<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX routing issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244272#M611470</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nadeem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is true regarding the access list, I forgot about that.  Also the information regarding the static entries is of note.  I have been looking at this too long and in the wrong places I think.  I will try these and post when I see what results.  Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 21 Oct 2003 01:35:59 GMT</pubDate>
    <dc:creator>bevans</dc:creator>
    <dc:date>2003-10-21T01:35:59Z</dc:date>
    <item>
      <title>PIX routing issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244267#M611452</link>
      <description>&lt;P&gt;We currently have a Cisco PIX that connects to our local network and then out to a T1 connection.  We added a loadbalancing device that sits between the T1 link and the PIX.  I changed the PIX's outside IP address and outside interface default route to fit the configuration change.  From on the PIX I can ping out to the Internet.  From behind the PIX I cannot ping out to the Internet.  I cannot even ping the external PIX interface from a workstation that is behind the PIX (behind the PIX = a workstation on the PIX's LAN).  Is there a configuration issue?  Is there something that the PIX does by default that I am not aware of?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill E.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:03:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244267#M611452</guid>
      <dc:creator>bevans</dc:creator>
      <dc:date>2020-02-21T07:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: PIX routing issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244268#M611459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PIX by default will not allow ICMP to come back thru the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If its absolutely important for you to ping to a host on the outside interface of the pix, you'd have to write an ACL, or a conduit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;~Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Oct 2003 22:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244268#M611459</guid>
      <dc:creator>jlebaron</dc:creator>
      <dc:date>2003-10-20T22:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: PIX routing issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244269#M611461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bill,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the first part of your message, we really do not have enough info to help in pinpointing the issue.  Perhaps we can start with your config (please remove all passwords and IP's).  As for part 2, it is expected that you would not be able to ping the PIX outside interface from a host on the inside network.  Packets must come in an interface and leave an interface in order to be passed by the PIX.  The PIX will not route back onto itself.  Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Oct 2003 22:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244269#M611461</guid>
      <dc:creator>scoclayton</dc:creator>
      <dc:date>2003-10-20T22:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: PIX routing issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244270#M611463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your post.  Below is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.1(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol h323 1720&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.67 eq smtp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.67 eq pop3 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.67 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.67 eq 3389 &lt;/P&gt;&lt;P&gt;           &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.67 eq ftp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.70 eq 1494 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.71 eq 1494 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.70 eq 1433 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.71 eq 1433 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.70 eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.71 eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.69 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.67 eq 5661 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.67 eq 5662 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit udp any host X.X.X.67 eq 5661 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit udp any host X.X.X.67 eq 5662 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.67 eq 5671 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.67 eq 5672 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit udp any host X.X.X.67 eq 5671 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit udp any host X.X.X.67 eq 5672 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host X.X.X.72 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;         &lt;/P&gt;&lt;P&gt;ip address outside 192.168.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address inside 10.10.5.1 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address DMZ 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover ip address outside 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover ip address inside 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;failover ip address DMZ 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alias (inside) 10.10.1.26 X.X.X.70 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alias (inside) 10.10.1.27 X.X.X.71 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alias (inside) 10.10.1.19 X.X.X.69 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alias (inside) 10.10.1.30 X.X.X.72 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;alias (DMZ) 192.168.1.67 X.X.X.67 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) X.X.X.67 192.168.1.67 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) X.X.X.70 10.10.1.26 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) X.X.X.71 10.10.1.27 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) X.X.X.69 10.10.1.19 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) X.X.X.72 10.10.1.30 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;              &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server community&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is probably worth mentioning that I have proxyarp disabled.  Also, our load balancing device does nat and so does the PIX.  It is very odd because it seemsthat traffic does not pass from the PIXs internal network to the external.  Also, DMZ traffic will not pass to the outbound interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill E.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Oct 2003 23:48:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244270#M611463</guid>
      <dc:creator>bevans</dc:creator>
      <dc:date>2003-10-20T23:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: PIX routing issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244271#M611467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; A couple of things worth mentioning here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- the access-list 101 should have an entry for the echo replies&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- You have a few static defined on the PIX, which are probably translating to public address, hence only these IPs will be allowed to go to the internet, provided you have routes configured for these IPs on your Load Balancer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3- All other devices besides the one in static will not be able to go intenet unless you configure nat for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Nadeem Khawaja&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Oct 2003 00:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244271#M611467</guid>
      <dc:creator>nkhawaja</dc:creator>
      <dc:date>2003-10-21T00:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: PIX routing issue</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244272#M611470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nadeem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is true regarding the access list, I forgot about that.  Also the information regarding the static entries is of note.  I have been looking at this too long and in the wrong places I think.  I will try these and post when I see what results.  Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Oct 2003 01:35:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-issue/m-p/244272#M611470</guid>
      <dc:creator>bevans</dc:creator>
      <dc:date>2003-10-21T01:35:59Z</dc:date>
    </item>
  </channel>
</rss>

