<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: pix routing-classless or classful?? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42343#M660776</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;-What does your ip nat access-list look like on your router, where is the inside?  Is traffic permitted to the 208.242.100.129 255.255.255.128 network? &lt;/P&gt;&lt;P&gt;-If you add the keyword "log" to the access-list acl-out7 permit icmp any any, does it show any hits (if yes what is the source IP)?  If you do a show log it should show if the PIX is denying them (which I doubt).  &lt;/P&gt;&lt;P&gt;-What does your static mapping on the PIX look like -  static (inside,outside) 208.242.100.x 208.242.100.x netmask x.x.x.x or is it nat (inside) 0?&lt;/P&gt;&lt;P&gt;-What did the debugs show?&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 23 Sep 2002 22:41:18 GMT</pubDate>
    <dc:creator>steve.barlow</dc:creator>
    <dc:date>2002-09-23T22:41:18Z</dc:date>
    <item>
      <title>pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42338#M660764</link>
      <description>&lt;P&gt;We have a subnetted class C as our inside network on a pix running 6.1.  We are attempting to communicate with another subnet of that same class c on the outside, with no success.  Does the pix recognize classless routing?  If not by default, how do we turn it on?  We are running 6.1 code.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42338#M660764</guid>
      <dc:creator>lxnancy</dc:creator>
      <dc:date>2020-02-21T06:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42339#M660767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have a static route to those networks?  If you are using RIP, make sure it's RIP 2.   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Sep 2002 16:30:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42339#M660767</guid>
      <dc:creator>steve.barlow</dc:creator>
      <dc:date>2002-09-23T16:30:46Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42340#M660770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;we have a default route pointing to the outside interface.. and we even hardcoded the outside subnet to point out that inteface.. but it still doesn't work. i can ping from any other interface on that outside router-except the subnet of the "shared" class c.. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Sep 2002 16:40:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42340#M660770</guid>
      <dc:creator>lxnancy</dc:creator>
      <dc:date>2002-09-23T16:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42341#M660772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the relevant configs (IPs and routes)?  Can you debug icmp to see if the PIX sends it out the correct interface (debug icmp trace and/or debug packet ...)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Sep 2002 17:06:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42341#M660772</guid>
      <dc:creator>steve.barlow</dc:creator>
      <dc:date>2002-09-23T17:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42342#M660774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;heres the router config:&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip directed-broadcast&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; full-duplex&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0.300&lt;/P&gt;&lt;P&gt; description Ethernet to NAMM Private LAN s1-namrmf&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 300&lt;/P&gt;&lt;P&gt; ip address 208.242.100.65 255.255.255.224&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip directed-broadcast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip directed-broadcast&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; full-duplex&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1.162&lt;/P&gt;&lt;P&gt; description Ethernet to PSC DMZ s1-namptc for NAMM/PSC access&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 162&lt;/P&gt;&lt;P&gt; ip address 165.136.127.165 255.255.255.248&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip directed-broadcast&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 208.242.100.128 255.255.255.128 FastEthernet0/1.162&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the pix:&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;access-list acl-out7 permit icmp any any &lt;/P&gt;&lt;P&gt;access-list acl-out7 permit tcp host 208.242.100.78 host 208.242.100.144 eq ftp &lt;/P&gt;&lt;P&gt;access-list acl-out7 permit tcp host 208.242.100.94 host 208.242.100.144 eq ftp &lt;/P&gt;&lt;P&gt;ip address outside 165.136.34.1 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address inside 208.242.100.129 255.255.255.128&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 165.136.34.13 1&lt;/P&gt;&lt;P&gt;(we also tested adding a specific route to 208.242.100.64 255.255.255.224 1665.136.34.13)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pings from the router... first is sourced from the network in question.. the second is just a straight ping (sourcing fromthe outbound interface)...&lt;/P&gt;&lt;P&gt;r1-namptc#ping&lt;/P&gt;&lt;P&gt;Protocol [ip]:&lt;/P&gt;&lt;P&gt;Target IP address: 208.242.100.144&lt;/P&gt;&lt;P&gt;Repeat count [5]:&lt;/P&gt;&lt;P&gt;Datagram size [100]:&lt;/P&gt;&lt;P&gt;Timeout in seconds [2]:&lt;/P&gt;&lt;P&gt;Extended commands [n]: y&lt;/P&gt;&lt;P&gt;Source address or interface: 208.242.100.65&lt;/P&gt;&lt;P&gt;Type of service [0]:&lt;/P&gt;&lt;P&gt;Set DF bit in IP header? [no]:&lt;/P&gt;&lt;P&gt;Validate reply data? [no]:&lt;/P&gt;&lt;P&gt;Data pattern [0xABCD]:&lt;/P&gt;&lt;P&gt;Loose, Strict, Record, Timestamp, Verbose[none]:&lt;/P&gt;&lt;P&gt;Sweep range of sizes [n]:&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 208.242.100.144, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;r1-namptc#ping 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 208.242.100.144, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try to get the debug info...&lt;/P&gt;&lt;P&gt;THANKS!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Sep 2002 18:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42342#M660774</guid>
      <dc:creator>lxnancy</dc:creator>
