<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: strange pix firewall problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116911#M729319</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you running a VPN to establish connections to outside hosts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 31 Mar 2003 12:46:26 GMT</pubDate>
    <dc:creator>j.khandia</dc:creator>
    <dc:date>2003-03-31T12:46:26Z</dc:date>
    <item>
      <title>strange pix firewall problem</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116910#M729303</link>
      <description>&lt;P&gt;In pix 515 when from outside(not internet other WAN site) anybody tries to access inside network it can't . But if i ping from inside network to outside network host it pings and after this outside network access the inside network resources easily uptill 10 hours . After 10 or 12 hours again same problem happens we have to ping from inside network to outside host if we want outside host to access inside network . Access-lists are being used and NAT is disable what could be the possible problem &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116910#M729303</guid>
      <dc:creator>haseeb_eng</dc:creator>
      <dc:date>2020-02-21T06:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: strange pix firewall problem</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116911#M729319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you running a VPN to establish connections to outside hosts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Mar 2003 12:46:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116911#M729319</guid>
      <dc:creator>j.khandia</dc:creator>
      <dc:date>2003-03-31T12:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: strange pix firewall problem</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116912#M729336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are also having the same issue as Haseeb. We are also using Access-lists, with NAT disabled. The communication is also between the inside and our  DMZ. VPN is not involved here. PIX version is 6.2(2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pradeep Majumder&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Mar 2003 13:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116912#M729336</guid>
      <dc:creator>pmajumder</dc:creator>
      <dc:date>2003-03-31T13:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: strange pix firewall problem</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116913#M729348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Without seeing yours or Haseeb config it would be difficult to ascertain what the issue is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before you decide to post your configs on the forum ensure you blank out or do not include the password lines from the config I would also suggest starring out the Ip addresses of your interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Mar 2003 15:01:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116913#M729348</guid>
      <dc:creator>j.khandia</dc:creator>
      <dc:date>2003-03-31T15:01:02Z</dc:date>
    </item>
    <item>
      <title>Re: strange pix firewall problem</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116914#M729361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do you mean by "nat is disabled"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're using NAT 0 (or any other nat/global method)to provide connectivity to a lower security interface, then the hosts won't always be available for connectivity by the remote hosts.  When you ping out, a translation is built and the hosts can connect.  After a period of inactivity, the translation will timeout and will no longer be available to that lower security interface.  The ACL may be there, but there must be a NAT translation when accessing hosts from a lower security interface to a higher one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what the static command is for.  To make the NAT process always available.  You can do static statements for a whole subnet that is really just NATted back to itself.  For exmaple, this command would NAT the whole inside network of 192.168.0.0/24 back to itself on the dmz interface.  The translations will be "permanent" and not timeout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shannon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Mar 2003 16:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116914#M729361</guid>
      <dc:creator>shannong</dc:creator>
      <dc:date>2003-03-31T16:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: strange pix firewall problem</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116915#M729372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;well VPN concontrator is behind the firewall(inside network) but i could'nt see any vpn config on the firewall , but i did'nt check vpn concentrator . One more thing i wana tell that the border router to which pix is connecting is having 3 serial interfaces . one is going to the internet and other 2 will to other WAN sites(not internet) . And from the internet i want to access only VPN concentrator . But from other 2 WAN sites whole network . Shannon has also a point . For the VPN i had used this command :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp inside  VPN-ip-address VPN-MAC-address &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Apr 2003 05:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116915#M729372</guid>
      <dc:creator>haseeb_eng</dc:creator>
      <dc:date>2003-04-01T05:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: strange pix firewall problem</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116916#M729381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It has to do with vpn concentrator config also ? If yes then what about the other whole network . In the inside network i have 10.0.0.x and 168 class B network .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Apr 2003 05:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116916#M729381</guid>
      <dc:creator>haseeb_eng</dc:creator>
      <dc:date>2003-04-01T05:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: strange pix firewall problem</title>
      <link>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116917#M729394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had checked the vpn concentrator it is configured for vpn tunnels . And the client are able to access it from the internet but only when you ping it from inside and after 10 hours you have to ping again from inside to outside in order to maintain the connection . I had checked the access-lists also but it seems fine to me . Should i use SYSOPT CONNECTION PERMIT-IPSEC command? I will also try to use static command &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Apr 2003 05:54:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/strange-pix-firewall-problem/m-p/116917#M729394</guid>
      <dc:creator>haseeb_eng</dc:creator>
      <dc:date>2003-04-01T05:54:21Z</dc:date>
    </item>
  </channel>
</rss>

