<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help Configuring a DSL conection via Pix Firewall e515 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461793#M640420</link>
    <description>&lt;P&gt;Can someone guide me on this i'm fairly new on this. i need to configure a Cisco Pix Firewall e515 to connect out to the internet via DSL. Basic Nat and DHCP, basic routing. here is my configuration. Please help me understanding how to configure this properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 8.0(2) &lt;BR /&gt;!&lt;BR /&gt;hostname voyze&lt;BR /&gt;domain-name voyze.com&lt;BR /&gt;enable&amp;nbsp; password mW6ETJKBd.1a9jjj encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet0&lt;BR /&gt; nameif AT&amp;amp;amp;T&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address&amp;nbsp; 74.164.6.10 255.255.255.248 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address&amp;nbsp; 192.168.1.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;passwd&amp;nbsp; 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group&amp;nbsp; DefaultDNS&lt;BR /&gt; domain-name voyze.com&lt;BR /&gt;same-security-traffic permit&amp;nbsp; inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group&amp;nbsp; service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq&amp;nbsp; https&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service&amp;nbsp; DM_INLINE_SERVICE_2&lt;BR /&gt; service-object tcp eq ftp &lt;BR /&gt; service-object&amp;nbsp; udp eq tftp &lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object tcp eq ftp &lt;BR /&gt; service-object udp eq tftp &lt;BR /&gt;access-list&amp;nbsp; inside_access_in extended permit tcp any 68.164.6.8 255.255.255.248&amp;nbsp; object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list AT&amp;amp;amp;T_access_in&amp;nbsp; extended permit tcp any any object-group DM_INLINE_TCP_3 &lt;BR /&gt;access-list&amp;nbsp; AT&amp;amp;amp;T_access_in extended permit object-group DM_INLINE_SERVICE_1&amp;nbsp; any any &lt;BR /&gt;access-list inside_access_in_1 extended permit tcp any any&amp;nbsp; object-group DM_INLINE_TCP_2 &lt;BR /&gt;access-list inside_access_in_1 extended&amp;nbsp; permit object-group DM_INLINE_SERVICE_2 any any &lt;BR /&gt;access-list&amp;nbsp; inside_nat0_outbound extended permit ip 74.164.6.8 255.255.255.248 any &lt;BR /&gt;pager&amp;nbsp; lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu&amp;nbsp; AT&amp;amp;amp;T 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1&amp;nbsp; burst-size 1&lt;BR /&gt;asdm image flash:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp&amp;nbsp; timeout 14400&lt;BR /&gt;global (AT&amp;amp;amp;T) 101 192.168.1.1-192.168.1.200&amp;nbsp; netmask 255.255.255.0&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat&amp;nbsp; (inside) 101 74.164.6.8 255.255.255.248&lt;BR /&gt;access-group&amp;nbsp; AT&amp;amp;amp;T_access_in in interface AT&amp;amp;amp;T per-user-override&lt;BR /&gt;access-group&amp;nbsp; inside_access_in_1 in interface inside per-user-override&lt;BR /&gt;route&amp;nbsp; AT&amp;amp;amp;T 0.0.0.0 0.0.0.0 74.164.6.9 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout&amp;nbsp; conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout&amp;nbsp; sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout&amp;nbsp; sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout&amp;nbsp; uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http&amp;nbsp; server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no&amp;nbsp; snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable&amp;nbsp; traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no crypto isakmp&amp;nbsp; nat-traversal&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout&amp;nbsp; 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.100-192.168.1.200&amp;nbsp; inside&lt;BR /&gt;dhcpd dns 68.94.157.1 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection&amp;nbsp; basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection&amp;nbsp; statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map&amp;nbsp; inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map&amp;nbsp; type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length&amp;nbsp; maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect&amp;nbsp; esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect&amp;nbsp; tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname&amp;nbsp; context &lt;BR /&gt;Cryptochecksum:51ef296083714caa6c753b0867bcf405&lt;BR /&gt;: end&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:07:26 GMT</pubDate>
    <dc:creator>mambito20</dc:creator>
    <dc:date>2019-03-11T18:07:26Z</dc:date>
    <item>
      <title>Help Configuring a DSL conection via Pix Firewall e515</title>
      <link>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461793#M640420</link>
