<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX and ADSL router. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135549#M607409</link>
    <description>&lt;P&gt;I have, in one site, a PIX 515 connected to a C827H (an ADSL router &amp;#147;doing&amp;#148; PPPoE). This router gives access to the Net. In another site I have another PIX (a 506) and another C827H router that gave access to Net. Both sites have access to net without problems. But when I what to establish a VPN tunnel (with Ipsec) between this two sites, through the Net, I can&amp;#146;t establish the connection. The ADSL router has their public IP negotiated with the ISP. In my lab I simulate this two connections putting two PIXs (a 520 and a 506) back-to-back with a crossover cable. I used the same configuration. The thing worked.  But in my two sites that is not working. Why? &lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 06:40:10 GMT</pubDate>
    <dc:creator>rcapao</dc:creator>
    <dc:date>2020-02-21T06:40:10Z</dc:date>
    <item>
      <title>PIX and ADSL router.</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135549#M607409</link>
      <description>&lt;P&gt;I have, in one site, a PIX 515 connected to a C827H (an ADSL router &amp;#147;doing&amp;#148; PPPoE). This router gives access to the Net. In another site I have another PIX (a 506) and another C827H router that gave access to Net. Both sites have access to net without problems. But when I what to establish a VPN tunnel (with Ipsec) between this two sites, through the Net, I can&amp;#146;t establish the connection. The ADSL router has their public IP negotiated with the ISP. In my lab I simulate this two connections putting two PIXs (a 520 and a 506) back-to-back with a crossover cable. I used the same configuration. The thing worked.  But in my two sites that is not working. Why? &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:40:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135549#M607409</guid>
      <dc:creator>rcapao</dc:creator>
      <dc:date>2020-02-21T06:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and ADSL router.</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135550#M607410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Apr 2003 19:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135550#M607410</guid>
      <dc:creator>xiaoj</dc:creator>
      <dc:date>2003-04-04T19:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and ADSL router.</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135551#M607411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;--begin ciscomoderator note-- The following post has been edited to remove potentially confidential information. Please refrain from posting confidential information on the site to reduce security risks to your network. -- end ciscomoderator note -- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK. &lt;/P&gt;&lt;P&gt;The configuration of my two PIXs is like this: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.1(4) &lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security10 &lt;/P&gt;&lt;P&gt;enable password xxxxx encrypted &lt;/P&gt;&lt;P&gt;passwd yyyy encrypted &lt;/P&gt;&lt;P&gt;hostname --moderator edit-- firewall &lt;/P&gt;&lt;P&gt;domain-name teste.pt &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21 &lt;/P&gt;&lt;P&gt;fixup protocol http 80 &lt;/P&gt;&lt;P&gt;fixup protocol h323 1720 &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514 &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554 &lt;/P&gt;&lt;P&gt;fixup protocol smtp 25 &lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521 &lt;/P&gt;&lt;P&gt;fixup protocol sip 5060 &lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000 &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.10.10.0 255.255.255.0 --moderator edit-- mm.mmm.mmm.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;access-list outside-in permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list outside-in permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside-in permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list outside-in permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;interface ethernet0 auto &lt;/P&gt;&lt;P&gt;interface ethernet1 auto &lt;/P&gt;&lt;P&gt;interface ethernet2 auto &lt;/P&gt;&lt;P&gt;mtu outside 1452 &lt;/P&gt;&lt;P&gt;mtu inside 1452 &lt;/P&gt;&lt;P&gt;mtu DMZ 1500 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip address outside --moderator edit-- xx.xx.xx.1 255.255.255.252 &lt;/P&gt;&lt;P&gt;ip address inside 10.10.10.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip address DMZ 172.16.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip audit info action alarm &lt;/P&gt;&lt;P&gt;ip audit attack action alarm &lt;/P&gt;&lt;P&gt;pdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;access-group outside-in in interface outside &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 --moderator edit-- xx.xx.xx.2 1 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si &lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;filter activex 80 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;filter java 80 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community public &lt;/P&gt;&lt;P&gt;no snmp-server enable traps &lt;/P&gt;&lt;P&gt;floodguard enable &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;no sysopt route dnat &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp &lt;/P&gt;&lt;P&gt;crypto map mymap 10 match address 101 &lt;/P&gt;&lt;P&gt;crypto