<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: pix 515 inbound port access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295343#M595291</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need to turn on logging for the ACL hit counters to work. They work by default and can be seen by using the [show access-list] command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With no hits on your ACL, it means the traffic from the server isn't getting to you at all, the traffic is from a different IP than expected, or the traffic is not on the ports you expect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the logging, you'll see exactly what ports the traffic is coming in on, from what address, and whether or not it is denied.  That is accomplished with [logging buffered 7] and [logging on].  To see the messages while you're troubleshooting, issue [show log] repeatedly and look for the external or internal address in question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Jan 2004 03:30:58 GMT</pubDate>
    <dc:creator>shannong</dc:creator>
    <dc:date>2004-01-20T03:30:58Z</dc:date>
    <item>
      <title>pix 515 inbound port access</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295339#M595284</link>
      <description>&lt;P&gt;I have a user application that works a little different than most client/server implementations that i have run across.  Once the user logins in, the server (that lives on the external interface of the pix) looks up the user in its database and finds out their ip address and then the server starts to communicate with the client at the found ip.  I have tried adding access lists for the 2 ports that the server needs, but it has not allowed the server to talk to the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your assistance,&lt;/P&gt;&lt;P&gt;Todd&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295339#M595284</guid>
      <dc:creator>toddjohnson</dc:creator>
      <dc:date>2020-02-21T07:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: pix 515 inbound port access</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295340#M595286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What does the firewall say?  Do the ACEs you configured show the hits?  (count=x)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using logging to troubleshoot.  Log everything to the buffer using [logging buffered 7].  Then issue [show log] repeatedly while the server is suppose to be connecting.  Look for any entry with that server's IP address.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're syslogging your firewall to a server, you can use this instead of [show log] if logging is high enough. [logging trap 7].&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-S&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jan 2004 20:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295340#M595286</guid>
      <dc:creator>shannong</dc:creator>
      <dc:date>2004-01-19T20:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: pix 515 inbound port access</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295341#M595287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for reposnding. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, I haven't seen the hits, is that something that needs to be enabled?  I will give the logging a try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Todd&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jan 2004 01:35:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295341#M595287</guid>
      <dc:creator>toddjohnson</dc:creator>
      <dc:date>2004-01-20T01:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: pix 515 inbound port access</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295342#M595289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you use [show access-list] it will show all ACLs and also show the total number of times traffic has matched each ACE.  This will tell you if the server's traffic is making to the firewall and matching the ACE.  This is usually the first time in my troubleshooting process for issues through the Pix.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jan 2004 02:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295342#M595289</guid>
      <dc:creator>shannong</dc:creator>
      <dc:date>2004-01-20T02:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: pix 515 inbound port access</title>
      <link>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295343#M595291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need to turn on logging for the ACL hit counters to work. They work by default and can be seen by using the [show access-list] command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With no hits on your ACL, it means the traffic from the server isn't getting to you at all, the traffic is from a different IP than expected, or the traffic is not on the ports you expect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the logging, you'll see exactly what ports the traffic is coming in on, from what address, and whether or not it is denied.  That is accomplished with [logging buffered 7] and [logging on].  To see the messages while you're troubleshooting, issue [show log] repeatedly and look for the external or internal address in question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Jan 2004 03:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515-inbound-port-access/m-p/295343#M595291</guid>
      <dc:creator>shannong</dc:creator>
      <dc:date>2004-01-20T03:30:58Z</dc:date>
    </item>
  </channel>
</rss>

