<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX 525 Help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170324#M600546</link>
    <description>&lt;P&gt;I'm trying to get access for a server (Webserv3) in a DMZ from the internet. This is the first server I'm trying to get to from the outside. Also I'm trying to limit some of the PC's on inside networks from the internet. I think the problem is with the ACL but I'm not sure. Please respond here I'm not near my mail much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;interface ethernet3 auto&lt;/P&gt;&lt;P&gt;interface ethernet4 100full&lt;/P&gt;&lt;P&gt;interface ethernet5 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ1 security30&lt;/P&gt;&lt;P&gt;nameif ethernet3 DMZ2 security40&lt;/P&gt;&lt;P&gt;nameif ethernet4 Failover security25&lt;/P&gt;&lt;P&gt;nameif ethernet5 State security20&lt;/P&gt;&lt;P&gt;enable password  encrypted&lt;/P&gt;&lt;P&gt;passwd encrypted&lt;/P&gt;&lt;P&gt;hostname Pix1(Primary)&lt;/P&gt;&lt;P&gt;domain-name dandh.com&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 1.0.0.253 Exchange&lt;/P&gt;&lt;P&gt;name 192.168.1.203 Webapp2&lt;/P&gt;&lt;P&gt;name 192.168.1.202 Webapp1&lt;/P&gt;&lt;P&gt;name 192.168.1.102 Webserv1&lt;/P&gt;&lt;P&gt;name 192.168.1.103 Webserv2&lt;/P&gt;&lt;P&gt;name 192.168.1.222 Message&lt;/P&gt;&lt;P&gt;name 192.168.1.204 Webapp3&lt;/P&gt;&lt;P&gt;name 192.168.1.104 Webserv3&lt;/P&gt;&lt;P&gt;object-group network Webappservers&lt;/P&gt;&lt;P&gt;  description Web App Servers on DMZ2&lt;/P&gt;&lt;P&gt;  network-object Webapp1 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object Webapp2 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object Webapp3 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group service Mail tcp&lt;/P&gt;&lt;P&gt;  description Mail Protocols&lt;/P&gt;&lt;P&gt;  port-object eq pop3&lt;/P&gt;&lt;P&gt;  port-object eq smtp&lt;/P&gt;&lt;P&gt;object-group service FTPGroup tcp&lt;/P&gt;&lt;P&gt;  port-object eq ftp-data&lt;/P&gt;&lt;P&gt;  port-object eq ftp&lt;/P&gt;&lt;P&gt;object-group network Webservers&lt;/P&gt;&lt;P&gt;  description Web Servers on DMZ1&lt;/P&gt;&lt;P&gt;  network-object Webserv1 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object Webserv2 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object Webserv3 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group service RPCFlaw tcp-udp&lt;/P&gt;&lt;P&gt;  description Microsoft RPC flaw&lt;/P&gt;&lt;P&gt;  port-object eq 4444&lt;/P&gt;&lt;P&gt;  port-object eq 69&lt;/P&gt;&lt;P&gt;  port-object eq 445&lt;/P&gt;&lt;P&gt;  port-object range 135 139&lt;/P&gt;&lt;P&gt;object-group service Web_Access tcp-udp&lt;/P&gt;&lt;P&gt;  port-object eq 80&lt;/P&gt;&lt;P&gt;access-list outside_access_in deny tcp xxx.xxx.xxx.32 255.255.255.224 object-group&lt;/P&gt;&lt;P&gt; RPCFlaw 1.0.0.0 255.0.0.0 object-group RPCFlaw&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host Message eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host Message eq pop3&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host Webserv1 eq ftp&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host xx.xx.xx.55&lt;/P&gt;&lt;P&gt;access-list outside_access_in2DMZ1 permit tcp any host xx.xx.xx.55&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 1.0.0.0 255.0.0.0 1.150.150.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 1.0.0.0 255.0.0.0 1.150.151.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_30 permit ip any 1.150.150.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_30 permit ip any 1.150.151.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.21.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.21.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.21.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.24.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.24.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.24.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.28.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.28.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.28.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.29.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.29.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.29.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.30.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.30.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.30.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.36.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.36.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 1.0.0.0 255.0.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 192.168.5.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 192.168.5.0 255.255.255.192 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 192.168.5.