<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX/DMZ problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413540#M533959</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great that you found the issue. Please rate my post if you think they were helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 25 Aug 2005 17:17:47 GMT</pubDate>
    <dc:creator>rsmith</dc:creator>
    <dc:date>2005-08-25T17:17:47Z</dc:date>
    <item>
      <title>PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413529#M533937</link>
      <description>&lt;P&gt;I have a test web server inside our DMZ that accesses a sql server on the inside network. The problem is when I create the access rule &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.250 eq 1433 host 10.10.2.28 eq 1433 and create the static route&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.10.2.28 10.10.2.28 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;The SQL server becomes unavailable to the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See PIX logs:&lt;/P&gt;&lt;P&gt;Deny udp src DMZ:10.10.31.7/2034 dst inside:10.10.2.28/161 by access-group "DMZ_inf_in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am unable to connect to the sql box from the inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413529#M533937</guid>
      <dc:creator>petersontom</dc:creator>
      <dc:date>2020-02-21T08:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413530#M533939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your error message indicates that the DMZ has an IP address of 10.10.31.7 (is this your test web server?) trying to access the inside address 10.10.2.28.  Your DMZ translation has an IP address of 172.16.10.250. Are your inside and DMZ network overlapping? If this does not help, please post your config, and sample log entries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2005 17:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413530#M533939</guid>
      <dc:creator>rsmith</dc:creator>
      <dc:date>2005-08-23T17:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413531#M533941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm sorry for the confusion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ ip address 172.16.10.250 (Web server)&lt;/P&gt;&lt;P&gt;SQl Server 10.10.2.8 (Inside network)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The address 10.10.31.7 is a workstation on the inside network pinging the SQl server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the access-list for the web server to access the sql server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.250 eq 1433 host 10.10.2.28 eq 1433 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the static NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.10.2.28 10.10.2.28 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I add this the SQL server becomes unreachable from any workstation on the inside address (10.10.x.x) ,however the web server in the DMZ can still access the SQL server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2005 18:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413531#M533941</guid>
      <dc:creator>petersontom</dc:creator>
      <dc:date>2005-08-23T18:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413532#M533943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm sorry for the confusion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ ip address 172.16.10.250 (Web server)&lt;/P&gt;&lt;P&gt;SQl Server 10.10.2.8 (Inside network)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The address 10.10.31.7 is a workstation on the inside network pinging the SQl server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the access-list for the web server to access the sql server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.250 eq 1433 host 10.10.2.28 eq 1433 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the static NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.10.2.28 10.10.2.28 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I add this the SQL server becomes unreachable from any workstation on the inside address (10.10.x.x) ,however the web server in the DMZ can still access the SQL server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2005 18:23:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413532#M533943</guid>
      <dc:creator>petersontom</dc:creator>
      <dc:date>2005-08-23T18:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413533#M533946</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There may be a problem with your physical setup of your DMZ interface, possibly connected directly to your inside network. The log entry you posted:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny udp src DMZ:10.10.31.7/2034 dst inside:10.10.2.28/161 by access-group "DMZ_inf_in &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shows the source interface (DMZ) for the 10.10.31.7 address, which you say is your inside workstation. Since it is trying to go from your DMZ to the inside (lower to higher) it will be denied unless you have an acl entry to allow access. The web server is getting access since you put the acl entry for that IP. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2005 18:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413533#M533946</guid>
      <dc:creator>rsmith</dc:creator>
      <dc:date>2005-08-23T18:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413534#M533948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your thoughts.  However, I have other devices in the DMZ access our internal network without issues.  Is there a fix up protocol I'm might be missing?  It seems to be the static NAT causing the current issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2005 19:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413534#M533948</guid>
      <dc:creator>petersontom</dc:creator>
      <dc:date>2005-08-23T19:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413535#M533952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmmm. I am still curious why the log file showed your udp denied coming from the DMZ interface, when it is an inside device.....&lt;/P&gt;&lt;P&gt;As to your static, do you use NAT 0 for all your access? (no translation to a DMZ address?) Could you post more log information when this fails, and possibly the config of the Firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Aug 2005 21:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413535#M533952</guid>
      <dc:creator>rsmith</dc:creator>