      <dc:date>2002-09-23T18:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42343#M660776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;-What does your ip nat access-list look like on your router, where is the inside?  Is traffic permitted to the 208.242.100.129 255.255.255.128 network? &lt;/P&gt;&lt;P&gt;-If you add the keyword "log" to the access-list acl-out7 permit icmp any any, does it show any hits (if yes what is the source IP)?  If you do a show log it should show if the PIX is denying them (which I doubt).  &lt;/P&gt;&lt;P&gt;-What does your static mapping on the PIX look like -  static (inside,outside) 208.242.100.x 208.242.100.x netmask x.x.x.x or is it nat (inside) 0?&lt;/P&gt;&lt;P&gt;-What did the debugs show?&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Sep 2002 22:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42343#M660776</guid>
      <dc:creator>steve.barlow</dc:creator>
      <dc:date>2002-09-23T22:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42344#M660777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok.. on the router.. the inside interfaces are serial links-we are natting unregistered addresses from our remote sites to registered before they enter our dmz to access other hosts on that network..  there is no natting currently setup for any 208.242.100.x addresses-however, if I nat that address it works.. but I need it to work native because too many other users in the dmz already access the servers on the native addresses.  Here are the commands in the pix for nat:&lt;/P&gt;&lt;P&gt;nat (inside) 0 208.242.100.128 255.255.255.128 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.132 208.242.100.132 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.140 208.242.100.140 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.141 208.242.100.141 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.151 208.242.100.151 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.150 208.242.100.150 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.152 208.242.100.152 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.153 208.242.100.153 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.154 208.242.100.154 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.155 208.242.100.155 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.156 208.242.100.156 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.170 208.242.100.170 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.144 208.242.100.144 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.157 208.242.100.157 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.158 208.242.100.158 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.171 208.242.100.171 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.180 208.242.100.180 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.159 208.242.100.159 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.185 208.242.100.185 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.186 208.242.100.186 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.187 208.242.100.187 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.160 208.242.100.160 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.161 208.242.100.161 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) 208.242.100.162 208.242.100.162 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should have the debug info and log info this afternoon.. unfortunately I don' t have access to the pix, so I have to have the fw guys do it...   In a nutshell, other networks off my router can get to the 208.242.100.128 network, but my 208.242.100.64 network can't.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;208.242.100.128 net ---- PIX --- DMZ RTR--- NAMM RTR---- 208.242.100.64 net&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2002 14:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42344#M660777</guid>
      <dc:creator>lxnancy</dc:creator>
      <dc:date>2002-09-24T14:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42345#M660778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Last gasp/straw before seeing debugs, does DMZ RTR have a route to 208.242.100.64/29 and have ip classless?  Can the PIX ping 208.242.100.65 (if yes to these first 3 questions it looks like a translation issue)?  &lt;/P&gt;&lt;P&gt;I may try static (inside,outside) 208.242.100.128  208.242.100.128 netmask 255.255.255.128 instead of all the individual statics.  Shouldn't make a diff but you never know.&lt;/P&gt;&lt;P&gt;Steve &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2002 15:13:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42345#M660778</guid>
      <dc:creator>steve.barlow</dc:creator>
      <dc:date>2002-09-24T15:13:33Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42346#M660779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok.. yes the dmz rtr has routes to 208.242.100.65/27 255.255.255.224 and ip classless.. and a route to 208.242.100.128/25 as well...  below is the info from the debugs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;f1-diadptc#debug icmp trace  (this is from an address that has a src which has the same class C network as my inside network yet it is actually&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on a different mask than my inside so therefore it should be a different network)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;801: Inbound  ICMP echo request (len 72 id 61448 seq 3497) 208.242.100.65 &amp;gt; 208.242.100.144 &amp;gt; 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;810: Inbound  ICMP echo request (len 72 id 61704 seq 3497) 208.242.100.65 &amp;gt; 208.242.100.144 &amp;gt; 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;819: Inbound  ICMP echo request (len 72 id 61960 seq 3497) 208.242.100.65 &amp;gt; 208.242.100.144 &amp;gt; 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;844: Inbound  ICMP echo request (len 72 id 62216 seq 3497) 208.242.100.65 &amp;gt; 208.242.100.144 &amp;gt; 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;853: Inbound  ICMP echo request (len 72 id 62472 seq 3497) 208.242.100.65 &amp;gt; 208.242.100.144 &amp;gt; 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;f1-diadptc#debug icmp trace  (this is from an address that has a src address from a different network than what is on my pix)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;946: Inbound  ICMP echo request (len 72 id 39436 seq 7972) 165.136.127.165 &amp;gt; 208.242.100.144 &amp;gt; 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;947: Outbound ICMP echo reply (len 72 id 39436 seq 7972) 208.242.100.144 &amp;gt; 208.242.100.144 &amp;gt; 165.136.127.165&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;948: Inbound  ICMP echo request (len 72 id 39692 seq 7972) 165.136.127.165 &amp;gt; 208.242.100.144 &amp;gt; 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;949: Outbound ICMP echo reply (len 72 id 39692 seq 7972) 208.242.100.144 &amp;gt; 208.242.100.144 &amp;gt; 165.136.127.165&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;950: Inbound  ICMP echo request (len 72 id 39948 seq 7972) 165.136.127.165 &amp;gt; 208.242.100.144 &amp;gt; 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;951: Outbound ICMP echo reply (len 72 id 39948 seq 7972) 208.242.100.144 &amp;gt; 208.242.100.144 &amp;gt; 165.136.127.165&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;952: Inbound  ICMP echo request (len 72 id 40204 seq 7972) 165.136.127.165 &amp;gt; 208.242.100.144 &amp;gt; 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;953: Outbound ICMP echo reply (len 72 id 40204 seq 7972) 208.242.100.144 &amp;gt; 208.242.100.144 &amp;gt; 165.136.127.165&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;954: Inbound  ICMP echo request (len 72 id 40460 seq 7972) 165.136.127.165 &amp;gt; 208.242.100.144 &amp;gt; 208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;955: Outbound ICMP echo reply (len 72 id 40460 seq 7972) 208.242.100.144 &amp;gt; 208.242.100.144 &amp;gt; 165.136.127.165&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;f1-diadptc# debug packet outside src 208.242.100.65 dst 208.242.100.144 proto icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;f1-diadptc# --------- PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- IP --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;208.242.100.65  ==&amp;gt;     208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ver = 0x4       hlen = 0x5      tos = 0x0       tlen = 0x64&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        id = 0x1db      flags = 0x0     frag off=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ttl = 0xfe      proto=0x1       chksum = 0x5007&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- ICMP --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                type = 0x8      code = 0x0      checksum=0xd297&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                identifier = 0x1e68     seq = 0x89d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- DATA --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                0000001c: 00 00 00 03 4a 96 3a 14 ab cd ab cd ab cd ab cd  |  ....J.:.........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                0000002c: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                0000003c: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                0000004c: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                0000005c: ab cd ab cd ab cd ab cd c4                       |  .........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- END OF PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- IP --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;208.242.100.65  ==&amp;gt;     208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ver = 0x4       hlen = 0x5      tos = 0x0       tlen = 0x64&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        id = 0x1dc      flags = 0x0     frag off=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ttl = 0xfe      proto=0x1       chksum = 0x5006&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- ICMP --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                type = 0x8      code = 0x0      checksum=0xcac6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                identifier = 0x1e69     seq = 0x89d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- DATA --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000014:                         00 00 00 03 4a 96 41 e4  |          ....J.A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000024: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000034: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000044: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000054: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000064: 32                                               |  2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- END OF PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- IP --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;208.242.100.65  ==&amp;gt;     208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ver = 0x4       hlen = 0x5      tos = 0x0       tlen = 0x64&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        id = 0x1dd      flags = 0x0     frag off=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ttl = 0xfe      proto=0x1       chksum = 0x5005&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- ICMP --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                type = 0x8      code = 0x0      checksum=0xc2f5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                identifier = 0x1e6a     seq = 0x89d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- DATA --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                0000001c: 00 00 00 03 4a 96 49 b4 ab cd ab cd ab cd ab cd  |  ....J.I.........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                0000002c: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                0000003c: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                0000004c: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                0000005c: ab cd ab cd ab cd ab cd 5b                       |  ........[&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- END OF PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- IP --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;208.242.100.65  ==&amp;gt;     208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ver = 0x4       hlen = 0x5      tos = 0x0       tlen = 0x64&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        id = 0x1de      flags = 0x0     frag off=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ttl = 0xfe      proto=0x1       chksum = 0x5004&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- ICMP --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                type = 0x8      code = 0x0      checksum=0xbb24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                identifier = 0x1e6b     seq = 0x89d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- DATA --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000014:                         00 00 00 03 4a 96 51 84  |          ....J.Q.