<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Accessing my Webserver from the outside - Pix 515E in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341732#M550331</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Quick question&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Should I be able to ping the xxx.yyy.17.246 address that I have assigned for the webserver ?  The route has been created as Patrick mentioned.  I think I'm missing something fundamental here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Should I be using my outside interface address instead for the route ?  xxx.yyy.17.145 instead of xxx.yyy.17.146 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) What logs would provide the best information ?  Syslogs, PDM Logging ?  ?????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am knew enough to this that I haven't used the logging before.  Any assistance would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 21 Mar 2005 18:16:27 GMT</pubDate>
    <dc:creator>PE-PatInBC</dc:creator>
    <dc:date>2005-03-21T18:16:27Z</dc:date>
    <item>
      <title>Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341729#M550326</link>
      <description>&lt;P&gt;Previously posted in the wrong forum.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can reach my webserver from any client through the inside interface but not from the outside.  Please review my config.  I have an outside interface of xxx.yyy.17.145 and I have setup this server to be accessed at xxx.yyy.17.146 which is one of the block of available IP addresses given to me by my ISP.  &lt;/P&gt;&lt;P&gt;What logging might help me with this ? PDM Logging ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know what I am doing wrong.&lt;/P&gt;&lt;P&gt;---------------------------------------------&lt;/P&gt;&lt;P&gt;PIX Version 6.3(4)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable password xxxxxxxx616Q encrypted&lt;/P&gt;&lt;P&gt;passwd xxxr616Q encrypted&lt;/P&gt;&lt;P&gt;hostname xxxxll1&lt;/P&gt;&lt;P&gt;domain-name xxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name xxx.yyy.90.0 MailNetwork&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host xxx.yyy.17.146 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging host inside 192.168.10.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside xxx.yyy.17.145 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address inside 192.168.10.100 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address DMZ 192.168.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 0.0.0.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.10.35 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.10.178 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.10.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location MailNetwork 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.10.0 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.20.101 255.255.255.255 DMZ&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 200 interface&lt;/P&gt;&lt;P&gt;global (DMZ) 200 192.168.20.50-192.168.20.100&lt;/P&gt;&lt;P&gt;nat (inside) 200 192.168.10.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) xxx.yyy.17.146 192.168.20.101 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 255.255.255.0 xxx.yyy.17.158 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.yyy.17.158 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;tftp-server inside 192.168.10.178 c:\tftp-root&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 192.168.10.35 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.10.178 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.10.5 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;[OK]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341729#M550326</guid>
      <dc:creator>PE-PatInBC</dc:creator>
      <dc:date>2020-02-21T08:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341730#M550327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Everything looks good have you reset the translation table after you changed the NAT configuration ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: This will reset all connections, be carefully in business hours with that !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Mar 2005 04:33:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341730#M550327</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-03-19T04:33:51Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341731#M550329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still no go.  I am able to access the webserver from the private clients through the inside interface to the DMZ but nothing from the outside interface to the DMZ.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I understand this, the first thing I need to do is make sure that all of the routing between the different interfaces is in place.  Once that is good, I apply access lists for providing access to required services.  How could I test the NAT from the outside to the DMZ ?  What logging might help and what should I be looking for ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other suggestions ?   &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Mar 2005 20:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341731#M550329</guid>
      <dc:creator>PE-PatInBC</dc:creator>
      <dc:date>2005-03-19T20:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341732#M550331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Quick question&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Should I be able to ping the xxx.yyy.17.246 address that I have assigned for the webserver ?  The route has been created as Patrick mentioned.  I think I'm missing something fundamental here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Should I be using my outside interface address instead for the route ?  xxx.yyy.17.145 instead of xxx.yyy.17.146 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) What logs would provide the best information ?  Syslogs, PDM Logging ?  ?????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am knew enough to this that I haven't used the logging before.  Any assistance would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2005 18:16:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341732#M550331</guid>
