<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix 6.3 firewall issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595340#M595678</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, that actually helped me a lot, it turns out that the iphone i was trying to connect was using&lt;/P&gt;&lt;P&gt; the internal wireless lan.........(same subnet as the pix internal)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the pix was behaving as expected (and so was the draytek), problem solved&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 31 Dec 2010 15:03:51 GMT</pubDate>
    <dc:creator>rogervanstone</dc:creator>
    <dc:date>2010-12-31T15:03:51Z</dc:date>
    <item>
      <title>Pix 6.3 firewall issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595336#M595672</link>
      <description>&lt;P&gt;I support an ageing pix 6.3 firewall. The ruleset on this firewall has been established forsome years now. One part of the ruleset allows inbound traffic for port 443 to an internal address. All fairly standard stuff. This rule works and can be verified. My problem is that trying to connect an iPhone to the internal host at this address, other 443 traffic (ie https) works. Replacing the pix with a draytek firewall allows the iphone to connect, so no issue with the internal host setup. Has anybody come across this issue before ?. I'm happy to post the config if required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:28:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595336#M595672</guid>
      <dc:creator>rogervanstone</dc:creator>
      <dc:date>2019-03-11T19:28:59Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 6.3 firewall issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595337#M595673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you say other 443 traffic (ie https) works, you mean PCs and laptops are able to connect to this same inside host from outside just not the iPone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2010 22:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595337#M595673</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-30T22:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 6.3 firewall issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595338#M595675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, other 443 traffic routes through ok (its a server). my only guess is that either the cisco is filtering the 443 traffic somehow (fixup http ?) or that there is secondary traffic outbound that the pix is blocking. Just though somebody might know. The only rule on the replacment draytek is an inbound 443 rule to this server. The draytek by default allows all traffic outbound except netbios stuff.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 09:43:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595338#M595675</guid>
      <dc:creator>rogervanstone</dc:creator>
      <dc:date>2010-12-31T09:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 6.3 firewall issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595339#M595677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We need to see the logs when the iPhone fails to load the page.&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;sh logg | i x.x.x.x ---&amp;gt; where x.x.x.x is the ip address of the iPhone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Captures on the pix would help as well. You can refer this link:&lt;/SPAN&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 13:46:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595339#M595677</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-31T13:46:09Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 6.3 firewall issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595340#M595678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, that actually helped me a lot, it turns out that the iphone i was trying to connect was using&lt;/P&gt;&lt;P&gt; the internal wireless lan.........(same subnet as the pix internal)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the pix was behaving as expected (and so was the draytek), problem solved&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 15:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-firewall-issue/m-p/1595340#M595678</guid>
      <dc:creator>rogervanstone</dc:creator>
      <dc:date>2010-12-31T15:03:51Z</dc:date>
    </item>
  </channel>
</rss>