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host Webserv3 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit icmp any any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.36.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out_DMZ1 permit icmp any any&lt;/P&gt;&lt;P&gt;access-list inside_access_out_DMZ1 permit tcp any host xx.xx.xx.55&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ1 1500&lt;/P&gt;&lt;P&gt;mtu DMZ2 1500&lt;/P&gt;&lt;P&gt;mtu Failover 1500&lt;/P&gt;&lt;P&gt;mtu State 1500&lt;/P&gt;&lt;P&gt;ip address outside xx.xxx.xx.50 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 1.0.1.254 255.0.0.0&lt;/P&gt;&lt;P&gt;ip address DMZ1 192.168.1.100 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address DMZ2 192.168.1.200 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address Failover 192.168.2.100 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address State 192.168.2.202 255.255.255.248&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool vpnpool1 1.150.150.1-1.150.150.254&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 1.150.151.0-1.150.151.255&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;failover replication http&lt;/P&gt;&lt;P&gt;failover ip address outside xx.xx.xx.51&lt;/P&gt;&lt;P&gt;failover ip address inside 1.0.3.254&lt;/P&gt;&lt;P&gt;failover ip address DMZ1 192.168.1.101&lt;/P&gt;&lt;P&gt;failover ip address DMZ2 192.168.1.201&lt;/P&gt;&lt;P&gt;failover ip address Failover 192.168.2.101&lt;/P&gt;&lt;P&gt;failover ip address State 192.168.2.201&lt;/P&gt;&lt;P&gt;failover link Failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface Failover&lt;/P&gt;&lt;P&gt;failover lan key ********&lt;/P&gt;&lt;P&gt;failover lan enable&lt;/P&gt;&lt;P&gt;pdm location 1.10.4.167 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&amp;lt; Some PDM Stuff Deleted&amp;gt;&lt;/P&gt;&lt;P&gt;pdm group Webservers DMZ1&lt;/P&gt;&lt;P&gt;pdm logging critical 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 4 xx.xx.xx.36&lt;/P&gt;&lt;P&gt;global (outside) 5 xx.xx.xx.60&lt;/P&gt;&lt;P&gt;global (outside) 6 xx.xx.xx.61&lt;/P&gt;&lt;P&gt;global (outside) 1 xx.xx.xx.52&lt;/P&gt;&lt;P&gt;global (outside) 5 xx.xx.xx.55&lt;/P&gt;&lt;P&gt;global (DMZ1) 3 192.168.1.101-192.168.1.122 netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;global (DMZ2) 2 192.168.1.201-Message netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.5.0 255.255.255.192 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.21.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.24.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.28.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.29.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.30.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 1.0.0.0 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ1) 4 Webserv1 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ1) 6 Webserv2 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ1) 5 Webserv3 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ2) 0 192.168.1.210 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ2) 7 Message 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ2,DMZ1) Webapp1 Webapp1 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ2,DMZ1) Webapp2 Webapp2 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) xx.xx.xx.49 Message netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ2,outside) xx.xx.xx.56 Message netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,DMZ1) xx.xx.xx.55 Webserv3 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) xx.xx.xx.55 Webserv3 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ1,outside) xx.xx.xx.55 Webserv3 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_out in interface inside&lt;/P&gt;&lt;P&gt;access-group inside_access_out_DMZ1 in interface DMZ1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xx.35 1&lt;/P&gt;&lt;P&gt;route DMZ1 Webserv3 255.255.255.255 xx.xx.xx.35 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 1.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;sysopt connection permit-pptp&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup vpnwvr address-pool vpnpool&lt;/P&gt;&lt;P&gt;vpngroup vpnwvr dns-server xx.xx.xx.72&lt;/P&gt;&lt;P&gt;vpngroup vpnwvr wins-server 1.4.1.1&lt;/P&gt;&lt;P&gt;vpngroup vpnwvr idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup vpnwvr password ********&lt;/P&gt;&lt;P&gt;vpngroup dandh address-pool vpnpool1&lt;/P&gt;&lt;P&gt;vpngroup dandh dns-server xx.xx.xx.72&lt;/P&gt;&lt;P&gt;vpngroup dandh wins-server 1.4.1.1&lt;/P&gt;&lt;P&gt;vpngroup dandh default-domain D-H_Domain&lt;/P&gt;&lt;P&gt;vpngroup dandh idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup dandh password ********&lt;/P&gt;&lt;P&gt;telnet 1.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 20&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;banner login "Warning: Unauthorized access to this system is forbidden and will&lt;/P&gt;&lt;P&gt;be prosecuted by law. By accessing this system, you agree that your actions may&lt;/P&gt;&lt;P&gt;be monitored if unauthorized usage is suspected."&lt;/P&gt;&lt;P&gt;Cryptochecksum:&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;Pix1(Primary)(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 06:56:38 GMT</pubDate>
