<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues remotely managing Pix 501 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issues-remotely-managing-pix-501/m-p/1427705#M639932</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. It's the outside IP I'm trying to access. I thought I'd allowed PDM from outside via this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that correct? Sorry if not but not sure what you mean by including the Pix's public IP in the allowed list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Jul 2010 13:45:32 GMT</pubDate>
    <dc:creator>Rex Biesty</dc:creator>
    <dc:date>2010-07-12T13:45:32Z</dc:date>
    <item>
      <title>Issues remotely managing Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/issues-remotely-managing-pix-501/m-p/1427703#M639930</link>
      <description>&lt;P&gt;Hi. I'm having issues trying to manage a Pix 501 remotely on one of&amp;nbsp; our satellite sites. I can connect to it locally using ssh client&amp;nbsp; (putty) and PDM but neither work from outside (Internet Explorer cannot display the webpage - via PDM). As far as I can tell it's&amp;nbsp; configured the same as my other satellite sites and I can manage them&amp;nbsp; fine remotely. Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp; Rex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;BR /&gt; interface ethernet0 auto&lt;BR /&gt; interface ethernet1 100full&lt;BR /&gt; nameif ethernet0 outside security0&lt;BR /&gt; nameif ethernet1 inside security100&lt;BR /&gt; enable password hVVg7CLUwzxPAzq2 encrypted&lt;BR /&gt; passwd hVVg7CLUwzxPAzq2 encrypted&lt;BR /&gt; hostname PartickPix&lt;BR /&gt; domain-name Partick&lt;BR /&gt; clock timezone GMT/BST 0&lt;BR /&gt; clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt; fixup protocol dns maximum-length 512&lt;BR /&gt; fixup protocol ftp 21&lt;BR /&gt; fixup protocol h323 h225 1720&lt;BR /&gt; fixup protocol h323 ras 1718-1719&lt;BR /&gt; fixup protocol http 80&lt;BR /&gt; fixup protocol pptp 1723&lt;BR /&gt; fixup protocol rsh 514&lt;BR /&gt; fixup protocol rtsp 554&lt;BR /&gt; fixup protocol sip 5060&lt;BR /&gt; fixup protocol sip udp 5060&lt;BR /&gt; fixup protocol skinny 2000&lt;BR /&gt; fixup protocol smtp 25&lt;BR /&gt; fixup protocol sqlnet 1521&lt;BR /&gt; fixup protocol tftp 69&lt;BR /&gt; names&lt;BR /&gt; name 172.16.0.0 Opps_LAN&lt;BR /&gt; access-list inside_outbound_nat0_acl permit ip 192.168.11.0&amp;nbsp; 255.255.255.0 Opps_LAN 255.255.0.0 &lt;BR /&gt; access-list outside_cryptomap_20 permit ip 192.168.11.0 255.255.255.0&amp;nbsp; Opps_LAN 255.255.0.0 &lt;BR /&gt; pager lines 24&lt;BR /&gt; logging on&lt;BR /&gt; logging trap debugging&lt;BR /&gt; logging host inside 192.168.11.17&lt;BR /&gt; mtu outside 1500&lt;BR /&gt; mtu inside 1500&lt;BR /&gt; ip address outside xxx.xxx.xxx.xxx 255.255.255.248&lt;BR /&gt; ip address inside 192.168.11.250 255.255.255.0&lt;BR /&gt; ip audit info action alarm&lt;BR /&gt; ip audit attack action alarm&lt;BR /&gt; pdm location Opps_LAN 255.255.0.0 outside&lt;BR /&gt; pdm location 192.168.11.17 255.255.255.255 inside&lt;BR /&gt; pdm logging informational 100&lt;BR /&gt; pdm history enable&lt;BR /&gt; arp timeout 14400&lt;BR /&gt; global (outside) 1 interface&lt;BR /&gt; nat (inside) 0 access-list inside_outbound_nat0_acl&lt;BR /&gt; nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;BR /&gt; route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1&lt;BR /&gt; timeout xlate 0:05:00&lt;BR /&gt; timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225&amp;nbsp; 1:00:00&lt;BR /&gt; timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt; timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt; timeout uauth 0:05:00 absolute&lt;BR /&gt; aaa-server TACACS+ protocol tacacs+ &lt;BR /&gt; aaa-server TACACS+ max-failed-attempts 3 &lt;BR /&gt; aaa-server TACACS+ deadtime 10 &lt;BR /&gt; aaa-server RADIUS protocol radius &lt;BR /&gt; aaa-server RADIUS max-failed-attempts 3 &lt;BR /&gt; aaa-server RADIUS deadtime 10 &lt;BR /&gt; aaa-server LOCAL protocol local &lt;BR /&gt; http server enable&lt;BR /&gt; http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt; http 192.168.11.0 255.255.255.0 inside&lt;BR /&gt; no snmp-server location&lt;BR /&gt; no snmp-server contact&lt;BR /&gt; snmp-server