<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to access server behind PIX from internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172731#M629802</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wolfrikk,&lt;/P&gt;&lt;P&gt;I 'll try that. Will let u know the result. thank.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 26 Feb 2003 01:33:36 GMT</pubDate>
    <dc:creator>chuachenhui</dc:creator>
    <dc:date>2003-02-26T01:33:36Z</dc:date>
    <item>
      <title>Unable to access server behind PIX from internet</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172726#M629797</link>
      <description>&lt;P&gt;I have a Pix with 2 VPN connection plus 1 remote client connection.&lt;/P&gt;&lt;P&gt;Meanwhile, I would like to allow my vendor to access one of my file server (internal IP 192.168.0.2). I tried to do a static bind with 202.174.143.45. And modify access-list accordingly. But still my vendor can't access the file server neither the server can go out to internet. What could be wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.2(2)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password KX/2yDvEiODIteF/ encrypted&lt;/P&gt;&lt;P&gt;passwd ggXVcePzJwQfhvVL encrypted&lt;/P&gt;&lt;P&gt;hostname Mitsui&lt;/P&gt;&lt;P&gt;domain-name Mitsuisoko.com&lt;/P&gt;&lt;P&gt;clock timezone MYT 8&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;object-group service Internet_access tcp&lt;/P&gt;&lt;P&gt;  port-object eq ftp&lt;/P&gt;&lt;P&gt;  port-object eq pop3&lt;/P&gt;&lt;P&gt;  port-object eq ftp-data&lt;/P&gt;&lt;P&gt;  port-object eq https&lt;/P&gt;&lt;P&gt;  port-object eq www&lt;/P&gt;&lt;P&gt;  port-object eq smtp&lt;/P&gt;&lt;P&gt;  port-object eq uucp&lt;/P&gt;&lt;P&gt;  port-object eq pcanywhere-data&lt;/P&gt;&lt;P&gt;  port-object range 1433 1433&lt;/P&gt;&lt;P&gt;  port-object range 9000 9002&lt;/P&gt;&lt;P&gt;object-group network VPN_users&lt;/P&gt;&lt;P&gt;  description This group included all the addresses of remote VPN site as well a&lt;/P&gt;&lt;P&gt;s VPN dial-up clients. 192.168.1.0 (Pasir Gudang), 192.168.2.0 (Melaka), 192.168&lt;/P&gt;&lt;P&gt;.3.0 (Dial-up VPN clients)&lt;/P&gt;&lt;P&gt;  network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;  network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;  network-object 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network Servers&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.1 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.100 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.33 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.0.2 any&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 192.168.0.0 255.255.255.0 any eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit udp 192.168.0.0 255.255.255.0 any eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 192.168.0.0 255.255.255.0 any object-group Internet_access&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.0.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_60 permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_40 permit ip 192.168.0.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip any host 202.174.143.45&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;access-list split permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging monitor errors&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging host inside 192.168.0.2&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 202.174.143.42 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.0.25 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip audit name Custom_attack attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip audit name Custom_infor info action alarm&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip local pool msoko_client 192.168.3.1-192.168.3.254&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 202.187.49.106 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.249 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.248 255.255.255.248 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.2.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.1 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 202.9.101.56 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.33 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 219.93.68.178 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 219.93.68.130 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.3.1 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.3.1 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.0 255.255.255.248 inside&lt;/P&gt;&lt;P&gt;pdm location 202.174.143.44 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 202.174.143.45 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm group VPN_users outside&lt;/P&gt;&lt;P&gt;pdm group Servers inside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 10 192.168.0.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.0.2 202.174.143.45 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 202.174.143.45 192.168.0.2 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 202.174.143.41 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si&lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 202.187.49.106 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;http 192.168.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;http 192.168.0.