<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: mapping network drive via PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267304#M592676</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I will try to follow your advise and swap the topology setup. &lt;/P&gt;&lt;P&gt;However, if i were to leave the setup the way it is Linux--pix--host, then according to your initial response you suggest to apply the ACL to the INSIDE interface? Why, shouldn't it be applied to the outside int since by default everything is permited on the inside?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 May 2004 18:49:19 GMT</pubDate>
    <dc:creator>wesleykuk</dc:creator>
    <dc:date>2004-05-19T18:49:19Z</dc:date>
    <item>
      <title>mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267300#M592661</link>
      <description>&lt;P&gt;I have a linux box running as my gateway to my network, then the second layer of protection is served by PIX 501. i need to access my shared drive located on Linux(running samba) from my internal host (win2k) via pix. Do i use static mapping? or access-list permitting TCP ports 135 &amp;amp; 139 and UDP ports 137 &amp;amp; 138. any help is appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:24:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267300#M592661</guid>
      <dc:creator>wesleykuk</dc:creator>
      <dc:date>2020-02-21T07:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267301#M592666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this your topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user---pix---Linux  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  that is the pix is in between the user and the Linux host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is the case, and the user sits on the inside interface and the Linux is on the outside then if you have an acl applied to the inside interface you need to open up tcp ports 137 and 139 as well as udp port 138.  I am not sure of port 135.  However, I do recommend that the pix and linux be swapped in relationship.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 May 2004 17:12:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267301#M592666</guid>
      <dc:creator>ehirsel</dc:creator>
      <dc:date>2004-05-19T17:12:07Z</dc:date>
    </item>
    <item>
      <title>Re: mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267302#M592670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, the pix is between the user and the linux server. The reason for this from my understanding the pix does not support dynamic DNS on the outside interface. I would need a static ip to access my internal resources. With linux my DNS record is updated automatically upon the ip address change. Is there any other alternative to that on pix?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, back to the question. Why is it that I don't need an ACL on the internal interface to access Internet, but it's required for file sharing? I guess port 80 is enabled by default without the need for acl?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 May 2004 18:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267302#M592670</guid>
      <dc:creator>wesleykuk</dc:creator>
      <dc:date>2004-05-19T18:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267303#M592674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;User--&amp;gt;Linux(w/DynDNS updater)--&amp;gt;PIX--&amp;gt;Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX 501 does support DHCP client on the outside interface.  That means you can hook it directly up to a cable modem/DSL/wireless/etc. link and get an address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why don't you run the Dynamic DNS updater on your Linux box?  Most updaters check your public IP address via an external website anyway, so I doesn't matter where your NAT box is (i.e. DynDNS.org or DtDNS.com)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, then there is your question of the static map.  On the PIX (version 6.2+ I think) you can use a keyword called "interface" instead of using your outside IP address.  For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Old way (static IP):&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.1.1.1 80 192.168.1.10 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Changes into the new way (dynamic IP):&lt;/P&gt;&lt;P&gt;static (inside,outside) interface 80 192.168.1.10 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, the "interface" keyword is replaced with whatever IP address is assigned to your outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default, the PIX will *PERMIT* all connections from the inside to the outside.  No need to add an ACL on the inside interface.  You will however need a STATIC *and* an ACL on the outside interface allowing:&lt;/P&gt;&lt;P&gt;UDP/137&lt;/P&gt;&lt;P&gt;UDP/138&lt;/P&gt;&lt;P&gt;TCP/139&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For security reasons however, it is usually not a good idea to do CIFS/Samba across the internet.  Your PIX is capable of doing an IPSec VPN or a PPTP VPN.  I'd set that up so you can take advantage of encryption.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 May 2004 18:27:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267303#M592674</guid>
      <dc:creator>thiland</dc:creator>
      <dc:date>2004-05-19T18:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267304#M592676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I will try to follow your advise and swap the topology setup. &lt;/P&gt;&lt;P&gt;However, if i were to leave the setup the way it is Linux--pix--host, then according to your initial response you suggest to apply the ACL to the INSIDE interface? Why, shouldn't it be applied to the outside int since by default everything is permited on the inside?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 May 2004 18:49:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267304#M592676</guid>
      <dc:creator>wesleykuk</dc:creator>
      <dc:date>2004-05-19T18:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267305#M592677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That wasn't my initial post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct.  The ACL would be applied to the outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 May 2004 23:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267305#M592677</guid>
      <dc:creator>thiland</dc:creator>
      <dc:date>2004-05-19T23:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267306#M592678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've applied the acl to the outside interface even with permit ip any any and the host still could not see the network drive on the Linux server. I believe it's because the pix is performing PAT. All addresses on the inside are translated to the outside interface of the pix. Would that cause the mapping not to work? If that's the case, then i would disable PAT but I am affraid that the inside host would not connect to the Internet anymore?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 May 2004 11:43:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267306#M592678</guid>
      <dc:creator>wesleykuk</dc:creator>
      <dc:date>2004-05-20T11:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267307#M592679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your PIX config, minus passwords, etc.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you also supply the IP addressing scheme you are using for the Linux box?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tested to see if a host can connect to the outside interface of the Linux box directly (just to make sure the PIX is the problem)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 May 2004 12:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267307#M592679</guid>
      <dc:creator>thiland</dc:creator>
      <dc:date>2004-05-20T12:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267308#M592680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will post my PIX config tonight when i get home.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the meanwhile, here is my addressing scheme of the network:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INTERNET -- (dynamic IP)LINUX(192.168.0.1) -- (192.168.0.2)PIX(192.168.1.1) -- (192.168.1.2)WIN2K&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can connect to the Internet from the host no problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 May 2004 13:10:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267308#M592680</guid>
      <dc:creator>wesleykuk</dc:creator>
      <dc:date>2004-05-20T13:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267309#M592681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is a copy of my PIX config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxx encrypted&lt;/P&gt;&lt;P&gt;hostname pix501&lt;/P&gt;&lt;P&gt;domain-name somename.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list Let-Traffic-In permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;icmp permit any echo outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 192.168.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.1 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group Let-Traffic-In in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.1.1 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;[OK]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 May 2004 20:51:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267309#M592681</guid>
      <dc:creator>wesleykuk</dc:creator>
      <dc:date>2004-05-20T20:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: mapping network drive via PIX</title>
      <link>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267310#M592682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got this resolved. &lt;/P&gt;&lt;P&gt;As the matter of fact i was able to map the drive all along. This does not even require to create openings in the acl on the outside interface. I simply tried to map the network drive via ip address as opposed to the bios name. When i specify the Ip address of the linux host followed by the share it works beautifully well. The only outgoing connection recorded on the pix is tcp port 445. Now, to enable this connection share by name i think it needs host file properley configured. Anyhow, Thanks for all your help.&lt;/P&gt;&lt;P&gt;Wesley&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 May 2004 21:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-network-drive-via-pix/m-p/267310#M592682</guid>
      <dc:creator>wesleykuk</dc:creator>
      <dc:date>2004-05-24T21:34:43Z</dc:date>
    </item>
  </channel>
</rss>

