<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Concentrator behind PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466948#M535396</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is nothing to do with the DMZ and VPN interface security levels as long as they don't need communication. There are certain config issues which caught my eye&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) The tunnel terminates on the Concentrator. then the any-vpn access list is on the in interface VPN. This shud be on the in interface outside. This is because the encrypted traffic shud be allowed to pass thru PIX.&lt;/P&gt;&lt;P&gt;2) There is a static translation between the outside IP of the concentrator to a public pool (assumed to be as IP 192.168.2.1). You can permit any-vpn access list for this IP as the dest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For testing purposes, u can try accessing (telnet or HTTPS) the outside of concentrator from outside the PIX (internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will appreciate your comments&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Jul 2005 06:27:39 GMT</pubDate>
    <dc:creator>ciscokrishna</dc:creator>
    <dc:date>2005-07-14T06:27:39Z</dc:date>
    <item>
      <title>Concentrator behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466945#M535391</link>
      <description>&lt;P&gt;The cisco concentrator is behind pix..&lt;/P&gt;&lt;P&gt;but i ca't to get to the concentractor to allow user to login..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please find the config below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet2 100full&lt;/P&gt;&lt;P&gt;interface ethernet3 100full&lt;/P&gt;&lt;P&gt;interface ethernet4 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet5 auto shutdown&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz security80&lt;/P&gt;&lt;P&gt;nameif ethernet3 vpn security80&lt;/P&gt;&lt;P&gt;nameif ethernet4 intf4 security8&lt;/P&gt;&lt;P&gt;nameif ethernet5 intf5 security10&lt;/P&gt;&lt;P&gt;enable password ZM2.IZknY5iIYxDH encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;hostname FWPDN-A1.2-1&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.1.50 Exchange-Private&lt;/P&gt;&lt;P&gt;name 192.168.1.51 Antivirus-Private&lt;/P&gt;&lt;P&gt;access-list permit-all permit ip any any&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq pop3&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq domain&lt;/P&gt;&lt;P&gt;access-list 100 permit udp any any eq domain&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq telnet&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq 8080&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any any&lt;/P&gt;&lt;P&gt;access-list 100 deny ip any any&lt;/P&gt;&lt;P&gt;access-list any-vpn permit esp any any&lt;/P&gt;&lt;P&gt;access-list any-vpn permit udp any any eq isakmp&lt;/P&gt;&lt;P&gt;access-list any-vpn permit udp any any eq 4500&lt;/P&gt;&lt;P&gt;access-list any-vpn permit icmp any any&lt;/P&gt;&lt;P&gt;access-list any-vpn deny ip any any&lt;/P&gt;&lt;P&gt;access-list vpn-all permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging console debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu vpn 1500&lt;/P&gt;&lt;P&gt;mtu intf4 1500&lt;/P&gt;&lt;P&gt;mtu intf5 1500&lt;/P&gt;&lt;P&gt;ip address outside 10.1.1.1 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 10.72.50.12 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address dmz 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address vpn 10.1.1.10 255.255.255.248&lt;/P&gt;&lt;P&gt;no ip address intf4&lt;/P&gt;&lt;P&gt;no ip address intf5&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool VPDN 192.168.3.10-192.168.3.20&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;no failover ip address outside&lt;/P&gt;&lt;P&gt;no failover ip address inside&lt;/P&gt;&lt;P&gt;no failover ip address dmz&lt;/P&gt;&lt;P&gt;no failover ip address vpn&lt;/P&gt;&lt;P&gt;no failover ip address intf4&lt;/P&gt;&lt;P&gt;no failover ip address intf5&lt;/P&gt;&lt;P&gt;pdm location 10.72.50.14 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (dmz,outside) 10.1.1.8 Exchange-Private netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (dmz,outside) 10.1.1.7 Antivirus-Private netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (dmz,outside) 10.1.1.99 192.168.1.10 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (vpn,outside) 10.1.1.6 192.168.2.1 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;access-group permit-all in interface inside&lt;/P&gt;&lt;P&gt;access-group 100 in interface dmz&lt;/P&gt;&lt;P&gt;access-group vpn-all in interface vpn&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.1.1.2 1&lt;/P&gt;&lt;P&gt;route inside 10.72.0.0 255.255.0.0 10.72.50.10 1&lt;/P&gt;&lt;P&gt;route vpn 192.168.2.0 255.255.255.0 10.1.1.9 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;telnet 10.72.101.10 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.1.10 255.255.255.255 dmz&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:16:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466945#M535391</guid>
      <dc:creator>naive.naive</dc:creator>