      <dc:creator>PE-PatInBC</dc:creator>
      <dc:date>2005-03-21T18:16:27Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341733#M550333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A1: NO you will not be able to ping. Ping is not stateful you will need to open the ping on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Handling ICMP Pings with the PIX Firewall&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The PIX and the traceroute Command&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800e9312.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800e9312.shtml&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A2: It does not really matter if you use xxx.yyy.17.145 or xxx.yyy.17.146. But the config will change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Option xxx.yyy.17.145 mean that you need to configure port redirection instaed of NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Option xxx.yyy.17.146 as used right now will be used in conjunction with NAT. Allows you to open all ports as necessary without limitation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A3: Syslog and PDM and "show logg" on the console will basicly provide the same information if the logging level is the same. Normaly "logging buffer warning" gives enough information to analyze troubles. You can also send them to a syslog server wich allows easyer troubleshooting in a text file with the FIND function of your prefered text file editor. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logg on&lt;/P&gt;&lt;P&gt;logg buff warn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2005 18:36:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341733#M550333</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-03-21T18:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341734#M550334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have now got logging working to a syslog server and am getting the following error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------------------------------------------&lt;/P&gt;&lt;P&gt;Mar 23 2005 09:31:04: %PIX-3-305005: No translation group found for udp src inside:192.168.20.101/2981 dst outside:192.168.0.20/53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the following warning:&lt;/P&gt;&lt;P&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;Mar 23 2005 09:32:06: %PIX-4-405001: Received ARP request collision from 192.168.10.100/000f.1f6e.7878 on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found the following explaination for the error but it looks like everything is in place.  I'm not sure why I'm getting the error 192.168.0.20 address as I don't have anything on that subnet internally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I confirm the NAT on my OUTSIDE interface to my DMZ webserver ?  Any other thoughts ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Mar 2005 17:47:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341734#M550334</guid>
      <dc:creator>PE-PatInBC</dc:creator>
      <dc:date>2005-03-23T17:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341735#M550336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats absolutly right !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have setup:&lt;/P&gt;&lt;P&gt;global (DMZ) 200 192.168.20.50-192.168.20.100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And 192.168.20.101 is not part of the allowed PAT (NAT) range 192.168.20.50-192.168.20.100 so this host cannot connect outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where, which interface, is this DNS host 192.168.0.20.&lt;/P&gt;&lt;P&gt;I cannot see it in the interface and you do not have a route or NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add another range to it !&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;global (DMZ) 200 192.168.20.101-192.168.20.150&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Mar 2005 18:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341735#M550336</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-03-23T18:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341736#M550338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Just 2 quick observations here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&lt;/P&gt;&lt;P&gt;The DMZ interface ip address is configured:&lt;/P&gt;&lt;P&gt;ip address &lt;B&gt;DMZ 192.168.20.1&lt;/B&gt; 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the error message:&lt;/P&gt;&lt;P&gt;%PIX-3-305005: No translation group found for udp src &lt;B&gt;inside:192.168.20.101&lt;/B&gt;/2981 dst outside:192.168.0.20/53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shows that host &lt;B&gt;192.168.20.101&lt;/B&gt; shouldn't be connected to the inside, it should be on the dmz (inside is 192.168.10.0/24 and dmz is 192.168.20.0/24). May be you need to check the PIX cabling, the inside and outside interfaces are on the chassis while the dmz interface (ethernet2) is on the pci slot. There shouldn't be a switch interconnecting the pix interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.&lt;/P&gt;&lt;P&gt;The inside interface is configured:&lt;/P&gt;&lt;P&gt;ip address inside &lt;B&gt;192.168.10.100 255.255.255.0&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the error message:&lt;/P&gt;&lt;P&gt;%PIX-4-405001: Received ARP request collision from &lt;B&gt;192.168.10.100&lt;/B&gt;/000f.1f6e.7878 on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible that the machine with MAC-OUI 000f.1f6e.7878 (possibly a Dell system) is conflicting with the pix's inside ip address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you post the arp caches content (show arp inside, show arp dmz)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Mustafa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Mar 2005 21:22:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341736#M550338</guid>