      <dc:date>2005-08-23T21:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413536#M533954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Company policy will not allow me to post the config, I contacted Cisco they wanted the access-list changed to:&lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.250 host 10.10.2.28 eq 1433&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did this and I still have the problem. here are some trap logs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny tcp src DMZ:10.10.10.59/2148 dst inside:10.10.2.28/80 by access-group "DMZ_inf_in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny tcp src DMZ:10.10.10.231/2222 dst inside:10.10.2.28/80 by access-group "DMZ_inf_in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny tcp src DMZ:10.10.10.29/1980 dst inside:10.10.2.28/80 by access-group "DMZ_inf_in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All these machines are on the internal network. &lt;/P&gt;&lt;P&gt;As soon as I remove the access-list I am able to ping/connect to the SQL server. I cannot explain this either.  I can get the PIX config posted but will take me awhile to remove private info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Aug 2005 00:01:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413536#M533954</guid>
      <dc:creator>petersontom</dc:creator>
      <dc:date>2005-08-24T00:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413537#M533955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hopefully you can get that cleaned and posted soon. I still keep going back to the log entries; since the Source interface for your Internal clients (10.10.10.x) is showing as the DMZ, attempting to access the inside (due to the static translation), it seems your DMZ and inside physical connections 'may be' reversed? Other than that, it will take a closer look at the config to see what is going on... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Aug 2005 16:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413537#M533955</guid>
      <dc:creator>rsmith</dc:creator>
      <dc:date>2005-08-24T16:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413538#M533957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a very stripped version of the config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.1(4)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security50&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 1720&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;access-list outside_inf_in permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_inf_in permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_inf_in permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_inf_in permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_inf_in permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_inf_in permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_inf_in permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_inf_in permit tcp any host x.x.x.x eq pop3 &lt;/P&gt;&lt;P&gt;access-list outside_inf_in permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list outside_inf_in permit tcp any host x.x.x.x eq www &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.250 eq 1433 host 10.10.2.28 eq 1433 &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.x eq 1433 host 10.10.2.28 eq 1433 &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.x eq 1433 host 10.10.2.28 eq 1433 &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.x host 10.10.x.x eq smtp &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.x any eq www &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.x any eq 443 &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit udp host 172.16.10.x any eq domain &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in deny icmp any any &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit udp host 172.16.10.x any eq domain &lt;/P&gt;&lt;P&gt;access-list DMZ_inf_in permit tcp host 172.16.10.x any eq www &lt;/P&gt;&lt;P&gt;logging trap warnings&lt;/P&gt;&lt;P&gt;logging history warnings&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;ip address outside x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 10.10.x.x 255.0.0.0&lt;/P&gt;&lt;P&gt;ip address DMZ 172.16.10.x 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) x.x.x.x 172.16.10.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) x.x.x.x 172.16.10.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) x.x.x.x 172.16.10.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) x.x.x.x 172.16.10.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) x.x.x.x 172.16.10.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 10.10.x.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 10.10.x.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 10.10.x.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 10.10.x.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 10.10.x.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 172.16.10.x 10.10.x.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) x.x.x.x 172.16.10.x  netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 10.10.x.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 10.10.x.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 10.10.x.x netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_inf_in in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ_inf_in in interface DMZ&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;/P&gt;&lt;P&gt;route DMZ x.x.x.x 255.255.255.255 172.16.10.x 1&lt;/P&gt;&lt;P&gt;route DMZ x.x.x.x 255.255.255.255 172.16.10.x 1&lt;/P&gt;&lt;P&gt;route DMZ x.x.x.x 255.255.255.255 172.16.10.x 1&lt;/P&gt;&lt;P&gt;route DMZ x.x.x.x 255.255.255.255 172.16.10.x 1&lt;/P&gt;&lt;P&gt;route outside x.x.x.x 255.255.254.0 x.x.x.x 1&lt;/P&gt;&lt;P&gt;route inside x.x.x.x 255.255.255.0 10.10.x.x 1&lt;/P&gt;&lt;P&gt;route inside x.x.x.x 255.255.255.0 10.10.x.x 1&lt;/P&gt;&lt;P&gt;route inside x.x.x.x 255.255.255.0 10.10.x.x 1&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Aug 2005 20:13:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413538#M533957</guid>
      <dc:creator>petersontom</dc:creator>
      <dc:date>2005-08-24T20:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413539#M533958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, I found the problem.  Unbelievable, one of our network administrators had mistakly plugged in a network cable from the DMZ switch to the internal LAN switch.  Thank you for all your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2005 17:08:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413539#M533958</guid>
      <dc:creator>petersontom</dc:creator>
      <dc:date>2005-08-25T17:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: PIX/DMZ problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413540#M533959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great that you found the issue. Please rate my post if you think they were helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2005 17:17:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-dmz-problems/m-p/413540#M533959</guid>
      <dc:creator>rsmith</dc:creator>
      <dc:date>2005-08-25T17:17:47Z</dc:date>
    </item>
  </channel>
</rss>

