<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco PIX 515 MPLS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798863#M531948</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Eric, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, logs and captures can determine if packets were not reaching the internet. Just by simply putting the following lines: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture permit tcp any any eq 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list capture interface inside &lt;/P&gt;&lt;P&gt;capture capout access-list capout interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then doing&amp;nbsp; sh cap capin and show cap capout would definetly tell you if the firewall is blocking any packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can review your config if necessary. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Sep 2011 00:23:16 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2011-09-02T00:23:16Z</dc:date>
    <item>
      <title>Cisco PIX 515 MPLS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798862#M531947</link>
      <description>&lt;P&gt;Hi, there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our ISP provider (AT&amp;amp;T) recently wanted to upgrade our system to WAN MPLS and&lt;/P&gt;&lt;P&gt;failed. The internal connections were tested ok, but the internet connection was failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They claimed that it was the firewall PIX 515 that blocks all the internet connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The LAN configuration for this small company I worked since less than a month ago is&lt;/P&gt;&lt;P&gt;very simple. There is really nothing in the current firewall configuration to my opinion will&lt;/P&gt;&lt;P&gt;block the outbound traffic. I start to wonder if there is any update of firmwave or software&lt;/P&gt;&lt;P&gt;that I have to patch first to make the machine compatible to the MPLS system. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This firewall was purchased many years ago and there is really no body in the company&lt;/P&gt;&lt;P&gt;knowing anything about the firewall. I have just read through the first three chapters of the &lt;/P&gt;&lt;P&gt;configuration guide and am still reading it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eric&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:19:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798862#M531947</guid>
      <dc:creator>EricOmnibank</dc:creator>
      <dc:date>2019-03-11T21:19:48Z</dc:date>
    </item>
    <item>
      <title>Cisco PIX 515 MPLS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798863#M531948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Eric, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, logs and captures can determine if packets were not reaching the internet. Just by simply putting the following lines: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture permit tcp any any eq 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list capture interface inside &lt;/P&gt;&lt;P&gt;capture capout access-list capout interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then doing&amp;nbsp; sh cap capin and show cap capout would definetly tell you if the firewall is blocking any packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can review your config if necessary. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 00:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798863#M531948</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-09-02T00:23:16Z</dc:date>
    </item>
    <item>
      <title>Cisco PIX 515 MPLS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798864#M531949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just one thing, when the new connection was plugged in, were you able to ping the MPLS router that connected to the internet? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 00:23:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798864#M531949</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-09-02T00:23:50Z</dc:date>
    </item>
    <item>
      <title>Cisco PIX 515 MPLS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798865#M531950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the only person who was there when it failed, what they did &lt;/P&gt;&lt;P&gt;then was to open the internet explorer from one of the work stations inside&lt;/P&gt;&lt;P&gt;the office and tried to access to the internet. It didn't work. This company&lt;/P&gt;&lt;P&gt;uses a lot of web-based software and they often use internet explorer to access&lt;/P&gt;&lt;P&gt;the service. They didn't use ping or capture to check the firewall. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below are the content of the configuration of the firewall. I have taken out the&lt;/P&gt;&lt;P&gt;public ip addresses and passwords for confidential reason. Here is how the&lt;/P&gt;&lt;P&gt;internal network setup. This Cisco PIX 515 has only two interfaces, inside and&lt;/P&gt;&lt;P&gt;outside. Its outside ip address is 56.120.4.2 and inside ip address is 10.100.1.51.&lt;/P&gt;&lt;P&gt;In terms of routing, the only job it needs to do is to route the traffic to all other &lt;/P&gt;&lt;P&gt;branch offices to a gateway router 10.100.1.1. There are four branch offices and&lt;/P&gt;&lt;P&gt;their ip addresses are 10.168.1.0 - 10.168.4.0., as you can see in the route table&lt;/P&gt;&lt;P&gt;section of the configuration. The last entry on the route table, 10.169.0.0 is a mistery&lt;/P&gt;&lt;P&gt;to me. The guy says not to remove it for a reason he can't make clear. This company&lt;/P&gt;&lt;P&gt;is not using any servers for mail or ftp as far as I know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internet router ip address is 56.120.4.1 where the firewall uses 56.120.4.2.&lt;/P&gt;&lt;P&gt;The public ip address 56.120.4.3 is used for PAT and 56.120.4.4-7 are used for&lt;/P&gt;&lt;P&gt;NAT. All the pdm location commands are junk, I think. I can't access to the PDM.&lt;/P&gt;&lt;P&gt;So I use telnet to configure the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's about it. The people work in the ISP is sure to me that all the public ip addresses&lt;/P&gt;&lt;P&gt;are the same for the new MLPS system. Hopefully, you will have better idea now. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eric&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;====================================================================&lt;/P&gt;&lt;P&gt;PIX Version 6.1(2)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;hostname guard&lt;/P&gt;&lt;P&gt;domain-name domain.com&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 1720&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol ftp 22&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list acl_out permit icmp any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging history alerts&lt;/P&gt;&lt;P&gt;logging facility 16&lt;/P&gt;&lt;P&gt;logging host inside 192.100.10.90&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;icmp deny any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp deny any unreachable outside&lt;/P&gt;&lt;P&gt;icmp deny any echo outside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 56.120.4.2 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 10.100.10.51 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 192.100.10.