<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VERY basic Pix 515E question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393372#M552640</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does you laptop have a default gateway of the pix?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the pix have a "route 0.0.0.0 0.0.0.0" pointing to your ISP ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Jan 2005 22:04:09 GMT</pubDate>
    <dc:creator>jason.aarons</dc:creator>
    <dc:date>2005-01-17T22:04:09Z</dc:date>
    <item>
      <title>VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393371#M552638</link>
      <description>&lt;P&gt;I just pulled the thing out of the box and powered it up.&lt;/P&gt;&lt;P&gt;I put it on our internal network connected a laptop to the inside interface and went through the setup wizard.&lt;/P&gt;&lt;P&gt;I gave the outside interface a static address, added pat for the internal systems (just the above listed laptop) and all seemed well.&lt;/P&gt;&lt;P&gt;There appears to already be an access rule that allows all outbound traffic but I can see anything beyond the inside interface (192.168.1.1) on the laptop.&lt;/P&gt;&lt;P&gt;I can ping the whole world from the pix but the poor internal system sees nothing.&lt;/P&gt;&lt;P&gt;I am very new to Cisco and am sure I'm missing something basic.&lt;/P&gt;&lt;P&gt;Anyone want to help our a newbie?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:52:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393371#M552638</guid>
      <dc:creator>_-TonyS-_</dc:creator>
      <dc:date>2020-02-21T07:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393372#M552640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does you laptop have a default gateway of the pix?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the pix have a "route 0.0.0.0 0.0.0.0" pointing to your ISP ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jan 2005 22:04:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393372#M552640</guid>
      <dc:creator>jason.aarons</dc:creator>
      <dc:date>2005-01-17T22:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393373#M552642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The laptop has a default gateway set to the inside interface of the Pix (192.168.1.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Pix outside interface has the following static route:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface name: Outside&lt;/P&gt;&lt;P&gt;IP Address: 0.0.0.0&lt;/P&gt;&lt;P&gt;Gateway IP: 192.168.0.111 (The internal interface of our live firewall)&lt;/P&gt;&lt;P&gt;Mask: 0.0.0.0&lt;/P&gt;&lt;P&gt;Metric: 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I THINK that the same as what you're asking.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jan 2005 23:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393373#M552642</guid>
      <dc:creator>_-TonyS-_</dc:creator>
      <dc:date>2005-01-17T23:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393374#M552643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is your Live firewall has route configured for 192.168.1.0 network? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;## Assuming you have got outside network of Test firewall 192.168.0.0/24 and inside network 192.168.1.0/24. ##&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;( You already mentioned that on your laptop you have got default route pointing to inside interface and Pix got default router 192.168.0.111 (The internal interface of our live firewall) but if your Live firewall is not aware of 192.168.1.0 network then it will drop the packets. )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 00:10:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393374#M552643</guid>
      <dc:creator>rthakker</dc:creator>
      <dc:date>2005-01-18T00:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393375#M552644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First things to know is: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without an access-list on the interface a higher level interface. eg inside, can access all other lower interfaces as outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second thing to know is: &lt;/P&gt;&lt;P&gt;ICMP is not a stateful protocol. To allow pings from the inside to the outside interface you need to create an access-list. &lt;/P&gt;&lt;P&gt;If you want to ping the same interface that you are physicly connected you need to configure the "icmp" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;See: Handling ICMP Pings with the PIX Firewall&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX and the traceroute Command&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800e9312.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800e9312.