<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Trace result with PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trace-result-with-pix/m-p/343862#M550291</link>
    <description>&lt;P&gt;The Trace from the internal network does not show the inside interface in the hops. The first hop is the internal Firewall and the second is the perimeter router connected to the Outside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anybody clarify on this ??&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 08:01:38 GMT</pubDate>
    <dc:creator>prasadkrishna</dc:creator>
    <dc:date>2020-02-21T08:01:38Z</dc:date>
    <item>
      <title>Trace result with PIX</title>
      <link>https://community.cisco.com/t5/network-security/trace-result-with-pix/m-p/343862#M550291</link>
      <description>&lt;P&gt;The Trace from the internal network does not show the inside interface in the hops. The first hop is the internal Firewall and the second is the perimeter router connected to the Outside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anybody clarify on this ??&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trace-result-with-pix/m-p/343862#M550291</guid>
      <dc:creator>prasadkrishna</dc:creator>
      <dc:date>2020-02-21T08:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Trace result with PIX</title>
      <link>https://community.cisco.com/t5/network-security/trace-result-with-pix/m-p/343863#M550292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does that device allow ICMP and which icmp commands ? Do we talk about a PIX or an IOS Firewall ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For PIX:&lt;/P&gt;&lt;P&gt;Handling ICMP Pings with the PIX Firewall&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The PIX and the traceroute Command&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800e9312.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800e9312.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2005 13:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trace-result-with-pix/m-p/343863#M550292</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-03-21T13:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: Trace result with PIX</title>
      <link>https://community.cisco.com/t5/network-security/trace-result-with-pix/m-p/343864#M550293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. The device allows ICMP. Im talking of the PIX ver6.3 &lt;/P&gt;&lt;P&gt;infact im able to do a PING and Trace from the inside host to the outside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Prasad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Mar 2005 08:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trace-result-with-pix/m-p/343864#M550293</guid>
      <dc:creator>prasadkrishna</dc:creator>
      <dc:date>2005-03-22T08:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: Trace result with PIX</title>
      <link>https://community.cisco.com/t5/network-security/trace-result-with-pix/m-p/343865#M550294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To ping or trace the from the inside network to the inside interface you need to configure the "ICMP" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP command example&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.30 echo inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.31 echo inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.20 echo inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.40 echo inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.100 echo inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Mar 2005 13:59:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trace-result-with-pix/m-p/343865#M550294</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-03-22T13:59:23Z</dc:date>
    </item>
  </channel>
</rss>

