<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Terminal services and pix 515 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150676#M727448</link>
    <description>&lt;P&gt;--begin ciscomoderator note-- The following post has been edited to remove potentially confidential information. Please refrain from posting confidential information on the site to reduce security risks to your network. -- end ciscomoderator note -- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a pix 515 and I want to allow terminal services to work on two diff. servers. I already have one working just fine. I created a static route from outside interface to inside interface. (ex. my outside interface ip is xxx.xxx.xxx.x and my internal server is 192.168.1.x. I want to be able to terminal services into a diff. server. My isp has assigned me 14 other ip addresses. How would I go about assigning one of those public IPs to my outside interface. I am stumped and new to pix. Any help would be greatly appreciated.. also attached is my current config: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.1(4) &lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security50 &lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxxxx encrypted &lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxx encrypted &lt;/P&gt;&lt;P&gt;hostname PIX &lt;/P&gt;&lt;P&gt;domain-name xxxxx.net &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21 &lt;/P&gt;&lt;P&gt;fixup protocol http 80 &lt;/P&gt;&lt;P&gt;fixup protocol h323 1720 &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514 &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554 &lt;/P&gt;&lt;P&gt;fixup protocol smtp 25 &lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521 &lt;/P&gt;&lt;P&gt;fixup protocol sip 5060 &lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000 &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;access-list vpnacl permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list smtp permit tcp any host xxx.xxx.xxx.3 eq smtp &lt;/P&gt;&lt;P&gt;access-list outsideif permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list outsideif permit udp any any eq 80 &lt;/P&gt;&lt;P&gt;access-list outsideif permit tcp any any eq 3389 &lt;/P&gt;&lt;P&gt;access-list outsideif permit udp any any eq 3389 &lt;/P&gt;&lt;P&gt;access-list outsideif permit tcp any any eq ftp &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;logging on &lt;/P&gt;&lt;P&gt;logging timestamp &lt;/P&gt;&lt;P&gt;logging trap errors &lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.7 &lt;/P&gt;&lt;P&gt;interface ethernet0 auto &lt;/P&gt;&lt;P&gt;interface ethernet1 auto &lt;/P&gt;&lt;P&gt;interface ethernet2 auto &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;mtu DMZ 1500 &lt;/P&gt;&lt;P&gt;ip address outside xxx.xxx.xxx.x 255.255.255.240 &lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip address DMZ 172.16.128.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip audit info action alarm &lt;/P&gt;&lt;P&gt;ip audit attack action alarm &lt;/P&gt;&lt;P&gt;ip local pool vpn3000-pool 192.168.2.1-192.168.2.150 &lt;/P&gt;&lt;P&gt;pdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list vpnacl &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.1.8 www netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 192.168.1.7 3389 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) xxx.xxy.3.5 172.16.128.103 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;access-group outsideif in interface outside &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.x 1 &lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.0.0 192.168.1.1 1 &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community public &lt;/P&gt;&lt;P&gt;no snmp-server enable traps &lt;/P&gt;&lt;P&gt;floodguard enable &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;no sysopt route dnat &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set myset &lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap &lt;/P&gt;&lt;P&gt;crypto map mymap interface outside &lt;/P&gt;&lt;P&gt;isakmp enable outside &lt;/P&gt;&lt;P&gt;isakmp identity address &lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des &lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5 &lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2 &lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400 &lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des &lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5 &lt;/P&gt;&lt;P&gt;isakmp policy 20 group 1 &lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400 &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 address-pool vpn3000-pool &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 dns-server xxx.xzz.193.250 xxx.xzz.203.12 &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 default-domain eatel.net &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 split-tunnel vpnacl &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 password ******** &lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;telnet 192.168.2.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;telnet timeout 5 &lt;/P&gt;&lt;P&gt;ssh timeout 5 &lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 inside &lt;/P&gt;&lt;P&gt;dhcpd dns xxx.xzz.203.12 xxx.xzz.193.250 &lt;/P&gt;&lt;P&gt;dhcpd lease 3600 &lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750 &lt;/P&gt;&lt;P&gt;dhcpd enable inside &lt;/P&gt;&lt;P&gt;terminal width 80 &lt;/P&gt;&lt;P&gt;Cryptochecksum:--moderator edit-- &lt;/P&gt;&lt;P&gt;: end &lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 06:47:46 GMT</pubDate>
    <dc:creator>dland1</dc:creator>
    <dc:date>2020-02-21T06:47:46Z</dc:date>
    <item>
      <title>Terminal services and pix 515</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150676#M727448</link>
      <description>&lt;P&gt;--begin ciscomoderator note-- The following post has been edited to remove potentially confidential information. Please refrain from posting confidential information on the site to reduce security risks to your network. -- end ciscomoderator note -- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a pix 515 and I want to allow terminal services to work on two diff. servers. I already have one working just fine. I created a static route from outside interface to inside interface. (ex. my outside interface ip is xxx.xxx.xxx.x and my internal server is 192.168.1.x. I want to be able to terminal services into a diff. server. My isp has assigned me 14 other ip addresses. How would I go about assigning one of those public IPs to my outside interface. I am stumped and new to pix. Any help would be greatly appreciated.. also attached is my current config: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.1(4) &lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0 &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100 &lt;/P&gt;&lt;P&gt;nameif ethernet2 DMZ security50 &lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxxxx encrypted &lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxx encrypted &lt;/P&gt;&lt;P&gt;hostname PIX &lt;/P&gt;&lt;P&gt;domain-name xxxxx.net &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21 &lt;/P&gt;&lt;P&gt;fixup protocol http 80 &lt;/P&gt;&lt;P&gt;fixup protocol h323 1720 &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514 &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554 &lt;/P&gt;&lt;P&gt;fixup protocol smtp 25 &lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521 &lt;/P&gt;&lt;P&gt;fixup protocol sip 5060 &lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000 &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;access-list vpnacl permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list smtp permit tcp any host xxx.xxx.xxx.3 eq smtp &lt;/P&gt;&lt;P&gt;access-list outsideif permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list outsideif permit udp any any eq 80 &lt;/P&gt;&lt;P&gt;access-list outsideif permit tcp any any eq 3389 &lt;/P&gt;&lt;P&gt;access-list outsideif permit udp any any eq 3389 &lt;/P&gt;&lt;P&gt;access-list outsideif permit tcp any any eq ftp &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;logging on &lt;/P&gt;&lt;P&gt;logging timestamp &lt;/P&gt;&lt;P&gt;logging trap errors &lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.7 &lt;/P&gt;&lt;P&gt;interface ethernet0 auto &lt;/P&gt;&lt;P&gt;interface ethernet1 auto &lt;/P&gt;&lt;P&gt;interface ethernet2 auto &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;mtu DMZ 1500 &lt;/P&gt;&lt;P&gt;ip address outside xxx.xxx.xxx.x 255.255.255.240 &lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip address DMZ 172.16.128.