community public&lt;BR /&gt; no snmp-server enable traps&lt;BR /&gt; floodguard enable&lt;BR /&gt; sysopt connection permit-ipsec&lt;BR /&gt; crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt; crypto map outside_map 20 ipsec-isakmp&lt;BR /&gt; crypto map outside_map 20 match address outside_cryptomap_20&lt;BR /&gt; crypto map outside_map 20 set peer xxx.xxx.xxx.xxx&lt;BR /&gt; crypto map outside_map 20 set transform-set ESP-DES-MD5&lt;BR /&gt; crypto map outside_map interface outside&lt;BR /&gt; isakmp enable outside&lt;BR /&gt; isakmp key xxxxxxxx address xxx.xxx.xxx.xxx netmask 255.255.255.255&amp;nbsp; no-xauth no-config-mode &lt;BR /&gt; isakmp keepalive 10&lt;BR /&gt; isakmp nat-traversal 10&lt;BR /&gt; isakmp policy 20 authentication pre-share&lt;BR /&gt; isakmp policy 20 encryption des&lt;BR /&gt; isakmp policy 20 hash md5&lt;BR /&gt; isakmp policy 20 group 2&lt;BR /&gt; isakmp policy 20 lifetime 86400&lt;BR /&gt; telnet 192.168.11.0 255.255.255.0 inside&lt;BR /&gt; telnet timeout 5&lt;BR /&gt; ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt; ssh 192.168.11.0 255.255.255.0 inside&lt;BR /&gt; ssh timeout 60&lt;BR /&gt; console timeout 0&lt;BR /&gt; dhcpd address 192.168.11.11-192.168.11.33 inside&lt;BR /&gt; dhcpd dns 172.16.1.9 194.72.9.34&lt;BR /&gt; dhcpd lease 3600&lt;BR /&gt; dhcpd ping_timeout 750&lt;BR /&gt; dhcpd auto_config outside&lt;BR /&gt; dhcpd enable inside&lt;BR /&gt; username RBiesty password mzMgn1DtloK0/v6C encrypted privilege 15&lt;BR /&gt; terminal width 80&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:10:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-remotely-managing-pix-501/m-p/1427703#M639930</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2019-03-11T18:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Issues remotely managing Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/issues-remotely-managing-pix-501/m-p/1427704#M639931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you trying to access the outside IP address or the inside IP address? If you are trying to access the outside IP, then you need to include your public IP address in the allowed list (for HTTP/telnet/ssh). If you are trying to access the inside interface IP, then I think you might be missing a command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/mr.html#wp1137951"&gt;http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/mr.html#wp1137951&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Executing the above command should resolve your issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Jul 2010 13:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-remotely-managing-pix-501/m-p/1427704#M639931</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-12T13:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Issues remotely managing Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/issues-remotely-managing-pix-501/m-p/1427705#M639932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. It's the outside IP I'm trying to access. I thought I'd allowed PDM from outside via this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that correct? Sorry if not but not sure what you mean by including the Pix's public IP in the allowed list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Jul 2010 13:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-remotely-managing-pix-501/m-p/1427705#M639932</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2010-07-12T13:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Issues remotely managing Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/issues-remotely-managing-pix-501/m-p/1427706#M639933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry I missed that line :). I do not see any issues with your configuration&lt;/P&gt;&lt;P&gt;as such. Can you ping the outside IP? (You might have to add a rule to allow&lt;/P&gt;&lt;P&gt;ICMP temporarily on the outside interface). Do you get any error messages&lt;/P&gt;&lt;P&gt;when you try to SSH to the box? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Jul 2010 15:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-remotely-managing-pix-501/m-p/1427706#M639933</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-12T15:16:28Z</dc:date>
    </item>
  </channel>
</rss>