      <description>&lt;P&gt;Can someone guide me on this i'm fairly new on this. i need to configure a Cisco Pix Firewall e515 to connect out to the internet via DSL. Basic Nat and DHCP, basic routing. here is my configuration. Please help me understanding how to configure this properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 8.0(2) &lt;BR /&gt;!&lt;BR /&gt;hostname voyze&lt;BR /&gt;domain-name voyze.com&lt;BR /&gt;enable&amp;nbsp; password mW6ETJKBd.1a9jjj encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet0&lt;BR /&gt; nameif AT&amp;amp;amp;T&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address&amp;nbsp; 74.164.6.10 255.255.255.248 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address&amp;nbsp; 192.168.1.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;passwd&amp;nbsp; 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group&amp;nbsp; DefaultDNS&lt;BR /&gt; domain-name voyze.com&lt;BR /&gt;same-security-traffic permit&amp;nbsp; inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group&amp;nbsp; service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq&amp;nbsp; https&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service&amp;nbsp; DM_INLINE_SERVICE_2&lt;BR /&gt; service-object tcp eq ftp &lt;BR /&gt; service-object&amp;nbsp; udp eq tftp &lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object tcp eq ftp &lt;BR /&gt; service-object udp eq tftp &lt;BR /&gt;access-list&amp;nbsp; inside_access_in extended permit tcp any 68.164.6.8 255.255.255.248&amp;nbsp; object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list AT&amp;amp;amp;T_access_in&amp;nbsp; extended permit tcp any any object-group DM_INLINE_TCP_3 &lt;BR /&gt;access-list&amp;nbsp; AT&amp;amp;amp;T_access_in extended permit object-group DM_INLINE_SERVICE_1&amp;nbsp; any any &lt;BR /&gt;access-list inside_access_in_1 extended permit tcp any any&amp;nbsp; object-group DM_INLINE_TCP_2 &lt;BR /&gt;access-list inside_access_in_1 extended&amp;nbsp; permit object-group DM_INLINE_SERVICE_2 any any &lt;BR /&gt;access-list&amp;nbsp; inside_nat0_outbound extended permit ip 74.164.6.8 255.255.255.248 any &lt;BR /&gt;pager&amp;nbsp; lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu&amp;nbsp; AT&amp;amp;amp;T 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1&amp;nbsp; burst-size 1&lt;BR /&gt;asdm image flash:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp&amp;nbsp; timeout 14400&lt;BR /&gt;global (AT&amp;amp;amp;T) 101 192.168.1.1-192.168.1.200&amp;nbsp; netmask 255.255.255.0&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat&amp;nbsp; (inside) 101 74.164.6.8 255.255.255.248&lt;BR /&gt;access-group&amp;nbsp; AT&amp;amp;amp;T_access_in in interface AT&amp;amp;amp;T per-user-override&lt;BR /&gt;access-group&amp;nbsp; inside_access_in_1 in interface inside per-user-override&lt;BR /&gt;route&amp;nbsp; AT&amp;amp;amp;T 0.0.0.0 0.0.0.0 74.164.6.9 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout&amp;nbsp; conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout&amp;nbsp; sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout&amp;nbsp; sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout&amp;nbsp; uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http&amp;nbsp; server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no&amp;nbsp; snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable&amp;nbsp; traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no crypto isakmp&amp;nbsp; nat-traversal&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout&amp;nbsp; 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.100-192.168.1.200&amp;nbsp; inside&lt;BR /&gt;dhcpd dns 68.94.157.1 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection&amp;nbsp; basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection&amp;nbsp; statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map&amp;nbsp; inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map&amp;nbsp; type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length&amp;nbsp; maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect&amp;nbsp; esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect&amp;nbsp; tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname&amp;nbsp; context &lt;BR /&gt;Cryptochecksum:51ef296083714caa6c753b0867bcf405&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461793#M640420</guid>
      <dc:creator>mambito20</dc:creator>
      <dc:date>2019-03-11T18:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: Help Configuring a DSL conection via Pix Firewall e515</title>
      <link>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461794#M640421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the configuration guide:&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="https://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/conf_gd.html"&gt;https://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/conf_gd.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's for ASA but most configuration is same for PIX 8.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that PIXes and ASAs have only Ethernet (RJ-45 or SFP) connectors. Typically your DSL SP will provide you a RJ-11. You can however do PPPoE on ASA/PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know what you want to do exactly so I may be a bit more specific. Most of the stuff is there in the config guide.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Jul 2010 18:23:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461794#M640421</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-07-03T18:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Help Configuring a DSL conection via Pix Firewall e515</title>
