<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX Denies Established TCP connection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128060#M606350</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was suspecting that these overlaps may be problems, but nothing that I could find indicated it was for sure. They are. I put the more specific statics in the config and it fired right up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 May 2003 00:22:06 GMT</pubDate>
    <dc:creator>kevin_noll</dc:creator>
    <dc:date>2003-05-08T00:22:06Z</dc:date>
    <item>
      <title>PIX Denies Established TCP connection</title>
      <link>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128056#M606346</link>
      <description>&lt;P&gt;I have a PIX 515e with 6 interfaces (5 in use) - inside, outside, dmz, dmz2 and vpn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am unable to telnet (or anything else) from dmz2 to dmz or dmz to vpn (possibly other combinations), but I am able to get from inside to anywhere or outside to anywhere, dmz to outside or inside, vpn to inside, etc. (of course, all&lt;/P&gt;&lt;P&gt;these are restricted based on access-lists).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I attempt to make a connection from dmz2 to dmz, I get the following log messages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;302013: Built inbound TCP connection 375382 for dmz2:10.64.16.25/1168 (10.64.16.&lt;/P&gt;&lt;P&gt;25/1168) to dmz:10.216.120.69/23 (10.216.120.69/23)&lt;/P&gt;&lt;P&gt;106015: Deny TCP (no connection) from 10.216.120.69/23 to 10.64.16.25/1168 flag&lt;/P&gt;&lt;P&gt;s SYN ACK  on interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my PIX configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.2(2)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz security50&lt;/P&gt;&lt;P&gt;nameif ethernet3 vpn security60&lt;/P&gt;&lt;P&gt;nameif ethernet4 dmz2 security40&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.216.120.22 dcvpn02-public&lt;/P&gt;&lt;P&gt;name 10.216.120.19 dcnet02r-fa0-0&lt;/P&gt;&lt;P&gt;name 10.216.120.21 dcvpn01-public&lt;/P&gt;&lt;P&gt;name 10.216.120.18 dcnet01r-fa0-0&lt;/P&gt;&lt;P&gt;name 10.216.120.17 dcnet0Xr-hsrp&lt;/P&gt;&lt;P&gt;name 10.216.120.69 dcvpn01-private&lt;/P&gt;&lt;P&gt;name 10.216.120.70 dcvpn02-private&lt;/P&gt;&lt;P&gt;name 10.216.120.4 dcnet0X-intrcnct&lt;/P&gt;&lt;P&gt;name 10.216.120.2 dcnet02r-lo0&lt;/P&gt;&lt;P&gt;name 10.216.120.1 dcnet01r-lo0&lt;/P&gt;&lt;P&gt;name 10.216.120.0 dcnet0X-lo0&lt;/P&gt;&lt;P&gt;name 10.216.120.20 dcvpn-pub-lbvip&lt;/P&gt;&lt;P&gt;name 10.216.120.6 dcnet02r-fa0-1&lt;/P&gt;&lt;P&gt;name 10.216.120.5 dcnet01r-fa0-1&lt;/P&gt;&lt;P&gt;name 192.168.239.3 dc6509a-16&lt;/P&gt;&lt;P&gt;name 192.168.239.2 dc6509a-15&lt;/P&gt;&lt;P&gt;name 10.36.172.0 ISP-IP-Addrs&lt;/P&gt;&lt;P&gt;name 10.216.120.16 Outside_Network&lt;/P&gt;&lt;P&gt;name 10.216.120.64 DMZ_Network&lt;/P&gt;&lt;P&gt;name 10.216.120.71 dcdmz01s&lt;/P&gt;&lt;P&gt;name 10.216.120.72 dcdmz02s&lt;/P&gt;&lt;P&gt;name 10.216.120.73 sid&lt;/P&gt;&lt;P&gt;name 10.216.120.74 zurg&lt;/P&gt;&lt;P&gt;name 10.64.32.0 VPN_Clients_32&lt;/P&gt;&lt;P&gt;name 10.64.33.0 VPN_Clients_33&lt;/P&gt;&lt;P&gt;name 172.20.53.204 host1&lt;/P&gt;&lt;P&gt;name 10.3.185.20 host2&lt;/P&gt;&lt;P&gt;object-group network DCNET0X_INTERFACES&lt;/P&gt;&lt;P&gt;  description All interfaces on the Internet routers&lt;/P&gt;&lt;P&gt;  network-object dcnet01r-lo0 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object dcnet02r-lo0 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object dcnet01r-fa0-1 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object dcnet02r-fa0-1 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object dcnet01r-fa0-0 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object dcnet02r-fa0-0 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group network VPN_CLIENTS&lt;/P&gt;&lt;P&gt;  description All VPN Clients&lt;/P&gt;&lt;P&gt;  network-object VPN_Clients_32 255.255.255.0&lt;/P&gt;&lt;P&gt;  network-object VPN_Clients_33 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network INSIDE_NETWORKS&lt;/P&gt;&lt;P&gt;  description All Inside Networks&lt;/P&gt;&lt;P&gt;  network-object 172.16.0.0 255.240.0.0&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;  network-object 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;object-group network VPNC_PRIVATE_INT&lt;/P&gt;&lt;P&gt;  description Private Interfaces of VPN Concentrators&lt;/P&gt;&lt;P&gt;  network-object dcvpn01-private 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object dcvpn02-private 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object 