<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with PIX 525 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530194#M609606</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside1) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Oct 2010 03:02:15 GMT</pubDate>
    <dc:creator>Nagaraja Thanthry</dc:creator>
    <dc:date>2010-10-07T03:02:15Z</dc:date>
    <item>
      <title>Problem with PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530191#M609602</link>
      <description>&lt;P&gt;I have a problem with a pix 525 firewall that I recently aquired. I have setup multiple interfaces using NAT and PAT. Everything is working so far except communication from higher security interfaces to lower security.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside1&lt;/P&gt;&lt;P&gt;192.168.0.X&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside2&lt;/P&gt;&lt;P&gt;192.168.1.X&lt;/P&gt;&lt;P&gt;security-level 90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not able to access inside2 interface from inside1. It was my understanding that the PIX allows communication to lower security level interfaces by default and access from all interfaces to outside is working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to PIX and routing in general.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where am I going wrong?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:51:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530191#M609602</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-03-11T18:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530192#M609604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please post the NAT configurations here? Also, please post the access-list entries for both inside and inside2 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 00:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530192#M609604</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-10-07T00:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530193#M609605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure, here is the info you requested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for looking at this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq 4100 log&lt;BR /&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.154 eq 3389&lt;BR /&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq smtp&lt;BR /&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq www&lt;BR /&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq https&lt;BR /&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq pop3&lt;BR /&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.154 eq ftp&lt;BR /&gt;access-list 101 extended permit ip any host xxx.xxx.xxx.155&lt;BR /&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq 5000&lt;BR /&gt;access-list 101 extended permit gre any host xxx.xxx.xxx.153&lt;BR /&gt;access-list 101 extended permit tcp any host xxx.xxx.xxx.153 eq pptp&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside1 1500&lt;BR /&gt;mtu inside2 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu internet 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image flash:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 2 xxx.xxx.xxx.154&lt;BR /&gt;global (outside) 3 xxx.xxx.xxx.155&lt;BR /&gt;global (outside) 4 xxx.xxx.xxx.156&lt;BR /&gt;nat (inside1) 1 192.168.0.0 255.255.255.0&lt;BR /&gt;nat (inside2) 2 192.168.1.0 255.255.255.0&lt;BR /&gt;nat (dmz) 3 192.168.2.0 255.255.255.0&lt;BR /&gt;nat (internet) 4 192.168.3.0 255.255.255.0&lt;BR /&gt;static (inside2,outside) tcp xxx.xxx.xxx.154 ftp 192.168.1.2 ftp netmask 255.255.255.255&lt;BR /&gt;static (inside1,outside) tcp interface smtp 192.168.0.2 smtp netmask 255.255.255.255&lt;BR /&gt;static (inside1,outside) tcp interface 5000 192.168.0.100 5000 netmask 255.255.255.255&lt;BR /&gt;static (inside1,outside) tcp interface www 192.168.0.2 www netmask 255.255.255.255&lt;BR /&gt;static (inside1,outside) tcp interface https 192.168.0.2 https netmask 255.255.255.255&lt;BR /&gt;static (inside1,outside) tcp interface pop3 192.168.0.2 pop3 netmask 255.255.255.255&lt;BR /&gt;static (inside1,outside) tcp interface pptp 192.168.0.2 pptp netmask 255.255.255.255&lt;BR /&gt;static (inside2,outside) tcp xxx.xxx.xxx.154 3389 192.168.1.2 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside1,outside) tcp interface 4100 192.168.0.2 4100 netmask 255.255.255.255&lt;BR /&gt;static (dmz,outside) xxx.xxx.xxx.155 192.168.2.2 netmask 255.255.255.255&lt;BR /&gt;access-group 101 in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 00:59:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530193#M609605</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2010-10-07T00:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530194#M609606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside1) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 03:02:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530194#M609606</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-10-07T03:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530195#M609607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes thank you that worked. I can now access the FTP server on inside2 from inside1 but not the other way which is what I want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So was I wrong to think that the pix allows communication to lower security interfaces by default?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, could you explain what this config means in detail. I am trying to learn this device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 03:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530195#M609607</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2010-10-07T03:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530196#M609608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration I have provided basically tells the firewall that when you are going from Inisde1 to Inside2, the source address should not be changed i.e. you have to bypass the NAT rules. This will satisfy the NAT requirement between higher security interface and the lower security interface. It will also allow the Inside2 to open a connection towards Inside1 hosts. The reason you are not able to initiate connections from Inside2 towards Inside1 is because Inside2 is at a lower security level and you need to have an exclusive access-list allowing that access. You can try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 102 permit ip any host &lt;INSIDE1 host=""&gt;&lt;/INSIDE1&gt;&lt;/P&gt;&lt;P&gt;access-list 102 deny ip any 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 102 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 102 in interface Inside2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above configuration &lt;INSIDE1 host=""&gt; is the host that you need access to from Inside2 subnet. If you want unlimited access between Inisde1 and Inside2, then you can ignore the first two lines and just add the 3rd line.&lt;/INSIDE1&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 04:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530196#M609608</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-10-07T04:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with PIX 525</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530197#M609609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No I would only like connections to be initialted from inside1. Interface inside2 has an old FTP server on it that I dont want to have access to my domain network on inside1. This is exactly what I wanted to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So let me see if I understand this correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The line...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside1) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sets up a NAT rule for inside1 that is defined by what is in the access list "nonat" rather than an IP like in my config (nat (inside1) 1 192.168.0.0).&lt;/P&gt;&lt;P&gt;and then that access list sets the rules for communication between the interfaces in this case allowing all trafic from inside1 clients to inside2 clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I wanted to expand on this an give inside1 access to another interface (inside3; 192.168.2.0; sec. lev. 80 for example), I could add the following...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.0.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, am I correct to assume that I don't need to tie the nonat access list to an interface using the access-group command because it is already tied to that interface within the NAT statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry if my terminology is not 100%&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a million for all you help. I have been looking everywhere for the answer to this question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Oct 2010 04:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-pix-525/m-p/1530197#M609609</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2010-10-07T04:34:53Z</dc:date>
    </item>
  </channel>
</rss>