      <link>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461795#M640422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for replying..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what i need the pix to do.&lt;/P&gt;&lt;P&gt;1. configure the pix so that it will connect to the internet&lt;/P&gt;&lt;P&gt;2. AT&amp;amp;T is my Dsl Provider.&lt;/P&gt;&lt;P&gt;3. the pix is configured. but is not going out to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please Take a look at my config and tell me whats missing. this should be straight forward connection. but is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Jul 2010 19:15:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461795#M640422</guid>
      <dc:creator>mambito20</dc:creator>
      <dc:date>2010-07-03T19:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Help Configuring a DSL conection via Pix Firewall e515</title>
      <link>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461796#M640423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to ping anything on the internet from PIX?&lt;/P&gt;&lt;P&gt;(Note: you might need to add "icmp perm any outside" to config)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that your NAT seems screwed up. I'll add an edit soon with suggestions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edit:&lt;/P&gt;&lt;P&gt;no access-list&amp;nbsp; inside_nat0_outbound extended permit ip 74.164.6.8 255.255.255.248 any &lt;BR /&gt;no global (AT&amp;amp;T) 101 192.168.1.1-192.168.1.200&amp;nbsp; netmask 255.255.255.0&lt;BR /&gt;no nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;no nat&amp;nbsp; (inside) 101 74.164.6.8 255.255.255.248&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global(AT&amp;amp;T) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should make sure that all traffic from inside is being PATed to outside interface's IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edit 2:&lt;/P&gt;&lt;P&gt;If you want to test ICMP from inside to internet add "fixup proto icmp" &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Jul 2010 21:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461796#M640423</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-07-03T21:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: Help Configuring a DSL conection via Pix Firewall e515</title>
      <link>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461797#M640424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;im still runinng into problems. below is my config can you tell me what to change to connect to the Internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;: Written by enable_15 at 21:13:54.534 UTC Wed Jul 7 2010&lt;BR /&gt;!&lt;BR /&gt;PIX&amp;nbsp; Version 8.0(2) &lt;BR /&gt;!&lt;BR /&gt;hostname pixfirewall&lt;BR /&gt;enable password&amp;nbsp; mW6ETJKBd.1a9jjj encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt; nameif&amp;nbsp; Outside&lt;BR /&gt;&amp;nbsp; security-level 0&lt;BR /&gt; ip address 74.164.6.10 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface&amp;nbsp; Ethernet1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address&amp;nbsp; 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2&lt;BR /&gt; shutdown&lt;BR /&gt; no&amp;nbsp; nameif&lt;BR /&gt;&amp;nbsp; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU&amp;nbsp; encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;access-list inside_access_in extended&amp;nbsp; permit tcp any any eq www &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm&amp;nbsp; informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt; mtu Outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm&amp;nbsp; image flash:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;access-group&amp;nbsp; inside_access_in in interface inside&lt;BR /&gt;route inside 0.0.0.0&amp;nbsp; 255.255.255.0 74.164.6.9 1&lt;BR /&gt; timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp&amp;nbsp; 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00&amp;nbsp; mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00&amp;nbsp; sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt; timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record&amp;nbsp; DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0&amp;nbsp; inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server&amp;nbsp; enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt; no crypto isakmp nat-traversal&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet timeout&amp;nbsp; 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address&amp;nbsp; 192.168.1.2-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection&amp;nbsp; basic-threat&lt;BR /&gt; threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map&amp;nbsp; inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map&amp;nbsp; type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length&amp;nbsp; maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect&amp;nbsp; ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect&amp;nbsp; skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect&amp;nbsp; netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;tftp-server&amp;nbsp; inside 192.168.1.22 /cisco&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:&lt;/P&gt;&lt;DIV&gt;44e94eadfa2d05328020ce6ec29eb580&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 20:23:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461797#M640424</guid>
      <dc:creator>mambito20</dc:creator>
      <dc:date>2010-07-07T20:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: Help Configuring a DSL conection via Pix Firewall e515</title>
