<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: help,there is a strange thing of pix! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-there-is-a-strange-thing-of-pix/m-p/138952#M607385</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Static commands make a permanent translation slot for traffic. In an environment with no nat (nat 0...), you use a netstatic (a static command for an entire block of IP addresses). This makes all of those hosts *potentially* accessible through the pix - you still need to open up the ports via a ACL or conduit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Similar thing applies for natted environments, but there you typically have one static command per one server you want accessible. In PAT, you use statics to forward unique ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But why static? If you only use nat 0 - only *temporary* translation slots are created - so that if host A is sending outbound traffic to the internet, then host B (provided there is a access list/conduit that permits this behaviour) can make a connection to A. But if A stops sending any outbound traffic, eventually the temporary translation slot times out, and no external hosts can initiate connections to A. Hence the need for a mechanism through which permanent translation slots can be made.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 15 Apr 2003 12:21:44 GMT</pubDate>
    <dc:creator>mostiguy</dc:creator>
    <dc:date>2003-04-15T12:21:44Z</dc:date>
    <item>
      <title>help,there is a strange thing of pix!</title>
      <link>https://community.cisco.com/t5/network-security/help-there-is-a-strange-thing-of-pix/m-p/138949#M607382</link>
      <description>&lt;P&gt;the diagram please see &lt;A class="jive-link-custom" href="http://www.ciscofan.com/smbc.jpg" target="_blank"&gt;www.ciscofan.com/smbc.jpg&lt;/A&gt;&lt;/P&gt;&lt;P&gt;now,the ebs router has a NM-1CE1U&amp;amp;NM-30DM,then remote clients can dial in the network,the pboc router has a wic-2t module,connect to remote side via DDN.the ebs interface's ip address of pix is x.x.45.2,the ebs router's ethernet ip address is x.x.45.1,and the ip address the remote client can get(the ip address pool) is from x.x.45.110-x.x.45.140.the ip address of pix515E 's inside interface is x.x.44.1.I use nat 0 0 0 to avoid any nat(image the pix as a router)then the strange thing happens,after configuration,in ebs router,can't ping any address who is like x.x.44.x,after server1 ping x.x.45.1,then both the dialer clients and the ebs router can ping server1,but can't ping server2,after server2 ping x.x.45.1(ebs router),both dialer clinets and ebs router can ping server2,etc.that means the inside computers must ping the outside computers first,then the outside computers can access(include ping) the inside server.and the even stanger thing is ,if there is no any traffic between ebs and the remote client(or the ebs router) in some time(maybe some hours,but I am not sure),the remote dialer clients or the ebs router can't ping(access) inside&lt;/P&gt;&lt;P&gt;servers.for instance,after one night,in the morning,the remote dialer clients or the ebs router can't ping x.x.44.x.It seems there is a time-out configuration,but  how can I setup it?&lt;/P&gt;&lt;P&gt;the following is the pix(515e)'s configuration:&lt;/P&gt;&lt;P&gt;PIX Version 6.1(4)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 intf2 security10&lt;/P&gt;&lt;P&gt;nameif ethernet3 intf3 security15&lt;/P&gt;&lt;P&gt;nameif ethernet4 ebs security20&lt;/P&gt;&lt;P&gt;nameif ethernet5 pboc security25&lt;/P&gt;&lt;P&gt;enable password n5vL encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnencrypted&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 1720&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;interface ethernet0 auto shutdown   &lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet3 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet4 auto&lt;/P&gt;&lt;P&gt;interface ethernet5 auto&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu intf2 1500&lt;/P&gt;&lt;P&gt;mtu intf3 1500&lt;/P&gt;&lt;P&gt;mtu ebs 1500&lt;/P&gt;&lt;P&gt;mtu pboc 1500&lt;/P&gt;&lt;P&gt;ip address outside 127.0.0.1 255.0.0.0&lt;/P&gt;&lt;P&gt;ip address inside x.x.44.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address intf2 129.0.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address intf3 127.0.0.1 255.255.255.255&lt;/P&gt;&lt;P&gt;ip address ebs x.x..45.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address pboc x.x.46.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;failover ip address outside 0.0.0.0&lt;/P&gt;&lt;P&gt;failover ip address inside 0.0.0.0                  &lt;/P&gt;&lt;P&gt;failover ip address intf3 0.0.0.0&lt;/P&gt;&lt;P&gt;failover ip address ebs 0.0.0.0&lt;/P&gt;&lt;P&gt;failover ip address pboc 0.0.0.0&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;conduit permit icmp any any&lt;/P&gt;&lt;P&gt;conduit permit ip any any&lt;/P&gt;&lt;P&gt;route pboc 10.24.15.0 255.255.255.0 x.x.46.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si&lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-there-is-a-strange-thing-of-pix/m-p/138949#M607382</guid>
      <dc:creator>jeff.lee</dc:creator>
      <dc:date>2020-02-21T06:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: help,there is a strange thing of pix!</title>
      <link>https://community.cisco.com/t5/network-security/help-there-is-a-strange-thing-of-pix/m-p/138950#M607383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't have any static commands to create static translation slots. Thus, you need outbound traffic to create temporary translation slots, but as these are not permanent, you will have problems. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside)  x.x.44.0 x.x.44.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;should bring you happiness&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Apr 2003 12:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-there-is-a-strange-thing-of-pix/m-p/138950#M607383</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2003-04-07T12:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: help,there is a strange thing of pix!</title>
      <link>https://community.cisco.com/t5/network-security/help-there-is-a-strange-thing-of-pix/m-p/138951#M607384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes,it works,but could u tell me what is the function of "static (inside, outside) x.x.44.0 x.x.44.0 netmask 255.255.255.0 "?thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2003 00:10:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-there-is-a-strange-thing-of-pix/m-p/138951#M607384</guid>
      <dc:creator>jeff.lee</dc:creator>
      <dc:date>2003-04-15T00:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: help,there is a strange thing of pix!</title>
      <link>https://community.cisco.com/t5/network-security/help-there-is-a-strange-thing-of-pix/m-p/138952#M607385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Static commands make a permanent translation slot for traffic. In an environment with no nat (nat 0...), you use a netstatic (a static command for an entire block of IP addresses). This makes all of those hosts *potentially* accessible through the pix - you still need to open up the ports via a ACL or conduit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Similar thing applies for natted environments, but there you typically have one static command per one server you want accessible. In PAT, you use statics to forward unique ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But why static? If you only use nat 0 - only *temporary* translation slots are created - so that if host A is sending outbound traffic to the internet, then host B (provided there is a access list/conduit that permits this behaviour) can make a connection to A. But if A stops sending any outbound traffic, eventually the temporary translation slot times out, and no external hosts can initiate connections to A. Hence the need for a mechanism through which permanent translation slots can be made.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2003 12:21:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-there-is-a-strange-thing-of-pix/m-p/138952#M607385</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2003-04-15T12:21:44Z</dc:date>
    </item>
  </channel>
</rss>

