;/PIX&gt;&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Nov 2005 12:56:48 GMT</pubDate>
    <dc:creator>jackko</dc:creator>
    <dc:date>2005-11-17T12:56:48Z</dc:date>
    <item>
      <title>browsing inside network from outside network on pix</title>
      <link>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440473#M530563</link>
      <description>&lt;P&gt;i have this scenario&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;users/dc/dns---pix----isa-----router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dc= domain controler&lt;/P&gt;&lt;P&gt;isa is member of the domain which is INSIDE of the pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any traffic going out (ie http, pop3) are ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer wants to filter traffic going out thru computer names at the ISA.&lt;/P&gt;&lt;P&gt;But the problem is the ISA cannot browse the network INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ive tried permiting all IP traffic coming from the ISA to the inside of the firewall but still i cant browse the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any quick help will be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440473#M530563</guid>
      <dc:creator>cfajardo1_2</dc:creator>
      <dc:date>2020-02-21T08:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: browsing inside network from outside network on pix</title>
      <link>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440474#M530564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;please excuse me for misunderstanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you mentioned "isa is member of the domain which is INSIDE of the pix" and at the same time "the problem is the ISA cannot browse the network INSIDE".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assuming the requirement is to permit isa (from the pix outside) inbound access, then a static nat and an inbound acl are required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;static (outside,inside) &lt;ISA ip=""&gt; &lt;ISA ip=""&gt; netmask 255.255.255.255&lt;/ISA&gt;&lt;/ISA&gt;&lt;/P&gt;&lt;P&gt;access-list inbound permit ip &lt;PIX inside="" net=""&gt; host &lt;ISA ip=""&gt;&lt;/ISA&gt;&lt;/PIX&gt;&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Nov 2005 12:56:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440474#M530564</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-11-17T12:56:48Z</dc:date>
    </item>
    <item>
      <title>Re: browsing inside network from outside network on pix</title>
      <link>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440475#M530565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. why do i need to do a static on isa ip?&lt;/P&gt;&lt;P&gt;2. why the access-list source the inside ip? am trying to brouse the inside network from the outside. so corrrect me if iam wrong but the way i figure out is that the source is the isa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what ive done instead is the ff&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) insideDNS_ip Inside DNS_ip&lt;/P&gt;&lt;P&gt;access-list acl_out permit ip host ISA_ip INSIDE_net&lt;/P&gt;&lt;P&gt;access-group acl_out in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Nov 2005 23:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440475#M530565</guid>
      <dc:creator>cfajardo1_2</dc:creator>
      <dc:date>2005-11-17T23:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: browsing inside network from outside network on pix</title>
      <link>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440476#M530566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;by reading your original post, i was having the impression that the isa from the pix outside needs to access the entire pix inside net. if this is the case then nat the entire subnet to public would not be feasible (assuming you don't have a whole class c public ip range); alternatively, if you nat the entire pix inside net to a private subnet, then you won't be albe to browse the internet as all source addresses are private.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Nov 2005 00:36:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440476#M530566</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-11-18T00:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: browsing inside network from outside network on pix</title>
      <link>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440477#M530567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's probably a NAT issue if you have the correct access-list on the outside interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Nov 2005 08:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440477#M530567</guid>
      <dc:creator>andrew.shore</dc:creator>
      <dc:date>2005-11-18T08:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: browsing inside network from outside network on pix</title>
      <link>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440478#M530568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;iam using private IPs on all internal networks including both ISA interfaces...the only public IP is the adsl WAN interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;internet access is no longer an issue coz thats was already working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the only problem left is for the ISA to browse the network INSIDE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Nov 2005 09:03:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440478#M530568</guid>
      <dc:creator>cfajardo1_2</dc:creator>
      <dc:date>2005-11-18T09:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: browsing inside network from outside network on pix</title>
      <link>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440479#M530569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK nat has nothing to do with public/private addressing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The pix works by translating address between interfaces not by routing. You can use a nat 0 function to tell the pix to translate an address to itself but it is still translated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 0 a.b.c.d 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where a.b.c.d is the ip address of the ISA server. This will translate the address of the ISA server to its self and allow a session back into the network (providing you have the correct ACL on the outside interface)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Nov 2005 10:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/browsing-inside-network-from-outside-network-on-pix/m-p/440479#M530569</guid>
      <dc:creator>andrew.shore</dc:creator>
      <dc:date>2005-11-18T10:00:15Z</dc:date>
    </item>
  </channel>
</rss>