    <dc:creator>james.brockman</dc:creator>
    <dc:date>2020-02-21T06:56:38Z</dc:date>
    <item>
      <title>PIX 525 Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170324#M600546</link>
      <description>&lt;P&gt;I'm trying to get access for a server (Webserv3) in a DMZ from the internet. This is the first server I'm trying to get to from the outside. Also I'm trying to limit some of the PC's on inside networks from the internet. I think the problem is with the ACL but I'm not sure. Please respond here I'm not near my mail much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;interface ethernet3 auto&lt;/P&gt;&lt;P&gt;interface ethernet4 100full&lt;/P&gt;&lt;P&gt;interface ethernet5 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ1 security30&lt;/P&gt;&lt;P&gt;nameif ethernet3 DMZ2 security40&lt;/P&gt;&lt;P&gt;nameif ethernet4 Failover security25&lt;/P&gt;&lt;P&gt;nameif ethernet5 State security20&lt;/P&gt;&lt;P&gt;enable password  encrypted&lt;/P&gt;&lt;P&gt;passwd encrypted&lt;/P&gt;&lt;P&gt;hostname Pix1(Primary)&lt;/P&gt;&lt;P&gt;domain-name dandh.com&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 1.0.0.253 Exchange&lt;/P&gt;&lt;P&gt;name 192.168.1.203 Webapp2&lt;/P&gt;&lt;P&gt;name 192.168.1.202 Webapp1&lt;/P&gt;&lt;P&gt;name 192.168.1.102 Webserv1&lt;/P&gt;&lt;P&gt;name 192.168.1.103 Webserv2&lt;/P&gt;&lt;P&gt;name 192.168.1.222 Message&lt;/P&gt;&lt;P&gt;name 192.168.1.204 Webapp3&lt;/P&gt;&lt;P&gt;name 192.168.1.104 Webserv3&lt;/P&gt;&lt;P&gt;object-group network Webappservers&lt;/P&gt;&lt;P&gt;  description Web App Servers on DMZ2&lt;/P&gt;&lt;P&gt;  network-object Webapp1 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object Webapp2 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object Webapp3 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group service Mail tcp&lt;/P&gt;&lt;P&gt;  description Mail Protocols&lt;/P&gt;&lt;P&gt;  port-object eq pop3&lt;/P&gt;&lt;P&gt;  port-object eq smtp&lt;/P&gt;&lt;P&gt;object-group service FTPGroup tcp&lt;/P&gt;&lt;P&gt;  port-object eq ftp-data&lt;/P&gt;&lt;P&gt;  port-object eq ftp&lt;/P&gt;&lt;P&gt;object-group network Webservers&lt;/P&gt;&lt;P&gt;  description Web Servers on DMZ1&lt;/P&gt;&lt;P&gt;  network-object Webserv1 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object Webserv2 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object Webserv3 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group service RPCFlaw tcp-udp&lt;/P&gt;&lt;P&gt;  description Microsoft RPC flaw&lt;/P&gt;&lt;P&gt;  port-object eq 4444&lt;/P&gt;&lt;P&gt;  port-object eq 69&lt;/P&gt;&lt;P&gt;  port-object eq 445&lt;/P&gt;&lt;P&gt;  port-object range 135 139&lt;/P&gt;&lt;P&gt;object-group service Web_Access tcp-udp&lt;/P&gt;&lt;P&gt;  port-object eq 80&lt;/P&gt;&lt;P&gt;access-list outside_access_in deny tcp xxx.xxx.xxx.32 255.255.255.224 object-group&lt;/P&gt;&lt;P&gt; RPCFlaw 1.0.0.0 255.0.0.0 object-group RPCFlaw&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host Message eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host Message eq pop3&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host Webserv1 eq ftp&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host xx.xx.xx.55&lt;/P&gt;&lt;P&gt;access-list outside_access_in2DMZ1 permit tcp any host xx.xx.xx.55&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 1.0.0.0 255.0.0.0 1.150.150.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 1.0.0.0 255.0.0.0 1.150.151.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_30 permit ip any 1.150.150.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_30 permit ip any 1.150.151.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.21.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.21.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.21.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.24.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.24.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.24.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.28.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.28.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.28.