      <dc:date>2020-02-21T08:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: Concentrator behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466946#M535394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hai,&lt;/P&gt;&lt;P&gt;   I am Nanda. Tell me Through which interface the Vpn User Come in. And IN which Interface the Concentrator is located. &lt;/P&gt;&lt;P&gt;   Also I Coul'd see VPN and DMZ interface has same Security level. If the Security level is same packet won't flow through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regard's&lt;/P&gt;&lt;P&gt;Nanda kumar.K&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2005 03:12:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466946#M535394</guid>
      <dc:creator>UPPILIV</dc:creator>
      <dc:date>2005-07-14T03:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: Concentrator behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466947#M535395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;initially the security level is different (dmz-80, vpn-90)..just change to c whether it will work or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;users come in from the outside..&lt;/P&gt;&lt;P&gt;concentrator is at the vpn interface..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2005 06:06:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466947#M535395</guid>
      <dc:creator>naive.naive</dc:creator>
      <dc:date>2005-07-14T06:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: Concentrator behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466948#M535396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is nothing to do with the DMZ and VPN interface security levels as long as they don't need communication. There are certain config issues which caught my eye&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) The tunnel terminates on the Concentrator. then the any-vpn access list is on the in interface VPN. This shud be on the in interface outside. This is because the encrypted traffic shud be allowed to pass thru PIX.&lt;/P&gt;&lt;P&gt;2) There is a static translation between the outside IP of the concentrator to a public pool (assumed to be as IP 192.168.2.1). You can permit any-vpn access list for this IP as the dest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For testing purposes, u can try accessing (telnet or HTTPS) the outside of concentrator from outside the PIX (internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will appreciate your comments&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2005 06:27:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466948#M535396</guid>
      <dc:creator>ciscokrishna</dc:creator>
      <dc:date>2005-07-14T06:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: Concentrator behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466949#M535397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have tried that, but still  no success..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now, i've moved the concentrator to the dmz zone..but it's still the same&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i can ping from internet to the concentrator public IP..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but when i try to vpn, it seems that no packet is travelling to the concentrator..and the error message is concentrator no response..but i can ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2005 07:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466949#M535397</guid>
      <dc:creator>naive.naive</dc:creator>
      <dc:date>2005-07-14T07:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: Concentrator behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466950#M535398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the whole scenario..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;internet-&amp;gt;router-&amp;gt;pix with dmz zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router doing nat n so does the pix (wanted to configure pix for passthru but cannot)..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;public ip | router ip | pix ip&lt;/P&gt;&lt;P&gt;-------------------------------&lt;/P&gt;&lt;P&gt;60.x.x.x  | 10.1.1.4  | 192.168.1.50 (servers)&lt;/P&gt;&lt;P&gt;60.x.x.x  | 10.1.1.5  | 192.168.1.51 (servers)&lt;/P&gt;&lt;P&gt;60.x.x.x  | 10.1.1.6  | 192.168.1.49 (concentrator)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from internet, i can ping to all the public ip and also access the servers services (http/pop3).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but cannot vpn to the concentrator..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2005 07:29:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466950#M535398</guid>
      <dc:creator>naive.naive</dc:creator>
      <dc:date>2005-07-14T07:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: Concentrator behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466951#M535399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmm...&lt;/P&gt;&lt;P&gt; but did u check the rules on the concentrator??&lt;/P&gt;&lt;P&gt;do one thing. first try to access (http or https) inside of the concentrator sitting inside. If that is happening. Check the rules on the public interface of the concentrator. U shud be giving https(in) access and https(out) access. Then from the internet try to access (https suggested) the concentrator's public IP. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2005 12:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/concentrator-behind-pix/m-p/466951#M535399</guid>
      <dc:creator>ciscokrishna</dc:creator>
      <dc:date>2005-07-14T12:48:56Z</dc:date>
    </item>
  </channel>
</rss>

