<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix 501 configuring.... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417013#M734757</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;jorgemcse,&lt;/P&gt;&lt;P&gt;Here is what I got when I did the ping test with the last configuration I revealed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JMSBC(config)# ping 4.2.2.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2 response received -- 10ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2 response received -- 0ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2 response received -- 0ms&lt;BR /&gt;JMSBC(config)# ping 216.x.x.230&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.230 response received -- 0ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.230 response received -- 0ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.230 response received -- 0ms&lt;BR /&gt;JMSBC(config)# ping 216.x.x.229&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.229 response received -- 0ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.229 response received -- 0ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.229 response received -- 0ms&lt;BR /&gt;JMSBC(config)# ping 24.x.x.33&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.33 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.33 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.33 NO response received -- 1000ms&lt;BR /&gt;JMSBC(config)# ping 24.x.x.32&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.32 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.32 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.32 NO response received -- 1000ms&lt;BR /&gt;JMSBC(config)# ping 24.x.x.34&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.34 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.34 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.34 NO response received -- 1000ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have since added the following line to the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outbound permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After adding this, the pings went through from the PC. As I write this I am using the firewall connection to do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What did this command do? Is it ok to use it without vulnerabilities?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dare I try to move on to remoting in???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your assistance and patience!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Apr 2010 00:12:15 GMT</pubDate>
    <dc:creator>mikentosh</dc:creator>
    <dc:date>2010-04-01T00:12:15Z</dc:date>
    <item>
      <title>Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417000#M734744</link>
      <description>&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;My client has recently purchased a fiber line. The ISP provided th following information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;IP routes:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Interface IP 216.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Gateway IP 216.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Mask 255.255.255.252&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;and DNS servers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;They also provided "Routed Network Info", which is confusing to me.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Subnet is 24.x.x.x/29 with 6 usable IPs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Gateway 24.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Mask 255.255.255.248&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;My first task is to try to configure a Pix 501 for insdie - out internet access&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Second task is to set up the RDP access to individual computers on the LAN. I had done this before using DD-WRT port forwarding on a router where I could give the client the public IP with a port number (public:1234) and configure a forwarding table to relay each assigned port to their computer IP on port 3389. Now that I am introducing the Pix and the additional routing info from ISP I am way confused. Any help would be appreciated. I would settle for getting internet access from the inside at this point.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I will try to get what I have configured (but not tested) posted soon.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:26:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417000#M734744</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2019-03-11T17:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417001#M734745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To make matters worse (for me) I am having to do everything in the console. Here is the configuration (sans sensitive info):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HELP&amp;gt; login&lt;BR /&gt;Username: admin&lt;BR /&gt;Password: **********&lt;BR /&gt;HELP# conf term&lt;BR /&gt;HELP(config)# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;PIX Version 6.3(5)&lt;BR /&gt;interface ethernet0 auto&lt;BR /&gt;interface ethernet1 100full&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;enable password xxxxxxxxxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxxxxxxxxx encrypted&lt;BR /&gt;hostname HELP&lt;BR /&gt;domain-name HELP.org&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;fixup protocol dns maximum-length 512&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;fixup protocol http 80&lt;BR /&gt;fixup protocol rsh 514&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;fixup protocol sqlnet 1521&lt;BR /&gt;fixup protocol tftp 69&lt;BR /&gt;names&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 3389&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq ftp-data&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq ftp&lt;BR /&gt;pager lines 24&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip address outside 216.x.x.x 255.255.255.252&lt;BR /&gt;ip address inside 192.168.1.2 255.255.255.0&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;ip audit attack action alarm&lt;BR /&gt;pdm logging informational 100&lt;BR /&gt;pdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 24.x.x.x&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;BR /&gt;static (inside,outside) tcp 216.x.x.x 3389 192.168.1.253 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;access-group outbound in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 216.x.x.x 1 &amp;lt;------Gateway IP&lt;BR /&gt;timeout xlate 0:05:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt;aaa-server TACACS+ deadtime 10&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt;aaa-server RADIUS deadtime 10&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;ntp server 192.168.1.4 source inside&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.3 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;no snmp-server enable traps&lt;BR /&gt;floodguard enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;username admin password .xxxxxxxxxxxxxxx encrypted privilege 15&lt;BR /&gt;terminal width 90&lt;BR /&gt;Cryptochecksum:eb81abfdc7e2b02e12b91a8836670df1&lt;BR /&gt;: end&lt;BR /&gt;HELP(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 18:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417001#M734745</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-03-29T18:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417002#M734746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #f8fafd; "&gt;They also provided "Routed Network Info", which is confusing to me.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #f8fafd; "&gt;Subnet is 24.x.x.x/29 with 6 usable IPs&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #f8fafd; "&gt;Gateway 24.x.x.x&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #f8fafd; "&gt;Mask 255.255.255.248&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is an IP range that the ISP will route to you so you can use it to present internal/dmz servers to the internet eg.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 24.x.x.1 192.168.5.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would present the inside server of 192.168.5.10 as 24.x.x.1 to the outside. You can also be more specific and use ports eg.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 24.x.x.1 80 192.168.5.10 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would present just port 80 for 192.168.5.10 as 24.x.x.1 on port 80 so you can use the same public IP for different ports and private IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your config looks fine to test with. Most people NAT the internal addresses to the outside interface IP but it looks like you have used one of your 24.x.x.x addresses. Nothing wrong with what you have done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Cisco are currently donating money to the Haiti earthquake appeal for every rating so please consider rating all helpful posts.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 20:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417002#M734746</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-03-29T20:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417003#M734747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&amp;nbsp; I know Jon will never get mad by adding additional info.. just wrote the answer but Jon's speed of light reply always takes me off guard &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Should be straight forward what you need to accomplish, and you have come to the right place here for us to help.&lt;/P&gt;&lt;P&gt;First lets star to understand&amp;nbsp; what ISP has giving you, it is always good to ask ISP when in doubt.&lt;/P&gt;&lt;P&gt;1 - IP routes:&lt;/P&gt;&lt;P&gt;Interface IP 216.x.x.x&lt;/P&gt;&lt;P&gt;Gateway IP 216.x.x.x&lt;/P&gt;&lt;P&gt;Mask 255.255.255.252&lt;/P&gt;&lt;P&gt;and DNS servers&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Above information is provided for your PIX&amp;nbsp; interface facing ISP configuration ,and looking at your PIX configuration&lt;BR /&gt;it looks like&amp;nbsp; you have already acomplish that with outside interface IP address and default route for your PIX gateway.&lt;BR /&gt;DNS servers info&amp;nbsp; will be for your inside hosts in the event that you do not have local DNS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- "Routed Network Info",&lt;/P&gt;&lt;P&gt;Subnet is 24.x.x.x/29 with 6 usable IPs&lt;/P&gt;&lt;P&gt;Gateway 24.x.x.x&lt;/P&gt;&lt;P&gt;Mask 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Routed network in your ISP case simply means that they have provided you with a /29 public IP block , they will&lt;BR /&gt;route the the /29 block towards your oustide PIX interface IP,&amp;nbsp; meaning that you may use those /29 IP addresses as NAT&lt;BR /&gt;address or NAT pool addresses etc as John indicated .