<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX only avail after pinging from itself in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-only-avail-after-pinging-from-itself/m-p/210659#M610343</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you using NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i was you, I would drop the DMZ ACL's and just have ACLS that relate to the static statements, then use nat for the inside clients to access the public and dmz networks. Also use nat for the dmz to access the public network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also, are you trying to block trying going OUT of the dmz or IN to it? You did an IN statement, not and usually you block at the outside interface, not the dmz one.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 13 Dec 2003 20:13:23 GMT</pubDate>
    <dc:creator>koaps</dc:creator>
    <dc:date>2003-12-13T20:13:23Z</dc:date>
    <item>
      <title>PIX only avail after pinging from itself</title>
      <link>https://community.cisco.com/t5/network-security/pix-only-avail-after-pinging-from-itself/m-p/210658#M610338</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got a PIX515e/UR running 6.3(1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like it is only reachable e.g. for ICMP once it pinged the other end first.&lt;/P&gt;&lt;P&gt;I try from ping 10.0.0.1 (host) and 10.0.0.254 (gateway) to the outside interface with no success.After pinging from the outside interface to this IPs I get two-way communication going. But just to the PIX not the host mapped by the static command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This behaviour is reproducible by clearing the arp entries on the host and the gateway.&lt;/P&gt;&lt;P&gt;I did some research mirroring traffic to and from the PIX and it does not seems to recognize the ARP requests at all.&lt;/P&gt;&lt;P&gt;debug arp gives me nothing at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW the gateway is a Alpine 3808 and the host is switched through it to access the PIX which is on a dedicated port there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Important part of the config follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 vlan2 logical&lt;/P&gt;&lt;P&gt;interface ethernet1 vlan3 logical&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif vlan2 dmz security10&lt;/P&gt;&lt;P&gt;nameif vlan3 internal security90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list compiled&lt;/P&gt;&lt;P&gt;access-list ACL_OUTSIDE_IN permit icmp any any&lt;/P&gt;&lt;P&gt;access-list ACL_OUTSIDE_IN permit ip host 10.0.0.1 any&lt;/P&gt;&lt;P&gt;access-list ACL_OUTSIDE_IN permit ip host 10.0.0.2 any&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ_IN deny ip 192.168.254.0 255.255.255.0 192.168.254.0&lt;/P&gt;&lt;P&gt;+255.255.255.0&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ_IN permit icmp any any&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ_IN permit ip any host 10.0.0.1&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ_IN permit ip any host 10.0.0.2&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ_IN permit udp any host 10.1.1.4 eq domain&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ_IN permit udp any host 10.1.1.5 eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;icmp permit any internal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside 10.0.0.250 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.155.254 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz 192.168.254.254 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address internal 192.168.151.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (dmz,outside) 10.0.0.50 192.168.254.1 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ACL_OUTSIDE_IN in interface outside&lt;/P&gt;&lt;P&gt;access-group ACL_DMZ_IN in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.0.0.254 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-only-avail-after-pinging-from-itself/m-p/210658#M610338</guid>
      <dc:creator>sven.huster</dc:creator>
      <dc:date>2020-02-21T07:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: PIX only avail after pinging from itself</title>
      <link>https://community.cisco.com/t5/network-security/pix-only-avail-after-pinging-from-itself/m-p/210659#M610343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you using NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i was you, I would drop the DMZ ACL's and just have ACLS that relate to the static statements, then use nat for the inside clients to access the public and dmz networks. Also use nat for the dmz to access the public network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also, are you trying to block trying going OUT of the dmz or IN to it? You did an IN statement, not and usually you block at the outside interface, not the dmz one.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Dec 2003 20:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-only-avail-after-pinging-from-itself/m-p/210659#M610343</guid>
      <dc:creator>koaps</dc:creator>
      <dc:date>2003-12-13T20:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: PIX only avail after pinging from itself</title>
      <link>https://community.cisco.com/t5/network-security/pix-only-avail-after-pinging-from-itself/m-p/210660#M610347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The internal and inside interfaces will use NAT to get to the outside but not between each other and the DMZ.&lt;/P&gt;&lt;P&gt;I need to DMZ ACL as I want to control what's allowed/denied from the hosts on this network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Dec 2003 09:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-only-avail-after-pinging-from-itself/m-p/210660#M610347</guid>
      <dc:creator>sven.huster</dc:creator>
      <dc:date>2003-12-14T09:51:46Z</dc:date>
    </item>
  </channel>
</rss>

