<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is wrong with this PIX 501 config? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-pix-501-config/m-p/90806#M651485</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your access-list statements, you use 123.187.1.204 as a host, this is your PIX firewall's outside interface. This should be a host matched to 172.16.4.41 in a static statement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 30 Oct 2002 17:42:18 GMT</pubDate>
    <dc:creator>george.banaszak</dc:creator>
    <dc:date>2002-10-30T17:42:18Z</dc:date>
    <item>
      <title>What is wrong with this PIX 501 config?</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-pix-501-config/m-p/90804#M651433</link>
      <description>&lt;P&gt;I am experimenting with a Cisco PIX 501. In the future I want to connect about  35 to our central (now 3600) router using VPN tunnels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First I want to understand the basic functions. &lt;/P&gt;&lt;P&gt;(I will ask the tunnel questions later)&lt;/P&gt;&lt;P&gt;This is what I want::&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Do nat from in to outside&lt;/P&gt;&lt;P&gt;2. Forward some ports (WWW, SMTP, FTP NNTP and some other) to an internal&lt;/P&gt;&lt;P&gt;host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problems:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Somehow only www forwarding seems to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- It looks like the PIX does not use "statefull inspection" because as soon&lt;/P&gt;&lt;P&gt;as I make a connection with a remote system, suddenly all protocols are&lt;/P&gt;&lt;P&gt;forwarded to my redirect system. (and all ports are open?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear conf all&lt;/P&gt;&lt;P&gt;hostname MyHostinterface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet0 10baseT&lt;/P&gt;&lt;P&gt;ip address outside 123.187.1.204 255.255.248.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 123.187.0.1 1&lt;/P&gt;&lt;P&gt;ip address inside 172.16.4.43 255.255.255.248&lt;/P&gt;&lt;P&gt;nat 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global 1 interface&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pdm loggin informational&lt;/P&gt;&lt;P&gt;access-list outside_in permit icmp any host 123.187.1.204&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 123.187.1.204 eq 20&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 123.187.1.204 eq 21&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 123.187.1.204 eq 22&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 123.187.1.204 eq 25&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 123.187.1.204 eq 80&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 123.187.1.204 eq 110&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 123.187.1.204 eq 113&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 123.187.1.204 eq 119&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 123.187.1.204 eq 443&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;static tcp interface 20 172.16.4.41 20 netmask 255.255.255.255 0 0static tcp&lt;/P&gt;&lt;P&gt;interface 21 172.16.4.41 21 netmask 255.255.255.255 0 0static tcp interface&lt;/P&gt;&lt;P&gt;22 172.16.4.41 22 netmask 255.255.255.255 0 0static tcp interface 25&lt;/P&gt;&lt;P&gt;172.16.4.41 25 netmask 255.255.255.255 0 0static tcp interface 80&lt;/P&gt;&lt;P&gt;172.16.4.41 80 netmask 255.255.255.255 0 0static tcp interface 110&lt;/P&gt;&lt;P&gt;172.16.4.41 110 netmask 255.255.255.255 0 0static tcp interface 113&lt;/P&gt;&lt;P&gt;172.16.4.41 113 netmask 255.255.255.255 0 0static tcp interface 119&lt;/P&gt;&lt;P&gt;172.16.4.41 119 netmask 255.255.255.255 0 0static tcp interface 443&lt;/P&gt;&lt;P&gt;172.16.4.41 443 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-pix-501-config/m-p/90804#M651433</guid>
      <dc:creator>jhoogerhuis</dc:creator>
      <dc:date>2020-02-21T06:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with this PIX 501 config?</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-pix-501-config/m-p/90805#M651471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PIX does stateful inspection.&lt;/P&gt;&lt;P&gt;May be few tips on this page will help you to fix your problem&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/707/index.shtml#pix" target="_blank"&gt;http://www.cisco.com/warp/public/707/index.shtml#pix&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2002 14:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-pix-501-config/m-p/90805#M651471</guid>
      <dc:creator>s-doyle</dc:creator>
      <dc:date>2002-10-17T14:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with this PIX 501 config?</title>
      <link>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-pix-501-config/m-p/90806#M651485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your access-list statements, you use 123.187.1.204 as a host, this is your PIX firewall's outside interface. This should be a host matched to 172.16.4.41 in a static statement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Oct 2002 17:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-wrong-with-this-pix-501-config/m-p/90806#M651485</guid>
      <dc:creator>george.banaszak</dc:creator>
      <dc:date>2002-10-30T17:42:18Z</dc:date>
    </item>
  </channel>
</rss>