&amp;nbsp; Since it is expected ISP to route this block back to your PIX you do not need&lt;BR /&gt;to do anything other than, again, using those addresses for one-to-one NAT translations or global Pools as ilustrated by Jon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 20:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417003#M734747</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2010-03-29T20:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417004#M734748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am grateful to both of you. I will hopefully be able to test it tonight. I will let you know what happens. Thanks again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Mar 2010 21:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417004#M734748</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-03-29T21:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417005#M734749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darn! It didn't work......... Not even the first task (getting internet access). Here's the rundown:&lt;/P&gt;&lt;P&gt;I connected the ISP ethernet line (from fiber box) to Pix WAN, connected Pix to laptop with ethernet, successfully pinged Pix (192.168.1.2), got "hardware error" when pinging outside.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I know I am doing something wrong. Would probably be much easier if I could get the PDM interface to work, but that is another story. I am posting the config again hoping someone can tell me where I am screwing up.&lt;/P&gt;&lt;P&gt;Note- the ANYRDP acl was just to test if I could access a specific inside system by using 24.x.x.33:1000 for a sort of one-to-one mapping of outside access in via RDP.&lt;/P&gt;&lt;P&gt;Again, any help is greatly appreciated...........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;The ISP provided information:&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;IP routes:&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;Interface IP 216.x.x.230&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;Gateway IP 216.x.x.229&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;Mask 255.255.255.252&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;and DNS servers&lt;/P&gt;&lt;P&gt; &lt;BR /&gt;&amp;gt;&amp;gt;They also provided "Routed Network Info", which is confusing to me.&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;Subnet is 24.x.x.33/29 with 6 usable IPs&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;Gateway 24.x.x.33&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;Mask 255.255.255.248&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;BR /&gt;&amp;gt;&amp;gt;My first task is to try to configure a Pix 501 for inside - out internet access&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;Second task is to set up the RDP access to individual computers on the LAN. I had done this before using DD-WRT port &amp;gt;&amp;gt;forwarding on a router where I could give the client the public IP with a port number (public:1234) and configure a &amp;gt;&amp;gt;forwarding table to relay each assigned port to their computer IP on port 3389. Now that I am introducing the Pix and &amp;gt;&amp;gt;the additional routing info from ISP I am way confused. Any help would be appreciated. I would settle for getting &amp;gt;&amp;gt;internet access from the inside at this point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CISCO SYSTEMS PIX-501&lt;BR /&gt;Embedded BIOS Version 4.3.200 07/31/01 15:58:22.08&lt;BR /&gt;Compiled by morlee&lt;BR /&gt;16 MB RAM&lt;/P&gt;&lt;P&gt;PCI Device Table.&lt;BR /&gt;Bus Dev Func VendID DevID Class&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Irq&lt;BR /&gt; 00&amp;nbsp; 00&amp;nbsp; 00&amp;nbsp;&amp;nbsp; 1022&amp;nbsp;&amp;nbsp; 3000&amp;nbsp; Host Bridge&lt;BR /&gt; 00&amp;nbsp; 11&amp;nbsp; 00&amp;nbsp;&amp;nbsp; 8086&amp;nbsp;&amp;nbsp; 1209&amp;nbsp; Ethernet&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9&lt;BR /&gt; 00&amp;nbsp; 12&amp;nbsp; 00&amp;nbsp;&amp;nbsp; 8086&amp;nbsp;&amp;nbsp; 1209&amp;nbsp; Ethernet&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10&lt;/P&gt;&lt;P&gt;Cisco Secure PIX Firewall BIOS (4.2) #6: Mon Aug 27 15:09:54 PDT 2001&lt;BR /&gt;Platform PIX-501&lt;BR /&gt;Flash=E28F640J3 @ 0x3000000&lt;/P&gt;&lt;P&gt;Use BREAK or ESC to interrupt flash boot.&lt;BR /&gt;Use SPACE to begin flash boot immediately.&lt;BR /&gt;Reading 1974784 bytes of image from flash.&lt;BR /&gt;#################################################################################################################&lt;BR /&gt;16MB RAM&lt;BR /&gt;mcwa i82559 Ethernet at irq&amp;nbsp; 9&amp;nbsp; MAC: xxxx.xxxx.xxxx&lt;BR /&gt;mcwa i82559 Ethernet at irq 10&amp;nbsp; MAC: xxxx.xxxx.xxxx&lt;BR /&gt;Flash=E28F640J3 @ 0x3000000&lt;BR /&gt;BIOS Flash=E28F640J3 @ 0xD8000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco PIX Firewall&lt;/P&gt;&lt;P&gt;Cisco PIX Firewall Version 6.3(5)&lt;BR /&gt;Licensed Features:&lt;BR /&gt;Failover:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Disabled&lt;BR /&gt;VPN-DES:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&lt;BR /&gt;VPN-3DES-AES:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&lt;BR /&gt;Maximum Physical Interfaces: 2&lt;BR /&gt;Maximum Interfaces:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;BR /&gt;Cut-through Proxy:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&lt;BR /&gt;Guards:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&lt;BR /&gt;URL-filtering:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Enabled&lt;BR /&gt;Inside Hosts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10&lt;BR /&gt;Throughput:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unlimited&lt;BR /&gt;IKE peers:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10&lt;/P&gt;&lt;P&gt;This PIX has a Restricted (R) license.&lt;/P&gt;&lt;P&gt;Global 24.x.x.33 will be Port Address Translated&lt;BR /&gt;.&lt;BR /&gt;Cryptochecksum(unchanged): 398d5ff2 fcb99bb7 0cdd07ce ba58c30b&lt;/P&gt;&lt;P&gt;Cannot select private keyType help or '?' for a list of available commands.