<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 515E config help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430425#M530671</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks jackko, it works great.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Nov 2005 19:58:55 GMT</pubDate>
    <dc:creator>jay.ratliff</dc:creator>
    <dc:date>2005-11-25T19:58:55Z</dc:date>
    <item>
      <title>PIX 515E config help</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430422#M530664</link>
      <description>&lt;P&gt;I am a new user and I am trying to configure a PIX 515e Ver 6.3(3).  How do I give my inside users access to my webfarm which is on dmz1.  I am able to access the inside and dzm1 test websites from the outside.  I can not access the dmz1 websites from the inside. Here is my current config:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet2 100full&lt;/P&gt;&lt;P&gt;interface ethernet3 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet4 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet5 auto shutdown&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz1 security50&lt;/P&gt;&lt;P&gt;nameif ethernet3 intf3 security6&lt;/P&gt;&lt;P&gt;nameif ethernet4 intf4 security8&lt;/P&gt;&lt;P&gt;nameif ethernet5 intf5 security10&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;passwd xxxx&lt;/P&gt;&lt;P&gt;hostname pix1&lt;/P&gt;&lt;P&gt;domain-name ae.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.10.10.1 aetest&lt;/P&gt;&lt;P&gt;name 10.10.10.2 aetest1&lt;/P&gt;&lt;P&gt;name 13.13.13.3 aetestdmz&lt;/P&gt;&lt;P&gt;name 13.13.13.4 aetestdmz1&lt;/P&gt;&lt;P&gt;access-list from-out-to-in permit tcp any any eq www&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz1 1500&lt;/P&gt;&lt;P&gt;mtu intf3 1500&lt;/P&gt;&lt;P&gt;mtu intf4 1500&lt;/P&gt;&lt;P&gt;mtu intf5 1500&lt;/P&gt;&lt;P&gt;ip address outside 12.x.x.x.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 10.10.10.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz1 13.x.x.x.255.255.0&lt;/P&gt;&lt;P&gt;no ip address intf3&lt;/P&gt;&lt;P&gt;no ip address intf4&lt;/P&gt;&lt;P&gt;no ip address intf5&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;no failover ip address outside&lt;/P&gt;&lt;P&gt;no failover ip address inside&lt;/P&gt;&lt;P&gt;no failover ip address dmz1&lt;/P&gt;&lt;P&gt;no failover ip address intf3&lt;/P&gt;&lt;P&gt;no failover ip address intf4&lt;/P&gt;&lt;P&gt;no failover ip address intf5&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (inside,outside) 12.12.12.15 aetest netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 12.12.12.16 aetest1 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (dmz1,outside) 12.12.12.17 aetestdmz netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (dmz1,outside) 12.12.12.18 aetestdmz1 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group from-out-to-in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 12.12.12.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.10.10.207 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 10.10.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 20&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks....Jay&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430422#M530664</guid>
      <dc:creator>jay.ratliff</dc:creator>
      <dc:date>2020-02-21T08:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config help</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430423#M530666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See the following weblink for an example of what you are trying to do:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094aee.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094aee.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need to use the alias command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2005 16:34:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430423#M530666</guid>
      <dc:creator>stomasko</dc:creator>
      <dc:date>2005-11-15T16:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config help</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430424#M530668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;with pix v6.x, nat/global or static is a must do before the pix will start forwarding packet between two interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the current static statements don't cover the translation between inside and dmz. since the traffic between pix inside net and dmz is private, i suggest you to configure no-nat between the two.&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;static (inside,dmz1) 10.10.10.0 10.10.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with the sample above, pix inside host should be able to access the dmz webserver by pointing to the dmz webserver private ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you prefer the pix inside host to access the dmz webserver by name, then "alias" command needs to be applied.