<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-configuration/m-p/236888#M593546</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the sample config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service InternetTCP tcp&lt;/P&gt;&lt;P&gt;  port-object eq http&lt;/P&gt;&lt;P&gt;  port-object eq https&lt;/P&gt;&lt;P&gt;  port-object eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_out permit tcp host 10.5.70.25 any object-group InternetTCP &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_out in interface inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure the inside can connect to outside before you apply for the access-group. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HATO&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Apr 2004 07:41:14 GMT</pubDate>
    <dc:creator>j.hato</dc:creator>
    <dc:date>2004-04-06T07:41:14Z</dc:date>
    <item>
      <title>PIX Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix-configuration/m-p/236887#M593544</link>
      <description>&lt;P&gt;I am configuring a PIX 515e.  Want to deny all outgoing traffic but the ports I allow.  I was trying to configure a service group to use inside of PDM for web traffic. I add http and https but the rule does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can deny all traffic but to try and allow it without using the all TCP traffic does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a list of what the services convert to and which are need to do simple transactions. (ie Browse the web and send and recieve email)&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:19:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-configuration/m-p/236887#M593544</guid>
      <dc:creator>admin_2</dc:creator>
      <dc:date>2020-02-21T07:19:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix-configuration/m-p/236888#M593546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the sample config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service InternetTCP tcp&lt;/P&gt;&lt;P&gt;  port-object eq http&lt;/P&gt;&lt;P&gt;  port-object eq https&lt;/P&gt;&lt;P&gt;  port-object eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_out permit tcp host 10.5.70.25 any object-group InternetTCP &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_out in interface inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure the inside can connect to outside before you apply for the access-group. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HATO&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2004 07:41:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-configuration/m-p/236888#M593546</guid>
      <dc:creator>j.hato</dc:creator>
      <dc:date>2004-04-06T07:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix-configuration/m-p/236889#M593547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the info but once I apply the access group to the interface I lose the ability to browse.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Apr 2004 22:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-configuration/m-p/236889#M593547</guid>
      <dc:creator />
      <dc:date>2004-04-07T22:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Configuration</title>
      <link>https://community.cisco.com/t5/network-security/pix-configuration/m-p/236890#M593548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to log everything,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX(config)# logging timestamp&lt;/P&gt;&lt;P&gt;PIX(config)# logging buffer debugging&lt;/P&gt;&lt;P&gt;PIX(config)# logging on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX(config)# show log &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please verify the log, make sure your tcp traffic won;t got blocked. When blocked try to add the tcp/udp ports to the service-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HATO&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2004 01:31:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-configuration/m-p/236890#M593548</guid>
      <dc:creator>j.hato</dc:creator>
      <dc:date>2004-04-08T01:31:45Z</dc:date>
    </item>
  </channel>
</rss>

