<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 501 - NAT/PAT Query in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500221#M628248</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please try to do logging buffered debug, logging enable, or logging on, whichever applies, and also debug icmp trace, then check what logs you get when you try to do the ping through. You can paste show log output here, that may provide further information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Aug 2010 09:54:50 GMT</pubDate>
    <dc:creator>edadios</dc:creator>
    <dc:date>2010-08-30T09:54:50Z</dc:date>
    <item>
      <title>PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500212#M628239</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having some difficulty with configuring a PIX 501. I am very new to Cisco equipment and am sure that I am missing something very basic.&lt;/P&gt;&lt;P&gt;I have configured the device to the best of my abilities but it is still not working. &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The PIX is sitting behind my DSL modem which is 192.168.1.1.&lt;/P&gt;&lt;P&gt;PIX outside: 192.168.1.111&lt;/P&gt;&lt;P&gt;PIX inside: 192.168.5.1 (running DHCP)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the PIX I can ping WAN IP's (eg. google - 66.102.11.104) OK and also 192.168.1.1 (dsl modem), and also internal addresses on the 192.168.5.0 subnet. I cannot however from any devices on the 192.168.5.0 subnet communicate with the outside world.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure there needs to be some form of NAT/PAT/something to allow 'inside' and 'outside' interfaces to communicate.&lt;/P&gt;&lt;P&gt;I have tried all kinds of combinations but with no success. If possible could someone review my configuration below and offer some advice?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;-Will&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixie# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password aqfn/Uesjj5 encrypted&lt;/P&gt;&lt;P&gt;passwd aqfn/Uesjj5 encrypted&lt;/P&gt;&lt;P&gt;hostname pixie&lt;/P&gt;&lt;P&gt;domain-name living.local&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 192.168.1.111 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.5.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.5.2-192.168.5.20 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.168.101 203.12.160.35&lt;/P&gt;&lt;P&gt;dhcpd wins 192.168.168.101&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain living.local&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;vpnclient server xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;vpnclient mode client-mode&lt;/P&gt;&lt;P&gt;vpnclient vpngroup living password ********&lt;/P&gt;&lt;P&gt;vpnclient username living1 password ********&lt;/P&gt;&lt;P&gt;vpnclient enable&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:8b9f9d5febad784d105320bda3532efd&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;pixie#&lt;/P&gt; &lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500212#M628239</guid>
      <dc:creator>chookenxxx</dc:creator>
      <dc:date>2019-03-11T18:32:12Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500213#M628240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Will,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try adding the command "fixup protocol icmp" and see if pings work. What happens when you to try to access google.com from a browser? Try accessing 74.125.19.147 as well (this is the IP address of google.com i found out using nslookup).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are able to access google using it's IP but not the name (google.com) then the issue is with DNS. Try adding "fixup protocol dns" as well on the PIX and see how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps. All the best!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 08:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500213#M628240</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-08-30T08:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500214#M628241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Base on the configuration, your internal user should be able to get to the internet.&lt;/P&gt;&lt;P&gt;I would try to "clear xlate" on the PIX, as well as enabling the icmp inspection "fixup protocol icmp error" if you are testing by ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the internal PC, can you ping the DSL modem (192.168.1.1)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please check if dns resolution works fine for internal users, and if you can browse the internet, and default gateway for the internal users are 192.168.5.1.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 08:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500214#M628241</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-08-30T08:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500215#M628242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Prapanch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tried adding both fixup lines you suggested. No change so far &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;BR /&gt;If I try access google via hostname or IP in the browser it times out, same as if I try to Ping from a device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still thinking it is some kind of NAT/PAT issue rather than a DNS problem &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the suggestion though&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 08:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500215#M628242</guid>
      <dc:creator>chookenxxx</dc:creator>
      <dc:date>2010-08-30T08:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500216#M628243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Halijenn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have tried "clear xlate", still no joy.&lt;/P&gt;&lt;P&gt;If I try ping 192.168.1.1 from an 'internal' PC it times out also.&lt;/P&gt;&lt;P&gt;DNS resolution also isn't working, I am guessing because it can't even access the external DNS server to attempt to resolve.&lt;/P&gt;&lt;P&gt;Unable to browse the internet &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Will &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 08:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500216#M628243</guid>
      <dc:creator>chookenxxx</dc:creator>
      <dc:date>2010-08-30T08:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500217#M628244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Definitely not a NAT/PAT issue as the following will PAT everything to the PIX outside interface ip address which is responding to ping:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is your internal test PC ip address, mask and default gateway? How is it being connected physically? Assuming that you are connecting via a switch, pls kindly make sure that they are connected in the same VLAN as the PIX inside interface. You can try to configure VLAN interface on the switch in the same subnet as 192.168.5.0/24, and try to ping out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 08:20:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500217#M628244</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-08-30T08:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500218#M628245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm, I *though* I had done the NAT/PAT config correctly &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal test PC(s) IP's are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(statically set for testing)&lt;/P&gt;&lt;P&gt;IP:192.168.5.20&lt;/P&gt;&lt;P&gt;MASK: 255.255.255.0&lt;/P&gt;&lt;P&gt;GW: 192.168.5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(obtained via DHCP)&lt;/P&gt;&lt;P&gt;IP: 192.168.5.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MASK: 255.255.255.0&lt;/P&gt;&lt;P&gt;GW: 192.168.5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Physically, they are both plugged into the back of the PIX 501 in ports 1 and 2 so this should limit any issues I am encountering.&lt;/P&gt;&lt;P&gt;So yes, still having problems &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 08:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500218#M628245</guid>
