<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: configuring pix for public ip address internal and external in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419758#M856879</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I remove this line, does it affect internet navigation? there are no webservers behind the firewall.&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[KS]No removing that line does not affect internet access. That will flow fine. fixup protocol http does extra checks on http traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we do not have a webserver behind the firewall, do I need this line?&lt;BR /&gt;1) access-list outside permit tcp any any eq www ----&amp;gt; instead of any as the destination you can specify which ever host is your webserver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[KS]If you don't have a web server on the inside, you can remove this line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any any eq domain&amp;nbsp; ----&amp;gt; you can remove this as DNS uses udp 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[KS]If you have active directory servers that are running DNS and doing zone transfers then you may need the above line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Apr 2010 03:13:04 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-04-13T03:13:04Z</dc:date>
    <item>
      <title>configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419742#M856854</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just receive new subnet(s) for the network(s) behind the firewall. the addresses are public addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore, after entering the information for each respective internal interface, now, the internal network stop communicating to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because of the network privacy, this time, I will not be able to reveal network addresses. Can you take a look why the internal network will not be able to go out to the internet. Again, these are public addresses, they do not need to be NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;PIX Version 6.3(5)&lt;BR /&gt;interface ethernet0 auto&lt;BR /&gt;interface ethernet1 auto&lt;BR /&gt;interface ethernet2 auto&lt;BR /&gt;interface ethernet3 auto shutdown&lt;BR /&gt;interface ethernet4 auto shutdown&lt;BR /&gt;interface ethernet5 auto shutdown&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;nameif ethernet2 intf2 security4&lt;BR /&gt;nameif ethernet3 intf3 security6&lt;BR /&gt;nameif ethernet4 intf4 security8&lt;BR /&gt;nameif ethernet5 intf5 security10&lt;BR /&gt;enable password DAyT8Zy5o1YlaDcM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;hostname lvfw&lt;BR /&gt;domain-name lv.psu.edu&lt;BR /&gt;fixup protocol dns maximum-length 512&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;fixup protocol http 80&lt;BR /&gt;fixup protocol rsh 514&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;fixup protocol sqlnet 1521&lt;BR /&gt;fixup protocol tftp 69&lt;BR /&gt;names&lt;BR /&gt;object-group network administrative-servers&lt;BR /&gt;&amp;nbsp; network-object host X.X.X.X&lt;BR /&gt;&amp;nbsp; network-object host X.X.X.X&lt;BR /&gt;&amp;nbsp; network-object host X.X.X.X&lt;BR /&gt;&amp;nbsp; &lt;BR /&gt;access-list extended permit ip any any&lt;BR /&gt;access-list extended permit icmp any any&lt;BR /&gt;access-list extended permit ip any object-group administrative-servers&lt;BR /&gt;access-list extended permit ip object-group administrative-servers any&lt;BR /&gt;access-list outside permit icmp any any&lt;BR /&gt;access-list outside permit tcp any any eq domain&lt;BR /&gt;access-list inside permit tcp any any eq www&lt;BR /&gt;access-list outside permit udp any any eq domain&lt;BR /&gt;access-list outside permit tcp any any eq 3389&lt;BR /&gt;access-list outside permit ip object-group administrative-servers A.B.C.D 255.255.255.128&lt;BR /&gt;pager lines 24&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any echo-reply inside&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu intf2 1500&lt;BR /&gt;mtu intf3 1500&lt;BR /&gt;mtu intf4 1500&lt;BR /&gt;mtu intf5 1500&lt;BR /&gt;ip address outside C.D.E.F 255.255.255.248&lt;BR /&gt;ip address inside H.I.J.M 255.255.255.192&lt;BR /&gt;ip address intf2 A.B.C.D 255.255.255.128&lt;BR /&gt;no ip address intf3&lt;BR /&gt;no ip address intf4&lt;BR /&gt;no ip address intf5&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;ip audit attack action alarm&lt;BR /&gt;no failover&lt;BR /&gt;failover timeout 0:00:00&lt;BR /&gt;failover poll 15&lt;BR /&gt;no failover ip address outside&lt;BR /&gt;no failover ip address inside&lt;BR /&gt;no failover ip address intf2&lt;BR /&gt;no failover ip address intf3&lt;BR /&gt;no failover ip address intf4&lt;BR /&gt;no failover ip address intf5&lt;BR /&gt;pdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;static (inside,outside) A.B.C.D A.B.C.D netmask 255.255.255.128 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) H.I.J.M H.I.J.M netmask 255.255.255.192 0 0&lt;BR /&gt;access-group outside in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 T.O.P.Q 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt;aaa-server TACACS+ deadtime 10&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt;aaa-server RADIUS deadtime 10&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;http server enable&lt;BR /&gt;http A.B.C.D 255.255.255.128 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;no snmp-server enable traps&lt;BR /&gt;floodguard enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;terminal width 80&lt;BR /&gt;: end&lt;BR /&gt;lvfw#&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419742#M856854</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2019-03-11T17:32:01Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419743#M856855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great News!