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;examples:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traveroute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Microsoft:&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host YourPublicIP unreachable&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host YourPublicIP time-exceeded&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host YourPublicIP echo-reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;UNIX:&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host YourPublicIP unreachable&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host YourPublicIP time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP command example&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.30 echo inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.31 echo inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.20 echo inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.40 echo inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.100 echo inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 00:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393375#M552644</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-01-18T00:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393376#M552645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;also apply this access list &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;icmp permit any echo outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any echo inside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 00:28:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393376#M552645</guid>
      <dc:creator>rthakker</dc:creator>
      <dc:date>2005-01-18T00:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393377#M552647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do I need to do anything to apply these access lists besides type the command at the pix(config)# prompt?&lt;/P&gt;&lt;P&gt;Because they don't seem to have any effect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 15:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393377#M552647</guid>
      <dc:creator>_-TonyS-_</dc:creator>
      <dc:date>2005-01-18T15:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393378#M552649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, just typing the commands at the console has no effect but I'm assuming there is some way to 'apply' access lists that I'm overlooking?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 15:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393378#M552649</guid>
      <dc:creator>_-TonyS-_</dc:creator>
      <dc:date>2005-01-18T15:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393379#M552651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have to be in config mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any host YourPublicIP unreachable&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any host YourPublicIP time-exceeded&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any host YourPublicIP echo-reply &lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply inside&lt;/P&gt;&lt;P&gt;icmp permit host YourPCsIP echo inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;write mem&lt;/P&gt;&lt;P&gt;show access-list outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: when you start pinging the hitcount behind the access-list is growing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;##################################################&lt;/P&gt;&lt;P&gt;Please Post your config, just remove your Public IP.&lt;/P&gt;&lt;P&gt;###################################################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 15:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393379#M552651</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-01-18T15:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393380#M552652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;to apply an access-list to an interface you have to&lt;/P&gt;&lt;P&gt;use command access-group (ACL name) in interface (interface name)&lt;/P&gt;&lt;P&gt;An example : You have access-list 101&lt;/P&gt;&lt;P&gt;             To apply it on the outside interface&lt;/P&gt;&lt;P&gt;             you must type :&lt;/P&gt;&lt;P&gt;             access-group 101 in int outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you have configured in the ACL 101 is up to you.Essentialy,for IP connection without ICMP you need not any ACL with PIX configured properly.You could try telnet connection from your laptop to the&lt;/P&gt;&lt;P&gt;live firewall,when it allows telnet and knows the route to the inside network 192.168.1.0/24.&lt;/P&gt;&lt;P&gt;If you want to ping the live firewall,then use ACL&lt;/P&gt;&lt;P&gt;allowing echo reply packets from live firewall.In that case I would use access-list allowing all return traffic (ICMP included)&lt;/P&gt;&lt;P&gt;Example :access-list 101 perm ip any any&lt;/P&gt;&lt;P&gt;Then try A.To ping inside PIX interface from your laptop &lt;/P&gt;&lt;P&gt;        B.If successfull,try to ping the live firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do not forget to tune ACL after the testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                                   HTH&lt;/P&gt;&lt;P&gt;                                       Zdenek  &lt;/P&gt;&lt;P&gt;to the   &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 15:58:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393380#M552652</guid>
      <dc:creator>zroth</dc:creator>