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.29.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.29.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.29.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.30.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.30.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.30.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 172.36.1.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 172.36.29.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 1.0.0.0 255.0.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host 192.168.5.1 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip 192.168.5.0 255.255.255.192 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 192.168.5.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit ip host Webserv3 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out permit icmp any any&lt;/P&gt;&lt;P&gt;access-list inside_access_out deny ip 172.36.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;access-list inside_access_out_DMZ1 permit icmp any any&lt;/P&gt;&lt;P&gt;access-list inside_access_out_DMZ1 permit tcp any host xx.xx.xx.55&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ1 1500&lt;/P&gt;&lt;P&gt;mtu DMZ2 1500&lt;/P&gt;&lt;P&gt;mtu Failover 1500&lt;/P&gt;&lt;P&gt;mtu State 1500&lt;/P&gt;&lt;P&gt;ip address outside xx.xxx.xx.50 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 1.0.1.254 255.0.0.0&lt;/P&gt;&lt;P&gt;ip address DMZ1 192.168.1.100 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address DMZ2 192.168.1.200 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address Failover 192.168.2.100 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address State 192.168.2.202 255.255.255.248&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool vpnpool1 1.150.150.1-1.150.150.254&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 1.150.151.0-1.150.151.255&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;failover replication http&lt;/P&gt;&lt;P&gt;failover ip address outside xx.xx.xx.51&lt;/P&gt;&lt;P&gt;failover ip address inside 1.0.3.254&lt;/P&gt;&lt;P&gt;failover ip address DMZ1 192.168.1.101&lt;/P&gt;&lt;P&gt;failover ip address DMZ2 192.168.1.201&lt;/P&gt;&lt;P&gt;failover ip address Failover 192.168.2.101&lt;/P&gt;&lt;P&gt;failover ip address State 192.168.2.201&lt;/P&gt;&lt;P&gt;failover link Failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface Failover&lt;/P&gt;&lt;P&gt;failover lan key ********&lt;/P&gt;&lt;P&gt;failover lan enable&lt;/P&gt;&lt;P&gt;pdm location 1.10.4.167 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&amp;lt; Some PDM Stuff Deleted&amp;gt;&lt;/P&gt;&lt;P&gt;pdm group Webservers DMZ1&lt;/P&gt;&lt;P&gt;pdm logging critical 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 4 xx.xx.xx.36&lt;/P&gt;&lt;P&gt;global (outside) 5 xx.xx.xx.60&lt;/P&gt;&lt;P&gt;global (outside) 6 xx.xx.xx.61&lt;/P&gt;&lt;P&gt;global (outside) 1 xx.xx.xx.52&lt;/P&gt;&lt;P&gt;global (outside) 5 xx.xx.xx.55&lt;/P&gt;&lt;P&gt;global (DMZ1) 3 192.168.1.101-192.168.1.122 netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;global (DMZ2) 2 192.168.1.201-Message netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.5.0 255.255.255.192 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.21.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.24.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.28.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.29.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.30.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 1.0.0.0 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ1) 4 Webserv1 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ1) 6 Webserv2 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ1) 5 Webserv3 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ2) 0 192.168.1.210 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;nat (DMZ2) 7 Message 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ2,DMZ1) Webapp1 Webapp1 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ2,DMZ1) Webapp2 Webapp2 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) xx.xx.xx.49 Message netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ2,outside) xx.xx.xx.56 Message netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,DMZ1) xx.xx.xx.55 Webserv3 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) xx.xx.xx.55 Webserv3 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (DMZ1,outside) xx.xx.xx.55 Webserv3 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_out in interface inside&lt;/P&gt;&lt;P&gt;access-group inside_access_out_DMZ1 in interface DMZ1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xx.35 1&lt;/P&gt;&lt;P&gt;route DMZ1 Webserv3 255.255.255.255 xx.xx.xx.35 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 1.