map mymap 10 set peer 60.60.60.1 &lt;/P&gt;&lt;P&gt;crypto map mymap 10 set transform-set myset &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;crypto map mymap interface outside &lt;/P&gt;&lt;P&gt;isakmp enable outside &lt;/P&gt;&lt;P&gt;isakmp key ******** address 10.100.100.1 netmask 255.255.255.255 no-xauth no-co &lt;/P&gt;&lt;P&gt;nfig-mode &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;isakmp identity address &lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des &lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5 &lt;/P&gt;&lt;P&gt;isakmp policy 10 group 1 &lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 43200 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;telnet timeout 5 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ssh timeout 5 &lt;/P&gt;&lt;P&gt;terminal width 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.1(4) &lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;enable password xxxx encrypted &lt;/P&gt;&lt;P&gt;passwd yyyy encrypted &lt;/P&gt;&lt;P&gt;hostname --moderator edit-- firewall &lt;/P&gt;&lt;P&gt;domain-name teste.pt &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21 &lt;/P&gt;&lt;P&gt;fixup protocol http 80 &lt;/P&gt;&lt;P&gt;fixup protocol h323 1720 &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514 &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554 &lt;/P&gt;&lt;P&gt;fixup protocol smtp 25 &lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521 &lt;/P&gt;&lt;P&gt;fixup protocol sip 5060 &lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000 &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;access-list out-in permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list out-in permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list out-in permit tcp host 62.48.154.238 any eq 22 &lt;/P&gt;&lt;P&gt;access-list out-in permit tcp --moderator edit-- nnn.nnn.nn.0 255.255.252.0 any eq 22 &lt;/P&gt;&lt;P&gt;access-list out-in permit tcp 194.65.19.0 255.255.255.0 any eq 22 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;access-list 101 permit ip --moderator edit-- mm.mmm.mmm.0 255.255.255.0 10.10.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;interface ethernet0 auto &lt;/P&gt;&lt;P&gt;interface ethernet1 auto &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip address outside 60.60.60.1 255.255.255.252 &lt;/P&gt;&lt;P&gt;ip address inside --moderator edit-- mm.mmm.mmm.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip audit info action alarm &lt;/P&gt;&lt;P&gt;ip audit attack action alarm &lt;/P&gt;&lt;P&gt;pdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;nat (inside) 1 --moderator edit-- mm.mmm.mmm.0 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;access-group out-in in interface outside &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 60.60.60.2 1 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si &lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;filter activex 80 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;filter java 80 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community public &lt;/P&gt;&lt;P&gt;no snmp-server enable traps &lt;/P&gt;&lt;P&gt;floodguard enable &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;no sysopt route dnat &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp &lt;/P&gt;&lt;P&gt;crypto map mymap 10 match address 101 &lt;/P&gt;&lt;P&gt;crypto map mymap 10 set peer --moderator edit-- xx.xx.xx.1 &lt;/P&gt;&lt;P&gt;crypto map mymap 10 set transform-set myset &lt;/P&gt;&lt;P&gt;crypto map mymap interface outside &lt;/P&gt;&lt;P&gt;isakmp enable outside &lt;/P&gt;&lt;P&gt;isakmp key ******** address --moderator edit-- xx.xx.xx.1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;isakmp identity address &lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des &lt;/P&gt;&lt;P&gt;isakmp policy 1 hash md5 &lt;/P&gt;&lt;P&gt;isakmp policy 1 group 1 &lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 43200 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;telnet timeout 5 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh timeout 5 &lt;/P&gt;&lt;P&gt;terminal width 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration of my two C807H is like this: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname RouterA-ADSL &lt;/P&gt;&lt;P&gt;enable secret WWWW &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;username ADSLPRIME password SRTFRD &lt;/P&gt;&lt;P&gt;ip subnet-zero &lt;/P&gt;&lt;P&gt;no ip domain-lookup &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 10.10.10.1 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;vpdn enable &lt;/P&gt;&lt;P&gt;vpdn-group pppoe &lt;/P&gt;&lt;P&gt;request-dialin &lt;/P&gt;&lt;P&gt;protocol pppoe &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0 &lt;/P&gt;&lt;P&gt;ip address --moderator edit-- xx.xx.xx.2 255.255.255.252 &lt;/P&gt;&lt;P&gt;ip tcp adjust-mss 1452 &lt;/P&gt;&lt;P&gt;no cdp enable &lt;/P&gt;&lt;P&gt;hold-queue 100 out &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface ATM0 &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;load-interval 30 &lt;/P&gt;&lt;P&gt;no atm ilmi-keepalive &lt;/P&gt;&lt;P&gt;pvc 0/35 &lt;/P&gt;&lt;P&gt;pppoe-client dial-pool-number 1 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;dsl operating-mode auto &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Dialer1 &lt;/P&gt;&lt;P&gt;mtu 1492 &lt;/P&gt;&lt;P&gt;ip address negotiated &lt;/P&gt;&lt;P&gt;encapsulation ppp &lt;/P&gt;&lt;P&gt;ip tcp adjust-mss 1452 &lt;/P&gt;&lt;P&gt;load-interval 30 &lt;/P&gt;&lt;P&gt;dialer pool 1 &lt;/P&gt;&lt;P&gt;dialer-group 1 &lt;/P&gt;&lt;P&gt;ppp authentication pap callin &lt;/P&gt;&lt;P&gt;ppp pap sent-username &lt;A href="mailto:ADSL000@teste.pt"&gt;ADSL000@teste.pt&lt;/A&gt; password --moderator edit--&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip classless &lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 Dialer1 &lt;/P&gt;&lt;P&gt;no ip http server &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;access-list 2 permit xxx.xxx.xxx.xxx &lt;/P&gt;&lt;P&gt;access-list 2 permit xxx.xxx.xxx.xxx &lt;/P&gt;&lt;P&gt;access-list 2 deny any log &lt;/P&gt;&lt;P&gt;dialer-list 1 protocol ip permit &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;line con 0 &lt;/P&gt;&lt;P&gt;exec-timeout 120 0 &lt;/P&gt;&lt;P&gt;password --moderator edit--&lt;/P&gt;&lt;P&gt;login &lt;/P&gt;&lt;P&gt;stopbits 1 &lt;/P&gt;&lt;P&gt;line vty 0 4 &lt;/P&gt;&lt;P&gt;access-class 2 in &lt;/P&gt;&lt;P&gt;exec-timeout 120 0 &lt;/P&gt;&lt;P&gt;password --moderator edit--&lt;/P&gt;&lt;P&gt;login &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;scheduler max-task-time 5000 &lt;/P&gt;&lt;P&gt;end &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today I saw that the isakmp protocol is passing in the routers but the esp protocol is not. I had put an access-list to see what kind of traffic was passing in the adsl routers and I saw that. The version of the two adsl router is: c820-y6-mz.122-8.YJ.bin. &lt;/P&gt;&lt;P&gt;With the PIXs I can see that the isakmp (phase 1) negotiation is happening but the next negotiation (isakmp phase 2) is not. Is at this point that this thing fails. Some one can tell me why? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2003 10:32:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135551#M607411</guid>
      <dc:creator>rcapao</dc:creator>
      <dc:date>2003-04-08T10:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and ADSL router.</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135552#M607412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I don't think the configuration will work according to the given scenario. your internal network should have no problem get to the internet, that's because your pix has a default route pointed to ADSL router and your ADSl router forwards everything to the internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see that you are trying to establish IPSec tunnel between two private networks through PIX's outside interface(70.70.70.1 and 60.60.60.1), but both of your PIX has no way of reaching to the remote address nor through ADSL router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can either change your pix's outside interface to a global routable address if it's possible or NAT them through ADSL routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Jimmy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2003 14:16:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135552#M607412</guid>
      <dc:creator>xiaoj</dc:creator>
      <dc:date>2003-04-08T14:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and ADSL router.</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135553#M607413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That networks (60.60.60.0/32 and 70.70.70.0/32) are not the real networks. I gave this two as an example. The two networks that I have in reality are routable (they are not privet networks), that is, are networks given to me by one of the locals ISPs and in the routers and in the PIXs I can reach to them. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2003 14:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135553#M607413</guid>
      <dc:creator>rcapao</dc:creator>
      <dc:date>2003-04-08T14:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and ADSL router.</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135554#M607414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry.&lt;/P&gt;&lt;P&gt;The two networks that a gave as a example are 60.60.60.0/30 and 70.70.70.0/30. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2003 14:55:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135554#M607414</guid>
      <dc:creator>rcapao</dc:creator>
      <dc:date>2003-04-08T14:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and ADSL router.</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135555#M607415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see, in that case. I suggest you change the ACL name defined in crypto map, try not to use the same ACL that you used for nat0, it causes problem sometimes.&lt;/P&gt;&lt;P&gt;Try that and see if it works for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Jimmy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2003 15:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135555#M607415</guid>
      <dc:creator>xiaoj</dc:creator>
      <dc:date>2003-04-08T15:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and ADSL router.</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135556#M607416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok.&lt;/P&gt;&lt;P&gt;The problem is solved.&lt;/P&gt;&lt;P&gt;Thank Jimmy for your help and advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rui&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Apr 2003 14:45:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-adsl-router/m-p/135556#M607416</guid>
      <dc:creator>rcapao</dc:creator>
      <dc:date>2003-04-09T14:45:44Z</dc:date>
    </item>
  </channel>
</rss>

