<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 501 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501/m-p/102847#M671476</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For basic inside to outside connections without yet configuring for outside to in access. eg. All out, none in.&lt;/P&gt;&lt;P&gt;remove:&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_access_in&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;Change:&lt;/P&gt;&lt;P&gt;global (outside) 1 *ISP ASSIGNED 2nd IP*&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;add:&lt;/P&gt;&lt;P&gt;access-list 101 icmp any any&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;for testing ping. ICMP packets must be permitted back in. All other traffic by default is permitted inside to out.&lt;/P&gt;&lt;P&gt;clear xlate then check following link&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/warp/customer/707/28.html" target="_blank"&gt;http://cisco.com/warp/customer/707/28.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Feb 2002 11:19:32 GMT</pubDate>
    <dc:creator>turnbull</dc:creator>
    <dc:date>2002-02-14T11:19:32Z</dc:date>
    <item>
      <title>PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/pix-501/m-p/102846#M671465</link>
      <description>&lt;P&gt;I have a PIX that I thought ws successfully setup, but apparently not. I can ping outside resources from within the PIX by IP address only, I cannot ping by DNS name(maybe by design?). However, the server attached to the switch from the PIX cannot get beyond the PIX. The server CAN ping the private address assigned to the PIX and vise-versa, but no outside traffice. Below is my configuration. Any help would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.1(1)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password OLKvKRtWYoX8k0LJ encrypted&lt;/P&gt;&lt;P&gt;passwd Dx7ZLAkN9r0yT5Q6 encrypted&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name 4layout.net&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 1720&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 10full&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside *ISP ASSIGNED IP* 255.255.255.128&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool pptp-pool 192.168.0.1-192.168.0.50&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 *ISP ASSIGNED 2nd IP*&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_access_in&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 *ISP ASSIGNED GW* 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si&lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:58:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501/m-p/102846#M671465</guid>
      <dc:creator>aparker</dc:creator>
      <dc:date>2020-02-21T05:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/pix-501/m-p/102847#M671476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For basic inside to outside connections without yet configuring for outside to in access. eg. All out, none in.&lt;/P&gt;&lt;P&gt;remove:&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_access_in&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;Change:&lt;/P&gt;&lt;P&gt;global (outside) 1 *ISP ASSIGNED 2nd IP*&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;add:&lt;/P&gt;&lt;P&gt;access-list 101 icmp any any&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;for testing ping. ICMP packets must be permitted back in. All other traffic by default is permitted inside to out.&lt;/P&gt;&lt;P&gt;clear xlate then check following link&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/warp/customer/707/28.html" target="_blank"&gt;http://cisco.com/warp/customer/707/28.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2002 11:19:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501/m-p/102847#M671476</guid>
      <dc:creator>turnbull</dc:creator>
      <dc:date>2002-02-14T11:19:32Z</dc:date>
    </item>
  </channel>
</rss>

