<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anything wrong with this Pix 501 config? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162132#M608224</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes to all of the above.  I can see the connections in sh conn, and I can see the translations in sh xlate.  The log show the connections being setup and torn down, but nothing is shown coming in.  And it still blows my mind that I am passing IPSEC traffic, but when it comes to plain old ICMP or unenc IP traffic it doesn't go through.  The only anamoly I've seen so far is an entry in the log when I try and ping the outside int from a remote site.  Here's the error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;402106: Rec'd packet not an IPSEC packet. (ip) dest_addr= &lt;PIX outside="" int="" ip=""&gt;, src_addr&lt;/PIX&gt;&lt;/P&gt;&lt;P&gt;= &lt;REMOTE site="" ip=""&gt;, prot= icmp&lt;/REMOTE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I have setup an acces-list saying permit icmp any any eq echo/echo-r but am showing no "hits" when I try and send pings out.  TAC says that no hits are showing up because I'm not getting any replys back, but it is an any any so shouldn't it show outgoing traffic as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember the days of nice simple Frame Relay?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zach&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Mar 2003 20:48:41 GMT</pubDate>
    <dc:creator>zcude</dc:creator>
    <dc:date>2003-03-19T20:48:41Z</dc:date>
    <item>
      <title>Anything wrong with this Pix 501 config?</title>
      <link>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162130#M608222</link>
      <description>&lt;P&gt;Then why can't it pass internet traffic!!!  Long story, short I had the Pix running its basic nat/global "I pass all traffic from inside to outside" config running without any problem.  Well I did have a bit of a hard time actually getting the traffic to pass, but hey it's a PIX it normally does what it wants for the first couple of hours of installation.  Finally go it to pass traffic and everything was kosher until I started configing it to VPN into my 3005 concentrator (that's a whole nother story).  I got the VPN up and running fine, but now the Pix has decided to STOP passing traffic to anything other than my remote VPN site.  I know it's up because I'm telnetting into it via another Cisco router on its local network, but it can't ping nothing and using the "debug icmp trace" command yields nada.  Nothing.  Zip.  Silence.  Makes me think that something is broke.&lt;/P&gt;&lt;P&gt;Anyways, here's the sterilized config if you guys would be so gracious to glance over and see if I have made any egregious errors.  Thanks in advance.&lt;/P&gt;&lt;P&gt;BTW I'm about to add another VPN tunnel so that's why there is 2 entries in the nat 0 command and a second access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enjoy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.1(3)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password hackmewhatdoIcare &lt;/P&gt;&lt;P&gt;passwd itsareallyhardone &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;hostname Pix&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 1720&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 172.16.x.0 255.255.255.0 172.16.y.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 172.16.x.0 255.255.255.0 10.z.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 120 permit ip 172.16.x.0 255.255.255.0 172.16.y.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 130 permit ip 172.16.x.0 255.255.255.0 10.z.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 10full&lt;/P&gt;&lt;P&gt;mtu outside 1200&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside dhcp setroute&lt;/P&gt;&lt;P&gt;ip address inside 172.16.x.254 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.x.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si&lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;no floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map IPSEC 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map IPSEC 10 match address 120&lt;/P&gt;&lt;P&gt;crypto map IPSEC 10 set peer 206.a.a.a&lt;/P&gt;&lt;P&gt;crypto map IPSEC 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map IPSEC interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 206.a.a.a netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 28800&lt;/P&gt;&lt;P&gt;telnet 172.16.x.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 172.16.y.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 15&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm stumped, are you?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:37:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162130#M608222</guid>
      <dc:creator>zcude</dc:creator>
      <dc:date>2020-02-21T06:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: Anything wrong with this Pix 501 config?</title>
      <link>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162131#M608223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep.  Config looks OK from what I can tell.  When you try and go out, what does a "sho xlate" and "sho conn" show?  Do you see the connection created in the PIX syslog?  Syslog should give you an idea of what's going on.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Mar 2003 05:14:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162131#M608223</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2003-03-14T05:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: Anything wrong with this Pix 501 config?</title>
