<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-question/m-p/33423#M707826</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The pix will allow outbound icmp packets from a higher security interface to a lower security interface, as long as you have a translation.  In your case, if the static (inside, outside) statement is correct, then it will allow the echo request to go out.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The echo reply (the response to your ping) will, by default, be dropped by the pix.  To allow it to return, you will need to apply a conduit or an ACL specifically permitting it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For test purposes, you can apply a conduit permit icmp any any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I recommend that you refer to the command reference for further clarification of the use of the commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_60/config/commands.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_60/config/commands.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Aug 2001 11:00:00 GMT</pubDate>
    <dc:creator>jekrauss</dc:creator>
    <dc:date>2001-08-15T11:00:00Z</dc:date>
    <item>
      <title>Pix question</title>
      <link>https://community.cisco.com/t5/network-security/pix-question/m-p/33420#M707822</link>
      <description>&lt;P&gt;I want to add another global outside ip address in pix firewall for outlook web server, basically i want to seperate exchange server and outlook web in different machines, outlook web &amp;amp; exchange Servers are intsalled inside the network, I also want alow outside users to access their e-mails connecting with any internet provider thru outlook web, so this would be like this???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 212.x.x.10 192.168.0.30 netmask 255.255.255.255. 0.0  (is this correct)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conduit permit tcp host 192.168.0.30 any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 212.x.x.10 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help!!!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-question/m-p/33420#M707822</guid>
      <dc:creator>kefah</dc:creator>
      <dc:date>2020-02-21T05:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: Pix question</title>
      <link>https://community.cisco.com/t5/network-security/pix-question/m-p/33421#M707823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is what you can do. Have a static and conduit pair for each server. If your exchange server was 192.168.0.30 and your outlook web server was 192.168.0.31, then do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 212.X.X.10 192.168.0.30&lt;/P&gt;&lt;P&gt;static (inside,outside) 212.X.X.11 192.168.0.31&lt;/P&gt;&lt;P&gt;conduit permit tcp host 212.X.X.10 eq (protocol) any&lt;/P&gt;&lt;P&gt;conduit permit tcp host 212.X.X.11 eq (protocol) any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The (protocol) would be smtp, http, etc., whatever you want to permit to get to that server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2001 16:02:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-question/m-p/33421#M707823</guid>
      <dc:creator>bducharm</dc:creator>
      <dc:date>2001-08-14T16:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: Pix question</title>
      <link>https://community.cisco.com/t5/network-security/pix-question/m-p/33422#M707824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply, just a quick question, Is it really require to restart the pix firewall to take effect the new settings??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;another question is defining static map for INSIDE/DMZ/OUTSIDE should be in sequence or it does not mater whatever sequence you make.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 212.x.x.10 192.168.0.30 netmask 255.255.255.255. 0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, DMZ)&lt;/P&gt;&lt;P&gt;static (inside)&lt;/P&gt;&lt;P&gt;static (inside,outisde)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;see above it is not in sequence i have the same case, I applied the settings you have suggested but it is not even ping to that IP from outside ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please suggest!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2001 08:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-question/m-p/33422#M707824</guid>
      <dc:creator>kefah</dc:creator>
      <dc:date>2001-08-15T08:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Pix question</title>
      <link>https://community.cisco.com/t5/network-security/pix-question/m-p/33423#M707826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The pix will allow outbound icmp packets from a higher security interface to a lower security interface, as long as you have a translation.  In your case, if the static (inside, outside) statement is correct, then it will allow the echo request to go out.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The echo reply (the response to your ping) will, by default, be dropped by the pix.  To allow it to return, you will need to apply a conduit or an ACL specifically permitting it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For test purposes, you can apply a conduit permit icmp any any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I recommend that you refer to the command reference for further clarification of the use of the commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_60/config/commands.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_60/config/commands.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2001 11:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-question/m-p/33423#M707826</guid>
      <dc:creator>jekrauss</dc:creator>
      <dc:date>2001-08-15T11:00:00Z</dc:date>
    </item>
  </channel>
</rss>

