<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX Config. problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266774#M709943</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No. Everything is the same as it has been for a couple of years. The only thing that has changed is I changed ISP and only got one external IP to use. So, I changed the outside interface IP, changed the static translations, and changed the conduits to point to my internal server that hosts smtp, pop3, and www. That is when my problems started.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Nov 2003 14:12:06 GMT</pubDate>
    <dc:creator>cabell911</dc:creator>
    <dc:date>2003-11-28T14:12:06Z</dc:date>
    <item>
      <title>PIX Config. problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266772#M709938</link>
      <description>&lt;P&gt;Does anyone see anything wrong with this config. ? I just recently had to switch ISP and got only one IP from my new one. Since then, internet access has been sporadic at best and I cant seem to figure it out. Simple config for the most part other than port redirection to a single internal host for smtp, pop3, and www. Thanks for any help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 10baset&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password *********** encrypted&lt;/P&gt;&lt;P&gt;passwd ********** encrypted&lt;/P&gt;&lt;P&gt;hostname test&lt;/P&gt;&lt;P&gt;domain-name test.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol domain 53&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;no fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;no fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 108 permit ip 192.168.0.0 255.255.255.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 108 permit ip 192.168.0.0 255.255.255.0 10.4.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.0.0 255.255.255.0 10.4.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging monitor debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside **.**.253.118 255.255.255.252&lt;/P&gt;&lt;P&gt;ip address inside 192.168.0.99 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool 911 172.16.1.1-172.16.1.3&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 108&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp **.**.253.118 smtp 192.168.0.3 smtp netmask 255.255.&lt;/P&gt;&lt;P&gt;255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp **.**.253.118 pop3 192.168.0.3 pop3 netmask 255.255.&lt;/P&gt;&lt;P&gt;255.255 0 0&lt;/P&gt;&lt;P&gt;conduit permit tcp host **.**.253.118 eq www any&lt;/P&gt;&lt;P&gt;conduit permit tcp host **.**.253.118 eq smtp any&lt;/P&gt;&lt;P&gt;conduit permit tcp host **.**.253.118 eq pop3 any&lt;/P&gt;&lt;P&gt;established tcp 0 0 permitto tcp 0 permitfrom tcp 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 **.**.253.117 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set wayne esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set wayne&lt;/P&gt;&lt;P&gt;crypto map wc 1 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map wc 1 match address 102&lt;/P&gt;&lt;P&gt;crypto map wc 1 set peer **.***.169.250&lt;/P&gt;&lt;P&gt;crypto map wc 1 set transform-set wayne&lt;/P&gt;&lt;P&gt;crypto map wc 10 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map wc interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address **.***.169.250 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 1000&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup vpdn3000 idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup group idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup pool idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup test address-pool 911&lt;/P&gt;&lt;P&gt;vpngroup test dns-server 192.168.0.3&lt;/P&gt;&lt;P&gt;vpngroup test wins-server 192.168.0.2&lt;/P&gt;&lt;P&gt;vpngroup test default-domain 911&lt;/P&gt;&lt;P&gt;vpngroup test idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup test password ********&lt;/P&gt;&lt;P&gt;telnet 192.168.0.3 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:07:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266772#M709938</guid>
      <dc:creator>cabell911</dc:creator>
      <dc:date>2020-02-21T07:07:27Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Config. problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266773#M709940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;  Does it help if you remove the VPN?&lt;/P&gt;&lt;P&gt;  Do yu want to try to config split tunnelling for your internet traffic if possible ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2003 13:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266773#M709940</guid>
      <dc:creator>tohuang</dc:creator>
      <dc:date>2003-11-28T13:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Config. problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266774#M709943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No. Everything is the same as it has been for a couple of years. The only thing that has changed is I changed ISP and only got one external IP to use. So, I changed the outside interface IP, changed the static translations, and changed the conduits to point to my internal server that hosts smtp, pop3, and www. That is when my problems started.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2003 14:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266774#M709943</guid>
      <dc:creator>cabell911</dc:creator>
      <dc:date>2003-11-28T14:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Config. problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266775#M709947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suggest that you convert your conduits to access-list first and check if this sorts out your problem. Mixing conduits and ACL&amp;#146;s is not recommended as the ACL&amp;#146;s will always be executed first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also clear translations with command clear xlate after the change and save with write memory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also here&amp;#146;s a good document on converting conduits to ACL&amp;#146;s by Bill Donaldson of GIAC Organisation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.giac.org/practical/GSEC/Bill_Donaldson_GSEC.pdf" target="_blank"&gt;http://www.giac.org/practical/GSEC/Bill_Donaldson_GSEC.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps and let me know how you get on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2003 15:28:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266775#M709947</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2003-11-28T15:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Config. problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266776#M709957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The access-lists are only applied at the crypto map.&lt;/P&gt;&lt;P&gt;Shouldn't have any bearing on my conduits.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Nov 2003 15:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-config-problem/m-p/266776#M709957</guid>
      <dc:creator>cabell911</dc:creator>
      <dc:date>2003-11-28T15:37:39Z</dc:date>
    </item>
  </channel>
</rss>

