<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: client---(inside)PIX(outside)---OracleServer in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286269#M594543</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jackko, &lt;/P&gt;&lt;P&gt;what is the command to implement what u just suggest me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please i'm very new in PIX commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 18 Feb 2004 07:19:10 GMT</pubDate>
    <dc:creator>inghau</dc:creator>
    <dc:date>2004-02-18T07:19:10Z</dc:date>
    <item>
      <title>client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286261#M594496</link>
      <description>&lt;P&gt;Hello everybody, &lt;/P&gt;&lt;P&gt;i need help here, i'm quite new in PIX configuration.&lt;/P&gt;&lt;P&gt;Can PIX allow connection from inside to outside to an OracleServer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My costumer just need to buy an firewall to protect oracle server.&lt;/P&gt;&lt;P&gt;i have already configured the PIX (without NAT) and i allow the sql*net fixup protocol. &lt;/P&gt;&lt;P&gt;But still the client cannot connect to the oraclesvr.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried to search for some guide and config example but no luck finding it. Can someone please tell me what did i miss ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286261#M594496</guid>
      <dc:creator>inghau</dc:creator>
      <dc:date>2020-02-21T07:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286262#M594504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please provide some syslog messages, do the following on the PIX (in config mode),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; logging on&lt;/P&gt;&lt;P&gt;&amp;gt; logging buffer debug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;TRY connecting="" from="" client="" to="" oracleserver=""&gt;&lt;/TRY&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now on the PIX issue - Sho logging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post the results and hopefully we can see what's going on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks - Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Feb 2004 17:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286262#M594504</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2004-02-17T17:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286263#M594512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;how does the pix connect to the server? lan? internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'm confused as you mentioned that you need a firewall to protect the server, yet you connected the server outside the pix.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Feb 2004 21:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286263#M594512</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2004-02-17T21:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286264#M594518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jacko, &lt;/P&gt;&lt;P&gt;the Firewall segments from the old LAN and the other LAN from other companies.&lt;/P&gt;&lt;P&gt;The reason i put it in outside is because &lt;/P&gt;&lt;P&gt;the traffic i want to allow is this oracle application only (for this time).&lt;/P&gt;&lt;P&gt;Or perhaps you recommend the otherwise ?&lt;/P&gt;&lt;P&gt;how about the rules ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Feb 2004 03:06:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286264#M594518</guid>
      <dc:creator>inghau</dc:creator>
      <dc:date>2004-02-18T03:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286265#M594522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jay, &lt;/P&gt;&lt;P&gt;i'm sorry i cannot give you the logging for now because my costumer's place is too far away from my office. &lt;/P&gt;&lt;P&gt;I'll try to guide the local admin to test it again and mail me the full config i hope it will be enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Sab&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Feb 2004 03:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286265#M594522</guid>
      <dc:creator>inghau</dc:creator>
      <dc:date>2004-02-18T03:13:07Z</dc:date>
    </item>
    <item>
      <title>Re: client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286266#M594529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so the pix is there to protect the old lan from another company, and the server is located on the another company lan, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;there are 2 scenarios:&lt;/P&gt;&lt;P&gt;1. old lan hosts initiate the traffic to oracle server, and&lt;/P&gt;&lt;P&gt;2. oracle server initiate the traffic to old lan hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if your case is 1, then you don't need to do anything yet the pix should pass the traffic; if your case is 2, then you have to configure nat/static and access lists to make it working&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Feb 2004 03:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286266#M594529</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2004-02-18T03:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286267#M594536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there, &lt;/P&gt;&lt;P&gt;no server is still in old network, &lt;/P&gt;&lt;P&gt;they're planning to add another network segment(from another company's) &lt;/P&gt;&lt;P&gt;BUT the traffic they want to allow from this other network to the old one is just the oracle app.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;heere's the config file if you want to check it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Sab&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxxxxencrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxencrypted&lt;/P&gt;&lt;P&gt;hostname PIX&lt;/P&gt;&lt;P&gt;domain-name tddi.co.id&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;no fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1-10000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp 10.83.56.0 255.255.255.0 eq netbios-ssn&lt;/P&gt;&lt;P&gt; 10.83.58.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp 10.83.56.0 255.255.255.0 range 1024 600&lt;/P&gt;&lt;P&gt;0 10.83.58.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit icmp 10.83.58.0 255.255.255.0 10.83.56.0 255&lt;/P&gt;&lt;P&gt;.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 10.83.58.0 255.255.255.0 eq netbios-ssn&lt;/P&gt;&lt;P&gt;10.83.56.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 10.83.58.0 255.255.255.0 10.83.56.0 255.&lt;/P&gt;&lt;P&gt;255.255.0 eq sqlnet&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 10.83.56.4 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 10.83.58.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 10.83.58.128 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.83.56.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 10.83.58.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.83.56.22 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.83.58.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.83.58.128 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;http 10.83.58.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 10.83.56.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.83.58.128 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet 10.83.58.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;PIX#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Feb 2004 06:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286267#M594536</guid>