&lt;BR /&gt;JMSBC&amp;gt; login&lt;BR /&gt;Username: admin&lt;BR /&gt;Password: *************&lt;BR /&gt;%Login failed&lt;BR /&gt;Username: admin&lt;BR /&gt;Password: **********&lt;BR /&gt;JMSBC# conf t&lt;BR /&gt;JMSBC(config)# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;PIX Version 6.3(5)&lt;BR /&gt;interface ethernet0 auto&lt;BR /&gt;interface ethernet1 100full&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;enable password xxxxxxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxxxxxxxx encrypted&lt;BR /&gt;hostname JMSBC&lt;BR /&gt;domain-name JMSBC.org&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;fixup protocol dns maximum-length 512&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;fixup protocol http 80&lt;BR /&gt;fixup protocol rsh 514&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;fixup protocol sqlnet 1521&lt;BR /&gt;fixup protocol tftp 69&lt;BR /&gt;names&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 3389&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq ftp-data&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq ftp&lt;BR /&gt;access-list ANYRDP permit tcp any interface outside eq 1000&lt;BR /&gt;pager lines 24&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip address outside 216.x.x.230 255.255.255.252&lt;BR /&gt;ip address inside 192.168.1.2 255.255.255.0&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;ip audit attack action alarm&lt;BR /&gt;pdm logging informational 100&lt;BR /&gt;pdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 24.x.x.33&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.1.253 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1000 192.168.1.55 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;access-group outbound in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 216.x.x.229 1&lt;BR /&gt;timeout xlate 0:05:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt;aaa-server TACACS+ deadtime 10&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt;aaa-server RADIUS deadtime 10&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;ntp server 192.168.1.4 source inside&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.3 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;no snmp-server enable traps&lt;BR /&gt;floodguard enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;username admin password xxxxxxxxxxxxxxxx encrypted privilege 15&lt;BR /&gt;terminal width 90&lt;BR /&gt;Cryptochecksum:398d5ff2fcb99bb70cdd07ceba58c30b&lt;BR /&gt;: end&lt;BR /&gt;JMSBC(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 12:11:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417005#M734749</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-03-30T12:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417006#M734750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post output of "sh interface" from the pix ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping the ISP default-gateway from the pix ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 12:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417006#M734750</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-03-30T12:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417007#M734751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I iwll post as soon as I can. I have to go there in the evenings after my "primary" job. I will get it tonight (hopefully). Do both of these commands require the pix to be connected to the outside (I know ping would). I have the Pix with me but am nowhere near the site. I can run sh interface, but probably wont be any results you are looking to see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for taking the time to help me!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 14:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417007#M734751</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-03-30T14:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417008#M734752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In addition&amp;nbsp; after you verify pinging the ISP gateway from the PIX itself&amp;nbsp; what Jon have suggested take note of following configuration to be corrected after you have confirmed ISP gateway is ICMP reachable from the pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly :&lt;BR /&gt;You have two different access list for inbound access (outside_in) and(ANYRDP) and have not yet being applied&amp;nbsp; to outside interface.&lt;BR /&gt;For consistancy&amp;nbsp; in access-list naming try&amp;nbsp; using&amp;nbsp; one access list&amp;nbsp; for specified interface, as it will be much easier down the road to reference them per interface as suppose to different/many&amp;nbsp; acl names per interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on your static NAT translation you have these two acl statements shown bellow&amp;nbsp; , for the tcp port 1000 use the same acl name as the first one you have for port 3389&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 3389&lt;BR /&gt;access-list ANYRDP permit tcp any interface outside eq 1000&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Above acls should appear as:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any interface outside eq 3389&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1000&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;apply the &lt;STRONG&gt;outside_in&lt;/STRONG&gt; access-list to outside interface by adding bellow statement&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After you have corrected these above ensure the servers 192.168.1.253&amp;nbsp; and 192.168.1.55 are indeed listening on RDP , then test them from outside internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 21:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417008#M734752</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2010-03-30T21:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417009#M734753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still can't get out.....