      <dc:creator>chookenxxx</dc:creator>
      <dc:date>2010-08-30T08:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500219#M628246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you sure you need to configure this device as a vpn client for a vpn server? Is that actually working now?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try to do this in configuration mode, and it should disable the vpnclient functionality. This should allow the device to work as plain nat/pat firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"no vpnclient enable"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you have done this, see if you can ping form inside 192.168.5.x pc to the default gateway of the firewall 192.168.1.1 .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also issue "debug icmp trace", and see the logs on the pix console if the pings are going through and getting response back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 09:12:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500219#M628246</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-08-30T09:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500220#M628247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi edadios,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am actually trying to set this PIX up to ultimately establish a VPN tunnel through to an ASA5505 that is currently running.&lt;/P&gt;&lt;P&gt;For now I have disabled the vpnclient as you suggested. Still not having any luck; cannot ping 192.168.1.1 from anywhere on the 192.168.5.0 subnet (with the exception being from the PIX directly).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 09:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500220#M628247</guid>
      <dc:creator>chookenxxx</dc:creator>
      <dc:date>2010-08-30T09:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500221#M628248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please try to do logging buffered debug, logging enable, or logging on, whichever applies, and also debug icmp trace, then check what logs you get when you try to do the ping through. You can paste show log output here, that may provide further information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 09:54:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500221#M628248</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-08-30T09:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500222#M628249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enabled logging, when I try to show the logs it doesn't really come up with much other than to say it is enabled.&lt;/P&gt;&lt;P&gt;The ICMP trace however was most interesting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixie#debug icmp trace&lt;/P&gt;&lt;P&gt;pixie# 28: ICMP echo-request from inside:192.168.5.20 to 192.168.1.1 ID=512 seq=37643 length=40&lt;/P&gt;&lt;P&gt;29: ICMP echo-request: translating inside:192.168.5.20/512 to outside:192.168.1.111/2&lt;/P&gt;&lt;P&gt;30: ICMP echo-reply from outside:192.168.1.1 to 192.168.1.111 ID=2 seq=37643 length=40&lt;/P&gt;&lt;P&gt;31: ICMP echo-request from inside:192.168.5.20 to 192.168.1.1 ID=512 seq=37899 length=40&lt;/P&gt;&lt;P&gt;32: ICMP echo-request: translating inside:192.168.5.20/512 to outside:192.168.1.111/2&lt;/P&gt;&lt;P&gt;33: ICMP echo-reply from outside:192.168.1.1 to 192.168.1.111 ID=2 seq=37899 length=40&lt;/P&gt;&lt;P&gt;34: ICMP echo-request from inside:192.168.5.20 to 192.168.1.1 ID=512 seq=38155 length=40&lt;/P&gt;&lt;P&gt;35: ICMP echo-request: translating inside:192.168.5.20/512 to outside:192.168.1.111/2&lt;/P&gt;&lt;P&gt;36: ICMP echo-reply from outside:192.168.1.1 to 192.168.1.111 ID=2 seq=38155 length=40&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;It looks like it is sending out from 192.168.5.0 subnet to the 192.168.1.0 subnet OK and that the PIX is receiving something back.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;and then... I tried to access a page again on the other test PC I have and it worked!&lt;/DIV&gt;&lt;DIV&gt;I have narrowed it down to "vpnclient enable" / "no vpnclient enable".&lt;/DIV&gt;&lt;DIV&gt;With the client enabled everything grinds to a halt. Also, I am still unable to PING out &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&amp;nbsp;&amp;nbsp; what would be stopping the ping reply's from ever hitting the local machines?&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks heaps for your helps so far! I am so glad that the PIX is now passing through internet traffic &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 10:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500222#M628249</guid>
      <dc:creator>chookenxxx</dc:creator>
      <dc:date>2010-08-30T10:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500223#M628250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think you did show log, or maybe the logging buffered debug has not been done, or the logging on/enable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inspect icmp should have done the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try and setup an access-list that allows icmp back to the outside interface, and see if that will then make the ping work through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.111&lt;/P&gt;&lt;P&gt;access-group 101 interface&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When time comes that you will need the vpnclient enabled again, ensure to enable split tunneling on the vpn server, and that should enable the client to get to the internet again in the clear. However, the vpnclient pix will have to be connected and working to the vpn server first before any other traffic can work through the pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 10:21:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500223#M628250</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-08-30T10:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500224#M628251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So with the VPN, if I go down the path of having the "easyvpn client" is there any way to have split tunneling set on the PIX locally so that in the event of the tunnel not being established the local machines can still access the net?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I was to configure the tunnel manually on the PIX rather than use the "easyvpn client" would the above be possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for all your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 10:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500224#M628251</guid>
      <dc:creator>chookenxxx</dc:creator>
      <dc:date>2010-08-30T10:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 - NAT/PAT Query</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500225#M628252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For vpn client mode pix, the vpn has to be up, before any traffic will go through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is not desirable, I suggest you configure the current vpn server ASA instead as lan to lan peer recieving a dynamic remote lan to lan peer, and the pix for a lan to lan setup, with the ASA as an static peer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;similar to this&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;A href="http://www.tinyurl.com.au/k42" target="_blank"&gt;http://www.tinyurl.com.au/k42&lt;/A&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 10:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-nat-pat-query/m-p/1500225#M628252</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-08-30T10:54:25Z</dc:date>
    </item>
  </channel>
</rss>