10.64.24.11 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object 10.64.24.12 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group network MGMT_STATIONS&lt;/P&gt;&lt;P&gt;  description Network Management Workstations&lt;/P&gt;&lt;P&gt;  network-object 172.16.0.0 255.240.0.0&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object-group network DMZ_SWITCHES&lt;/P&gt;&lt;P&gt;  description Management Interfaces of the DMZ switches&lt;/P&gt;&lt;P&gt;  network-object dcdmz01s 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object dcdmz02s 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object 10.64.16.11 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object 10.64.16.12 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group network DNS_SERVERS&lt;/P&gt;&lt;P&gt;  description External/Public DNS Servers&lt;/P&gt;&lt;P&gt;  network-object sid 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object zurg 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group network DMZ_HOSTS&lt;/P&gt;&lt;P&gt;  description These are hosts that are on the DMZ&lt;/P&gt;&lt;P&gt;  network-object DMZ_Network 255.255.255.224&lt;/P&gt;&lt;P&gt;object-group network INSIDE_DENIED_INTERNET&lt;/P&gt;&lt;P&gt;  description These are inside hosts that are denied Internet access&lt;/P&gt;&lt;P&gt;  network-object 10.32.96.0 255.255.252.0&lt;/P&gt;&lt;P&gt;  network-object 10.32.24.0 255.255.252.0&lt;/P&gt;&lt;P&gt;object-group network INSIDE_DENIED_DMZ&lt;/P&gt;&lt;P&gt;  description These hosts are denied access to the DMZ&lt;/P&gt;&lt;P&gt;  network-object 10.32.96.0 255.255.252.0&lt;/P&gt;&lt;P&gt;  network-object 10.32.24.0 255.255.252.0&lt;/P&gt;&lt;P&gt;object-group service VPNC_INTERNAL_SERVICES tcp-udp&lt;/P&gt;&lt;P&gt;  description TCP and UDP Ports that the VPN Concentrators need to use&lt;/P&gt;&lt;P&gt;  port-object eq domain&lt;/P&gt;&lt;P&gt;  port-object eq tacacs&lt;/P&gt;&lt;P&gt;  port-object eq 69&lt;/P&gt;&lt;P&gt;  port-object eq 161&lt;/P&gt;&lt;P&gt;  port-object eq 162&lt;/P&gt;&lt;P&gt;  port-object eq 514&lt;/P&gt;&lt;P&gt;  port-object eq 1645&lt;/P&gt;&lt;P&gt;  port-object eq 1646&lt;/P&gt;&lt;P&gt;  port-object eq 123&lt;/P&gt;&lt;P&gt;object-group network DO_VPN_CLIENTS&lt;/P&gt;&lt;P&gt;  description Clients on remote VPN segments&lt;/P&gt;&lt;P&gt;  network-object 10.68.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list dont_nat permit ip object-group DCNET0X_INTERFACES object-group MGMT_STATIONS&lt;/P&gt;&lt;P&gt;access-list dont_nat permit ip object-group VPNC_PRIVATE_INT object-group INSIDE_NETWORKS&lt;/P&gt;&lt;P&gt;access-list dont_nat permit ip object-group DMZ_SWITCHES object-group MGMT_STATIONS&lt;/P&gt;&lt;P&gt;access-list dont_nat permit ip object-group DNS_SERVERS any&lt;/P&gt;&lt;P&gt;access-list outside_inbound permit udp object-group DCNET0X_INTERFACES any eq tftp&lt;/P&gt;&lt;P&gt;access-list outside_inbound permit udp object-group DCNET0X_INTERFACES any eq ntp&lt;/P&gt;&lt;P&gt;access-list outside_inbound permit udp any object-group DNS_SERVERS eq domain&lt;/P&gt;&lt;P&gt;access-list outside_inbound permit tcp host host2 host 10.216.120.26 eq 8080&lt;/P&gt;&lt;P&gt;access-list outside_inbound permit tcp host 10.216.120.35 any eq www&lt;/P&gt;&lt;P&gt;access-list outside_inbound permit tcp host 10.216.120.35 any eq https&lt;/P&gt;&lt;P&gt;access-list dmz_inbound permit udp object-group DMZ_SWITCHES object-group MGMT_STATIONS eq tftp&lt;/P&gt;&lt;P&gt;access-list dmz_inbound permit udp object-group DMZ_SWITCHES object-group MGMT_STATIONS eq ntp&lt;/P&gt;&lt;P&gt;access-list dmz_inbound permit tcp object-group DNS_SERVERS object-group INSIDE_NETWORKS eq smtp&lt;/P&gt;&lt;P&gt;access-list dmz_inbound permit udp object-group DNS_SERVERS object-group INSIDE_NETWORKS eq ntp&lt;/P&gt;&lt;P&gt;access-list dmz_inbound deny udp object-group DNS_SERVERS object-group INSIDE_NETWORKS eq domain&lt;/P&gt;&lt;P&gt;access-list dmz_inbound permit udp object-group DNS_SERVERS any eq domain&lt;/P&gt;&lt;P&gt;access-list dmz_inbound permit udp object-group VPNC_PRIVATE_INT object-group INSIDE_NETWORKS object-group VPNC_INTERNAL_SERVICES&lt;/P&gt;&lt;P&gt;access-list dmz_inbound permit ip object-group VPN_CLIENTS any&lt;/P&gt;&lt;P&gt;access-list dmz_inbound permit ip object-group DO_VPN_CLIENTS any&lt;/P&gt;&lt;P&gt;access-list inside_inbound deny ip object-group INSIDE_DENIED_DMZ object-group DMZ_HOSTS&lt;/P&gt;&lt;P&gt;access-list inside_inbound deny ip object-group INSIDE_DENIED_INTERNET any&lt;/P&gt;&lt;P&gt;access-list inside_inbound permit ip object-group INSIDE_NETWORKS any&lt;/P&gt;&lt;P&gt;access-list vpn_inbound permit udp object-group