<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX operation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-operation/m-p/70803#M687141</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With a base configuration, the base security policy is all TCP and UDP is allowed out and only return (established) connections are allowed back in.  Then you can start opening holes for mail servers, web servers, etc.  You can set access lists to block outbound traffic to certain IP addresses/subnets or major nets.  If you are looking to perform content filtering, the PIX works seamlessly with WebSense from &lt;A class="jive-link-custom" href="http://www.websense.com" target="_blank"&gt;www.websense.com&lt;/A&gt;   &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Nov 2001 21:58:25 GMT</pubDate>
    <dc:creator>lisa.hall</dc:creator>
    <dc:date>2001-11-29T21:58:25Z</dc:date>
    <item>
      <title>PIX operation</title>
      <link>https://community.cisco.com/t5/network-security/pix-operation/m-p/70802#M687094</link>
      <description>&lt;P&gt;Does PIX firewall run tranperant mode with user by default. I mean that does PIX firewall open all the Internet port ? and can we deny by the domain name?    &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-operation/m-p/70802#M687094</guid>
      <dc:creator>kvbien</dc:creator>
      <dc:date>2020-02-21T05:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: PIX operation</title>
      <link>https://community.cisco.com/t5/network-security/pix-operation/m-p/70803#M687141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With a base configuration, the base security policy is all TCP and UDP is allowed out and only return (established) connections are allowed back in.  Then you can start opening holes for mail servers, web servers, etc.  You can set access lists to block outbound traffic to certain IP addresses/subnets or major nets.  If you are looking to perform content filtering, the PIX works seamlessly with WebSense from &lt;A class="jive-link-custom" href="http://www.websense.com" target="_blank"&gt;www.websense.com&lt;/A&gt;   &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2001 21:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-operation/m-p/70803#M687141</guid>
      <dc:creator>lisa.hall</dc:creator>
      <dc:date>2001-11-29T21:58:25Z</dc:date>
    </item>
  </channel>
</rss>