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 65.160.32.43 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;pdm location 192.100.10.21 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 65.160.32.32 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.3.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.4.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 10.169.228.78 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.169.231.72 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.169.232.69 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.169.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;pdm location 12.145.39.234 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.100.10.90 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm logging alerts 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 56.120.4.4-56.120.4.7&lt;/P&gt;&lt;P&gt;global (outside) 1 56.120.4.3&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group acl_out in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 56.120.4.1 1&lt;/P&gt;&lt;P&gt;route inside 10.168.1.0 255.255.255.0 10.100.10.1 1&lt;/P&gt;&lt;P&gt;route inside 10.168.2.0 255.255.255.0 10.100.10.1 1&lt;/P&gt;&lt;P&gt;route inside 10.168.3.0 255.255.255.0 10.100.10.1 1&lt;/P&gt;&lt;P&gt;route inside 10.168.4.0 255.255.255.0 10.100.10.1 1&lt;/P&gt;&lt;P&gt;route inside 10.169.0.0 255.255.0.0 10.100.10.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.100.10.21 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;no floodguard enable&lt;/P&gt;&lt;P&gt;sysopt route dnat&lt;/P&gt;&lt;P&gt;telnet 10.100.10.21 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 59&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 01:34:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798865#M531950</guid>
      <dc:creator>EricOmnibank</dc:creator>
      <dc:date>2011-09-02T01:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco PIX 515 MPLS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798866#M531952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eric,&lt;/P&gt;&lt;P&gt;All you need for inside to outside internet access is the folloiwng lines&lt;/P&gt;&lt;P&gt;RTP - Route, Traslation and Permission&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 56.120.4.4-56.120.4.7&lt;/P&gt;&lt;P&gt;global (outside) 1 56.120.4.3&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 56.120.4.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, there could have been many reasons for this to have failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. PCs using IE - did they try to ping &lt;A href="https://community.cisco.com/www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt; from a command prompt to see if they got name resolution? May be this was a DNS problem.&lt;/P&gt;&lt;P&gt;2. Did they try to put the IP address or google page or yahoo page on the browser to see if it loaded?&lt;/P&gt;&lt;P&gt;3. Did they from that PC ping 56.120.4.1 ? to make sure they are able to cross the FW?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Action plan in the future.&lt;/P&gt;&lt;P&gt;4. In addition to the above pls. also watch what the syslogs say on the FW.&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;loggin on&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;sh logg | i x.x.x.x&lt;/P&gt;&lt;P&gt;where x.x.x.x is the IP address of the PC that has trouble reaching the internet through this firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, pdm is restricted to only certain subnets and IPs on the inside. Only hosts in these n/w can access pdm.&lt;/P&gt;&lt;P&gt;pdm location 192.100.10.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;pdm location 192.100.10.21 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.3.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.4.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 10.169.228.78 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.169.231.72 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.169.232.69 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.169.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;pdm location 192.100.10.90 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 14:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798866#M531952</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-09-02T14:36:08Z</dc:date>
    </item>
    <item>
      <title>Cisco PIX 515 MPLS</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798867#M531954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, Sankar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did have all the RTP - route implemented in the firewall. That's why it is &lt;/P&gt;&lt;P&gt;currently working with the old system. Whey they switched to the new MPLS&lt;/P&gt;&lt;P&gt;system, it didn't work. I am here to response to your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. No. they didn't ping anybody. They just opened an internet explorer and it failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; to display the webpages. I will definitely try to ping the internet next time we do&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; the switch. Now, suppose it is the DNS not being translated correctly, what do&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; suggest me to do ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. No they didn't, but I will.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. I will definitely try this next time I am in the office (I only work part time there)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for telling me the pdm commands. So, if I need to access the device&lt;/P&gt;&lt;P&gt;manager from, say 10.100.10.21, I would have to put an entry like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pdm location 10.100.10.21 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way, the account manager in the ISP provide also tell me some WAN IP&lt;/P&gt;&lt;P&gt;address, which is different than the public ip addresses that this company has. &lt;/P&gt;&lt;P&gt;Do I need to somehow put this information in the configuration of my firewall ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eric&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Sep 2011 22:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-515-mpls/m-p/1798867#M531954</guid>
      <dc:creator>EricOmnibank</dc:creator>
      <dc:date>2011-09-02T22:14:46Z</dc:date>
    </item>
  </channel>
</rss>