      <link>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461798#M640425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would definetly change that route:&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0&amp;nbsp; 255.255.255.0 74.164.6.9 1&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0&amp;nbsp; 0.0.0.0 74.164.6.9 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly:&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended&amp;nbsp; permit tcp any any eq www&lt;/P&gt;&lt;P&gt;You should at least also allow DNS! For your users to be able to browse internet!&lt;/P&gt;&lt;P&gt;But honestly do not apply inbound accless-list on inside interface unless you don't need it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see any NAT configuration .. so your inside users will not be NATed when going out to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 100 0 0&lt;/P&gt;&lt;P&gt;global (outside) 100 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should take care of NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you apply those changes please apply my sugestions from posts below (pinging fromPIX itself to test connectivity to internet etc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 20:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461798#M640425</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-07-07T20:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: Help Configuring a DSL conection via Pix Firewall e515</title>
      <link>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461799#M640426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Marcin,&lt;/P&gt;&lt;P&gt;I'm still working it out. this time i added ppoe . can you please assist. or do you think you can help me offline with this?&lt;/P&gt;&lt;P&gt;Please from the kindness of your heart.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is the config i have by adding ppoe. what do you think?&lt;/P&gt;&lt;P&gt;Also keep in mind i am using ASDM to configure the box. thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;Result of the command: "show running-config"&lt;P&gt;&lt;/P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;PIX Version 8.0(2) &lt;BR /&gt;!&lt;BR /&gt;hostname pixfirewall&lt;BR /&gt;enable password mW6ETJKBd.1a9jjj encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;nameif Outside&lt;BR /&gt;security-level 0&lt;BR /&gt;pppoe client vpdn group AT&amp;amp;T&lt;BR /&gt;ip address pppoe &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup Outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 68.94.156.1&lt;BR /&gt;name-server 68.94.157.1&lt;BR /&gt;access-list inside_access_in extended permit tcp any any eq www &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image flash:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (Outside) 101 interface&lt;BR /&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 74.164.6.9 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group AT&amp;amp;T request dialout pppoe&lt;BR /&gt;&lt;SPAN&gt;vpdn group AT&amp;amp;T localname &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:rafaelpadilla4953@att.net"&gt;rafaelpadilla4953@att.net&lt;/A&gt;&lt;BR /&gt;vpdn group AT&amp;amp;T ppp authentication pap&lt;BR /&gt;&lt;SPAN&gt;vpdn username &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:mert2010stw@att.net"&gt;mert2010stw@att.net&lt;/A&gt;&lt;SPAN&gt; password ********* &lt;/SPAN&gt;&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;tftp-server inside 192.168.1.22 /cisco&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:ccc2eb63ab1f84b377509e0e80768326&lt;BR /&gt;: end&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jul 2010 17:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461799#M640426</guid>
      <dc:creator>mambito20</dc:creator>
      <dc:date>2010-07-08T17:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Help Configuring a DSL conection via Pix Firewall e515</title>
      <link>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461800#M640427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Considering that we're in different timezones it might be a problem - I'm usually checing forums late at night &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Few notes, provided that your pppoe is working I would do this:&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;PRE&gt;&lt;EM style="color: #0000ff; "&gt;&lt;STRONG&gt;ip address pppoe setroute&lt;BR /&gt;&lt;/STRONG&gt;-----&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;SPAN style="color: #0000ff;"&gt;Now with this in place ASA should put a default route based on what we negotiate via pppoe. &lt;BR /&gt;So you might as well remove old route:&lt;BR /&gt;-----&lt;BR /&gt;&lt;/SPAN&gt;no route inside 0.0.0.0 0.0.0.0 74.164.6.9 1&lt;BR /&gt;------&lt;BR /&gt;&lt;BR /&gt;On old bug quite good guide:&lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://cisco.biz/en/US/products/ps6120/products_configuration_example09186a0080ab7ce9.shtml"&gt;http://cisco.biz/en/US/products/ps6120/products_configuration_example09186a0080ab7ce9.shtml&lt;/A&gt;&lt;BR /&gt;(Both CLI and ASDM)&lt;BR /&gt;&lt;BR /&gt;Marcin&lt;BR /&gt;&lt;/PRE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jul 2010 22:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-configuring-a-dsl-conection-via-pix-firewall-e515/m-p/1461800#M640427</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-07-08T22:39:20Z</dc:date>
    </item>
  </channel>
</rss>