&lt;/P&gt;&lt;P&gt;Ping results are hardware errors.&lt;/P&gt;&lt;P&gt;Here is the sh interface results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JMSBC(config)# sh interface&lt;BR /&gt;interface ethernet0 "outside" is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is i82559 ethernet, address is 0012.0059.dd6b&lt;BR /&gt;&amp;nbsp; IP address 216.x.x.230, subnet mask 255.255.255.252&lt;BR /&gt;&amp;nbsp; MTU 1500 bytes, BW 100000 Kbit full duplex&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9 packets input, 564 bytes, 0 no buffer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 1 broadcasts, 0 runts, 0 giants&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 packets output, 120 bytes, 0 underruns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 babbles, 0 late collisions, 0 deferred&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 lost carrier, 0 no carrier&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input queue (curr/max blocks): hardware (128/128) software (0/3)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; output queue (curr/max blocks): hardware (0/1) software (0/1)&lt;BR /&gt;interface ethernet1 "inside" is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is i82559 ethernet, address is 0012.0059.dd6c&lt;BR /&gt;&amp;nbsp; IP address 192.168.1.2, subnet mask 255.255.255.0&lt;BR /&gt;&amp;nbsp; MTU 1500 bytes, BW 100000 Kbit full duplex&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 41 packets input, 2852 bytes, 0 no buffer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 37 broadcasts, 0 runts, 0 giants&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70 packets output, 4256 bytes, 0 underruns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 babbles, 0 late collisions, 0 deferred&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 lost carrier, 0 no carrier&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input queue (curr/max blocks): hardware (128/128) software (0/3)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; output queue (curr/max blocks): hardware (0/1) software (0/1)&lt;BR /&gt;JMSBC(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;BR /&gt;interface ethernet0 auto&lt;BR /&gt;interface ethernet1 100full&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;enable password xxxxxxxxxxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxxxxxxxxxxxxxxxx encrypted&lt;BR /&gt;hostname JMSBC&lt;BR /&gt;domain-name JMSBC.org&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;fixup protocol dns maximum-length 512&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;fixup protocol http 80&lt;BR /&gt;fixup protocol rsh 514&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;fixup protocol sqlnet 1521&lt;BR /&gt;fixup protocol tftp 69&lt;BR /&gt;names&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 3389&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq ftp-data&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq ftp&lt;BR /&gt;access-list outbound permit icmp 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list ANYRDP permit tcp any interface outside eq 1000&lt;BR /&gt;pager lines 24&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip address outside 216.x.x.230 255.255.255.252&lt;BR /&gt;ip address inside 192.168.1.2 255.255.255.0&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;ip audit attack action alarm&lt;BR /&gt;pdm logging informational 100&lt;BR /&gt;pdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.1.253 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1000 192.168.1.55 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;access-group outbound in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 216.x.x.229 1&lt;BR /&gt;timeout xlate 0:05:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt;aaa-server TACACS+ deadtime 10&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt;aaa-server RADIUS deadtime 10&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;ntp server 192.168.1.4 source inside&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.3 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;no snmp-server enable traps&lt;BR /&gt;floodguard enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;username admin password .xxxxxxxxxxxxxxxxx encrypted privilege 15&lt;BR /&gt;terminal width 90&lt;BR /&gt;Cryptochecksum:1adc46e73a8c32004d2b3d81143476ed&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any help!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Mar 2010 11:39:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417009#M734753</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-03-31T11:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417010#M734754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;by default from the pix itself you should be able to ping the ISP router gateway ,&amp;nbsp; however plese add to your config ( &lt;STRONG&gt;icmp permit any outside&lt;/STRONG&gt;)&amp;nbsp; for ping test to ISP gateway from the PIX itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you are trying to ping from a PC in the LAN you need to allow the replies back in in firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit icmp any any echo-reply &lt;BR /&gt;access-list outside_in permit icmp any any source-quench &lt;BR /&gt;access-list outside_in permit icmp any any unreachable &lt;BR /&gt;access-list outside_in permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With these above you can ping by IP address , try pinging&amp;nbsp; this opened public IP 4.2.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp; either from PIX firewall or PC , post results.