<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Backup through PIX 501 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473615#M733432</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have a network splittet with a pix. The 192.168.111.0 at the outside interface of the PIX and the 192.168.110.0 at the inside interface.&lt;/P&gt;&lt;P&gt;From the inside interface everything to the extern (192.168.111.0 network) is allowed. But no access from 192.168.111.0 to 192.168.110.0 (internal interface of the PIX) is allowed.&lt;/P&gt;&lt;P&gt;Now i need to backup from network 192.168.111.0 servers who are locatet at the 192.168.110.0 network.&lt;/P&gt;&lt;P&gt;There is a way that the PIX allow the special Ports of the backup program and block rest of the traffic as it do at moment?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Ports are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; mso-ansi-language: EN-US; font-family: Calibri; "&gt;TCP 10000 outgoing&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Calibri; "&gt;TCP 1025 – 65536 outgoing&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;TCP 445 outgoing&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;UDP 135 send&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:51:30 GMT</pubDate>
    <dc:creator>sebastianvetter</dc:creator>
    <dc:date>2019-03-11T17:51:30Z</dc:date>
    <item>
      <title>Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473615#M733432</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have a network splittet with a pix. The 192.168.111.0 at the outside interface of the PIX and the 192.168.110.0 at the inside interface.&lt;/P&gt;&lt;P&gt;From the inside interface everything to the extern (192.168.111.0 network) is allowed. But no access from 192.168.111.0 to 192.168.110.0 (internal interface of the PIX) is allowed.&lt;/P&gt;&lt;P&gt;Now i need to backup from network 192.168.111.0 servers who are locatet at the 192.168.110.0 network.&lt;/P&gt;&lt;P&gt;There is a way that the PIX allow the special Ports of the backup program and block rest of the traffic as it do at moment?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Ports are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; mso-ansi-language: EN-US; font-family: Calibri; "&gt;TCP 10000 outgoing&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Calibri; "&gt;TCP 1025 – 65536 outgoing&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;TCP 445 outgoing&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;UDP 135 send&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:51:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473615#M733432</guid>
      <dc:creator>sebastianvetter</dc:creator>
      <dc:date>2019-03-11T17:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473616#M733433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sebastian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allows those ports:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; mso-ansi-language: EN-US;"&gt;TCP 10000 outgoing&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;TCP 1025 – 65536 outgoing&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;TCP 445 outgoing&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;UDP 135 send&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;access-list outbound permit tcp 192.168.110.0 255.255.255.0 any range 1025 65536&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;access-list outbound permit tcp 192.168.110.0 255.255.255.0 any eq 445&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;access-list outbound permit udp 192.168.110.0 255.255.255.0 any eq 135&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;access-group outbound in interface inside &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;WIth the above configuration only those ports are allowed and ALL other traffic is blocked. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;Federico.&lt;/SPAN&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 May 2010 14:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473616#M733433</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-27T14:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473617#M733434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;if i enter this commands to the CLI and then check in the&amp;nbsp; Cisco PDM i see that there are 3 new rules from the internal network to outside.&lt;/P&gt;&lt;P&gt;But i need to open this ports at the outside interface to intern!&lt;/P&gt;&lt;P&gt;Else my standard allow all rule from intern to extern is overwritten.&lt;/P&gt;&lt;P&gt;The access rules after the commands at CLI i attached as picture. As i see there the acces rules are from intern to extern.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sebastian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 May 2010 12:42:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473617#M733434</guid>
      <dc:creator>sebastianvetter</dc:creator>
      <dc:date>2010-05-28T12:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473618#M733435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sebastian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your post you specify the requirements as outgoing (that's why I thought you need to open those ports in an outbound direction).&lt;/P&gt;&lt;P&gt;If you need to open them inbound... then the ACLs are like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;access-list inbound permit tcp any any range 1025 65536&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; "&gt;access-list inbound permit udp any any eq 135&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;access-list inbound permit tcp any any eq 445&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;access-group inbound in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;Now.... it is important to replace ''any'' with the network addresses to avoid security problems. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;Also, remove the previos ACLs though. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000;"&gt;Federico.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 May 2010 19:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473618#M733435</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-28T19:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473619#M733436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;So if my backupserver have the IP 192.168.111.100 and the server who should be backuped the 192.168.110.100.