      <dc:creator>inghau</dc:creator>
      <dc:date>2004-02-18T06:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286268#M594540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i would suggest using static command rather than nat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.83.58.0 10.83.58.0 netmask 255.255.255.0 0 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Feb 2004 06:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286268#M594540</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2004-02-18T06:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286269#M594543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jackko, &lt;/P&gt;&lt;P&gt;what is the command to implement what u just suggest me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please i'm very new in PIX commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Feb 2004 07:19:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286269#M594543</guid>
      <dc:creator>inghau</dc:creator>
      <dc:date>2004-02-18T07:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286270#M594547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jay, &lt;/P&gt;&lt;P&gt;here's the log i can find, &lt;/P&gt;&lt;P&gt;please suggest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX(config)# show log&lt;/P&gt;&lt;P&gt;Syslog logging: enabled&lt;/P&gt;&lt;P&gt;    Facility: 20&lt;/P&gt;&lt;P&gt;    Timestamp logging: disabled&lt;/P&gt;&lt;P&gt;    Standby logging: disabled&lt;/P&gt;&lt;P&gt;    Console logging: disabled&lt;/P&gt;&lt;P&gt;    Monitor logging: disabled&lt;/P&gt;&lt;P&gt;    Buffer logging: level debugging, 41 messages logged&lt;/P&gt;&lt;P&gt;    Trap logging: disabled&lt;/P&gt;&lt;P&gt;    History logging: disabled&lt;/P&gt;&lt;P&gt;    Device ID: disabled&lt;/P&gt;&lt;P&gt;111008: User 'enable_15' executed the 'logging buffer debug' command.&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 56 for outside:10.83.56.22/1521 (10.83.56.&lt;/P&gt;&lt;P&gt;22/1521) to inside:10.83.58.100/1042 (10.83.58.100/1042)&lt;/P&gt;&lt;P&gt;602101: PMTU-D packet 44 bytes greater than effective mtu 0, dest_addr=10.83.58.&lt;/P&gt;&lt;P&gt;100, src_addr=10.83.56.22, prot=tcp&lt;/P&gt;&lt;P&gt;602101: PMTU-D packet 40 bytes greater than effective mtu 0, dest_addr=10.83.58.&lt;/P&gt;&lt;P&gt;100, src_addr=10.83.56.22, prot=tcp&lt;/P&gt;&lt;P&gt;602101: PMTU-D packet 40 bytes greater than effective mtu 0, dest_addr=10.83.58.&lt;/P&gt;&lt;P&gt;100, src_addr=10.83.56.22, prot=tcp&lt;/P&gt;&lt;P&gt;602101: PMTU-D packet 44 bytes greater than effective mtu 0, dest_addr=10.83.58.&lt;/P&gt;&lt;P&gt;100, src_addr=10.83.56.22, prot=tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX(config)# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;hostname PIX&lt;/P&gt;&lt;P&gt;domain-name tddi.co.id&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;no fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1-10000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp 10.83.56.0 255.255.255.0 eq netbios-ssn&lt;/P&gt;&lt;P&gt; 10.83.58.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp 10.83.56.0 255.255.255.0 range 1024 600&lt;/P&gt;&lt;P&gt;0 10.83.58.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit icmp 10.83.58.0 255.255.255.0 10.83.56.0 255&lt;/P&gt;&lt;P&gt;.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 10.83.58.0 255.255.255.0 eq netbios-ssn&lt;/P&gt;&lt;P&gt;10.83.56.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 10.83.58.0 255.255.255.0 10.83.56.0 255.&lt;/P&gt;&lt;P&gt;255.255.0 eq sqlnet&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 10.83.56.4 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 10.83.58.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 10.83.58.128 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.83.56.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location 10.83.58.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 10.83.56.22 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.83.58.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.83.58.128 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;http 10.83.58.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 10.83.56.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.83.58.128 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet 10.83.58.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:195cea14e46e3de2bfe27656128087ff&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;PIX(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Feb 2004 08:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286270#M594547</guid>
      <dc:creator>inghau</dc:creator>
      <dc:date>2004-02-18T08:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: client---(inside)PIX(outside)---OracleServer</title>
      <link>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286271#M594549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this is what we use whenever we don't want a network to be natted. eg. inside to dmz. since both inside and dmz are private so there is no reason why we want to nat the network back and forth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with your case, i would suggest you to disable the nat0 statement and put in the static command. once you put in the command, the pix will then do the nat by using the same network. one thing has to be noticed is that hosts behind the pix can't browse internet anymore as the netword address is now private.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2004 20:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/client-inside-pix-outside-oracleserver/m-p/286271#M594549</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2004-02-19T20:56:04Z</dc:date>
    </item>
  </channel>
</rss>