      <link>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162132#M608224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes to all of the above.  I can see the connections in sh conn, and I can see the translations in sh xlate.  The log show the connections being setup and torn down, but nothing is shown coming in.  And it still blows my mind that I am passing IPSEC traffic, but when it comes to plain old ICMP or unenc IP traffic it doesn't go through.  The only anamoly I've seen so far is an entry in the log when I try and ping the outside int from a remote site.  Here's the error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;402106: Rec'd packet not an IPSEC packet. (ip) dest_addr= &lt;PIX outside="" int="" ip=""&gt;, src_addr&lt;/PIX&gt;&lt;/P&gt;&lt;P&gt;= &lt;REMOTE site="" ip=""&gt;, prot= icmp&lt;/REMOTE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I have setup an acces-list saying permit icmp any any eq echo/echo-r but am showing no "hits" when I try and send pings out.  TAC says that no hits are showing up because I'm not getting any replys back, but it is an any any so shouldn't it show outgoing traffic as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember the days of nice simple Frame Relay?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zach&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Mar 2003 20:48:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162132#M608224</guid>
      <dc:creator>zcude</dc:creator>
      <dc:date>2003-03-19T20:48:41Z</dc:date>
    </item>
    <item>
      <title>Re: Anything wrong with this Pix 501 config?</title>
      <link>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162133#M608225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Zach,&lt;/P&gt;&lt;P&gt;If you break the VPN does the PIX start passing traffic again?  If so, make sure your not sending any mode config from the 3005.  Did you setup the VPN through the LANtoLAN configuration on the 3005 or use the base group or a new group?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just trying to help....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Mar 2003 19:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162133#M608225</guid>
      <dc:creator>mike-greene</dc:creator>
      <dc:date>2003-03-20T19:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Anything wrong with this Pix 501 config?</title>
      <link>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162134#M608226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ACl is only applied INbound on the interface, so no, you won't see hits as the ICMP packets go out cause those packets don't get checked against the ACL, only the replies will.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're trying to ping thru the PIX, then keep in mndthat ICMP's aren't automatically allowed back in, so you'll need the following (I think you have this but just want to make sure):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; access-list inbound permit icmp any any&lt;/P&gt;&lt;P&gt;&amp;gt; accessgroup inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can make the ACL more specific by putting "echo-reply" on the end of it, that'll only allow pings responses in, so outside people can't ping your internl hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "rec'd packet not an IPSec packet" is normal, you can't telnet to the outside of a PIXunless you come in over a tunnel, so if you just try a normal telnet the PIX expects it to be encrypted and complains about it, it's nothing to worry about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for why unencrypted traffic doesn't go out, not sure.  If the xlate/conn are created then the PIX seems to be doing it's job.  You might want to check with your ISP and make sure everything there is fine, sounds like a routing issue or something like that.  When the conn's are torn down, is it due to inactivity, do they show any bytes have gone across them?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Mar 2003 22:38:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162134#M608226</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2003-03-20T22:38:16Z</dc:date>
    </item>
    <item>
      <title>Re: Anything wrong with this Pix 501 config?</title>
      <link>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162135#M608227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I set it up LAN 2 LAN.  Have a network list in the source field on the 3005 of 172.16.y.0 and that 10.z.0.0 network.  I'm having it shipped back to me so I can hit it with a hammer and upgrade it to version 6.2.  I'll let you know if it solves anything.  At least the VPN config will be simpler with the EasyVPN commands.&lt;/P&gt;&lt;P&gt;Need all the help I can get...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Mar 2003 02:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anything-wrong-with-this-pix-501-config/m-p/162135#M608227</guid>
      <dc:creator>zcude</dc:creator>
      <dc:date>2003-03-21T02:01:44Z</dc:date>
    </item>
  </channel>
</rss>

