<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix with 4 interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442501#M535746</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What kind of access do you need (smtp, http, ...) from where to where (inside, dmz, ...)? Is it possible to post  the access-list you already have?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Jul 2005 07:24:30 GMT</pubDate>
    <dc:creator>tvanginneken</dc:creator>
    <dc:date>2005-07-07T07:24:30Z</dc:date>
    <item>
      <title>Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442498#M535743</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need help on this as I'm newbie in PIX.&lt;/P&gt;&lt;P&gt;Have gone through the doc but still cannot get what i want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say,&lt;/P&gt;&lt;P&gt;Inside Interface : Internal Network&lt;/P&gt;&lt;P&gt;Outside Interface : Public Network&lt;/P&gt;&lt;P&gt;DMZ Interface : DMZ servers&lt;/P&gt;&lt;P&gt;VPN Interface : connected to VPN Concentrator&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Desired reults:&lt;/P&gt;&lt;P&gt;1) All the inside are able to access outside&lt;/P&gt;&lt;P&gt;2) Outside users can access the DMZ&lt;/P&gt;&lt;P&gt;3) Outside users can VPN. (PIX have to bypass the IPSec tunnel to the VPN box)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But still cannot get what i wanted..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442498#M535743</guid>
      <dc:creator>naive.naive</dc:creator>
      <dc:date>2020-02-21T08:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442499#M535744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;did you already have a look at this url:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It show all kinds of configuration examples.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2005 06:35:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442499#M535744</guid>
      <dc:creator>tvanginneken</dc:creator>
      <dc:date>2005-07-07T06:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442500#M535745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;already did...but still cannot get what i wanted..especially on the access list that i've to build..in order for the access..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2005 07:03:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442500#M535745</guid>
      <dc:creator>naive.naive</dc:creator>
      <dc:date>2005-07-07T07:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442501#M535746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What kind of access do you need (smtp, http, ...) from where to where (inside, dmz, ...)? Is it possible to post  the access-list you already have?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2005 07:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442501#M535746</guid>
      <dc:creator>tvanginneken</dc:creator>
      <dc:date>2005-07-07T07:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442502#M535748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll have a stab at it, i think your config will be along the lines of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allow internal users to access internet using PAT to the public address assigned to the outside interface&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# global (outside) 1 interface&lt;/P&gt;&lt;P&gt;# nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To permit HTTP traffic to a host on the DMZ from the outside:&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# static (dmz,outside)  &lt;DMZ_SERVER_PUBLIC_ADDRESS&gt; &lt;DMZ_SERVER_PRIVATE_ADDRESS&gt; netmask 255.255.255.255&lt;/DMZ_SERVER_PRIVATE_ADDRESS&gt;&lt;/DMZ_SERVER_PUBLIC_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;# access-list outside_in permit tcp any host &lt;DMZ_SERVER_PUBLIC_ADDRESS&gt; eq http&lt;/DMZ_SERVER_PUBLIC_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;# access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To permit IPSEC to VPN Gateway on DMZ:&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;# static (dmz,outside)  &lt;DMZ_VPNGW_PUBLIC_ADDRESS&gt; &lt;DMZ_VPNGW_PRIVATE_ADDRESS&gt; netmask 255.255.255.255&lt;/DMZ_VPNGW_PRIVATE_ADDRESS&gt;&lt;/DMZ_VPNGW_PUBLIC_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To permit outbound VPN connections&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# global (outside) 2 &lt;DMZ_VPNGW_PUBLIC_ADDRESS&gt;&lt;/DMZ_VPNGW_PUBLIC_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;# nat (dmz) &lt;DMZ_VPNGW_PRIVATE_ADDRESS&gt; 255.255.255.255&lt;/DMZ_VPNGW_PRIVATE_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "sysopt connection permit-ipsec" command will allow all packets from an IPSEC tunnel to bypass ACL checking so you don't need to build an access list for this.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure you'll be permitting other ports to your DMZ, these can be added to the access-list outside_in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;PJD&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2005 07:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442502#M535748</guid>
      <dc:creator>paddyxdoyle</dc:creator>
