<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port forwarding on Pix 515E in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-on-pix-515e/m-p/1515767#M610927</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Port forwarding on Pix 515E&lt;/P&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;What I am trying to accomplish is to forward port 80 and port 443 to allow a Microsoft Small Business Server to access Remote Web Workplace.&lt;/P&gt;&lt;P&gt;Thank you for your help&lt;/P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial;"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial;"&gt;&lt;P&gt;Here is my config&lt;/P&gt;&lt;P&gt;PIX(config)# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz security50&lt;/P&gt;&lt;P&gt;enable password XJX9T/MNG54uoaTm encrypted&lt;/P&gt;&lt;P&gt;passwd XJX9T/MNG54uoaTm encrypted&lt;/P&gt;&lt;P&gt;hostname PIX&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 10.0.1.103 eq https&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip address outside dhcp setroute&lt;/P&gt;&lt;P&gt;ip address inside 10.0.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz 172.16.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.100.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route dmz 192.168.42.0 255.255.255.0 192.168.1.5 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 10.0.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.0.1.0 255.255.255.0 dmz&lt;/P&gt;&lt;P&gt;telnet timeout 3&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 10.0.1.100-10.0.1.125 inside&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.2.2-172.16.2.20 dmz&lt;/P&gt;&lt;P&gt;dhcpd dns 205.171.3.25 192.168.100.1&lt;/P&gt;&lt;P&gt;dhcpd wins 209.165.201.5&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain sbssrv.com&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;dhcpd enable dmz&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;banner login Enter your password to log in&lt;/P&gt;&lt;P&gt;Cryptochecksum:3a32247b0d6dd90b125f3873d0e30902&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;networ setup DSL Router&amp;gt;PIX&amp;gt;DMZ&amp;gt;Server&lt;/P&gt;&lt;P&gt;IP Address&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.2.2-172.16.2.20 dmz&lt;/P&gt;&lt;SPAN style=": ; font-size: 2; font-family: Arial; "&gt;&lt;P&gt;DSL Router&lt;/P&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: Arial; font-size: 2; "&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; font-size: 12pt; font-family: Times New Roman; "&gt;174.21.215.27&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Server 172.16.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:43:53 GMT</pubDate>
    <dc:creator>Mark Bracking</dc:creator>
    <dc:date>2019-03-11T18:43:53Z</dc:date>
    <item>
      <title>Port forwarding on Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-on-pix-515e/m-p/1515767#M610927</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Port forwarding on Pix 515E&lt;/P&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;What I am trying to accomplish is to forward port 80 and port 443 to allow a Microsoft Small Business Server to access Remote Web Workplace.&lt;/P&gt;&lt;P&gt;Thank you for your help&lt;/P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial;"&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial;"&gt;&lt;P&gt;Here is my config&lt;/P&gt;&lt;P&gt;PIX(config)# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz security50&lt;/P&gt;&lt;P&gt;enable password XJX9T/MNG54uoaTm encrypted&lt;/P&gt;&lt;P&gt;passwd XJX9T/MNG54uoaTm encrypted&lt;/P&gt;&lt;P&gt;hostname PIX&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 10.0.1.103 eq https&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip address outside dhcp setroute&lt;/P&gt;&lt;P&gt;ip address inside 10.0.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz 172.16.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.100.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route dmz 192.168.42.0 255.255.255.0 192.168.1.5 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 10.0.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.0.1.0 255.255.255.0 dmz&lt;/P&gt;&lt;P&gt;telnet timeout 3&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 10.0.1.100-10.0.1.125 inside&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.2.2-172.16.2.20 dmz&lt;/P&gt;&lt;P&gt;dhcpd dns 205.171.3.25 192.168.100.1&lt;/P&gt;&lt;P&gt;dhcpd wins 209.165.201.5&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain sbssrv.com&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;dhcpd enable dmz&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;banner login Enter your password to log in&lt;/P&gt;&lt;P&gt;Cryptochecksum:3a32247b0d6dd90b125f3873d0e30902&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;networ setup DSL Router&amp;gt;PIX&amp;gt;DMZ&amp;gt;Server&lt;/P&gt;&lt;P&gt;IP Address&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.2.2-172.16.2.20 dmz&lt;/P&gt;&lt;SPAN style=": ; font-size: 2; font-family: Arial; "&gt;&lt;P&gt;DSL Router&lt;/P&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: Arial; font-size: 2; "&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style=": ; font-size: 12pt; font-family: Times New Roman; "&gt;174.21.215.27&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Server 172.16.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:43:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-on-pix-515e/m-p/1515767#M610927</guid>
      <dc:creator>Mark Bracking</dc:creator>
      <dc:date>2019-03-11T18:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding on Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-on-pix-515e/m-p/1515768#M610928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 80 &lt;MICROSOFTSERVERIP&gt; 80 netmask 255.255.255.255&lt;/MICROSOFTSERVERIP&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 443 &lt;MICROSOFTSERVERIP&gt; 443 netmask 255.255.255.255&lt;/MICROSOFTSERVERIP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no &lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;access-list outside_access_in permit tcp any host 10.0.1.103 eq https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;access-list outside_access_in permit tcp any interface outside eq https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial; "&gt;access-list outside_access_in permit tcp any interface outside eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Sep 2010 02:43:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-on-pix-515e/m-p/1515768#M610928</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-23T02:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding on Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-on-pix-515e/m-p/1515769#M610929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This is the error message that I receive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote Web Access to your server is blocked&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some routers may not work properly with your server. Visit the support Web site for your router manufacturer and ensure that your router has the most recent firmware.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some internet providers (ISP) block ports 80 and 443 to prevent customers from remotely accessing services that are hosted on their networks. For more information, contact your ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;UPnP is not enabled on the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried the suggestions and they did not work. Does anyone of any other suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Sep 2010 17:32:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-on-pix-515e/m-p/1515769#M610929</guid>
      <dc:creator>Mark Bracking</dc:creator>
      <dc:date>2010-09-23T17:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding on Pix 515E</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-on-pix-515e/m-p/1515770#M610930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the IP address of the SBS (172.16.2.2), it resides behind the DMZ interface, correct?&amp;nbsp; The static statements need to be changed as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp interface 80 172.16.2.2 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp interface 443 172.16.2.2 443 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (&lt;STRONG&gt;dmz&lt;/STRONG&gt;,outside) tcp interface 80 172.16.2.2 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (&lt;STRONG&gt;dmz&lt;/STRONG&gt;,outside) tcp interface 443 172.16.2.2 443 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can leave the ACL as follows, which is correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial;"&gt;access-list outside_access_in permit tcp any interface outside eq https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Arial;"&gt;access-list outside_access_in permit tcp any interface outside eq 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please give that a try, thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Sep 2010 17:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-on-pix-515e/m-p/1515770#M610930</guid>
      <dc:creator>Allen P Chen</dc:creator>
      <dc:date>2010-09-23T17:43:44Z</dc:date>
    </item>
  </channel>
</rss>

