<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic pix unable to reroute packets through the outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-unable-to-reroute-packets-through-the-outside/m-p/302958#M592308</link>
    <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;We configured our 515 PIX to accept VPN Clients (3.6.6 and above) connections, and we do not have any problem to get to the 'inside' and to browse the LAN. Our problem is to get out through the outside with an IP address of the VPN local pool.&lt;/P&gt;&lt;P&gt;Since we have many important network devices just configured to be accessible only by a specific network, and didn't want to modify the access-list on every one, we decided to create a VPN ip local POOl on the PIX, splitting the pure class C private network configured on the inside of it in two x.x.x.x/25, where the 2nd half is for our VPN Clients. As we 'land' on the PIX and receive an IP address from the local pool, we can go everywhere on every immediatly connected network, but are unable to get out through the outside to reach our network devices with private addressing.&lt;/P&gt;&lt;P&gt;This are the logs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;106011: Deny inbound (No xlate) icmp src outside:10.174.190.130 dst&lt;/P&gt;&lt;P&gt;outside:10.174.173.2 (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;106011: Deny inbound (No xlate) tcp src outside:10.174.190.130/1057 dst&lt;/P&gt;&lt;P&gt;outside:10.174.173.2/23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We sent this output to the Cisco Output interpreter and as we knew, it stated that the pix is unable to reroute on the same interface a packet wich has same source and destination interface, thinking of it as a security breach. We also noticed that a solution could be a Proxy for various applications or the 'split tunneling' implementation.&lt;/P&gt;&lt;P&gt;Does anybody know what else could we do?&lt;/P&gt;&lt;P&gt;Thank a lot in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dario Ferroni&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 07:25:43 GMT</pubDate>
    <dc:creator>d.ferroni</dc:creator>
    <dc:date>2020-02-21T07:25:43Z</dc:date>
    <item>
      <title>pix unable to reroute packets through the outside</title>
      <link>https://community.cisco.com/t5/network-security/pix-unable-to-reroute-packets-through-the-outside/m-p/302958#M592308</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;We configured our 515 PIX to accept VPN Clients (3.6.6 and above) connections, and we do not have any problem to get to the 'inside' and to browse the LAN. Our problem is to get out through the outside with an IP address of the VPN local pool.&lt;/P&gt;&lt;P&gt;Since we have many important network devices just configured to be accessible only by a specific network, and didn't want to modify the access-list on every one, we decided to create a VPN ip local POOl on the PIX, splitting the pure class C private network configured on the inside of it in two x.x.x.x/25, where the 2nd half is for our VPN Clients. As we 'land' on the PIX and receive an IP address from the local pool, we can go everywhere on every immediatly connected network, but are unable to get out through the outside to reach our network devices with private addressing.&lt;/P&gt;&lt;P&gt;This are the logs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;106011: Deny inbound (No xlate) icmp src outside:10.174.190.130 dst&lt;/P&gt;&lt;P&gt;outside:10.174.173.2 (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;106011: Deny inbound (No xlate) tcp src outside:10.174.190.130/1057 dst&lt;/P&gt;&lt;P&gt;outside:10.174.173.2/23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We sent this output to the Cisco Output interpreter and as we knew, it stated that the pix is unable to reroute on the same interface a packet wich has same source and destination interface, thinking of it as a security breach. We also noticed that a solution could be a Proxy for various applications or the 'split tunneling' implementation.&lt;/P&gt;&lt;P&gt;Does anybody know what else could we do?&lt;/P&gt;&lt;P&gt;Thank a lot in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dario Ferroni&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-unable-to-reroute-packets-through-the-outside/m-p/302958#M592308</guid>
      <dc:creator>d.ferroni</dc:creator>
      <dc:date>2020-02-21T07:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: pix unable to reroute packets through the outside</title>
      <link>https://community.cisco.com/t5/network-security/pix-unable-to-reroute-packets-through-the-outside/m-p/302959#M592312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;what about involving a third interface (VLAN) to route through it to the restricted targets?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Milan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2004 09:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-unable-to-reroute-packets-through-the-outside/m-p/302959#M592312</guid>
      <dc:creator>milan.kulik</dc:creator>
      <dc:date>2004-06-01T09:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: pix unable to reroute packets through the outside</title>
      <link>https://community.cisco.com/t5/network-security/pix-unable-to-reroute-packets-through-the-outside/m-p/302960#M592316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like the error messages your are receiving may be due to the ACL that defines "interesting traffic" for the VPN users.  There's a good chance that the NAT 0 statement does not include the subnet of your important network devices.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you consider posting part of your configuration relating to VPN so we can look through it to assist you further?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;peter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2004 14:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-unable-to-reroute-packets-through-the-outside/m-p/302960#M592316</guid>
      <dc:creator>pcomeaux</dc:creator>
      <dc:date>2004-06-01T14:30:42Z</dc:date>
    </item>
  </channel>
</rss>