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;sysopt noproxyarp outside&lt;/P&gt;&lt;P&gt;sysopt noproxyarp inside&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dymanic 10 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 match address outside_cryptomap_40&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 set peer 219.93.68.178&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 set security-association lifetime seconds 3600 kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 match address outside_cryptomap_60&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 set peer 219.93.68.130&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 set security-association lifetime seconds 3600 kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 80 ipsec-isakmp dynamic dymanic&lt;/P&gt;&lt;P&gt;crypto map outside_map client configuration address initiate&lt;/P&gt;&lt;P&gt;crypto map outside_map client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 219.93.68.178 netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;isakmp key ******** address 219.93.68.130 netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;isakmp key ******** address 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp client configuration address-pool local msoko_client outside&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 600&lt;/P&gt;&lt;P&gt;isakmp policy 30 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 30 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 30 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 30 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 30 lifetime 600&lt;/P&gt;&lt;P&gt;vpngroup msoko address-pool msoko_client&lt;/P&gt;&lt;P&gt;vpngroup msoko wins-server 192.168.1.1 192.168.1.2&lt;/P&gt;&lt;P&gt;vpngroup msoko default-domain mitsuisoko&lt;/P&gt;&lt;P&gt;vpngroup msoko idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup msoko password ********&lt;/P&gt;&lt;P&gt;telnet 192.168.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.0.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172726#M629797</guid>
      <dc:creator>chuachenhui</dc:creator>
      <dc:date>2020-02-21T06:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access server behind PIX from internet</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172727#M629798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure, but just checkout by increasing the telnet timeout from 5 seconds to 10 or 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2003 19:26:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172727#M629798</guid>
      <dc:creator>beth-martin</dc:creator>
      <dc:date>2003-02-24T19:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access server behind PIX from internet</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172728#M629799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You do not need to create a static mapping for both directions.  I would remove the "static (outside,inside) 192.168.0.2 202.174.143.45 netmask 255.255.255.255 0 0" line and keep the other static mapping.  They are both doing the same thing and may be confusing things.  The ACL's look okay.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2003 19:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172728#M629799</guid>
      <dc:creator>wolfrikk</dc:creator>
      <dc:date>2003-02-24T19:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access server behind PIX from internet</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172729#M629800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank for your advice. Now think getting more weird. Even with the following config I still suffering the same issue. Wondering anything to do after I establish the site-to-site VPN or VPN client. What do you think? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a show xlate and the static map is there. However, the server that hold static map can't even surf the net! &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.2(2)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password KX/2yDvEiODIteF/ encrypted&lt;/P&gt;&lt;P&gt;passwd ggXVcePzJwQfhvVL encrypted&lt;/P&gt;&lt;P&gt;hostname Mitsui&lt;/P&gt;&lt;P&gt;domain-name Mitsuisoko.com&lt;/P&gt;&lt;P&gt;clock timezone MYT 8&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;object-group service Internet_access tcp&lt;/P&gt;&lt;P&gt;  port-object eq ftp&lt;/P&gt;&lt;P&gt;  port-object eq pop3&lt;/P&gt;&lt;P&gt;  port-object eq ftp-data&lt;/P&gt;&lt;P&gt;  port-object eq https&lt;/P&gt;&lt;P&gt;  port-object eq www&lt;/P&gt;&lt;P&gt;  port-object eq smtp&lt;/P&gt;&lt;P&gt;  port-object eq uucp&lt;/P&gt;&lt;P&gt;  port-object eq pcanywhere-data&lt;/P&gt;&lt;P&gt;  port-object range 1433 1433&lt;/P&gt;&lt;P&gt;  port-object range 9000 9002&lt;/P&gt;&lt;P&gt;object-group network VPN_users&lt;/P&gt;&lt;P&gt;  description This group included all the addresses of remote VPN site as well a&lt;/P&gt;&lt;P&gt;s VPN dial-up clients. 192.168.1.0 (Pasir Gudang), 192.168.2.0 (Melaka), 192.168&lt;/P&gt;&lt;P&gt;.3.0 (Dial-up VPN clients)&lt;/P&gt;&lt;P&gt;  network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;  network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;  network-object 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network Servers&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.1 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.100 255.255.255.255&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.33 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip host 192.168.0.2 any&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 192.168.0.0 255.255.255.0 any eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit udp 192.168.0.0 255.255.255.0 any eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 192.168.0.0 255.255.255.0 any object-group Internet_access&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.0.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_60 permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_40 permit ip 192.168.0.