      <dc:date>2005-01-18T15:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393381#M552653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pixfirewall(config)#show config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 06:41:15.021 UTC Tue Jan 18 2005&lt;/P&gt;&lt;P&gt;PIX Version 6.3(4)&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto shutdown&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 intf2 security4&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;passwd xxxx&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name xxxxxx.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;icmp permit any echo outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.2 echo outside&lt;/P&gt;&lt;P&gt;icmp permit any echo insideicmp permit any echo-reply inside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.2 echo inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu intf2 1500&lt;/P&gt;&lt;P&gt;ip address outside 192.168.0.107 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip address intf2&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.111 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet timeout 5ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.0.250 &lt;/P&gt;&lt;P&gt;dhcpd wins 192.168.0.250 &lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain xxxxxx.com&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxx&lt;/P&gt;&lt;P&gt;pixfirewall(config)# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 16:50:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393381#M552653</guid>
      <dc:creator>_-TonyS-_</dc:creator>
      <dc:date>2005-01-18T16:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393382#M552654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI:&lt;/P&gt;&lt;P&gt;I'm not sure if this changes anything but the laptop connected to the inside interface has NO access outside of the PIX firewall.&lt;/P&gt;&lt;P&gt;I can't ping, can't access http, ftp, smtp, snmp,smb,  nothing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can however ping the inside interface of the pix (192.168.1.1) and can bring up the https configuration website (also 192.168.1.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 17:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393382#M552654</guid>
      <dc:creator>_-TonyS-_</dc:creator>
      <dc:date>2005-01-18T17:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393383#M552655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;O.K.You can ping inside PIX interface (192.168.1.1) from your laptop.&lt;/P&gt;&lt;P&gt;The next step : try to ping the live firewall (PIX default gateway - 192.168.0.111,I suppose).&lt;/P&gt;&lt;P&gt;Start icmp debug on the PIX with the command debug icmp trace &lt;/P&gt;&lt;P&gt;You should see outgoing ICMP packets at least.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                                HTH&lt;/P&gt;&lt;P&gt;                                    Zdenek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2005 09:55:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393383#M552655</guid>
      <dc:creator>zroth</dc:creator>
      <dc:date>2005-01-19T09:55:54Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393384#M552657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the ICMP trace on the pix, i see nothing when trying to ping 192.168.0.111 from the laptop. I see information when I ping 192.168.0.111 from the PIX but I was always able to ping from the PIX.&lt;/P&gt;&lt;P&gt;Is there some sort of trace I can turn on to see where exactly the PIX is dropping the packets coming from the laptop?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2005 14:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393384#M552657</guid>
      <dc:creator>_-TonyS-_</dc:creator>
      <dc:date>2005-01-19T14:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393385#M552659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;you can watch traffic on any interface by applying&lt;/P&gt;&lt;P&gt;the folloving command&lt;/P&gt;&lt;P&gt; capture (name of capture) int (name of interface)&lt;/P&gt;&lt;P&gt;through the command show capt (name of capture) you&lt;/P&gt;&lt;P&gt;see the captured packets on that interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example : I want to watch traffic on inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In privileged mode (#) type capture tony interface inside&lt;/P&gt;&lt;P&gt;then show capture tony&lt;/P&gt;&lt;P&gt;In this case you should see incoming ICMP echo packets from the laptop.(I do not believe they are coming,I suppose you have not the route to the network 192.168.0.0 (or just default route over 192.168.1.1 - and only one !)in your laptop).Try route print command on the laptop to check it.&lt;/P&gt;&lt;P&gt;ICMP commands in your configuration are not ACL commands,they only control ICMP access to the PIX&lt;/P&gt;&lt;P&gt;interfaces,not ICMP through PIX.&lt;/P&gt;&lt;P&gt;Therefore I do not think you can succesfully ping&lt;/P&gt;&lt;P&gt; 192.168.0.111,but ICMP echo packets should leave&lt;/P&gt;&lt;P&gt; the PIX outside interface and the ICMP echo-reply&lt;/P&gt;&lt;P&gt; packets from 192.168.0.111 would be stopped at this&lt;/P&gt;&lt;P&gt; interface by ping return.This could be watched in&lt;/P&gt;&lt;P&gt; PIX log (show logg).You must start logging in configuration by&lt;/P&gt;&lt;P&gt;                   conf t&lt;/P&gt;&lt;P&gt;                   logg on&lt;/P&gt;&lt;P&gt;                   logg buff 7&lt;/P&gt;&lt;P&gt; You can also apply capture on outside interface !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; To achieve return of ping packets from 192.168.0.111 you have to apply an access-list on outside PIX interface .As written in previous post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                                   HTH&lt;/P&gt;&lt;P&gt;                                        Zdenek &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2005 16:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393385#M552659</guid>
