<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Secure PIX Firewall with Two Routers Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332971#M559728</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, here is the inside router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.3&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service tcp-keepalives-in&lt;/P&gt;&lt;P&gt;service tcp-keepalives-out&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;service sequence-numbers&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname rtr2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;security authentication failure rate 10 log&lt;/P&gt;&lt;P&gt;security passwords min-length 6&lt;/P&gt;&lt;P&gt;logging console critical&lt;/P&gt;&lt;P&gt;enable secret xxxx&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username admin password xxxx&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login local_auth local&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;no ip source-route&lt;/P&gt;&lt;P&gt;no ip gratuitous-arps&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip bootp server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; ip address 10.10.254.2 255.255.255.0&lt;/P&gt;&lt;P&gt; ip access-group 110 in&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; media-type rj45&lt;/P&gt;&lt;P&gt; no negotiation auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; ip address 10.1.4.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; media-type gbic&lt;/P&gt;&lt;P&gt; negotiation auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; media-type gbic&lt;/P&gt;&lt;P&gt; no negotiation auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt; redistribute connected&lt;/P&gt;&lt;P&gt; network 10.0.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.10.254.1&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging facility local2&lt;/P&gt;&lt;P&gt;logging 10.1.4.250&lt;/P&gt;&lt;P&gt;access-list compiled&lt;/P&gt;&lt;P&gt;access-list 10 permit 10.1.4.250&lt;/P&gt;&lt;P&gt;access-list 110 permit udp host 10.10.250.0 0.0.0.255 10.1.4.250 eq 514&lt;/P&gt;&lt;P&gt;access-list 110 deny ip host 10.10.254.1 any log&lt;/P&gt;&lt;P&gt;access-list 110 deny ip 10.10.250.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 10.10.254.0 0.0.0.255 10.10.250.0 0.255.255.255&lt;/P&gt;&lt;P&gt;dialer-list 1 protocol ip permit&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;gatekeeper&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 5 0&lt;/P&gt;&lt;P&gt; login authentication local_auth&lt;/P&gt;&lt;P&gt; transport preferred all&lt;/P&gt;&lt;P&gt; transport output telnet&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; login authentication local_auth&lt;/P&gt;&lt;P&gt; transport preferred all&lt;/P&gt;&lt;P&gt; transport output telnet&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 10 in&lt;/P&gt;&lt;P&gt; password xxxx&lt;/P&gt;&lt;P&gt; login authentication local_auth&lt;/P&gt;&lt;P&gt; transport preferred all&lt;/P&gt;&lt;P&gt; transport input telnet&lt;/P&gt;&lt;P&gt; transport output all&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Dec 2004 19:03:29 GMT</pubDate>
    <dc:creator>dink</dc:creator>
    <dc:date>2004-12-30T19:03:29Z</dc:date>
    <item>
      <title>Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332967#M559724</link>
      <description>&lt;P&gt;I'm trying to impliment this exact senario that Cisco lays out in this article.  &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094763.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094763.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Document ID: 15244&lt;/P&gt;&lt;P&gt;The problem is, I can't get it to work.  I have a PIX535, and 2 7206 routers.  I've put in the commands exactly as seen here, with the exception of a few commands that arn't correct.  i.e. they left out a few things in some of the access list commands. One command i'm not sure what to replace. Like this one:   access-list 110 permit udp host 10.10.250.5 0.0.0.255  this command appears to be quite messed up or from an older version of IOS.  Anyway, what it comes down to is the PIX config works fine, but once I add in the access-lists to the routers, all communication through, inside and out, stops.  According to the logs, all internal traffic going outside is denided by the internal router's access list.  I like the concept here and I would like to get it to work right.  I'm not an access-list wiz so i'm unsure where to go from here.  &lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Chris Allen&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:50:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332967#M559724</guid>
      <dc:creator>dink</dc:creator>