      <dc:creator>mhussein</dc:creator>
      <dc:date>2005-03-23T21:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341737#M550341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to both of you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mustafa, I'm guilty and you were correct.  I didn't have the DMZ on a dedicated physical network.  I just moved it to one and now the log says&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mar 23 2005 14:50:55: %PIX-4-106100: access-list outside_access_in permitted tcp outside/209.53.227.66(3416) -&amp;gt; DMZ/xxx.xxx.17.146(80) hit-cnt 1 (first hit)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That looks alot better but I still can't get the webpage to come up.  I am looking at the webserver now to see if I'm missing something but if I type&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://192.168.20.101" target="_blank"&gt;http://192.168.20.101&lt;/A&gt; &lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://192.168.20.101/index.htm" target="_blank"&gt;http://192.168.20.101/index.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from clients accessing the inside interface as their gateway, I get a webpage.  Any thoughts ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Mar 2005 23:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341737#M550341</guid>
      <dc:creator>PE-PatInBC</dc:creator>
      <dc:date>2005-03-23T23:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341738#M550342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ARP cache as requested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix# show arp&lt;/P&gt;&lt;P&gt;        inside 192.168.10.5 0050.bad3.1cd6&lt;/P&gt;&lt;P&gt;        inside 192.168.10.178 0007.e90b.b642&lt;/P&gt;&lt;P&gt;        inside 192.168.10.38 0007.e90b.b07a&lt;/P&gt;&lt;P&gt;        inside 192.168.10.25 000f.1f6e.7877&lt;/P&gt;&lt;P&gt;        inside 192.168.20.101 0002.b3ab.66dd&lt;/P&gt;&lt;P&gt;        DMZ 192.168.20.101 0002.b3ab.66dd&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed the outside interface but if you need it too let me know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Mar 2005 23:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341738#M550342</guid>
      <dc:creator>PE-PatInBC</dc:creator>
      <dc:date>2005-03-23T23:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341739#M550343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Host 192.168.20.101 still appears on 2 sides of the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside 192.168.20.101 0002.b3ab.66dd&lt;/P&gt;&lt;P&gt;DMZ 192.168.20.101 0002.b3ab.66dd &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try clearing the arp-cache and the translations again:&lt;/P&gt;&lt;P&gt;clear arp&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And check that host 192.168.20.101 is on dmz:&lt;/P&gt;&lt;P&gt;show arp&lt;/P&gt;&lt;P&gt;show xlat&lt;/P&gt;&lt;P&gt;sho local-host 192.168.20.101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Mustafa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Mar 2005 23:47:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341739#M550343</guid>
      <dc:creator>mhussein</dc:creator>
      <dc:date>2005-03-23T23:47:41Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341740#M550344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Done as requested.  Here is the results:&lt;/P&gt;&lt;P&gt;------------------------------------------&lt;/P&gt;&lt;P&gt;PE-Wall1# sh arp&lt;/P&gt;&lt;P&gt;        inside 192.168.10.5 0050.bad3.1cd6&lt;/P&gt;&lt;P&gt;        DMZ 192.168.20.101 0002.b3ab.66dd&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PE-Wall1# sh xlate&lt;/P&gt;&lt;P&gt;1 in use, 45 most used&lt;/P&gt;&lt;P&gt;Global xxx.xxx.17.146 Local 192.168.20.101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PE-Wall1# sh local-host 192.168.20.101&lt;/P&gt;&lt;P&gt;Interface DMZ: 1 active, 1 maximum active, 0 denied&lt;/P&gt;&lt;P&gt;local host: &amp;lt;192.168.20.101&amp;gt;,&lt;/P&gt;&lt;P&gt;    TCP connection count/limit = 0/unlimited&lt;/P&gt;&lt;P&gt;    TCP embryonic count = 0&lt;/P&gt;&lt;P&gt;    TCP intercept watermark = unlimited&lt;/P&gt;&lt;P&gt;    UDP connection count/limit = 0/unlimited&lt;/P&gt;&lt;P&gt;  AAA:&lt;/P&gt;&lt;P&gt;  Xlate(s):&lt;/P&gt;&lt;P&gt;    Global xxx.xxx.17.146 Local 192.168.20.101&lt;/P&gt;&lt;P&gt;  Conn(s):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface inside: 0 active, 2 maximum active, 0 denied&lt;/P&gt;&lt;P&gt;----------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still no access to a webpage through the outside interface translation.  Nothing that I can see in the logs that says that there is any problem but it just won't show the page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Mar 2005 01:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341740#M550344</guid>
      <dc:creator>PE-PatInBC</dc:creator>
      <dc:date>2005-03-24T01:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341741#M550345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Last thing I can think of is the default gateway on host 192.168.20.101 should be set to 192.168.20.1 (pix dmz interface).&lt;/P&gt;&lt;P&gt;From 192.168.20.101 try to browse to &lt;A class="jive-link-custom" href="http://www2.cotse.com/cgi-bin/test.cgi" target="_blank"&gt;http://www2.cotse.com/cgi-bin/test.cgi&lt;/A&gt; or use proxy test &lt;A class="jive-link-custom" href="http://www.all-nettools.com/toolbox" target="_blank"&gt;http://www.all-nettools.com/toolbox&lt;/A&gt; to see what ip address is being used.&lt;/P&gt;&lt;P&gt;On the log, look for "translation/connection built/tear down" etc..., and check the access-list hit count.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Mar 2005 02:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341741#M550345</guid>
      <dc:creator>mhussein</dc:creator>