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000024: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000034: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000044: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000054: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000064: 31                                               |  1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- END OF PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- IP --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;208.242.100.65  ==&amp;gt;     208.242.100.144&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ver = 0x4       hlen = 0x5      tos = 0x0       tlen = 0x64&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        id = 0x1df      flags = 0x0     frag off=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ttl = 0xfe      proto=0x1       chksum = 0x5003&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- ICMP --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                type = 0x8      code = 0x0      checksum=0xb353&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                identifier = 0x1e6c     seq = 0x89d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- DATA --&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000014:                         00 00 00 03 4a 96 59 54  |          ....J.YT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000024: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000034: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000044: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000054: ab cd ab cd ab cd ab cd ab cd ab cd ab cd ab cd  |  ................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                00000064: 20                                               |   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- END OF PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2002 18:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42346#M660779</guid>
      <dc:creator>lxnancy</dc:creator>
      <dc:date>2002-09-24T18:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42347#M660780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This proves the pix receives the packets and NATs them (as shown by 208.242.100.144 &amp;gt; 208.242.100.144).  The next step in the troubleshooting saga would be to place a sniffer on the 208.242.100.128 subnet (just after the PIX) to see if the PIX actually forwards it out it's interface.  I suspect not, but the sniffer will prove it.  Can this be done?&lt;/P&gt;&lt;P&gt;I suspect a NAT issue, not routing (can the pix ping 208.242.100.65 - if yes it's not routing).&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2002 22:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42347#M660780</guid>
      <dc:creator>steve.barlow</dc:creator>
      <dc:date>2002-09-24T22:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42348#M660781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no, the pix cannot ping 208.242.100.65 either.  We are verifying all the server subnet masks right now(tho I know the router mask is correct) and will test again.. If it still fails, ideas?  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2002 16:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42348#M660781</guid>
      <dc:creator>lxnancy</dc:creator>
      <dc:date>2002-09-25T16:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42349#M660782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PIX can't ping even with a static route, interesting.  Can you turn on RIP2 on the PIX, the DMZ RTR and the NAMM RTR (passive interface all interfaces except those needed)?  By using RIP2, we know it should understand VLSM.  Right now your network is staring at a discontiguous network.  RIP 2 shouldn't care about this though.&lt;/P&gt;&lt;P&gt;If that fails, I have failed and can only suggest: &lt;/P&gt;&lt;P&gt;1)TAC&lt;/P&gt;&lt;P&gt;2)using NAT on a router &lt;/P&gt;&lt;P&gt;3)creating a GRE tunnel between both 208.242.100.x networks and use acls as security. &lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2002 17:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42349#M660782</guid>
      <dc:creator>steve.barlow</dc:creator>
      <dc:date>2002-09-25T17:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42350#M660783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try do a 'sh route' on the pix, and post it up...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2002 18:57:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42350#M660783</guid>
      <dc:creator>bz</dc:creator>
      <dc:date>2002-09-25T18:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42351#M660784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;YES;SURE.You cant enable because Its default. CISCO will not be "crazy' to made a classless firewall.&lt;/P&gt;&lt;P&gt;I Have a 32  sites 'pseudo-A class" and all works fine&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2002 19:13:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42351#M660784</guid>
      <dc:creator>bs0000554</dc:creator>
      <dc:date>2002-09-25T19:13:34Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42352#M660785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Steve... thanks for all of your help.. RIP2 won't be an answer, cause they don't want it on in the dmz..   We are thinking TAC, and trying out NAT now(I'm waiting on the fw changes as we speak)..   I hadn't considered a tunnel.. so that's an idea too.  You haven't failed.. you've been a great help!  I'll post what we do to get around it and what the ultimate answer is.. if we find one... Long term these 2 networks will merge together, so I'm investigating how quickly we can make that happen too.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2002 20:07:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42352#M660785</guid>
      <dc:creator>lxnancy</dc:creator>
      <dc:date>2002-09-25T20:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: pix routing-classless or classful??</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42353#M660786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the pix has 2 directly connected interfaces and a default route.. no routing protocols, no static routes except the default. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Sep 2002 20:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-classless-or-classful/m-p/42353#M660786</guid>
      <dc:creator>lxnancy</dc:creator>
      <dc:date>2002-09-25T20:32:22Z</dc:date>
    </item>
  </channel>
</rss>