      <dc:date>2020-02-21T07:50:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332968#M559725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it seems like the access-list is incorrect. we need to see the access-list that you have configured and the ip addresses. infact the complete configs (hide external IP addresses)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Nadeem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2004 00:38:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332968#M559725</guid>
      <dc:creator>nkhawaja</dc:creator>
      <dc:date>2004-12-30T00:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332969#M559726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, here are my configs.&lt;/P&gt;&lt;P&gt;It goes, outside router, PIX, inside router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.3&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service tcp-keepalives-in&lt;/P&gt;&lt;P&gt;service tcp-keepalives-out&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;service sequence-numbers&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname rtr1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;security authentication failure rate 10 log&lt;/P&gt;&lt;P&gt;security passwords min-length 6&lt;/P&gt;&lt;P&gt;logging console critical&lt;/P&gt;&lt;P&gt;enable secret xxxx&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username admin password xxxx&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login local_auth local&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;no ip source-route&lt;/P&gt;&lt;P&gt;no ip gratuitous-arps&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip bootp server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; ip address 131.1.x.x.x.255.224&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; media-type rj45&lt;/P&gt;&lt;P&gt; no negotiation auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; media-type rj45&lt;/P&gt;&lt;P&gt; no negotiation auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; media-type rj45&lt;/P&gt;&lt;P&gt; no negotiation auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface POS5/0&lt;/P&gt;&lt;P&gt; ip address XX.XX.XX.XX XX.XX.XX.XX (Outside IP Hidden)&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip access-group 110 in&lt;/P&gt;&lt;P&gt; encapsulation ppp&lt;/P&gt;&lt;P&gt; crc 32&lt;/P&gt;&lt;P&gt; pos scramble-atm&lt;/P&gt;&lt;P&gt; pos flag c2 22&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt; redistribute connected&lt;/P&gt;&lt;P&gt; network 4.0.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 XX.XX.XX.XX (IP HIDDEN)&lt;/P&gt;&lt;P&gt;ip route 10.1.4.0 255.255.255.0 131.1.23.2&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging 131.1.23.11&lt;/P&gt;&lt;P&gt;access-list compiled&lt;/P&gt;&lt;P&gt;access-list 10 permit 131.1.23.11&lt;/P&gt;&lt;P&gt;access-list 110 deny ip 131.1.23.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;access-list 110 deny ip any host 131.1.23.2 log&lt;/P&gt;&lt;P&gt;access-list 110 permit tcp any 131.1.23.0 0.0.0.255 established&lt;/P&gt;&lt;P&gt;access-list 110 deny ip any host 131.1.23.3 log&lt;/P&gt;&lt;P&gt;access-list 110 permit ip any 131.x.x.x.0.0.255&lt;/P&gt;&lt;P&gt;dialer-list 1 protocol ip permit&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;gatekeeper&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 5 0&lt;/P&gt;&lt;P&gt; login authentication local_auth&lt;/P&gt;&lt;P&gt; transport preferred all&lt;/P&gt;&lt;P&gt; transport output telnet&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; login authentication local_auth&lt;/P&gt;&lt;P&gt; transport preferred all&lt;/P&gt;&lt;P&gt; transport output telnet&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 10 in&lt;/P&gt;&lt;P&gt; password xxx&lt;/P&gt;&lt;P&gt; login authentication local_auth&lt;/P&gt;&lt;P&gt; transport preferred all&lt;/P&gt;&lt;P&gt; transport input telnet&lt;/P&gt;&lt;P&gt; transport output all&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Continued on the next message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2004 18:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332969#M559726</guid>
      <dc:creator>dink</dc:creator>
      <dc:date>2004-12-30T18:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332970#M559727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;passwd xxxx&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name ciscopix.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 101 permit udp host 131.1.23.1 host 131.1.23.11 eq syslog &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging history debugging&lt;/P&gt;&lt;P&gt;logging host inside 10.1.4.250&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 131.1.x.x.x.255.224&lt;/P&gt;&lt;P&gt;ip address inside 10.10.254.1 255.0.0.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 10.1.4.250 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.1.4.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm logging debugging 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 131.x.x.1.4.250 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 x.x.x.x.1.23.1 1&lt;/P&gt;&lt;P&gt;route inside 10.1.4.0 255.255.255.0 10.10.254.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.1.4.250 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 10.1.4.250 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;username admin password xxxxx&lt;/P&gt;&lt;P&gt;privilege 15&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;[OK]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Continued on next message&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2004 19:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332970#M559727</guid>