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Mar 2010 14:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417010#M734754</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2010-03-31T14:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417011#M734755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your patience! Yes, I was trying to ping from an internal PC, I couldn't connect to any known IPs either. Forgive me for being so ignorant about the PIX firewall, but can I ping from the console? The sh interface results I posted earlier were from the PC. Am I using the right gateway? Again this is what the ISP provided:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: Calibri; font-size: 10pt;"&gt;&lt;SPAN&gt;Interface IP: 216.x.x.230&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: Calibri; font-size: 10pt;"&gt;&lt;SPAN&gt;Gateway IP: 216.x.x.229&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: Calibri; font-size: 10pt;"&gt;&lt;SPAN&gt;Subnetmask: 255.255.255.252&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: Calibri; font-size: 10pt;"&gt;&lt;SPAN&gt;DNS Servers: 69.1.30.18 and .19&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: Calibri; font-size: 10pt;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: Calibri; font-size: 10pt;"&gt;&lt;SPAN&gt;Routed Network Information:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: Calibri; font-size: 10pt;"&gt;&lt;SPAN&gt;Subnet is: 24.x.x.32/29 with 6 usable IPs&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: Calibri; font-size: 10pt;"&gt;&lt;SPAN&gt;Usable IP Range: 24.x.x.33 - 24.x.x.38&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: Calibri; font-size: 10pt;"&gt;&lt;SPAN&gt;Gateway: 24.x.x.33&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: Calibri; font-size: 10pt;"&gt;&lt;SPAN&gt;Subnetmask: 255.255.255.248&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I must be plugging something in wrong because I just cannot get out. Does it look right to you where I have the GWs/IPs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try what you suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Mar 2010 18:14:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417011#M734755</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-03-31T18:14:56Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417012#M734756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike, you posted output of show interface which looks&amp;nbsp; interfaces are up for both inside and outside,&amp;nbsp;&amp;nbsp; from the PIX console&amp;nbsp;&amp;nbsp; can you post the output of "show arp"&amp;nbsp;&amp;nbsp;&amp;nbsp; pix#show arp&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again you can ping the ISP gateway from PIX console&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX#ping&amp;nbsp; &lt;SPAN style="font-family: Calibri;"&gt;216.x.x.229&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;--&amp;nbsp; can you ping the gateway from pix?&amp;nbsp;&amp;nbsp; if you can ping gateway , also try&amp;nbsp; other public IP like the one posted&amp;nbsp; ,&amp;nbsp; ping 4.2.2.2&amp;nbsp; from the PIX console, if you can ping these addresse form PIX you have connectivity to internet, then move onto next task but please first confirm you can reach ISP gateway and 4.2.2.2 IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Mar 2010 21:14:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417012#M734756</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2010-03-31T21:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417013#M734757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;jorgemcse,&lt;/P&gt;&lt;P&gt;Here is what I got when I did the ping test with the last configuration I revealed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JMSBC(config)# ping 4.2.2.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2 response received -- 10ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2 response received -- 0ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2 response received -- 0ms&lt;BR /&gt;JMSBC(config)# ping 216.x.x.230&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.230 response received -- 0ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.230 response received -- 0ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.230 response received -- 0ms&lt;BR /&gt;JMSBC(config)# ping 216.x.x.229&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.229 response received -- 0ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.229 response received -- 0ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.x.x.229 response received -- 0ms&lt;BR /&gt;JMSBC(config)# ping 24.x.x.33&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.33 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.33 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.33 NO response received -- 1000ms&lt;BR /&gt;JMSBC(config)# ping 24.x.x.32&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.32 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.32 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.32 NO response received -- 1000ms&lt;BR /&gt;JMSBC(config)# ping 24.x.x.34&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.34 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.34 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.x.x.34 NO response received -- 1000ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have since added the following line to the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outbound permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After adding this, the pings went through from the PC. As I write this I am using the firewall connection to do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What did this command do? Is it ok to use it without vulnerabilities?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dare I try to move on to remoting in???