<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix Access-list 101 denies unix trafic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-access-list-101-denies-unix-trafic/m-p/81848#M661493</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;a&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Jul 2002 14:53:24 GMT</pubDate>
    <dc:creator>cweatherford</dc:creator>
    <dc:date>2002-07-17T14:53:24Z</dc:date>
    <item>
      <title>Pix Access-list 101 denies unix trafic</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-101-denies-unix-trafic/m-p/81846#M661462</link>
      <description>&lt;P&gt;Has anyone ever seen unix trafic (vai reflections or telnet) be denied when thew following line is in your config:&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any&lt;/P&gt;&lt;P&gt;When the line bellow is in unix is ok but MSN messenger and other such programs need no authentication:&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any any eq www&lt;/P&gt;&lt;P&gt;Do I have a routing problem?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-101-denies-unix-trafic/m-p/81846#M661462</guid>
      <dc:creator>cweatherford</dc:creator>
      <dc:date>2020-02-21T06:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: Pix Access-list 101 denies unix trafic</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-101-denies-unix-trafic/m-p/81847#M661473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We need way more information than this.  Where are the Unix servers, and where are the clients located (what PIX interface)?  Do you see anything in the PIX syslog when the connection is denied to indicate the traffic is dropped?  Can you forward the PIX config (remove any password lines and change IP addresses if you like) and then detail exactly what isn't working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is access-list 101 used for authentication, or for allowing access through the PIX?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2002 02:39:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-101-denies-unix-trafic/m-p/81847#M661473</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2002-07-17T02:39:27Z</dc:date>
    </item>
    <item>
      <title>Re: Pix Access-list 101 denies unix trafic</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-101-denies-unix-trafic/m-p/81848#M661493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;a&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2002 14:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-101-denies-unix-trafic/m-p/81848#M661493</guid>
      <dc:creator>cweatherford</dc:creator>
      <dc:date>2002-07-17T14:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Pix Access-list 101 denies unix trafic</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-101-denies-unix-trafic/m-p/81849#M661532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pix 520 6.2(1)&lt;/P&gt;&lt;P&gt;The Unix server and clients are inside the firewall. The clients have host files but all of the ip's are internal. When I change this line I see the following in the syslog- "2002-07-16 00:54:16 UTC,Local0.Error,10.***.***.***,Jul 15 2002 18:49:40: %PIX-3-109013: User must authenticate before using this service.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;As soon as I change this line: access-list 101 permit tcp any any eq www (which only asks for authentication through browsers)&lt;/P&gt;&lt;P&gt;to: access-list 101 permit ip any any (which will ask for authenication for anything passing through the pix)&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Yes, we have everyone authenticate before going out to the internet.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.2(1)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 ras security50&lt;/P&gt;&lt;P&gt;nameif ethernet3 dmz security10&lt;/P&gt;&lt;P&gt;enable password  encrypted&lt;/P&gt;&lt;P&gt;passwd encrypted&lt;/P&gt;&lt;P&gt;hostname pix&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;no names&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10. any&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10.any&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10. any&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10.110 any&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10.110 any&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10.110any&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10.110 any&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10.110 any&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10.110 any&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10.110 any&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10.110 any&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any any eq www&lt;/P&gt;&lt;P&gt;pager lines 23&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap errors&lt;/P&gt;&lt;P&gt;logging facility 16&lt;/P&gt;&lt;P&gt;logging host inside &lt;/P&gt;&lt;P&gt;logging host inside &lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;interface ethernet3 auto&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu ras 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip address outside  255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside  255.0.0.0&lt;/P&gt;&lt;P&gt;ip address ras  255.255.0.0&lt;/P&gt;&lt;P&gt;ip address dmz  255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;failover ip address outside 0.0.0.0&lt;/P&gt;&lt;P&gt;failover ip address inside 0.0.0.0&lt;/P&gt;&lt;P&gt;failover ip address ras 0.0.0.0&lt;/P&gt;&lt;P&gt;failover ip address dmz 0.0.0.0&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1  netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;global (ras) 1  netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;global (dmz) 1  netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (ras) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (dmz,outside) netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (dmz,outside) netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,ras)  netmask 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,ras)  netmask 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,ras)  netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,ras)  netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;conduit permit icmp any any&lt;/P&gt;&lt;P&gt;conduit permit tcp any 172.  255.255.0.0&lt;/P&gt;&lt;P&gt;conduit permit udp host 12. eq dnsix any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 12. eq domain any&lt;/P&gt;&lt;P&gt;conduit permit udp host 12 eq domain any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 12.eq smtp any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 12.q smtp any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 12.eq domain any&lt;/P&gt;&lt;P&gt;conduit permit udp host 12.eq domain any&lt;/P&gt;&lt;P&gt;conduit permit udp host 12.eq dnsix any&lt;/P&gt;&lt;P&gt;conduit permit udp host 12.eq nameserver any&lt;/P&gt;&lt;P&gt;conduit permit udp host 12.eq nameserver any&lt;/P&gt;&lt;P&gt;conduit permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;conduit permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;conduit permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;conduit permit icmp any any parameter-problem&lt;/P&gt;&lt;P&gt;conduit permit icmp any any echo&lt;/P&gt;&lt;P&gt;conduit permit tcp host 192 eq smtp host 192.&lt;/P&gt;&lt;P&gt;conduit permit tcp host 192. eq smtp host 192.&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 12.28.0.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si&lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:00:00 absolute uauth 1:00:00 inactivity&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ (inside) host 10. timeout 5&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;aaa-server attack protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server attack (inside) host 10. timeout 5&lt;/P&gt;&lt;P&gt;aaa authentication match 101 inside attack&lt;/P&gt;&lt;P&gt;aaa authorization match 101 inside attack&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;tftp-server inside 10.\&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;auth-prompt prompt "Company Access"&lt;/P&gt;&lt;P&gt;telnet 10..0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 ras&lt;/P&gt;&lt;P&gt;telnet 10..0.0.0 dmz&lt;/P&gt;&lt;P&gt;telnet timeout 15&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;[OK]&lt;/P&gt;&lt;P&gt;pixfirewall#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2002 14:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-101-denies-unix-trafic/m-p/81849#M661532</guid>
      <dc:creator>cweatherford</dc:creator>
      <dc:date>2002-07-17T14:54:59Z</dc:date>
    </item>
  </channel>
</rss>

