<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX 515E config question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324179#M550496</link>
    <description>&lt;P&gt;I'm an amateur at this so please be patient with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of my users is getting an application that needs to communicate with the vendors host.  The vendor tells me that my users workstation needs a public IP to make this work but they have made it work witha NAT'ed IP.  That would be my preferred method of commection as giving that user a public IP would be a difficult task.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question is, how do I go about configuring this users IP address for port 80 and a few other ports (I haven't been given the other ports yet)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Relevant config info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;access-list outbound permit ip any any&lt;/P&gt;&lt;P&gt;&amp;gt;ip address outside 170.x.x.242 255.255.255.248&lt;/P&gt;&lt;P&gt;&amp;gt;ip address inside 10.x.x.1 255.255.254.0&lt;/P&gt;&lt;P&gt;&amp;gt;route outside 0.0.0.0 0.0.0.0 170.x.x.241 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on other access rules we have set up for other needs, this is what I'm thinking of adding:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;access-list inbound permit ip any host 170.x.x.246&lt;/P&gt;&lt;P&gt;&amp;gt;static (inside,outside) 170.x.x.246 10.x.x.38 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would that be correct and if not, what am I missing?  If any other information is needed, let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 08:00:52 GMT</pubDate>
    <dc:creator>bhhouston</dc:creator>
    <dc:date>2020-02-21T08:00:52Z</dc:date>
    <item>
      <title>PIX 515E config question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324179#M550496</link>
      <description>&lt;P&gt;I'm an amateur at this so please be patient with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of my users is getting an application that needs to communicate with the vendors host.  The vendor tells me that my users workstation needs a public IP to make this work but they have made it work witha NAT'ed IP.  That would be my preferred method of commection as giving that user a public IP would be a difficult task.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question is, how do I go about configuring this users IP address for port 80 and a few other ports (I haven't been given the other ports yet)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Relevant config info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;access-list outbound permit ip any any&lt;/P&gt;&lt;P&gt;&amp;gt;ip address outside 170.x.x.242 255.255.255.248&lt;/P&gt;&lt;P&gt;&amp;gt;ip address inside 10.x.x.1 255.255.254.0&lt;/P&gt;&lt;P&gt;&amp;gt;route outside 0.0.0.0 0.0.0.0 170.x.x.241 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on other access rules we have set up for other needs, this is what I'm thinking of adding:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;access-list inbound permit ip any host 170.x.x.246&lt;/P&gt;&lt;P&gt;&amp;gt;static (inside,outside) 170.x.x.246 10.x.x.38 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would that be correct and if not, what am I missing?  If any other information is needed, let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324179#M550496</guid>
      <dc:creator>bhhouston</dc:creator>
      <dc:date>2020-02-21T08:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324180#M550498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This would work but would open a backdoor to your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Better restrict the access-list to something like this bellow and also restrict the protocol to http !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;access-list inbound permit tcp host PartnerPublicIP host 170.x.x.246 eq www&lt;/P&gt;&lt;P&gt;&amp;gt;static (inside,outside) 170.x.x.246 10.x.x.38 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Mar 2005 14:02:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324180#M550498</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-03-15T14:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324181#M550499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Patrick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I assume that the PartnerPublicIP is the IP address of the application host?  Also, should "host" be included before and after PartnerPublicIP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And, does eq www take into account the other ports that will need to be opened?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally, I'm dealing with an IT person on the other end with limited experience like myself.  How would their configuration be set up to correspond with mine?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Mar 2005 14:30:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324181#M550499</guid>
      <dc:creator>bhhouston</dc:creator>
      <dc:date>2005-03-15T14:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324182#M550500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ben,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.) The host statement is before the Public IP.&lt;/P&gt;&lt;P&gt;2.) For each port that your client has to connect to your internal server you have to add a access-list line or you can work with object groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX(config)# access-list acl-outside permit tcp host PartnerPubIP host MyPublicIP eq 25&lt;/P&gt;&lt;P&gt;PIX(config)# access-list acl-outside permit tcp host PartnerPubIP host MyPublicIP eq 443&lt;/P&gt;&lt;P&gt;PIX(config)# access-list acl-outside permit tcp host PartnerPubIP host MyPublicIP eq 80 &lt;/P&gt;&lt;P&gt;PIX(config)# access-list acl-outside permit tcp host PartnerPubIP host MyPublicIP eq 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX(config)# access-group acs-outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) MyPublicIP 10.0.0.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dont forget to do a "clear xlate" after changing / add the static line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See examples on cisco:&lt;/P&gt;&lt;P&gt;Using and Configuring PIX Object Groups:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800d641d.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800d641d.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Other examples:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094466.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094466.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/pcgi-bin/Support/browse/psp_view.pl?p=Hardware:PIX&amp;amp;s=Software_Configuration" target="_blank"&gt;http://www.cisco.com/pcgi-bin/Support/browse/psp_view.pl?p=Hardware:PIX&amp;amp;s=Software_Configuration&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Mar 2005 18:26:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324182#M550500</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-03-15T18:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324183#M550501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just a follow-up to this thread from 2 weeks ago . . .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I got all the information I needed from my vendor, these were the commands I added:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;access-list inbound permit esp host 170.x.x.130 host 170.x.x.246&lt;/P&gt;&lt;P&gt;&amp;gt;static (inside,outside) 170.x.x.246 10.x.x.38 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had a little help from another client who had recently gotten the software and he helped me with the "permit esp" command.  I don't quite understand why we used this instead of "permit tcp", though.  I was wondering if you might provide a brief explanation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again, Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Mar 2005 17:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324183#M550501</guid>
      <dc:creator>bhhouston</dc:creator>
      <dc:date>2005-03-31T17:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324184#M550502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As soon as you have more details who will connect and with what port, tcp etc let me know and I will give you some guidance how to setup your configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The example that you gave (access-list inbound permit esp host 170.x.x.130 host 170.x.x.246) allone will not work, this looks like an incomplete IPSEC excample.&lt;/P&gt;&lt;P&gt;Usually UDP 500 is also required for that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;access-list inbound permit udp host 170.x.x.130 host 170.x.x.246 eq 500&lt;/P&gt;&lt;P&gt;access-list inbound permit esp host 170.x.x.130 host 170.x.x.246  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But is it really that that your partner wants to do establish a VPN in the inside of your network or do you establish the connectivity ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Mar 2005 21:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324184#M550502</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-03-31T21:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324185#M550506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Curious.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You say the permit esp command alone will not work but it did, even without the udp 500 command added.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The connection is a VPN to the inside or their network and all tests thus far have been successful.  Could that be the reason udp was not necessary?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Apr 2005 16:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324185#M550506</guid>
      <dc:creator>bhhouston</dc:creator>
      <dc:date>2005-04-06T16:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324186#M550508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have the line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the configuration ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If yes thats why you could even remove the command line that permits ESP. As the sysopt opens IPSEC globaly and does not check the access-list on the interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Apr 2005 17:05:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324186#M550508</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-04-06T17:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324187#M550510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I have that line in my configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You've been a big help, Patrick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Apr 2005 18:04:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324187#M550510</guid>
      <dc:creator>bhhouston</dc:creator>
      <dc:date>2005-04-06T18:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 515E config question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324188#M550512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The pleasure is mine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Apr 2005 18:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-config-question/m-p/324188#M550512</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-04-06T18:12:13Z</dc:date>
    </item>
  </channel>
</rss>