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip any host 202.174.143.45&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;access-list split permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging monitor errors&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging host inside 192.168.0.2&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 202.174.143.42 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.0.25 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip audit name Custom_attack attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip audit name Custom_infor info action alarm&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip local pool msoko_client 192.168.3.1-192.168.3.254&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 202.187.49.106 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.249 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.248 255.255.255.248 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.2.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.1 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 202.9.101.56 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.33 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 219.93.68.178 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 219.93.68.130 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.3.1 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.3.1 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.0 255.255.255.248 inside&lt;/P&gt;&lt;P&gt;pdm location 202.174.143.44 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 202.174.143.45 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm group VPN_users outside&lt;/P&gt;&lt;P&gt;pdm group Servers inside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 10 192.168.0.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 202.174.143.45 192.168.0.2 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 202.174.143.41 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si&lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 202.187.49.106 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;http 192.168.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;http 192.168.0.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;sysopt noproxyarp outside&lt;/P&gt;&lt;P&gt;sysopt noproxyarp inside&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dymanic 10 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 match address outside_cryptomap_40&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 set peer 219.93.68.178&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 set security-association lifetime seconds 3600 kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 match address outside_cryptomap_60&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 set peer 219.93.68.130&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 set security-association lifetime seconds 3600 kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 80 ipsec-isakmp dynamic dymanic&lt;/P&gt;&lt;P&gt;crypto map outside_map client configuration address initiate&lt;/P&gt;&lt;P&gt;crypto map outside_map client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 219.93.68.178 netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;isakmp key ******** address 219.93.68.130 netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;isakmp key ******** address 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp client configuration address-pool local msoko_client outside&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 600&lt;/P&gt;&lt;P&gt;isakmp policy 30 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 30 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 30 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 30 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 30 lifetime 600&lt;/P&gt;&lt;P&gt;vpngroup msoko address-pool msoko_client&lt;/P&gt;&lt;P&gt;vpngroup msoko wins-server 192.168.1.1 192.168.1.2&lt;/P&gt;&lt;P&gt;vpngroup msoko default-domain mitsuisoko&lt;/P&gt;&lt;P&gt;vpngroup msoko idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup msoko password ********&lt;/P&gt;&lt;P&gt;telnet 192.168.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.0.100 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Feb 2003 01:43:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172729#M629800</guid>
      <dc:creator>chuachenhui</dc:creator>
      <dc:date>2003-02-25T01:43:38Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access server behind PIX from internet</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172730#M629801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have run into this a few times with PIX Static mappings.  What I have ended up doing in the past is reboot the PIX and the ISP router at the same time.  I think it has something to do with the MAC Address mappings on the ISP router.  Rebooting the PIX may not be necessary, but I figure it won't hurt while the ISP router is reloading.  If you have a DMZ, you may just want to enter clear xlate as the ISP router reloads.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Feb 2003 12:07:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172730#M629801</guid>
      <dc:creator>wolfrikk</dc:creator>
      <dc:date>2003-02-25T12:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access server behind PIX from internet</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172731#M629802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wolfrikk,&lt;/P&gt;&lt;P&gt;I 'll try that. Will let u know the result. thank.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Feb 2003 01:33:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-server-behind-pix-from-internet/m-p/172731#M629802</guid>
      <dc:creator>chuachenhui</dc:creator>
      <dc:date>2003-02-26T01:33:36Z</dc:date>
    </item>
  </channel>
</rss>