      <dc:creator>dink</dc:creator>
      <dc:date>2004-12-30T19:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332971#M559728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, here is the inside router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.3&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service tcp-keepalives-in&lt;/P&gt;&lt;P&gt;service tcp-keepalives-out&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;service sequence-numbers&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname rtr2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;security authentication failure rate 10 log&lt;/P&gt;&lt;P&gt;security passwords min-length 6&lt;/P&gt;&lt;P&gt;logging console critical&lt;/P&gt;&lt;P&gt;enable secret xxxx&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username admin password xxxx&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login local_auth local&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;no ip source-route&lt;/P&gt;&lt;P&gt;no ip gratuitous-arps&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip bootp server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; ip address 10.10.254.2 255.255.255.0&lt;/P&gt;&lt;P&gt; ip access-group 110 in&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; media-type rj45&lt;/P&gt;&lt;P&gt; no negotiation auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; ip address 10.1.4.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; media-type gbic&lt;/P&gt;&lt;P&gt; negotiation auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; media-type gbic&lt;/P&gt;&lt;P&gt; no negotiation auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt; redistribute connected&lt;/P&gt;&lt;P&gt; network 10.0.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.10.254.1&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging facility local2&lt;/P&gt;&lt;P&gt;logging 10.1.4.250&lt;/P&gt;&lt;P&gt;access-list compiled&lt;/P&gt;&lt;P&gt;access-list 10 permit 10.1.4.250&lt;/P&gt;&lt;P&gt;access-list 110 permit udp host 10.10.250.0 0.0.0.255 10.1.4.250 eq 514&lt;/P&gt;&lt;P&gt;access-list 110 deny ip host 10.10.254.1 any log&lt;/P&gt;&lt;P&gt;access-list 110 deny ip 10.10.250.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 10.10.254.0 0.0.0.255 10.10.250.0 0.255.255.255&lt;/P&gt;&lt;P&gt;dialer-list 1 protocol ip permit&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;gatekeeper&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 5 0&lt;/P&gt;&lt;P&gt; login authentication local_auth&lt;/P&gt;&lt;P&gt; transport preferred all&lt;/P&gt;&lt;P&gt; transport output telnet&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; login authentication local_auth&lt;/P&gt;&lt;P&gt; transport preferred all&lt;/P&gt;&lt;P&gt; transport output telnet&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 10 in&lt;/P&gt;&lt;P&gt; password xxxx&lt;/P&gt;&lt;P&gt; login authentication local_auth&lt;/P&gt;&lt;P&gt; transport preferred all&lt;/P&gt;&lt;P&gt; transport input telnet&lt;/P&gt;&lt;P&gt; transport output all&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2004 19:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332971#M559728</guid>
      <dc:creator>dink</dc:creator>
      <dc:date>2004-12-30T19:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332972#M559729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;we focus on PIX config, i dont see any access-list applied. What access-list you are applying ? and what is getting blocked. Please provide breif problem description.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Nadeem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2004 19:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332972#M559729</guid>
      <dc:creator>nkhawaja</dc:creator>
      <dc:date>2004-12-30T19:17:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332973#M559730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Weel, like I said in my first message, The senario is one of the sample pix configs with 2 routers setup to protect it.  The pix config alone works fine, but once I apply the access lists to the 2 routers, It doesn't work like the documents says it should.  No traffic is allowed in or out.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2004 19:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332973#M559730</guid>
      <dc:creator>dink</dc:creator>