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got it to work by using static (in,out)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, how do I block internet users from getting into my network. I want to limit access just to corporate network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words, going out should not have any blocks. But, access to internal network should be limited to corporate network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 21:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419743#M856855</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-12T21:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419744#M856856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Traffic from outside to your internal network should have been blocked by default, unless you configure access-list to allow the inbound traffic. Traffic from low to high security level is not allowed by default.&lt;/P&gt;&lt;P&gt;In your case, access-list "outside" is applied on the outside interface, and if you would need specific access to the internal network, you would have to configure the access-list to allow those traffic in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 22:40:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419744#M856856</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-12T22:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419745#M856857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you think any of these rules are allowing to pass thru?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure if this rule is allowing to pass other traffic than corporate traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) access-list extended permit ip any any&lt;BR /&gt;2) access-list extended permit icmp any any&lt;/P&gt;&lt;P&gt;3) access-list outside permit icmp any any&lt;/P&gt;&lt;P&gt;These rules were created to access internet, and remote desktop connectivity:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) access-list outside permit tcp any any eq domain&lt;BR /&gt;2) access-list inside permit tcp any any eq www&lt;BR /&gt;3) access-list outside permit udp any any eq domain&lt;BR /&gt;4) access-list outside permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;These rules were created to allow corporate network access:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) access-list extended permit ip any object-group administrative-servers&lt;BR /&gt;2) access-list extended permit ip object-group administrative-servers any&lt;/P&gt;&lt;P&gt;3) access-list outside permit ip object-group administrative-servers A.B.C.D 255.255.255.128&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 01:00:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419745#M856857</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-13T01:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419746#M856858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only acl that is applied to the interface is called outside and it is applied to the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any&lt;BR /&gt;access-list outside permit tcp any any eq domain&lt;BR /&gt;access-list outside permit udp any any eq domain&lt;BR /&gt;access-list outside permit tcp any any eq 3389&lt;BR /&gt;access-list outside permit ip object-group administrative-servers A.B.C.D 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What ever this acl is allowing is being allowed to come from the outside towards the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 01:16:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419746#M856858</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-13T01:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419747#M856859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you help me to limit some traffic between the firewall and the rest of the corporate network?&lt;/P&gt;&lt;P&gt;And, as far internet traffic, I believe the firewall is doing a good job.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My concern that something is allowing too many non-corporate network to get inside the firewall protected area.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you illustrate how to acomplish this goal?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 01:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419747#M856859</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-13T01:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419748#M856860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This one acl is pretty wide open&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit ip object-group administrative-servers A.B.C.D 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are allowing all the hosts in the administrative-servers group to access the entire A.B.C.D/25 network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to restric that by only allowing what you need. May be just tcp certain ports and not all IP traffic like you have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 01:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419748#M856860</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-13T01:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419749#M856861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how do I stop non-corporate networks from able to ping the internal subnets?