&lt;/P&gt;&lt;P&gt;I will configure a Static NAT from 192.168.111.100 to 192.168.110.xxx/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp 192.168.110.0 255.255.255.0 host 192.168.110.xxx range 1025 65535&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp 192.168.110.0 255.255.255.0 host 192.168.110.xxx range eq 445&lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp 192.168.110.0 255.255.255.0 host 192.168.110.xxx range eq 135&lt;/P&gt;&lt;P&gt;access-group inbound in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that ok? Where xxx is always the same IP at 192.168.110.0/24&lt;/P&gt;&lt;P&gt;So i read it at the "&lt;SPAN style="font-size: 10pt;"&gt;Cisco Security Appliance Command Line Configuration Guide" page 277.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Hope that is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sebastian&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 May 2010 10:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473619#M733436</guid>
      <dc:creator>sebastianvetter</dc:creator>
      <dc:date>2010-05-31T10:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473620#M733437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes,&lt;/P&gt;&lt;P&gt;If you have any problems please post your current configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 May 2010 13:47:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473620#M733437</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-31T13:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473621#M733438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;I will apply this rules tomorrow at customer site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another question... iam pretty new to Cisco and configured most things via ASDM.&lt;/P&gt;&lt;P&gt;If i apply this to my Test-ASA i can only see this rules at ASDM under VPN -&amp;gt; Group Policy -&amp;gt; Client Configuration -&amp;gt; Split Tunneling -&amp;gt; Extendet ACL&lt;/P&gt;&lt;P&gt;Should it not be visible at Security Policy -&amp;gt; Access Rules too ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sebastian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 May 2010 14:11:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473621#M733438</guid>
      <dc:creator>sebastianvetter</dc:creator>
      <dc:date>2010-05-31T14:11:37Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473622#M733439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you should see the rules under Firewall - Access rules as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 May 2010 15:11:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473622#M733439</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-31T15:11:50Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473623#M733440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i set the access rules to the pix. But backup is still not possible. I installed the remote agend at the Server in 192.168.110.0 site.&lt;/P&gt;&lt;P&gt;At the backupserver 192.168.111.0 site i see the Server in 192.168.110.0 site.&lt;/P&gt;&lt;P&gt;But the backup agend sends data to backup server and from 192.168.110.0 to 192.168.111.0 all is allowed, so it is logical that backup programm see the remote server. But backup still dont work. Cant access to the server and select what i want to backup.&lt;/P&gt;&lt;P&gt;The static NAT route i set to a non used IP in 192.168.110.0 site. Dont know if that works, but so i understood at the Cisco CLI dokumentation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The new PIX config i have attached.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jun 2010 12:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473623#M733440</guid>
      <dc:creator>sebastianvetter</dc:creator>
      <dc:date>2010-06-02T12:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473624#M733441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sebastian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you need to access the server 192.168.111.100 from the outside of the PIX? &lt;BR /&gt;In that case you need to do the following: &lt;BR /&gt; &lt;BR /&gt;no static (outside,inside) 192.168.110.250 WAWI-SBS netmask 255.255.255.255 0 0 &lt;BR /&gt;static (inside,outside) 192.168.110.250 WAWI-SBS netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, you can only access the server with its NATed IP 192.168.110.250.&lt;BR /&gt;The inbound ACL is applied to the inside interface (you need to make sure the correct ports are allowed in that list).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another thing, &lt;BR /&gt;In order to allow communication from the outside to the inside you require an ACL that is applied to the outside interface. &lt;BR /&gt;i.e. &lt;BR /&gt;access-list outside permit ip any host 192.168.110.119 &lt;BR /&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that you can access this server from the outside but not from the Internet since the NATed IP is a private IP.&lt;/P&gt;&lt;P&gt;Let me know what is failing after these changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jun 2010 13:19:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473624#M733441</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-02T13:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473625#M733442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no the server 192.168.111.100 is the backupserver (WAWI-SBS) and is located at the outside interface of the PIX.&lt;/P&gt;&lt;P&gt;I need to access a server in 192.168.110.0 subnet from the outside of the PIX.&lt;/P&gt;&lt;P&gt;I set the static NAT: static (outside,inside) 192.168.110.250 WAWI-SBS netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i need to apply this commands to the PIX?&lt;/P&gt;&lt;P&gt;access-list outside permit ip any host 192.168.110.119 &lt;BR /&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only need to access this server from outside not from internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cant make changes at the PIX now, tomorrow i can do.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jun 2010 13:38:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473625#M733442</guid>
      <dc:creator>sebastianvetter</dc:creator>