VPNC_PRIVATE_INT object-group INSIDE_NETWORKS object-group VPNC_INTERNAL_SERVICES&lt;/P&gt;&lt;P&gt;access-list vpn_inbound permit ip object-group VPN_CLIENTS any&lt;/P&gt;&lt;P&gt;access-list vpn_inbound permit ip object-group DO_VPN_CLIENTS any&lt;/P&gt;&lt;P&gt;access-list vpn_inbound permit ip object-group VPNC_PRIVATE_INT VPN_Clients_32 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz2_inbound permit udp object-group DMZ_SWITCHES object-group MGMT_STATIONS eq tftp&lt;/P&gt;&lt;P&gt;access-list dmz2_inbound permit udp object-group DMZ_SWITCHES object-group MGMT_STATIONS eq ntp&lt;/P&gt;&lt;P&gt;access-list dmz2_inbound permit ip host 10.64.17.35 object-group INSIDE_NETWORKS&lt;/P&gt;&lt;P&gt;access-list dmz2_inbound permit ip 10.64.16.0 255.255.255.0 10.64.24.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz2_inbound permit ip 10.64.16.0 255.255.255.0 10.32.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list dmz2_inbound permit ip host 10.64.16.25 host dcvpn01-private&lt;/P&gt;&lt;P&gt;access-list dont_nat_vpn permit ip 10.64.24.0 255.255.255.0 VPN_Clients_32 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dont_nat_vpn permit ip VPN_Clients_32 255.255.255.0 10.64.24.0 255.255.255.0&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet2 100full&lt;/P&gt;&lt;P&gt;interface ethernet3 100full&lt;/P&gt;&lt;P&gt;interface ethernet4 100full&lt;/P&gt;&lt;P&gt;ip address outside 10.216.120.23 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address inside 192.168.225.15 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz 10.216.120.66 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address vpn 10.64.24.1 255.255.252.0&lt;/P&gt;&lt;P&gt;ip address dmz2 10.64.16.1 255.255.252.0&lt;/P&gt;&lt;P&gt;ip address intf5 127.0.0.1 255.255.255.255&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface dmz&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface vpn&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface dmz2&lt;/P&gt;&lt;P&gt;global (outside) 100 10.216.120.25&lt;/P&gt;&lt;P&gt;global (outside) 160 10.216.120.26&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list dont_nat&lt;/P&gt;&lt;P&gt;nat (inside) 100 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (dmz) 100 VPN_Clients_32 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.0.0 192.168.0.0 netmask 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz) 172.16.0.0 172.16.0.0 netmask 255.240.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (dmz,outside) sid sid netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (dmz,outside) zurg zurg netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.216.120.26 host1 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.32.0.0 10.32.0.0 netmask 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,vpn) 192.168.0.0 192.168.0.0 netmask 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,vpn) 172.16.0.0 172.16.0.0 netmask 255.240.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,vpn) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (dmz2,outside) 10.216.120.35 10.64.17.35 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz2) 172.16.0.0 172.16.0.0 netmask 255.240.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz2) 192.168.0.0 192.168.0.0 netmask 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz2) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (vpn,dmz) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (vpn,dmz2) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (dmz,dmz2) DMZ_Network DMZ_Network netmask 255.255.255.224 0 0&lt;/P&gt;&lt;P&gt;access-group outside_inbound in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_inbound in interface inside&lt;/P&gt;&lt;P&gt;access-group dmz_inbound in interface dmz&lt;/P&gt;&lt;P&gt;access-group dmz2_inbound in interface dmz2&lt;/P&gt;&lt;P&gt;rip dmz passive version 2&lt;/P&gt;&lt;P&gt;rip vpn passive version 2&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 dcnet0Xr-hsrp 1&lt;/P&gt;&lt;P&gt;route dmz 10.1.1.0 255.255.255.0 dcvpn01-private 1&lt;/P&gt;&lt;P&gt;route dmz 10.1.2.0 255.255.255.0 dcvpn02-private 1&lt;/P&gt;&lt;P&gt;route inside 10.32.0.0 255.255.0.0 192.168.225.1 1&lt;/P&gt;&lt;P&gt;route inside 10.33.0.0 255.255.0.0 192.168.225.1 1&lt;/P&gt;&lt;P&gt;route dmz VPN_Clients_32 255.255.255.0 dcvpn01-private 1&lt;/P&gt;&lt;P&gt;route vpn VPN_Clients_33 255.255.255.0 10.64.24.12 1&lt;/P&gt;&lt;P&gt;route outside ISP-IP-Addrs 255.255.255.0 dcnet0Xr-hsrp 1&lt;/P&gt;&lt;P&gt;route inside 172.16.0.0 255.240.0.0 192.168.225.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.0.0 192.168.225.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128056#M606346</guid>