      <dc:date>2005-07-07T07:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442503#M535750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a few remarks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;° sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This only works if the vpn tunnel is TO the PIX (so the pix is the vpn gateway) and not THROUGH the pix (in your case). &lt;/P&gt;&lt;P&gt;So you need to add access-list entries to the outside-in access-list to allow the vpn traffic (udp/500 for ike, esp or UDP encap for encrypted data)from the outside to the dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;° static (dmz,outside) &lt;DMZ_VPNGW_PUBLIC_ADDRESS&gt; &lt;DMZ_VPNGW_PRIVATE_ADDRESS&gt; netmask 255.255.255.255 &lt;/DMZ_VPNGW_PRIVATE_ADDRESS&gt;&lt;/DMZ_VPNGW_PUBLIC_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This works in both direction, so you don't need:&lt;/P&gt;&lt;P&gt;global (outside) 2 &lt;DMZ_VPNGW_PUBLIC_ADDRESS&gt;&lt;/DMZ_VPNGW_PUBLIC_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) &lt;DMZ_VPNGW_PRIVATE_ADDRESS&gt; 255.255.255.255&lt;/DMZ_VPNGW_PRIVATE_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2005 07:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442503#M535750</guid>
      <dc:creator>tvanginneken</dc:creator>
      <dc:date>2005-07-07T07:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442504#M535752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tom,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the remarks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure about the syslopt comment, i thought it would allow IPSEC pass through aswell.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_user_guide_chapter09186a00801aed85.html#1034087" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_user_guide_chapter09186a00801aed85.html#1034087&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Paddy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2005 09:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442504#M535752</guid>
      <dc:creator>paddyxdoyle</dc:creator>
      <dc:date>2005-07-07T09:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442505#M535755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paddy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am quite sure. &lt;/P&gt;&lt;P&gt;Somewhere in the link you posted, you will find this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"To enable IPSec authenticated/cipher inbound sessions to always be permitted, use the sysopt connection permit-ipsec command."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX can only be sure that the session is autheticated if the PIX is also the endpoint of the VPN tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is still not working, you should consider to enable logging to see what packets are denied. More info on how to setup syslogging can be found here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094030.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094030.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2005 10:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442505#M535755</guid>
      <dc:creator>tvanginneken</dc:creator>
      <dc:date>2005-07-07T10:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442506#M535757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Tom,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's confusing because the link also says:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note   If the sysopt connection permit-ipsec command is not configured, you must explicitly configure an access-list command statement to permit IPSec traffic to traverse the PIX  Firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't really test it as i don't have a PIX at the mo &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Paddy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2005 11:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442506#M535757</guid>
      <dc:creator>paddyxdoyle</dc:creator>
      <dc:date>2005-07-07T11:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442507#M535758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in order for the vpn traffic to bypass, which one i should use??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;should i create a static nat to the vpn box, and then create an accesslist to permit the vpn traffic??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2005 15:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442507#M535758</guid>
      <dc:creator>naive.naive</dc:creator>
      <dc:date>2005-07-07T15:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: Pix with 4 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442508#M535761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think Tom is correct, i've done some more reading on the sysopt command however if you can i would still try using it out of curiosity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other than that you need to have access-lists as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For AH&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX1(config)# access-list outside_access_in permit 50 any host &lt;VPNGW_PUBLIC_ADDRESS&gt;&lt;/VPNGW_PUBLIC_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For ESP&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX1(config)# access-list outside_access_in permit 51 any &lt;VPNGW_PUBLIC_ADDRESS&gt;&lt;/VPNGW_PUBLIC_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For both ESP and AH (IKE)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX1(config)# access-list outside_access_in permit udp host &lt;VPNGW_PUBLIC_ADDRESS&gt; eq 500&lt;/VPNGW_PUBLIC_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;PJD&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jul 2005 10:07:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-with-4-interfaces/m-p/442508#M535761</guid>
      <dc:creator>paddyxdoyle</dc:creator>
      <dc:date>2005-07-08T10:07:06Z</dc:date>
    </item>
  </channel>
</rss>