      <dc:date>2004-12-30T19:32:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332974#M559731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think main thing here is a difference in "GLOBAL" statement on the PIX. Example has:&lt;/P&gt;&lt;P&gt;global (outside) 1 131.1.23.12-131.1.23.254&lt;/P&gt;&lt;P&gt;But your config:&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hence second line of ACL 110 on outside router blocks return traffic:&lt;/P&gt;&lt;P&gt;access-list 110 deny ip 131.1.23.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;access-list 110 deny ip any host 131.1.23.2 log&lt;/P&gt;&lt;P&gt;access-list 110 permit tcp any 131.1.23.0 0.0.0.255 established &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have 2 options:&lt;/P&gt;&lt;P&gt;1. Change Global on the firewall&lt;/P&gt;&lt;P&gt;2. Change order of lines in ACL 110, switch line 2 with line 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Alexander.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2004 20:11:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332974#M559731</guid>
      <dc:creator>alutsik</dc:creator>
      <dc:date>2004-12-30T20:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332975#M559732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i think the problem is with this line in the  access-list applied to inside router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 10.10.254.0 0.0.0.255 10.10.250.0 0.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this should be changed to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 permit ip any 10.1.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just change the access-list 110 on outside router too as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acess-list 110 permit ip any host 131.1.23.2&lt;/P&gt;&lt;P&gt;access-list 110 permit ip any host 131.1.23.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Nadeem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2004 21:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332975#M559732</guid>
      <dc:creator>nkhawaja</dc:creator>
      <dc:date>2004-12-30T21:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332976#M559733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I think i have it all working now.  I used a combination of the 2 and traffic is flowing now.  Just to make sure i'm blockign what I need to be, like spoof attacks and such, do my access-lists look ok now?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OUTSIDE ROUTER&lt;/P&gt;&lt;P&gt;access-list 110 deny   ip 131.1.23.0 0.0.0.225 any log&lt;/P&gt;&lt;P&gt;access-list 110 permit tcp any 131.1.23.0 0.0.0.255 established&lt;/P&gt;&lt;P&gt;access-list 110 deny   ip any host 131.1.23.1&lt;/P&gt;&lt;P&gt;access-list 110 permit ip any 131.1.23.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INSIDE ROUTER&lt;/P&gt;&lt;P&gt;access-list 110 permit udp host 10.10.250.0 0.0.0.5 10.1.4.250 eq syslog&lt;/P&gt;&lt;P&gt;access-list 110 deny   ip host 10.10.254.1 any log&lt;/P&gt;&lt;P&gt;access-list 110 deny   ip 10.10.250.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 110 permit ip any 10.1.4.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, would it be any more beneficial to run the AUTO SECURE command on these routers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2004 23:30:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332976#M559733</guid>
      <dc:creator>dink</dc:creator>
      <dc:date>2004-12-30T23:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Secure PIX Firewall with Two Routers Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332977#M559734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;oops, Sorry, I had some type-os in there.  here are the access lists again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OUTSIDE ROUTER &lt;/P&gt;&lt;P&gt;access-list 110 deny ip 131.1.23.0 0.0.0.225 any log &lt;/P&gt;&lt;P&gt;access-list 110 permit tcp any 131.1.23.0 0.0.0.255 established &lt;/P&gt;&lt;P&gt;access-list 110 deny ip any host 131.1.23.1 &lt;/P&gt;&lt;P&gt;access-list 110 permit ip any 131.1.23.0 0.0.0.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX&lt;/P&gt;&lt;P&gt;access-list 101 permit udp host 131.1.23.1 host 131.1.23.11 eq syslog &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INSIDE ROUTER&lt;/P&gt;&lt;P&gt;access-list 110 permit udp host 10.10.254.0 0.0.0.255 10.1.4.250 eq syslog&lt;/P&gt;&lt;P&gt;access-list 110 deny   ip host 10.10.254.1 any log&lt;/P&gt;&lt;P&gt;access-list 110 deny   ip 10.1.4.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 110 permit ip any 10.1.4.0 0.0.0.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2004 01:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-secure-pix-firewall-with-two-routers-configuration/m-p/332977#M559734</guid>
      <dc:creator>dink</dc:creator>
      <dc:date>2004-12-31T01:08:25Z</dc:date>
    </item>
  </channel>
</rss>

