<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX Firewall Lower security zone to higher security zone acc in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418145#M531704</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No this is ok but a more uncommon scenario/use of a PIX. Usually alltraffic flows from the higher to the lower interfaces and not the other way arround. But the anyway the most trusted network has the highest security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Short description of the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.) Let your inside network on the same interface as it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.) Keep the route as it was on the inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.) Disable NAT from all interfaces to the inside network and follow my example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.) Add on each interface 152, 153 and 154 an access-list that permits that hosts to access some internal hosts on the corporate network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But do not forget that when you add one access-list line with a permit statemet then automaticly, even if it not shown in the config, follows a DENY ANY ANY statement and blocks all other communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 18 Oct 2005 02:08:43 GMT</pubDate>
    <dc:creator>Patrick Iseli</dc:creator>
    <dc:date>2005-10-18T02:08:43Z</dc:date>
    <item>
      <title>PIX Firewall Lower security zone to higher security zone access</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418139#M531694</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;I want to give the whole lower security network 10.10.10.0/25 access to the internal higher security network 192.168.100.0/24.without using NAT&lt;/P&gt;&lt;P&gt;What is the pix cmds in ver.6.3 to be used?&lt;/P&gt;&lt;P&gt;In one-to-one Translation we can use static (inside, dmz1) 192.168.100.x 192.168.100.x netmask y.y.y.y.&lt;/P&gt;&lt;P&gt;      (Higher)       (Higher)&lt;/P&gt;&lt;P&gt;But when the whole network wants to connect to the higher inside what is the cmd syntex to be used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please I am waiting for your answer. It is very basic question for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnaks&lt;/P&gt;&lt;P&gt;swamy&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418139#M531694</guid>
      <dc:creator>arumugasamy</dc:creator>
      <dc:date>2020-02-21T08:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Firewall Lower security zone to higher security zone acc</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418140#M531695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to create an Access-list on the DMZ interface that allows the DMZ hosts to connect to the inside host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz permit tcp host DMZ-Host host Inside-Host eq www&lt;/P&gt;&lt;P&gt;access-group dmz in interface dmz &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Oct 2005 17:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418140#M531695</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-10-17T17:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Firewall Lower security zone to higher security zone acc</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418141#M531697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also attempting to connect a Test Lab (security0) to an Internal Network (security100) for Internet connectivity. I have tried just using access-lists and access-groups as well as the static command with no success. &lt;/P&gt;&lt;P&gt;Question : If I only want to connect from lower to higher do I need NAT and Global commands ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SydDPixFW01(config)# sh run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet3 auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 152 security0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet2 153 security70&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet3 154 security80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname SydDPixFW01&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;domain-name citrite.net&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;              &lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inside permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_152 permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_152 permit tcp any any eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_153 permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_153 permit tcp any any eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_154 permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging console informational&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging monitor alerts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu 152 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu 153 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu 154 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address 152 10.x.x.x.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address inside 10.41.33.11 255.255.240.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address 153 10.x.x.x.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address 154 10.x.x.x.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;              &lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no failover ip address 152&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no failover ip address inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no failover ip address 153&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no failover ip address 154&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,153) tcp 10.42.153.2 www 10.41.81.27 www netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,152) 10.42.152.2 10.41.33.10 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_152 in interface 152&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_inside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_153 in interface 153&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_154 in interface 154&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 10.41.33.11 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;             &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http 10.41.81.27 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 10.41.81.27 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SydDPixFW01(config)#        &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then added the following to try and get it working with no success: &lt;/P&gt;&lt;P&gt;global (inside) 1 10.41.33.12 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (153) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Oct 2005 22:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418141#M531697</guid>
      <dc:creator>jtoumeh</dc:creator>
