<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help requested: Cisco-PIX501 config not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491746#M613273</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Casper,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These static commands work as I would estimate due to the order of the interfaces as listed in ( ).&amp;nbsp; When explaining 'static' statements to customers, I use the following example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (real_interface,proxy_interface) proxy_ip real_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this example, real_interface and real_ip, as the name indicates, is the interface of the ASA where the host REALLY resides as well as the REAL IP address that is configured on the device (ie, the address that is shown via 'ipconfig' or 'ifconfig' on the device).&amp;nbsp; The proxy_interface and proxy_ip are the interfaces of the ASA that will act as a "forwarding device" for the traffic and the IP address that the ASA will respond to for that traffic (ie the NATed IP).&amp;nbsp; For instance, consider the following scenarios:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;Correct Topology/Configuration:&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server (10.1.1.2) -&amp;gt; (inside/10.1.1.1) ASA (outside/1.1.1.1) -&amp;gt; Internet -&amp;gt; ClientPC (1.1.1.3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this scenario, to host the server (10.1.1.2) on the internet using the IP address, 1.1.1.2, I would use the command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.2 10.1.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;BROKEN Topology/Configuration:&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;IF I were to reverse the order of the interfaces on the 'static' statement such as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 1.1.1.2 10.1.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The topology that this would represent is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client (1.1.1.3) -&amp;gt; (inside/1.1.1.1) ASA (outside/10.1.1.1) -&amp;gt; Internet -&amp;gt; Server (10.1.1.2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Aug 2010 19:10:55 GMT</pubDate>
    <dc:creator>Kevin Redmon</dc:creator>
    <dc:date>2010-08-27T19:10:55Z</dc:date>
    <item>
      <title>Help requested: Cisco-PIX501 config not working</title>
      <link>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491743#M613267</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm experiencing trouble with a PIX501 config. I hope someone is willing to help me on this, since I dont' have too much experience with Cisco-firewalls. I have an ASA5510 (configured by a specialist, I only add/remove/alter IP's) and I tried to apply the same sort of config to the PIX. Many commands are not accepted by the PIX, probably because of the older software-version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config is pasted below, an expert on this probably understands the purpose of this config...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that the servers cannot connect from inside to outside (tested &lt;A href="http://www.google.com" target="_blank"&gt;http://www.google.com&lt;/A&gt;), and that the servers cannot be reached from the outside. SSH and ping do work from inside and outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;BR /&gt;interface ethernet0 auto&lt;BR /&gt;interface ethernet1 100full&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;enable password **** encrypted&lt;BR /&gt;passwd **** encrypted&lt;BR /&gt;hostname ****&lt;BR /&gt;domain-name ****&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;fixup protocol dns maximum-length 512&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;fixup protocol http 80&lt;BR /&gt;fixup protocol rsh 514&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;fixup protocol sqlnet 1521&lt;BR /&gt;fixup protocol tftp 69&lt;BR /&gt;names&lt;BR /&gt;name 172.16.199.62 FirewallGateway&lt;BR /&gt;name **** srcCasperHome&lt;BR /&gt;name **** srcJaapHQ&lt;BR /&gt;name **** srcViking&lt;BR /&gt;name 172.16.199.48 svrWE01Inside&lt;BR /&gt;name ****.199.48 svrWE01Outside&lt;BR /&gt;name 172.16.199.49 svrvWEPROD01Inside&lt;BR /&gt;name ****.199.49 svrvWEPROD01Outside&lt;BR /&gt;name 172.16.199.50 svrvWEPROD02Inside&lt;BR /&gt;name ****.199.50 svrvWEPROD02Outside&lt;BR /&gt;name 172.16.199.51 svrvWETEST01Inside&lt;BR /&gt;name ****.199.51 svrvWETEST01Outside&lt;BR /&gt;object-group service Services_Public_svrWE01 tcp&lt;BR /&gt;object-group service Services_NonPublic_svrWE01 tcp&lt;BR /&gt;&amp;nbsp; port-object eq www&lt;BR /&gt;&amp;nbsp; port-object eq 3389&lt;BR /&gt;object-group service Services_Public_svrvWEPROD01 