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your assistance and patience!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 00:12:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417013#M734757</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-04-01T00:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417014#M734758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My TERMSERV ACL is good for RDP. I can get in using 216.x.x.230:1000 and it routes to 3389 on the designated internal PC. Now what I need to do (if possible) is set a range of 20 individual connections similar. Is there a way to designate say incoming 1000-1020 to an internal router where I can do the port forwarding?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way in my excitement (and some tweaking) I lost the ability to ping out from the PC again. Connection works to internet, but can't ping out (can ping in though). Can you identify the error in the configuration below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;hostname JMSBC&lt;/P&gt;&lt;P&gt;domain-name JMSBC.org&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list outside_in permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any interface outside eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_in permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_in permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list outside_in permit icmp any any source-quench&lt;/P&gt;&lt;P&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;/P&gt;&lt;P&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq ftp-data&lt;/P&gt;&lt;P&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq ftp&lt;/P&gt;&lt;P&gt;access-list outbound permit ip any any&lt;/P&gt;&lt;P&gt;access-list TERMSERV permit tcp any interface outside eq 1000&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 216.x.x.230 255.255.255.252&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 192.168.1.253 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 1000 192.168.1.55 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group TERMSERV in interface outside&lt;/P&gt;&lt;P&gt;access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 216.x.x.229 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;ntp server 192.168.1.4 source inside&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.3 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;username admin password .xxxxxxxxxxxxxxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;terminal width 90&lt;/P&gt;&lt;P&gt;Cryptochecksum:8f7d937a3d6ce0bceb6c332114927321&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 02:52:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417014#M734758</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-04-01T02:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417015#M734759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;ok i'm pinging again. figured out i was missing the access-group outside_in. now for the rdp problems.... and did i mention i would be setting up a site to site vpn?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 12:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417015#M734759</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-04-01T12:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417016#M734760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike, good that&amp;nbsp; you are making progress.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp; access-list outbound permit ip any any applied to inside interface s fine and you can leave it, simply it allows TCP/UDP outbound from any inside hosts, so you do not need these .&lt;/P&gt;&lt;P&gt;These three lines ca be removed - as long you leave &lt;STRONG&gt;access-list outbound permit ip any any&lt;/STRONG&gt; applied to inside interface.&lt;BR /&gt;&lt;EM&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq ftp-data&lt;BR /&gt;access-list outbound permit tcp 192.168.1.0 255.255.255.0 any eq ftp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;As for not being unable to ping the ISP gateway&amp;nbsp; it most likely is that ISP blocking icmps , but you have confirmed internet connectivity to 4.2.2.2 from pix and inside hosts after you added outside permit ip any any to inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for Site to Site VPN go to this link and reference in mid page down &lt;STRONG&gt;Site to Site VPN (L2L) with PIX&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to reate helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 15:07:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417016#M734760</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2010-04-01T15:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417017#M734761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;jorgemcse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the link to Site to Site VPN, I will look at that next. I will also remove the lines you specified for www, ftp &amp;amp; ftp-data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the RDP access, I currently have configured to allow 3389 acces to the internal Terminal Server as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any interface outside eq 3389&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 192.168.1.253 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I missing the "access-group outside_in in interface outside" to allow the above configuration to work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I currently have the additional routing to a specific internal workstation for a user set as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list RDPUSER permit tcp any interface outside eq 1000&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 1000 192.168.1.55 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group