<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy Routing on Pix in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218873#M591486</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only thing that I would recommend to you is to enable and configure the proxy settings on the web browsers of your users. I know, that can be a very tedious task if you don't trust your users to do it themselves. One way to facilitate could be by creating a registry file (if you users are windows based) that users can import by doubleclicking on it (if they have the permissions to modify the registry). In the proxy configuration of the web browser, you're telling it to use your proxy server IP address and port number for all connections on port 80 and 443. After everybody is successfully going through the browser, block any direct access to port 80 and 443 to the internet from the inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Jul 2004 16:30:42 GMT</pubDate>
    <dc:creator>crojas</dc:creator>
    <dc:date>2004-07-07T16:30:42Z</dc:date>
    <item>
      <title>Policy Routing on Pix</title>
      <link>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218870#M591480</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  I'm aware that this question has been here a few times, but I didn't see an answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With a router it's easy to route by certain ports. I'd like to do this with a setup like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&amp;gt;IN&amp;gt;Pix Firewall&amp;gt;OUT&amp;gt;----&lt;/P&gt;&lt;P&gt;          DMZ&lt;/P&gt;&lt;P&gt;           |&lt;/P&gt;&lt;P&gt;         Proxy&lt;/P&gt;&lt;P&gt;           &amp;amp;&lt;/P&gt;&lt;P&gt;         Mail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Requests from the inside (Port 80 and 443) should go to the Proxy, which is in the DMZ because it's a proxy for mail too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other traffic should go straight to the outside, if allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't find an option for the pix setting the next hop by port. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe someone has an idea for that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:29:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218870#M591480</guid>
      <dc:creator>reeseb</dc:creator>
      <dc:date>2020-02-21T07:29:55Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Routing on Pix</title>
      <link>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218871#M591481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe what you are looking for is Port Redirection with Static, if so, then read the following document:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/707/28.html" target="_blank"&gt;http://www.cisco.com/warp/public/707/28.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can not do PBR (Policy Based Routing) on a PIX .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps and let me know how you get on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2004 09:37:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218871#M591481</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2004-07-07T09:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Routing on Pix</title>
      <link>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218872#M591483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jay and thanks for the reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  I guess the static is not the thing I'm looking for, all users on the inside doing internet access to port 80 for example, would normaly go via the default route on the pix, straight out of the external interface. I want this redirected to Proxy:8080 in the DMZ. I Guess static demands a 1 to 1 Mapping, which would be difficult, with 30 Networks behind the inside interface. So it seems really to be kind of bad idea to put a proxy in the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;best regards &lt;/P&gt;&lt;P&gt;björn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2004 11:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218872#M591483</guid>
      <dc:creator>reeseb</dc:creator>
      <dc:date>2004-07-07T11:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Routing on Pix</title>
      <link>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218873#M591486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only thing that I would recommend to you is to enable and configure the proxy settings on the web browsers of your users. I know, that can be a very tedious task if you don't trust your users to do it themselves. One way to facilitate could be by creating a registry file (if you users are windows based) that users can import by doubleclicking on it (if they have the permissions to modify the registry). In the proxy configuration of the web browser, you're telling it to use your proxy server IP address and port number for all connections on port 80 and 443. After everybody is successfully going through the browser, block any direct access to port 80 and 443 to the internet from the inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2004 16:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218873#M591486</guid>
      <dc:creator>crojas</dc:creator>
      <dc:date>2004-07-07T16:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Routing on Pix</title>
      <link>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218874#M591488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ditto. it really is the best method. if they are all windows based and on active directory you can make a group policy to apply the proxy settings automatically and the users will not be able to change them.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jul 2004 18:05:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218874#M591488</guid>
      <dc:creator>rwcrowe</dc:creator>
      <dc:date>2004-07-08T18:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Routing on Pix</title>
      <link>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218875#M591491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;O.K., I'll see if i can handle this with a policy. Thanks for your replys.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Jul 2004 07:29:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-routing-on-pix/m-p/218875#M591491</guid>
      <dc:creator>reeseb</dc:creator>
      <dc:date>2004-07-09T07:29:04Z</dc:date>
    </item>
  </channel>
</rss>