      <dc:date>2010-06-02T13:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473626#M733443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let's say that you need to access server 192.168.110.10 from outside the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you do is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.110.10 192.168.110.10&lt;/P&gt;&lt;P&gt;access-list outside permit ip any host 192.168.110.10&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above example is assuming that you don't need to NAT the server.&lt;/P&gt;&lt;P&gt;If you need to NAT 192.168.110.10 to 192.168.111.10 for example, you do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.111.10 192.168.110.10&lt;/P&gt;&lt;P&gt;access-list outside permit ip any host 192.168.111.10&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jun 2010 13:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473626#M733443</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-02T13:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473627#M733444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i attached a picture of the network. The green arrow shows the access i need with the special ports.&lt;/P&gt;&lt;P&gt;Only the 192.168.111.100 should can access to 192.168.110.0 subnet with the special ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sebastian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jun 2010 14:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473627#M733444</guid>
      <dc:creator>sebastianvetter</dc:creator>
      <dc:date>2010-06-02T14:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473628#M733445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (inside,outside) 192.168.110.0 192.168.110.0 netmask 255.255.255.0&lt;BR /&gt;access-list outside permit tcp host 192.168.111.100 192.168.110.0 255.255.255.0 eq 80&lt;BR /&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sebastian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration allows communication from outside host 192.168.111.100 to the internal LAN 192.168.110.0/24 only on the &lt;BR /&gt;ports that you specify in the ACL outside. &lt;BR /&gt;The above ACL is an example to allow port 80 (HTTP), you should include the ports you need to permit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jun 2010 15:28:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473628#M733445</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-02T15:28:38Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473629#M733446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i will try this configuration at the PIX today.&lt;/P&gt;&lt;P&gt;But.... static (inside,outside) 192.168.110.0 192.168.110.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;two times 192.168.110.0? Is that ok so?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sebastian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 07:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473629#M733446</guid>
      <dc:creator>sebastianvetter</dc:creator>
      <dc:date>2010-06-03T07:04:18Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473630#M733447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes this command is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.110.0 192.168.110.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And it is called static Identity NAT.&lt;/P&gt;&lt;P&gt;You're matching 192.168.110.0/24 against a NAT rule that translates the network to itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is done when you must match a NAT rule to be allowed to pass traffic, but you don't actually want to change the real IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 13:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473630#M733447</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T13:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473631#M733448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i apply your commands i can successfully acces the server at 192.168.110.0 subnet with the backup programm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i lose the connection from 192.168.110 subnet to 192.168.111.0.&lt;/P&gt;&lt;P&gt;The 192.168.110.0 subnet dont have any access to internet or other ressources at 192.168.111.0 subnet.&lt;/P&gt;&lt;P&gt;Only IP 192.168.111.100 works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i reset the PIX all worked fine. Try to set the commands second time the same issues occour.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attached the config before the changes (Config1) and after the changes (Config2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jun 2010 13:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473631#M733448</guid>
      <dc:creator>sebastianvetter</dc:creator>
      <dc:date>2010-06-07T13:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473632#M733449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sebastian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suggest that instead of this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.110.0 192.168.110.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just have the static with the correct ports&lt;/P&gt;&lt;P&gt;i.e&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 192.168.110.10 80 192.168.110.10 80&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 192.168.110.10 80 192.168.110.10 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above commands is to be able to acess server 192.168.110.10 on port 80 and port 3389.&lt;/P&gt;&lt;P&gt;The advantage of doing it like this is that the 192.168.110.x will still have internet access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jun 2010 13:04:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473632#M733449</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-08T13:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: Backup through PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473633#M733450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;works fine this way &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/images/emoticons/wink.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sebastian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jun 2010 14:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/backup-through-pix-501/m-p/1473633#M733450</guid>
      <dc:creator>sebastianvetter</dc:creator>
      <dc:date>2010-06-21T14:04:38Z</dc:date>
    </item>
  </channel>
</rss>