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;sysopt connection permit-pptp&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup vpnwvr address-pool vpnpool&lt;/P&gt;&lt;P&gt;vpngroup vpnwvr dns-server xx.xx.xx.72&lt;/P&gt;&lt;P&gt;vpngroup vpnwvr wins-server 1.4.1.1&lt;/P&gt;&lt;P&gt;vpngroup vpnwvr idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup vpnwvr password ********&lt;/P&gt;&lt;P&gt;vpngroup dandh address-pool vpnpool1&lt;/P&gt;&lt;P&gt;vpngroup dandh dns-server xx.xx.xx.72&lt;/P&gt;&lt;P&gt;vpngroup dandh wins-server 1.4.1.1&lt;/P&gt;&lt;P&gt;vpngroup dandh default-domain D-H_Domain&lt;/P&gt;&lt;P&gt;vpngroup dandh idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup dandh password ********&lt;/P&gt;&lt;P&gt;telnet 1.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 20&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;banner login "Warning: Unauthorized access to this system is forbidden and will&lt;/P&gt;&lt;P&gt;be prosecuted by law. By accessing this system, you agree that your actions may&lt;/P&gt;&lt;P&gt;be monitored if unauthorized usage is suspected."&lt;/P&gt;&lt;P&gt;Cryptochecksum:&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;Pix1(Primary)(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170324#M600546</guid>
      <dc:creator>james.brockman</dc:creator>
      <dc:date>2020-02-21T06:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 525 Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170325#M600547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;in your acl outside access in, you only allow ftp to webserv3. add a line for tcp port 80 to allow web traffic. does it run a ftp daemon? have you been able to connect to it from the outside?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Aug 2003 13:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170325#M600547</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2003-08-20T13:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 525 Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170326#M600548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a ACL &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host XX.XX.XX.55&lt;/P&gt;&lt;P&gt;that references the server I'm trying to get to from the outside. I have not been able to get to it from outside but I can see it from inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Aug 2003 13:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170326#M600548</guid>
      <dc:creator>james.brockman</dc:creator>
      <dc:date>2003-08-20T13:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 525 Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170327#M600549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello James -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check this URL(page 5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/tech/pixcg_cg.pdf" target="_blank"&gt;http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/tech/pixcg_cg.pdf&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks -&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Aug 2003 14:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170327#M600549</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2003-08-20T14:10:33Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 525 Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170328#M600550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;This example uses conduits instead of access lists I thought conduits were replaced with access lists? Is there an updated artical? Should I use conduits?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Aug 2003 16:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170328#M600550</guid>
      <dc:creator>james.brockman</dc:creator>
      <dc:date>2003-08-20T16:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 525 Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170329#M600551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-lists are the future. conduits still work, but might be unsupported in a future version. you access-list look fine - I missed that permit tcp any line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aha - try this - I think your access-list applied to the dmz is wrong. Try removing it. I think your source is any, destination is xxxxxx.55, and it needs to be flipped - you want to allow source of xxxx.55, with destination any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Aug 2003 17:12:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-525-help/m-p/170329#M600551</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2003-08-20T17:12:38Z</dc:date>
    </item>
  </channel>
</rss>

