<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pix 515 2 &amp;quot;inside&amp;quot; networks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715339#M536405</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you need not do much, just let me explain you by an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you have 3 interafce, lets say, inside, outside and dmz:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;since inside is highere security zone for you, security level would be 100&lt;/P&gt;&lt;P&gt;outside is less secure, level should be 0&lt;/P&gt;&lt;P&gt;dmz is mid-security zone so level could be 50, although you can change it to 100 as well, thats your requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for internet access:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thats it, both the inside and dmz woudl take the public ip on outside interafce and should be able to access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Jul 2011 13:17:03 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-07-08T13:17:03Z</dc:date>
    <item>
      <title>Pix 515 2 "inside" networks</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715338#M536404</link>
      <description>&lt;P&gt;I have a pix 515 with 4 port nic installed. I have outside setup with public ip inside setup up with private ip of one of my inside subnets and eth2 on ex card setup with different private subnet on our network. I need to be able to access internet from both private subnets throught the same outside ip. Seems like it should be simple enough to just copy the nat rule for the first network which is working. Do I need to change security levels on nic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your time&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:56:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715338#M536404</guid>
      <dc:creator>david.kordyban</dc:creator>
      <dc:date>2019-03-11T20:56:33Z</dc:date>
    </item>
    <item>
      <title>Pix 515 2 "inside" networks</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715339#M536405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you need not do much, just let me explain you by an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you have 3 interafce, lets say, inside, outside and dmz:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;since inside is highere security zone for you, security level would be 100&lt;/P&gt;&lt;P&gt;outside is less secure, level should be 0&lt;/P&gt;&lt;P&gt;dmz is mid-security zone so level could be 50, although you can change it to 100 as well, thats your requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for internet access:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thats it, both the inside and dmz woudl take the public ip on outside interafce and should be able to access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jul 2011 13:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715339#M536405</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-08T13:17:03Z</dc:date>
    </item>
    <item>
      <title>Pix 515 2 "inside" networks</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715340#M536406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; as long as the security level on your second inside interface is higher than the outside interface you should be fine&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jul 2011 13:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715340#M536406</guid>
      <dc:creator>p.mcgowan</dc:creator>
      <dc:date>2011-07-08T13:17:41Z</dc:date>
    </item>
    <item>
      <title>Pix 515 2 "inside" networks</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715341#M536407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you Varun&lt;/P&gt;&lt;P&gt;after checking I am still having trouble. I have internet when plugging into "server"&amp;nbsp; nic on the pix. I then clear xlate , and clear arp , change ip info on pc nic, plug into courthouse and sheriff and I get no where, cant even ping pix ip for that subnet can you see anything wrong with config:&lt;/P&gt;&lt;P&gt;PIX-GW# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 8.0(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname PIX-GW&lt;/P&gt;&lt;P&gt;domain-name garrettcounty.org&lt;/P&gt;&lt;P&gt;enable password 2Vnffa/98HkYTtlJ encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 167.*.#.% 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.100.20 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif Sheriffs&lt;/P&gt;&lt;P&gt; security-level 99&lt;/P&gt;&lt;P&gt; ip address 192.168.104.3 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet3&lt;/P&gt;&lt;P&gt; nameif Courthouse&lt;/P&gt;&lt;P&gt; security-level 98&lt;/P&gt;&lt;P&gt; ip address 192.168.102.50 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name dn.local&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu Sheriffs 1500&lt;/P&gt;&lt;P&gt;mtu Courthouse 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm-613.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 101 interface&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Sheriffs) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Courthouse) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 167.*.*.*.*&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.100.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.100.88 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:1b03067e1a9f17d1ae0e08c72c1d9a80&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jul 2011 17:42:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715341#M536407</guid>
      <dc:creator>david.kordyban</dc:creator>
      <dc:date>2011-07-08T17:42:57Z</dc:date>
    </item>
    <item>
      <title>Pix 515 2 "inside" networks</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715342#M536408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi david,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plz provide me the captures when you plug the internet to the sherrif and courthouse interface, here is how to take them:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit ip host &lt;TES pc="" connected="" to="" sherrif=""&gt; any&lt;/TES&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit ip any host &lt;TES pc="" connected="" to="" sherrif=""&gt;&lt;/TES&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture caps access-list cap interface sherrif&lt;/P&gt;&lt;P&gt;capture capo access-list cap interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try connecting to internet after that, and collect the output of "show capture caps" and show capture capo"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover kindly give me the output of the packet-tracer:&lt;/P&gt;&lt;P&gt;packet-tracer input sherrif tcp &lt;TEST pc="" ip="" connected="" to="" sherrif=""&gt; 2345 1.1.1.1 80 detailed&lt;/TEST&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And plz collect the logs for the time of the issue as well, this shoudl be enough to troubleshoot on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jul 2011 18:53:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715342#M536408</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-08T18:53:59Z</dc:date>
    </item>
    <item>
      <title>Pix 515 2 "inside" networks</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715343#M536409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi I put the capture commands in and plugged in to sheriff and it started working. Maybe I had be ether cables&lt;/P&gt;&lt;P&gt;Anyway I really appreciate the help consider it solved&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jul 2011 12:35:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715343#M536409</guid>
      <dc:creator>david.kordyban</dc:creator>
      <dc:date>2011-07-09T12:35:31Z</dc:date>
    </item>
    <item>
      <title>Pix 515 2 "inside" networks</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715344#M536410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is good, all the best &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jul 2011 13:53:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-2-quot-inside-quot-networks/m-p/1715344#M536410</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-09T13:53:22Z</dc:date>
    </item>
  </channel>
</rss>