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip audit info action alarm &lt;/P&gt;&lt;P&gt;ip audit attack action alarm &lt;/P&gt;&lt;P&gt;ip local pool vpn3000-pool 192.168.2.1-192.168.2.150 &lt;/P&gt;&lt;P&gt;pdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list vpnacl &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.1.8 www netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 192.168.1.7 3389 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) xxx.xxy.3.5 172.16.128.103 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;access-group outsideif in interface outside &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.x 1 &lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.0.0 192.168.1.1 1 &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community public &lt;/P&gt;&lt;P&gt;no snmp-server enable traps &lt;/P&gt;&lt;P&gt;floodguard enable &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;no sysopt route dnat &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set myset &lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap &lt;/P&gt;&lt;P&gt;crypto map mymap interface outside &lt;/P&gt;&lt;P&gt;isakmp enable outside &lt;/P&gt;&lt;P&gt;isakmp identity address &lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption des &lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5 &lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2 &lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400 &lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des &lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5 &lt;/P&gt;&lt;P&gt;isakmp policy 20 group 1 &lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400 &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 address-pool vpn3000-pool &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 dns-server xxx.xzz.193.250 xxx.xzz.203.12 &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 default-domain eatel.net &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 split-tunnel vpnacl &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 password ******** &lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;telnet 192.168.2.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;telnet timeout 5 &lt;/P&gt;&lt;P&gt;ssh timeout 5 &lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 inside &lt;/P&gt;&lt;P&gt;dhcpd dns xxx.xzz.203.12 xxx.xzz.193.250 &lt;/P&gt;&lt;P&gt;dhcpd lease 3600 &lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750 &lt;/P&gt;&lt;P&gt;dhcpd enable inside &lt;/P&gt;&lt;P&gt;terminal width 80 &lt;/P&gt;&lt;P&gt;Cryptochecksum:--moderator edit-- &lt;/P&gt;&lt;P&gt;: end &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150676#M727448</guid>
      <dc:creator>dland1</dc:creator>
      <dc:date>2020-02-21T06:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal services and pix 515</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150677#M727519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are currently using PAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 12345 192.168.1.125 3389 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you server is 192.168.1.125, the above line would allow TS to work, but you would need to connect to port 12345 to do so, so in the TS client, you would need to specific the outside interface of the pix's ip:12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can statically nat one ip address to the ip of the server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside)  209.164.3.6 192.168.1.125  netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you then could connect to TS via just 209.164.3.6 without having to specify the port number.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you secured your terminal servers? Do you have a pop up login banner and a password policy with account lock outs to protect against brute forcing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2003 14:45:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150677#M727519</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2003-06-11T14:45:17Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal services and pix 515</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150678#M727545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I do have them secure. I tried typing the following in that you specified and it gave me the following error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"static (inside,outside) 209.124.236.x 192.168.1.5 255.255.255.255&lt;/P&gt;&lt;P&gt;unrecognized option: 255.255.255.255&lt;/P&gt;&lt;P&gt;Type help or '?' for a list of available commands."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions I would rather not have to worry about port numbers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2003 14:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150678#M727545</guid>
      <dc:creator>dland1</dc:creator>
      <dc:date>2003-06-11T14:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal services and pix 515</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150679#M727571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried it both ways and neither of them work. Any suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2003 15:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150679#M727571</guid>
      <dc:creator>dland1</dc:creator>
      <dc:date>2003-06-11T15:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal services and pix 515</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150680#M727596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;did you type in "netmask" before 255.255.255.255 ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2003 16:03:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150680#M727596</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2003-06-11T16:03:32Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal services and pix 515</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150681#M727619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I thought about it after my post and went back and did it. It took the command but will not let me connect to the terminal server?? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2003 16:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150681#M727619</guid>
      <dc:creator>dland1</dc:creator>
      <dc:date>2003-06-11T16:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal services and pix 515</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150682#M727655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you probably need to do a clear xlate to clear out all translation slots. this will clear the connection table, breaking all active connections. you might want to do that at the end of the day&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2003 16:45:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150682#M727655</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2003-06-11T16:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal services and pix 515</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150683#M727677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alright lets see if you guys can explain this. I put in the static route yesterday. Did not do the clear xlate command. User tells me today they can not access internet. Took out static route and did a clear xlate command, can access internet fine now. Back to square one. I would like to get to this box via terminal services but I need it to be able to access web also. Any suggestions??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2003 15:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-and-pix-515/m-p/150683#M727677</guid>
      <dc:creator>dland1</dc:creator>
      <dc:date>2003-06-12T15:00:11Z</dc:date>
    </item>
  </channel>
</rss>