RDPUSER in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I add more of these one to one configurations, such as 1001 to x.x.x.56? Will the following work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list RDPUSER permit tcp any interface outside eq 1001&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 1000 192.168.1.56 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-list RDPUSER permit tcp any interface outside eq 1002&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 1000 192.168.1.57 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-list RDPUSER permit tcp any interface outside eq 1003&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 1000 192.168.1.58 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will they all use the access-group RDPUSER in interface outside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know I'm asking many questions here, but I just want to provide a solution for the port forwarding we used to do in the router.....at the perimeter (Pix) now. I don't want to go the VPN route for fear of trashing the office network with home computer bugs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you think this is feasible and my configuration examples are proper (albeit unorthodox).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As always, Thanks for your time and help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Apr 2010 14:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417017#M734761</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-04-05T14:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417018#M734762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike, thanks for rating ..&amp;nbsp; using rating system will also allow&amp;nbsp; Cisco to&amp;nbsp; contributing $1&amp;nbsp; to help&amp;nbsp; Haiti earthquake victims .&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For bellow scenario you cannot do it this way using same port 1000 forwarding based on the static PAT translation, you&lt;BR /&gt;will get error on duplicate existing NAT, I think you probably meant tcp ports&amp;nbsp; 1001,1002 etc.. based on your acl.&lt;/P&gt;&lt;P&gt;access-list RDPUSER permit tcp any interface outside eq 1001&lt;BR /&gt;static (inside,outside) tcp interface 1000 192.168.1.56 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;access-list RDPUSER permit tcp any interface outside eq 1002&lt;BR /&gt;static (inside,outside) tcp interface 1000 192.168.1.57 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;access-list RDPUSER permit tcp any interface outside eq 1003&lt;BR /&gt;static (inside,outside) tcp interface 1000 192.168.1.58 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So it will look&amp;nbsp; like this bellow , using different ports&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 1001 192.168.1.56 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1002 192.168.1.57 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1003 192.168.1.58 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-list RDPUSER permit tcp any interface outside eq 1001&lt;BR /&gt;access-list RDPUSER permit tcp any interface outside eq 1002&lt;BR /&gt;access-list RDPUSER permit tcp any interface outside eq 1003&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;As for the RDP access, I currently have configured to allow 3389 acces to the internal Terminal Server as follows:&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 3389&lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.1.253 3389 netmask 255.255.255.255 0 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The access-list and static nat above is fine, bu the acl named ( outside_in ) needs to be applied to outside interface.&amp;nbsp; &lt;BR /&gt;Use one access-list ( naming ) per interface&amp;nbsp; like I said before.&amp;nbsp; Elimimate the RDPUSER access list, or the other one (outside_access_in)&lt;BR /&gt;and stick with one acl for outside interface.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So your ultimate configuration for your inbound rules to these systems&amp;nbsp; would be&amp;nbsp; like this bellow, consolidate the access-list rules in one acl for outside interface.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.1.253 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 1001 192.168.1.56 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 1002 192.168.1.57 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 1003 192.168.1.58 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any interface outside eq 3389&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1001&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1002&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1003&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Remove access-group RDPUSER from outside interface&lt;/P&gt;&lt;P&gt;no access-group RDPUSER in interface outside&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;and apply new access-list to it&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Apr 2010 18:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417018#M734762</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2010-04-05T18:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuring....</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417019#M734763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;jorgemcse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again, thank you. I will try the suggested configuration and let you know the results later this week. Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2010 11:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuring/m-p/1417019#M734763</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-04-06T11:42:09Z</dc:date>
    </item>
  </channel>
</rss>