      <dc:creator>zroth</dc:creator>
      <dc:date>2005-01-19T16:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393386#M552660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, thanks everyone (especially Zdenek) for the great info.&lt;/P&gt;&lt;P&gt;I was able to uncover that for whatever reason the PIX was not handing out route information to the laptop on the internal interface. The following command fixed the issue:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.111 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Everyone!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2005 16:36:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393386#M552660</guid>
      <dc:creator>_-TonyS-_</dc:creator>
      <dc:date>2005-01-19T16:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393387#M552661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tony,&lt;/P&gt;&lt;P&gt;I am glad to hear about the final success.&lt;/P&gt;&lt;P&gt;Just two remarks :&lt;/P&gt;&lt;P&gt;1.The above mentioned command route outside 0 0 192.168.0.111 has been already configured in your&lt;/P&gt;&lt;P&gt;PIX (at least what I see in your configuration) and&lt;/P&gt;&lt;P&gt;because 192.168.0.111 is in a connected network (PIX outside interface network),you actually do not need&lt;/P&gt;&lt;P&gt;this route for reaching 192.168.0.111.So I do not suppose this is the reason.&lt;/P&gt;&lt;P&gt;2.PIX is not handing out routing information in this&lt;/P&gt;&lt;P&gt;case (no RIP,no OSPF) and all is done statically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                   But anyway,good luck&lt;/P&gt;&lt;P&gt;                                Sincerely&lt;/P&gt;&lt;P&gt;                                            Zdenek &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2005 17:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393387#M552661</guid>
      <dc:creator>zroth</dc:creator>
      <dc:date>2005-01-19T17:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393388#M552662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Really?&lt;/P&gt;&lt;P&gt;That is odd then.&lt;/P&gt;&lt;P&gt;I typed the command in the (config#) console and it didn't tell me it was already there.&lt;/P&gt;&lt;P&gt;And suddenly afterward it was all working.&lt;/P&gt;&lt;P&gt;Perhaps a glitch?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2005 19:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393388#M552662</guid>
      <dc:creator>_-TonyS-_</dc:creator>
      <dc:date>2005-01-19T19:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393389#M552663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the configuration you have sent on the Jan 18 through command sh conf is the default route written.You can check it.Of course this configuration&lt;/P&gt;&lt;P&gt;is the backup one,so it is quite possible that running configuration has been different.&lt;/P&gt;&lt;P&gt;You can check PIX valid routes by command show routes,this is taken from running config.&lt;/P&gt;&lt;P&gt;But anyway,I still do believe you would be able&lt;/P&gt;&lt;P&gt;to reach 192.168.0.111 from your laptop without defining PIX default route under three conditions :&lt;/P&gt;&lt;P&gt;1.The laptop is in the network 192.168.1.0/24&lt;/P&gt;&lt;P&gt;2.The laptop has either default route over 192.168.1.1 or route to 192.168.0.0 over 192.168.1.1&lt;/P&gt;&lt;P&gt;3.The live firewall 192.168.0.111 has to know the route to the network 192.168.1.0 (over 192.168.0.107)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try it by config command no route 0 0 192.168.0.111 &lt;/P&gt;&lt;P&gt; check show route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just for fun&lt;/P&gt;&lt;P&gt;                            Sincerely&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                                         Zdenek&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jan 2005 13:24:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393389#M552663</guid>
      <dc:creator>zroth</dc:creator>
      <dc:date>2005-01-20T13:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: VERY basic Pix 515E question</title>
      <link>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393390#M552666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the same issue as Tony and haven't quite figured out it out yet.  Tony says that he has his live Firewall's address in the route (is that his gateway?).  In my situation what is the IP I should be using in that route ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Outside interface of the PIX ?&lt;/P&gt;&lt;P&gt;Or the gateway or inside interface on my router ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;Pat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2005 03:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-basic-pix-515e-question/m-p/393390#M552666</guid>
      <dc:creator>ptaylor</dc:creator>
      <dc:date>2005-01-28T03:45:36Z</dc:date>
    </item>
  </channel>
</rss>