tcp&lt;BR /&gt;&amp;nbsp; port-object eq www&lt;BR /&gt;&amp;nbsp; port-object eq https&lt;BR /&gt;&amp;nbsp; port-object eq ftp&lt;BR /&gt;object-group service Services_NonPublic_svrvWEPROD01 tcp&lt;BR /&gt;&amp;nbsp; port-object eq 3389&lt;BR /&gt;object-group service Services_Public_svrvWEPROD02 tcp&lt;BR /&gt;&amp;nbsp; port-object eq www&lt;BR /&gt;object-group service Services_NonPublic_svrvWEPROD02 tcp&lt;BR /&gt;&amp;nbsp; port-object eq ftp&lt;BR /&gt;&amp;nbsp; port-object eq 3389&lt;BR /&gt;object-group network Trusted_Overall&lt;BR /&gt;&amp;nbsp; network-object host srcCasperHome&lt;BR /&gt;&amp;nbsp; network-object host srcJaapHQ&lt;BR /&gt;&amp;nbsp; network-object host srcViking&lt;BR /&gt;object-group network Trusted_svrW01&lt;BR /&gt;object-group network Trusted_svrvWEPROD01&lt;BR /&gt;object-group network Trusted_svrvWEPROD02&lt;BR /&gt;object-group network Trusted_svrvWETEST01&lt;BR /&gt;object-group service Services_NonPublic_svrvWETEST01 tcp&lt;BR /&gt;&amp;nbsp; port-object eq 3389&lt;BR /&gt;object-group service Services_Public_svrvWETEST01 tcp&lt;BR /&gt;&amp;nbsp; port-object eq www&lt;BR /&gt;&amp;nbsp; port-object eq https&lt;BR /&gt;&amp;nbsp; port-object eq ftp&lt;BR /&gt;access-list outside_access_in permit tcp any host svrvWEPROD01Inside object-group Services_Public_svrvWEPROD01&lt;BR /&gt;access-list outside_access_in permit tcp any host svrvWEPROD02Inside object-group Services_Public_svrvWEPROD02&lt;BR /&gt;access-list outside_access_in permit tcp any host svrvWETEST01Inside object-group Services_Public_svrvWETEST01&lt;BR /&gt;access-list outside_access_in permit tcp object-group Trusted_Overall host svrWE01Inside object-group Services_NonPublic_svrWE01&lt;BR /&gt;access-list outside_access_in permit tcp object-group Trusted_Overall host svrvWEPROD01Inside object-group Services_NonPublic_svrvWEPROD01&lt;BR /&gt;access-list outside_access_in permit tcp object-group Trusted_Overall host svrvWEPROD02Inside object-group Services_NonPublic_svrvWEPROD02&lt;BR /&gt;access-list outside_access_in permit tcp object-group Trusted_Overall host svrvWETEST01Inside object-group Services_NonPublic_svrvWETEST01&lt;BR /&gt;access-list outside_access_in permit icmp object-group Trusted_Overall any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging on&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;icmp permit host srcJaapHQ outside&lt;BR /&gt;icmp permit host srcViking outside&lt;BR /&gt;icmp permit host srcCasperHome outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip address outside ****.199.47 255.255.255.224&lt;BR /&gt;ip address inside FirewallGateway 255.255.255.0&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;ip audit attack action alarm&lt;BR /&gt;pdm logging informational 100&lt;BR /&gt;pdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;BR /&gt;static (outside,inside) svrWE01Outside svrWE01Inside dns netmask 255.255.255.255 0 0&lt;BR /&gt;static (outside,inside) svrvWEPROD01Outside svrvWEPROD01Inside dns netmask 255.255.255.255 0 0&lt;BR /&gt;static (outside,inside) svrvWEPROD02Outside svrvWEPROD02Inside dns netmask 255.255.255.255 0 0&lt;BR /&gt;static (outside,inside) svrvWETEST01Outside svrvWETEST01Inside dns netmask 255.255.255.255 0 0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 ****.199.62 1&lt;BR /&gt;timeout xlate 0:05:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt;aaa-server TACACS+ deadtime 10&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt;aaa-server RADIUS deadtime 10&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;no snmp-server enable traps&lt;BR /&gt;floodguard enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh srcJaapHQ 255.255.255.255 outside&lt;BR /&gt;ssh srcViking 255.255.255.255 outside&lt;BR /&gt;ssh srcCasperHome 255.255.255.255 outside&lt;BR /&gt;ssh 172.16.199.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;username weadmin password ztUzXsDyW6EdO7Uz encrypted privilege 15&lt;BR /&gt;terminal width 80&lt;BR /&gt;Cryptochecksum:3df02ef47f61ab4080d096b55fb51066&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:31:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491743#M613267</guid>
      <dc:creator>Casperdegeus</dc:creator>
      <dc:date>2019-03-11T18:31:32Z</dc:date>
    </item>
    <item>
      <title>Re: Help requested: Cisco-PIX501 config not working</title>