      <dc:date>2005-03-24T02:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341742#M550346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the DMZ is a completely separate network and it needs to know where to go when it can't find something on it's own network, so having the correct gateway address allows the request to be returned.  I changed the gateway address on the web server and it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick and Mustafa, you guys are amazing.  Thank you for all of your assistance.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Mar 2005 18:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341742#M550346</guid>
      <dc:creator>PE-PatInBC</dc:creator>
      <dc:date>2005-03-24T18:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341743#M550347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;%PIX-4-405001: Received ARP request collision from 192.168.10.100/000f.1f6e.7878 on interface inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mustafa,&lt;/P&gt;&lt;P&gt;You mentioned in your above commment above that my conflict might be with a Dell Server.  Once again, right you are.  the second address that is conflicting is 000f.1f6e.7877  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a SHOW ARP from my PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PE-Wall1# sh arp&lt;/P&gt;&lt;P&gt;        outside xxx.xxx.17.158 0012.7f32.9ce1&lt;/P&gt;&lt;P&gt;        inside 192.168.10.25 000f.1f6e.7877&lt;/P&gt;&lt;P&gt;        inside 192.168.10.5 0050.bad3.1cd6&lt;/P&gt;&lt;P&gt;        inside 192.168.10.178 0007.e90b.b642&lt;/P&gt;&lt;P&gt;        inside 192.168.10.38 0007.e90b.b07a&lt;/P&gt;&lt;P&gt;        inside 192.168.10.35 000f.1f23.184d&lt;/P&gt;&lt;P&gt;        DMZ 192.168.20.101 0002.b3ab.66dd&lt;/P&gt;&lt;P&gt;        DMZ 192.168.20.100 0007.e90b.b6b3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What can be done about this ?  Is it conflicting with the inside interface on the PIX ?  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Mar 2005 22:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341743#M550347</guid>
      <dc:creator>PE-PatInBC</dc:creator>
      <dc:date>2005-03-25T22:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341744#M550348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The mac address is already installed:&lt;/P&gt;&lt;P&gt;inside 192.168.10.25 000f.1f6e.7877 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000f.1f6e.7877 is probably conflicting with another host, not the PIX itself. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suggest finishing up dhcp configs on the pix, and keeping a list or spreadsheet of statically assigned ip addresses. for example:&lt;/P&gt;&lt;P&gt;192.168.10.2-192.168.10.99 : desktops, dhcp&lt;/P&gt;&lt;P&gt;192.168.10.100 : pix inside ip address&lt;/P&gt;&lt;P&gt;192.168.10.101-192.168.10.254: servers/other systems, statically assigned, no dhcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*** pix dhcp configs:&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.10.2-192.168.10.99 inside&lt;/P&gt;&lt;P&gt;dhcpd dns x.x.x.x x.x.x.x&lt;/P&gt;&lt;P&gt;dhcpd wins y.y.y.y &amp;lt;----------- optional&lt;/P&gt;&lt;P&gt;dhcpd lease 86400 &amp;lt;------- one day lease&lt;/P&gt;&lt;P&gt;dhcpd domain something.something&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172794.html#wp1031649" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172794.html#wp1031649&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Mar 2005 00:44:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341744#M550348</guid>
      <dc:creator>mhussein</dc:creator>
      <dc:date>2005-03-26T00:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341745#M550349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A couple things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)  I ran a network utility that gets all of the info off of all of the devices on my 192.168.10.0 network and could only find the Dell server with that MAC address.  The Dell server in question has the NICs teamed if that makes any difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)  You suggest finishing up the dhcp configs.  Unless there is something I don't know about, I would prefer to not use the PIX for my DHCP.  I have DHCP servers already on my LAN.  I do keep a TCP/IP document with all related IP addresses tracked for my network.  I don't have any IP conflicts that I know of ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Can I just delete the DHCP related items in my config if I don't intend to use them ?  They didn't clean up after removing DHCP from the PDM.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other suggestions on how I can track down the conflicting MAC address ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Mar 2005 01:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341745#M550349</guid>
      <dc:creator>PE-PatInBC</dc:creator>
      <dc:date>2005-03-26T01:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing my Webserver from the outside - Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341746#M550350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am not sure about Dell's NIC teaming. I don't think there would be a problem if the 2 NICs use a single virtual mac address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it is safe to remove the dhcp configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are many snmp based tools to monitor mac addresses and arp tables, specially if you are using a managed switch, e.g:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://manageengine.adventnet.com/products/oputils/index.html" target="_blank"&gt;http://manageengine.adventnet.com/products/oputils/index.html&lt;/A&gt; (commercial+free)&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.wtcs.org/snmp4tpc/getif.htm" target="_blank"&gt;http://www.wtcs.org/snmp4tpc/getif.htm&lt;/A&gt; (free)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Mar 2005 00:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-my-webserver-from-the-outside-pix-515e/m-p/341746#M550350</guid>
      <dc:creator>mhussein</dc:creator>
      <dc:date>2005-03-27T00:10:58Z</dc:date>
    </item>
  </channel>
</rss>