      <dc:creator>kevin_noll</dc:creator>
      <dc:date>2020-02-21T06:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Denies Established TCP connection</title>
      <link>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128057#M606347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would try the following:&lt;/P&gt;&lt;P&gt;&amp;gt; ip verify reverse-path interface dmz &lt;/P&gt;&lt;P&gt;Try without the above line - just for the test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; static (dmz,dmz2) DMZ_Network DMZ_Network netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;Try to remove that line and add:&lt;/P&gt;&lt;P&gt;access-list nonatdmz permit ip 10.216.120.64 255.255.255.224 10.64.16.0 255.255.252.0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list nonatdmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it change anything?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 May 2003 19:11:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128057#M606347</guid>
      <dc:creator>yizhar</dc:creator>
      <dc:date>2003-05-06T19:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Denies Established TCP connection</title>
      <link>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128058#M606348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I noticed in my original post that I forgot to actually say what I wanted to do. I think you figured it out, though. I need to be able to get traffic from dmz or dmz2 to vpn and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried what you suggested already, but I did it again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm a bit frustrated, the various configurations I've tried have either gotten me &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"305005: No translation group found for tcp src dmz:10.64.32.1/1336 dst vpn:10.64.24.12/23" (this is what I got with your suggestions)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or I get the "deny TCP" that I posted in the original.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Turning off reverse-path didn't change anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--kan--&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 May 2003 01:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128058#M606348</guid>
      <dc:creator>kevin_noll</dc:creator>
      <dc:date>2003-05-07T01:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Denies Established TCP connection</title>
      <link>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128059#M606349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to fix up these, they'll definately be causing strange things:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;static (inside,vpn) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;static (inside,dmz2) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;static (vpn,dmz) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;static (vpn,dmz2) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In one command you're telling the PIX the whole 10.0.0.0 subnet sits on the inside interface, then you're telling it it sits on the vpn interface (yes, these override the static routes when the PIX receives packets on interfaces).  Make all your statics reference the specific subnets only that are on each interface (there doen't seem to be too many going by your static routes), and see how you go.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try plugging your config into the Output Interpretor (&lt;A class="jive-link-custom" href="https://www.cisco.com/cgi-bin/Support/OutputInterpreter/home.pl" target="_blank"&gt;https://www.cisco.com/cgi-bin/Support/OutputInterpreter/home.pl&lt;/A&gt;) and it'll tell you a wealth of information.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 May 2003 04:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128059#M606349</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2003-05-07T04:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Denies Established TCP connection</title>
      <link>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128060#M606350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was suspecting that these overlaps may be problems, but nothing that I could find indicated it was for sure. They are. I put the more specific statics in the config and it fired right up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 May 2003 00:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-denies-established-tcp-connection/m-p/128060#M606350</guid>
      <dc:creator>kevin_noll</dc:creator>
      <dc:date>2003-05-08T00:22:06Z</dc:date>
    </item>
  </channel>
</rss>