      <dc:date>2005-10-17T22:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Firewall Lower security zone to higher security zone acc</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418142#M531698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;arumugasamy, with the static you can actually apply the entire subnet instead of a single host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) &lt;INSIDE subnet=""&gt; &lt;INSIDE subnet=""&gt; netmask &lt;SUBNET mask=""&gt; 0 0&lt;/SUBNET&gt;&lt;/INSIDE&gt;&lt;/INSIDE&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) &lt;DMZ subnet=""&gt; &lt;DMZ subnet=""&gt; netmask &lt;SUBNET mask=""&gt; 0 0&lt;/SUBNET&gt;&lt;/DMZ&gt;&lt;/DMZ&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.2.0 192.168.2.0 netmask 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with the static above, all traffic from dmz-inside or inside-dmz will not be natted. acl is still required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g. access-list 100 permit tcp 192.168.2.0 255.255.255.0 host 192.168.1.100 eq 25&lt;/P&gt;&lt;P&gt;access-group 100 in interface dmz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Oct 2005 23:56:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418142#M531698</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-10-17T23:56:40Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Firewall Lower security zone to higher security zone acc</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418143#M531699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1.) First remove this access-lists because they block all access from their interface, to all hosts on that network, to the the lower security level interfaces. &lt;/P&gt;&lt;P&gt;To access from a lower level to higher level you need to configure and access-list, but from a higher to a lower level &lt;/P&gt;&lt;P&gt;there is no need for an access-list unless you want to restrict the protocols or IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list acl_153 permit icmp any any&lt;/P&gt;&lt;P&gt;no access-list acl_153 permit tcp any any eq www&lt;/P&gt;&lt;P&gt;no access-group acl_153 in interface 153&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list acl_154 permit icmp any any&lt;/P&gt;&lt;P&gt;no access-group acl_154 in interface 154&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.) What excatly you want to do, talk from the inside network to the DMZ network. &lt;/P&gt;&lt;P&gt;Then you should just diable NAT betwwen the inside and the interface 153.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove this static &lt;/P&gt;&lt;P&gt;no static (inside,153) tcp 10.42.153.2 www 10.41.81.27 www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example to disable NAT between this two interfaces, to access the web server use the private IP and not the public one !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,153) 10.41.33.11 10.41.33.11 netmask 255.255.240.0&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Setup of the Access from the Internet (outside) to the DMZ for WWW:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 152 security0&lt;/P&gt;&lt;P&gt;ip address 152 10.42.152.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_152 permit icmp any any&lt;/P&gt;&lt;P&gt;access-list acl_152 permit tcp any host 10.42.152.2 eq www&lt;/P&gt;&lt;P&gt;access-group acl_152 in interface 152&lt;/P&gt;&lt;P&gt;static (inside,152) 10.42.152.2 10.41.33.10 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Set the route to the outside:&lt;/P&gt;&lt;P&gt;The internet, less secure zone, is on the interface with the lowest security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have configured the default gateway to the inside interface !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no route inside 0.0.0.0 0.0.0.0 10.41.33.11 1&lt;/P&gt;&lt;P&gt;route  0.0.0.0 0.0.0.0 10.42.152.XXX 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. To get all inside users connect to the internet (interface 152)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (152) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6. Allow traffic to connect to the outside world:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;ip address inside 10.41.33.11 255.255.240.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inside permit icmp any any&lt;/P&gt;&lt;P&gt;access-list acl_inside permit ip any any&lt;/P&gt;&lt;P&gt;access-group acl_inside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7. After all that reset the translation table to get NAT working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reference guide:&lt;/P&gt;&lt;P&gt;Establishing Connectivity&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172786.html" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172786.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Oct 2005 00:10:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418143#M531699</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-10-18T00:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Firewall Lower security zone to higher security zone acc</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418144#M531700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your comprehensive reply. I am keen to make the changes but just a few questions before I do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The aim of the firewall is to protect the internal (inside) corporate LAN from these new Test Lab (152,152,154) networks. The Test Lab networks just need to traverse the corporate network to access the Internet and RO access to certain servers (is that possible using a PIX?). Is this the simpliest way to configure the PIX ? I would like a working basic config and built from there perhaps.&lt;/P&gt;&lt;P&gt;I can make the Internal LAN (inside) the outside interface (security 0) and try it that way perhaps ?&lt;/P&gt;&lt;P&gt;Just doesnt make sense to make the Test Lab (non routable) the trusted network and the corporate LAN (routable across the entire corp) the outside network?&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Oct 2005 01:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418144#M531700</guid>
      <dc:creator>jtoumeh</dc:creator>
      <dc:date>2005-10-18T01:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Firewall Lower security zone to higher security zone acc</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418145#M531704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No this is ok but a more uncommon scenario/use of a PIX. Usually alltraffic flows from the higher to the lower interfaces and not the other way arround. But the anyway the most trusted network has the highest security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Short description of the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.) Let your inside network on the same interface as it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.) Keep the route as it was on the inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.) Disable NAT from all interfaces to the inside network and follow my example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.) Add on each interface 152, 153 and 154 an access-list that permits that hosts to access some internal hosts on the corporate network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But do not forget that when you add one access-list line with a permit statemet then automaticly, even if it not shown in the config, follows a DENY ANY ANY statement and blocks all other communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Oct 2005 02:08:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418145#M531704</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-10-18T02:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Firewall Lower security zone to higher security zone acc</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418146#M531705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have applied the config and receive the following for www access from 152 to inside.&lt;/P&gt;&lt;P&gt;SydDPixFW01(config)# 106011: Deny inbound (No xlate) tcp src 152:10.42.152.2/183&lt;/P&gt;&lt;P&gt;5 dst 152:10.41.81.27/80&lt;/P&gt;&lt;P&gt;106011: Deny inbound (No xlate) tcp src 152:10.42.152.2/1835 dst 152:10.41.81.27&lt;/P&gt;&lt;P&gt;/80&lt;/P&gt;&lt;P&gt;106011: Deny inbound (No xlate) tcp src 152:10.42.152.2/1835 dst 152:10.41.81.27&lt;/P&gt;&lt;P&gt;/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and for icmp access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SydDPixFW01(config)# 305005: No translation group found for icmp src 152:10.42.1&lt;/P&gt;&lt;P&gt;52.2 dst inside:10.41.33.11 (type 8, code 0)&lt;/P&gt;&lt;P&gt;305005: No translation group found for icmp src 152:10.42.152.2 dst inside:10.41&lt;/P&gt;&lt;P&gt;.33.11 (type 8, code 0)&lt;/P&gt;&lt;P&gt;302010: 0 in use, 0 most used&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Oct 2005 02:40:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-lower-security-zone-to-higher-security-zone-access/m-p/418146#M531705</guid>
      <dc:creator>jtoumeh</dc:creator>
      <dc:date>2005-10-18T02:40:56Z</dc:date>
    </item>
  </channel>
</rss>