      <link>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491744#M613269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Casper,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are three key items that a host needs in order to traverse a firewall - Permissions, Translations, and Routes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the Translations, it looks as though you may have the interfaces "backwards":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) svrWE01Outside svrWE01Inside dns netmask 255.255.255.255 0 0&lt;BR /&gt;static (outside,inside) svrvWEPROD01Outside svrvWEPROD01Inside dns netmask 255.255.255.255 0 0&lt;BR /&gt;static (outside,inside) svrvWEPROD02Outside svrvWEPROD02Inside dns netmask 255.255.255.255 0 0&lt;BR /&gt;static (outside,inside) svrvWETEST01Outside svrvWETEST01Inside dns netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case, the interfaces should be listed as "static (inside,outside) &lt;OUTSIDE_IP&gt; &lt;INSIDE_IP&gt;" - it is likely that this is the reason you cannot get to the inside servers.&lt;/INSIDE_IP&gt;&lt;/OUTSIDE_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just reviewing the Permissions (via the access-group) - these lookk good on the surface - as do the routes.&amp;nbsp; At this point, it looks as though the 'static' statements are your only problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this resolves your issues, please be sure to mark this thread as answered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great weekend,&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 14:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491744#M613269</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2010-08-27T14:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: Help requested: Cisco-PIX501 config not working</title>
      <link>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491745#M613271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much for your reply! Below I posted the config of the ASA5510 which resides in the same rack/network. I used this as an example because this device works properly. Do you know why these static lines seem to be ok since the device works?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2)&lt;BR /&gt;!&lt;BR /&gt;hostname Nemo1&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password 9HQ3YZN4r6yXmgGR encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name **** srcJaapHQ&lt;BR /&gt;name **** srcParthaHome&lt;BR /&gt;name **** srcViking&lt;BR /&gt;name **** srcWEWWW01&lt;BR /&gt;name 172.16.199.41 svrYawsInside&lt;BR /&gt;name ***.***.199.41 svrYawsOutside&lt;BR /&gt;name 172.16.199.42 svrFlipperInside&lt;BR /&gt;name ***.***.199.42 svrFlipperOutside&lt;BR /&gt;name 172.16.199.43 svrArielInside&lt;BR /&gt;name ***.***.199.43 svrArielOutside&lt;BR /&gt;name 122.165.1.193 srcNeeSoftHQ&lt;BR /&gt;name 172.16.199.44 svrSeabertInside&lt;BR /&gt;name ***.***.199.44 svrSeabertOutside&lt;BR /&gt;name **** srcTTYGroningen&lt;BR /&gt;name **** srcJarno_Tty_Nl&lt;BR /&gt;name **** srcJaap_Tty_nl&lt;BR /&gt;name **** srcJappe_Tty_nl&lt;BR /&gt;name **** srcJaccoHome&lt;BR /&gt;name ***.***.199.58 svrZeekoeOutside&lt;BR /&gt;name 172.16.199.58 svrZeekoeInside&lt;BR /&gt;name **** srcDsbBankHQ&lt;BR /&gt;name **** srcJaapHQ2&lt;BR /&gt;name 172.16.199.39 svrSteffieInside&lt;BR /&gt;name **** srcNeeSoftHQ2&lt;BR /&gt;name **** srcJaccoAlmere&lt;BR /&gt;name ***.***.199.45 svrKwalOutside&lt;BR /&gt;name 172.16.199.45 svrKwalInside&lt;BR /&gt;name **** srcCasperHome&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address ***.***.199.40 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.16.199.62 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa822-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;object-group service NeptuneAPI tcp&lt;BR /&gt; port-object eq 8000&lt;BR /&gt;object-group service Services_NonPublic_Yaws tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group service Services_NonPublic_Flipper tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt; port-object eq ftp&lt;BR /&gt;object-group service Services_NonPublic_Ariel tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt; port-object eq 8443&lt;BR /&gt;object-group service Services_Public_Flipper tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt;object-group network FullyTrustedSources&lt;BR /&gt; network-object host srcJaapHQ&lt;BR /&gt; network-object host srcViking&lt;BR /&gt; network-object host srcWEWWW01&lt;BR /&gt; network-object host srcTTYGroningen&lt;BR /&gt; network-object host srcJarno_Tty_Nl&lt;BR /&gt; network-object host srcJaap_Tty_nl&lt;BR /&gt; network-object host srcJappe_Tty_nl&lt;BR /&gt; network-object host srcJaccoHome&lt;BR /&gt; network-object host srcDsbBankHQ&lt;BR /&gt; network-object host srcJaapHQ2&lt;BR /&gt; network-object host srcJaccoAlmere&lt;BR /&gt; network-object host srcCasperHome&lt;BR /&gt;object-group network India&lt;BR /&gt; network-object host srcParthaHome&lt;BR /&gt; network-object host srcNeeSoftHQ&lt;BR /&gt; network-object host srcNeeSoftHQ2&lt;BR /&gt;object-group service Services_NonPublic_Seabert tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group service Services_NonPublic_Zeekoe tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt; port-object eq ftp&lt;BR /&gt;object-group service Services_Public_Zeekoe tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt;object-group service Services_NonPublic_Kwal tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group FullyTrustedSources host svrYawsOutside object-group Services_NonPublic_Yaws&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group FullyTrustedSources host svrFlipperOutside object-group Services_NonPublic_Flipper&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group FullyTrustedSources host svrArielOutside object-group Services_NonPublic_Ariel&lt;BR /&gt;access-list outside_access_in extended permit tcp any host svrFlipperOutside object-group Services_Public_Flipper&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group FullyTrustedSources host svrArielOutside object-group NeptuneAPI&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group India host svrArielOutside object-group NeptuneAPI&lt;BR /&gt;access-list outside_access_in extended permit icmp object-group FullyTrustedSources any&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group FullyTrustedSources host svrSeabertOutside object-group Services_NonPublic_Seabert&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group FullyTrustedSources host svrZeekoeOutside object-group Services_NonPublic_Zeekoe&lt;BR /&gt;access-list outside_access_in extended permit tcp any host svrZeekoeOutside object-group Services_Public_Zeekoe&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group FullyTrustedSources host svrKwalOutside object-group Services_NonPublic_Kwal&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 172.16.199.32 255.255.255.224&lt;BR /&gt;access-list Private standard permit 172.16.199.0 255.255.255.0&lt;BR /&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool VPN_pool 172.16.199.100-172.16.199.110 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-625-53.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) svrYawsOutside svrYawsInside netmask 255.255.255.255 dns&lt;BR /&gt;static (inside,outside) svrFlipperOutside svrFlipperInside netmask 255.255.255.255 dns&lt;BR /&gt;static (inside,outside) svrArielOutside svrArielInside netmask 255.255.255.255 dns&lt;BR /&gt;static (inside,outside) svrSeabertOutside svrSeabertInside netmask 255.255.255.255 dns&lt;BR /&gt;static (inside,outside) svrZeekoeOutside svrZeekoeInside netmask 255.255.255.255 dns&lt;BR /&gt;static (inside,outside) svrKwalOutside svrKwalInside netmask 255.255.255.255 dns&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 ***.***.199.62 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http **** 255.255.255.255 outside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http srcJaapHQ 255.255.255.255 outside&lt;BR /&gt;http srcCasperHome 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set aes128sha esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set aes128sha mode transport&lt;BR /&gt;crypto ipsec transform-set aes256sha esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set aes256sha mode transport&lt;BR /&gt;crypto ipsec transform-set 3desmd5 esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set 3desmd5 mode transport&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map out_dyn_map 10 set transform-set aes128sha aes256sha 3desmd5&lt;BR /&gt;crypto map vpn 20 ipsec-isakmp dynamic out_dyn_map&lt;BR /&gt;crypto map vpn interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp nat-traversal 3600&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh srcJaapHQ 255.255.255.255 outside&lt;BR /&gt;ssh srcViking 255.255.255.255 outside&lt;BR /&gt;ssh srcWEWWW01 255.255.255.255 outside&lt;BR /&gt;ssh srcCasperHome 255.255.255.255 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 213.239.154.12 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; svc image disk0:/anyconnect-win-2.2.0140-k9.pkg 1&lt;BR /&gt; svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 2&lt;BR /&gt; svc enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; dns-server value 172.16.199.41 172.16.199.51&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Private&lt;BR /&gt;group-policy nemo1 internal&lt;BR /&gt;group-policy nemo1 attributes&lt;BR /&gt; dns-server value 85.17.150.123 85.17.96.69&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt;group-policy AnyGroup internal&lt;BR /&gt;group-policy AnyGroup attributes&lt;BR /&gt; vpn-tunnel-protocol svc&lt;BR /&gt;username Casper password GuN2yHGa.QngQtJa encrypted privilege 0&lt;BR /&gt;username Casper attributes&lt;BR /&gt; vpn-group-policy AnyGroup&lt;BR /&gt;username setict password sb4z1PnahJA3dzhH encrypted privilege 15&lt;BR /&gt;username Jacco password h4I5tgnnFL2JaZyd encrypted privilege 0&lt;BR /&gt;username Jacco attributes&lt;BR /&gt; vpn-group-policy AnyGroup&lt;BR /&gt;username jaapadmin password 33TkgTBpS3jOqhOq encrypted privilege 15&lt;BR /&gt;username timv password VDxt13UmaVSs/K3W encrypted privilege 0&lt;BR /&gt;username timv attributes&lt;BR /&gt; vpn-group-policy nemo1&lt;BR /&gt;username lswadmin password ol/uHR/3k8aXa5Pu encrypted privilege 15&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool VPN_pool&lt;BR /&gt; authorization-server-group LOCAL&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt; no authentication chap&lt;BR /&gt; no authentication ms-chap-v1&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt; address-pool VPN_pool&lt;BR /&gt;tunnel-group AnyVPN type remote-access&lt;BR /&gt;tunnel-group AnyVPN general-attributes&lt;BR /&gt; address-pool VPN_pool&lt;BR /&gt; default-group-policy AnyGroup&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:f244f6adc3628749c955d8cfa5792e92&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 15:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491745#M613271</guid>
      <dc:creator>Casperdegeus</dc:creator>
      <dc:date>2010-08-27T15:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: Help requested: Cisco-PIX501 config not working</title>
      <link>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491746#M613273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Casper,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These static commands work as I would estimate due to the order of the interfaces as listed in ( ).&amp;nbsp; When explaining 'static' statements to customers, I use the following example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (real_interface,proxy_interface) proxy_ip real_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this example, real_interface and real_ip, as the name indicates, is the interface of the ASA where the host REALLY resides as well as the REAL IP address that is configured on the device (ie, the address that is shown via 'ipconfig' or 'ifconfig' on the device).&amp;nbsp; The proxy_interface and proxy_ip are the interfaces of the ASA that will act as a "forwarding device" for the traffic and the IP address that the ASA will respond to for that traffic (ie the NATed IP).&amp;nbsp; For instance, consider the following scenarios:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;Correct Topology/Configuration:&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server (10.1.1.2) -&amp;gt; (inside/10.1.1.1) ASA (outside/1.1.1.1) -&amp;gt; Internet -&amp;gt; ClientPC (1.1.1.3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this scenario, to host the server (10.1.1.2) on the internet using the IP address, 1.1.1.2, I would use the command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.2 10.1.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;BROKEN Topology/Configuration:&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;IF I were to reverse the order of the interfaces on the 'static' statement such as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 1.1.1.2 10.1.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The topology that this would represent is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client (1.1.1.3) -&amp;gt; (inside/1.1.1.1) ASA (outside/10.1.1.1) -&amp;gt; Internet -&amp;gt; Server (10.1.1.2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 19:10:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491746#M613273</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2010-08-27T19:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: Help requested: Cisco-PIX501 config not working</title>
      <link>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491747#M613275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your explanation. This is really helpfull, and makes me understand things a little more. However, since the ASA5510-config works, I've been looking around some more and got it to work, with the 'faulty' statics. I found some example-configs at cisco.com that used the same static with the strange ordering.&lt;/P&gt;&lt;P&gt;The problem was that the permissions were wrong: I gave permissions on the Inside-IP's of the servers, instead of the Outside-IP's. Your first answer made me figure this out (Permissions, Translations, and Routes) so thank you for your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Casper.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Aug 2010 13:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-requested-cisco-pix501-config-not-working/m-p/1491747#M613275</guid>
      <dc:creator>Casperdegeus</dc:creator>
      <dc:date>2010-08-28T13:28:58Z</dc:date>
    </item>
  </channel>
</rss>