&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;alias (inside) 13.13.13.3 12.12.12.17 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the need of the command "alias" is due to the fact that when pix inside host attempts to access the dmz webserver by name, the public dns will point to the dmz webserver public ip. now, since the static created for dmz webserver is directional i.e. public ip will only be accessible from the outside, not the pix inside net. thus the "alias" command will enable the pix to manipulate the dns response, and point the name to the dmz webserver private ip for the pix inside host.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2005 23:14:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430424#M530668</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-11-15T23:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config help</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430425#M530671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks jackko, it works great.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2005 19:58:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430425#M530671</guid>
      <dc:creator>jay.ratliff</dc:creator>
      <dc:date>2005-11-25T19:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config help</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430426#M530674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it's good to learn that your issue has been resolved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;according to cisco:&lt;/P&gt;&lt;P&gt;Why should I rate posts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you see a post that you think deserves recognition, please take a moment to rate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You'll be helping yourself and others to quickly identify useful content -- as determined by members. And you'll be ensuring that people who generously share their expertise are properly acknowledged. As posts are rated, the value of those ratings are accumulated as "points" and summarized on the Member Profile page and on each member's Preferences page. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2005 23:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430426#M530674</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-11-25T23:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config help</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430427#M530676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your advice worked for my lab.  When I changed the IP addresses to match the current Symantec firewall and replaced it on the network, it did not work.  I can ping the inside websites, dmz1 websites and the outside router from the PIX.  When I try to access a web page from the inside to dmz1 or outside to inside, I get &amp;#147;This page can not be displayed&amp;#148;.  I read an article that suggested clearing arp on the outside router and the inside switch and that did not work either.  Here is a copy of the config that worked in the lab.&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet2 100full&lt;/P&gt;&lt;P&gt;interface ethernet3 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet4 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet5 auto shutdown&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz1 security50&lt;/P&gt;&lt;P&gt;nameif ethernet3 intf3 security6&lt;/P&gt;&lt;P&gt;nameif ethernet4 intf4 security8&lt;/P&gt;&lt;P&gt;nameif ethernet5 intf5 security10&lt;/P&gt;&lt;P&gt;enable password ?????? encrypted&lt;/P&gt;&lt;P&gt;passwd ????? encrypted&lt;/P&gt;&lt;P&gt;hostname pix1&lt;/P&gt;&lt;P&gt;domain-name ?????&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list out-to-in permit tcp any host 12.108.53.146 eq www&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz1 1500&lt;/P&gt;&lt;P&gt;mtu intf3 1500&lt;/P&gt;&lt;P&gt;mtu intf4 1500&lt;/P&gt;&lt;P&gt;mtu intf5 1500&lt;/P&gt;&lt;P&gt;ip address outside 12.108.53.130 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 10.10.1.210 255.255.0.0&lt;/P&gt;&lt;P&gt;ip address dmz1 172.18.1.2 255.255.255.224&lt;/P&gt;&lt;P&gt;no ip address intf3&lt;/P&gt;&lt;P&gt;no ip address intf4&lt;/P&gt;&lt;P&gt;no ip address intf5&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;no failover ip address outside&lt;/P&gt;&lt;P&gt;no failover ip address inside&lt;/P&gt;&lt;P&gt;no failover ip address dmz1&lt;/P&gt;&lt;P&gt;no failover ip address intf3&lt;/P&gt;&lt;P&gt;no failover ip address intf4&lt;/P&gt;&lt;P&gt;no failover ip address intf5&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (inside,outside) 12.108.53.146 10.10.9.39 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz1) 10.10.0.0 10.10.0.0 netmask 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group out-to-in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 12.108.53.129 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 10.10.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 20&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, all that was done to the above config was changing the IP addresses to match the current firewall config.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;Thanks&amp;#133;&lt;/P&gt;&lt;P&gt;Jay &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Nov 2005 18:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-help/m-p/430427#M530676</guid>
      <dc:creator>jay.ratliff</dc:creator>
      <dc:date>2005-11-29T18:11:09Z</dc:date>
    </item>
  </channel>
</rss>

