<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX-Internet Problem  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300847#M610434</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post me your full PIX config, either here on the forum or direct to me at &lt;A href="mailto:jmia@ohgroup.co.uk"&gt;jmia@ohgroup.co.uk&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls remember to change passwords and real IPs - Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Dec 2003 15:29:40 GMT</pubDate>
    <dc:creator>jmia</dc:creator>
    <dc:date>2003-12-10T15:29:40Z</dc:date>
    <item>
      <title>PIX-Internet Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300843#M610430</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;   My pix is up and  internet is  fine , but i need only One IP addesss x.x.x.1 to access internet rest other denied, and x.x.x.1 will have ISA server from where i will permit particular users to browse internet , Am using NAT/PAT on PIX , what will be my access-list , coz if i remove from NAT from PIX this will stop the whole internet and email access... Can any one let me know this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i tried this but no success&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 111 permit tcp 10.x.x.1 255.255.255.255 any eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 111 in interface inside &lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:08:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300843#M610430</guid>
      <dc:creator>secnas</dc:creator>
      <dc:date>2020-02-21T07:08:53Z</dc:date>
    </item>
    <item>
      <title>Re: PIX-Internet Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300844#M610431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That access list is probably blocking the ISA server from being able to make UDP based DNS requests to resolve hostnames to IP addresses. Assuming your dns servers are outside of the PIX, adding this line should allow dns to work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 111 permit udp 10.x.x.1 255.255.255.255 any eq dns  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2003 11:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300844#M610431</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2003-12-10T11:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: PIX-Internet Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300845#M610432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I presume what you are saying is that you want all internet connections to go via your ISA server, correct? If so then do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;NAME or="" number=""&gt; permit tcp host &lt;INSIDE isa="" server="" ip=""&gt; any eq www&lt;/INSIDE&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;NAME or="" number=""&gt; deny tcp any any eq www&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;NAME or="" number=""&gt; permit ip any any&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;access-group &lt;NAME or="" number=""&gt; in interface inside&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now makesure to save with cmd write memory and also clear translations with cmd clear xlate.&lt;/P&gt;&lt;P&gt;Write you access-list on a notepad first (as above) and then issue a no access-list &lt;NAME or="" number=""&gt; as the first line, this way when you paste back onto the PIX you'll get a clean config for the access-list mentioned i.e.&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Config mode on PIX:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list &lt;NAME or="" number=""&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;NAME or="" number=""&gt; permit tcp host &lt;INSIDE isa="" server="" ip=""&gt; any eq www&lt;/INSIDE&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;NAME or="" number=""&gt; deny tcp any any eq www&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;NAME or="" number=""&gt; permit ip any any&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;access-group &lt;NAME or="" number=""&gt; in interface inside&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps and let me know how you get on -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2003 13:30:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300845#M610432</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2003-12-10T13:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: PIX-Internet Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300846#M610433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did the both suggestions , but still internet is not working ... Error &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Web page is not available &lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can't find DNS server , &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: if i remove this access-list applied to inside interface then my internet works fine ... I higly appreicated your response ... hope to see new workarounds ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2003 14:25:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300846#M610433</guid>
      <dc:creator>secnas</dc:creator>
      <dc:date>2003-12-10T14:25:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX-Internet Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300847#M610434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post me your full PIX config, either here on the forum or direct to me at &lt;A href="mailto:jmia@ohgroup.co.uk"&gt;jmia@ohgroup.co.uk&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls remember to change passwords and real IPs - Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2003 15:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300847#M610434</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2003-12-10T15:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: PIX-Internet Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300848#M610435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password  XXXX encrypted&lt;/P&gt;&lt;P&gt;passwd encrypted&lt;/P&gt;&lt;P&gt;hostname &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 10.0.0.0 255.255.0.0 10.50.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 120 permit ip 10.0.0.0 255.255.0.0 10.60.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.0.0.0 255.255.0.0 10.50.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.0.0.0 255.255.0.0 10.60.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list 100 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host X.X.X.X eq www&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside X&amp;gt;X&amp;gt;X&amp;gt; 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address inside 10.0.0.15 255.255.0.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 62.3.X.X&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) X.X.X.X 10.0.0.1 netmask 255.255.255.255 0&lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 62.3.47.130 1&lt;/P&gt;&lt;P&gt;route inside 10.10.0.0 255.255.0.0 10.0.0.109 1&lt;/P&gt;&lt;P&gt;route inside 10.100.0.0 255.255.0.0 10.0.0.109 1&lt;/P&gt;&lt;P&gt;route inside 10.110.0.0 255.255.0.0 10.0.0.109 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set araset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map rascomap 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map rascomap 20 match address 110&lt;/P&gt;&lt;P&gt;crypto map rascomap 20 set peer &lt;/P&gt;&lt;P&gt;crypto map rascomap 20 set transform-set araset&lt;/P&gt;&lt;P&gt;crypto map rascomap 30 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map rascomap 30 match address 120&lt;/P&gt;&lt;P&gt;crypto map rascomap 30 set peer &lt;/P&gt;&lt;P&gt;crypto map rascomap 30 set transform-set araset&lt;/P&gt;&lt;P&gt;crypto map rascomap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp key ******** address netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:77debd4e5bda066901b9f479718fac60&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;[OK]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Dec 2003 06:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300848#M610435</guid>
      <dc:creator>secnas</dc:creator>
      <dc:date>2003-12-13T06:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: PIX-Internet Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300849#M610436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; From the outside in, everything is blocked on a pix, so long as it is not part of a connection originated in the outbound direction from the inside interface. Your access list 100 is applied to the outside interface - it will allow some icmp traffic thru, and it will allow people on the internet to access the http port of host x.x.x.x. Is x.x.x.x a web server? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now, you have nothing blocking any internal machines from making outbound connections. All internal machines should be able to do just about anything they want. With the above configuration, what does not work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Dec 2003 15:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-internet-problem/m-p/300849#M610436</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2003-12-13T15:30:43Z</dc:date>
    </item>
  </channel>
</rss>