&lt;/P&gt;&lt;P&gt;And, is there a way from stoping non-corporate networks from trying to scan the internal subnets?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have like an access-list example?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 01:31:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419749#M856861</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-13T01:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419750#M856862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Remove this line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;no access-list outside permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then no one from the outside can ping devices on the inside. Enable "fixup protocol icmp" so when the inside hosts ping, the replies will be allowed to come back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is how to add fixup icmp&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;fixup protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 01:41:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419750#M856862</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-13T01:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419751#M856864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This last message did the job. However, can you give me an example of how to&lt;/P&gt;&lt;P&gt;prevent someone from scaning internal computer(s) by hostnames&amp;nbsp; and/or similar tachtics.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp; for all your help, as you can see, pix firewall is a new game for me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 01:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419751#M856864</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-13T01:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419752#M856866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem. We are here to help. Pls. rate the posts that helped you understand/learn/solve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no way you can stop people from sending malicious traffic towards your firewall.&amp;nbsp; All you can do is protect your firewall by restricting access-list like you have already done and restrict management access like telnet/ssh/pdm to the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These kind of attacks can be mitigated by IDS/IPS devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 02:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419752#M856866</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-13T02:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419753#M856869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) access-list and access-list extended serve different purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Fixup Protocol benefit the internal network more than external network&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 02:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419753#M856869</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-13T02:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419754#M856871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fixup protocol will automatically allow (without having to allow permission on the outside acl) permission and translation for responses coming from the outside via a brand new connection relating to the connection that was initiated from the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 02:28:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419754#M856871</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-13T02:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419755#M856873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you take one final look at the config file? I still have to fix the open ports from external corporate networks. But, other than that, can you critic anything that looks wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;lvfw(config)# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;PIX Version 6.3(5)&lt;BR /&gt;interface ethernet0 auto&lt;BR /&gt;interface ethernet1 auto&lt;BR /&gt;interface ethernet2 auto&lt;BR /&gt;interface ethernet3 auto shutdown&lt;BR /&gt;interface ethernet4 auto shutdown&lt;BR /&gt;interface ethernet5 auto shutdown&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;nameif ethernet2 intf2 security4&lt;BR /&gt;nameif ethernet3 intf3 security6&lt;BR /&gt;nameif ethernet4 intf4 security8&lt;BR /&gt;nameif ethernet5 intf5 security10&lt;BR /&gt;enable password DAyT8Zy5o1YlaDcM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;hostname lvfw&lt;BR /&gt;domain-name lv.psu.edu&lt;BR /&gt;fixup protocol dns maximum-length 512&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;fixup protocol http 80&lt;BR /&gt;fixup protocol icmp error&lt;BR /&gt;fixup protocol rsh 514&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;fixup protocol sqlnet 1521&lt;BR /&gt;fixup protocol tftp 69&lt;BR /&gt;names&lt;BR /&gt;object-group network administrative-servers&lt;BR /&gt;&amp;nbsp; network-object host X.X.X.X&lt;BR /&gt;&amp;nbsp; network-object host X.X.X.X&lt;BR /&gt;&amp;nbsp; network-object host X.X.X.X&lt;BR /&gt; &lt;BR /&gt;access-list extended permit ip any any&lt;BR /&gt;access-list extended permit ip any object-group administrative-servers&lt;BR /&gt;access-list extended permit ip object-group administrative-servers any&lt;BR /&gt;access-list outside permit tcp any any eq domain&lt;BR /&gt;access-list outside permit tcp any any eq www&lt;BR /&gt;access-list outside permit udp any any eq domain&lt;BR /&gt;access-list outside permit tcp any any eq 3389&lt;BR /&gt;access-list outside permit ip object-group administrative-servers A.B.C.D 255.255.255.192&lt;BR /&gt;access-list outside permit ip object-group administrative-servers E.F.G.H 255.255.255.128&lt;BR /&gt;access-list outside permit icmp object-group administrative-servers any&lt;BR /&gt;pager lines 24&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any echo-reply inside&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu intf2 1500&lt;BR /&gt;mtu intf3 1500&lt;BR /&gt;mtu intf4 1500&lt;BR /&gt;mtu intf5 1500&lt;BR /&gt;ip address outside X.X.X.X 255.255.255.248&lt;BR /&gt;ip address inside A.B.C.D 255.255.255.192&lt;BR /&gt;ip address intf2 E.F.G.H 255.255.255.128&lt;BR /&gt;no ip address intf3&lt;BR /&gt;no ip address intf4&lt;BR /&gt;no ip address intf5&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;ip audit attack action alarm&lt;BR /&gt;no failover&lt;BR /&gt;failover timeout 0:00:00&lt;BR /&gt;failover poll 15&lt;BR /&gt;no failover ip address outside&lt;BR /&gt;no failover ip address inside&lt;BR /&gt;no failover ip address intf2&lt;BR /&gt;no failover ip address intf3&lt;BR /&gt;no failover ip address intf4&lt;BR /&gt;no failover ip address intf5&lt;BR /&gt;pdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;static (inside,outside) A.B.C.D A.B.C.D netmask 255.255.255.192 0 0&lt;BR /&gt;access-group outside in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.217 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt;aaa-server TACACS+ deadtime 10&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt;aaa-server RADIUS deadtime 10&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;http server enable&lt;BR /&gt;http A.B.C.D 255.255.255.192 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;no snmp-server enable traps&lt;BR /&gt;floodguard enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;terminal width 80&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 02:37:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419755#M856873</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-13T02:37:21Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419756#M856875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks good from what I can tell. May be you can restrict it a little further.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may want to remove that. Internet access might get a little faster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to remove you can do&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;no fixup protocol http 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when you issue "sh access-l outside" do you show hit counts on these acls? If you do not show any hit counts you can remove them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any any eq domain&amp;nbsp; ----&amp;gt; you can remove this as DNS uses udp 53&lt;BR /&gt;access-list outside permit tcp any any eq www ----&amp;gt; instead of any as the destination you can specify which ever host is your webserver.&lt;BR /&gt;access-list outside permit udp any any eq domain&lt;BR /&gt;access-list outside permit tcp any any eq 3389&amp;nbsp; ----&amp;gt; instead of any as the destination you can specify which ever host is your RDC server&lt;BR /&gt;access-list outside permit ip object-group administrative-servers A.B.C.D 255.255.255.192 ---&amp;gt; it you want to allow IP traffic to one host you can change the mask to 255.255.255.255 instead of the entire network.&lt;BR /&gt;access-list outside permit ip object-group administrative-servers E.F.G.H 255.255.255.128&amp;nbsp; ---&amp;gt; it you want to allow IP traffic to one host you can change the mask to 255.255.255.255 instead of the entire network.&lt;BR /&gt;access-list outside permit icmp object-group administrative-servers any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 02:45:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419756#M856875</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-13T02:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419757#M856877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We run an active directory network. Behind the firewall, we have a windows server currently replicating files to other corporate network servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I remove this line, does it affect internet navigation? there are no webservers behind the firewall.&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After running this command "sh access-l outside"&amp;nbsp; there were a few hit counts in some of the networks (administrative-servers).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it affect Active Directory Replication and MIT Kerberos authentication?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) access-list outside permit tcp any any eq domain&amp;nbsp; ----&amp;gt; you can remove this as DNS uses udp 53&lt;/P&gt;&lt;P&gt;2) access-list outside permit udp any any eq domain&lt;BR /&gt;3) access-list outside permit tcp any any eq 3389&amp;nbsp; ----&amp;gt; instead of any as the destination you can specify which ever host is your RDC server&lt;BR /&gt;4) access-list outside permit ip object-group administrative-servers A.B.C.D 255.255.255.192 ---&amp;gt; it you want to allow IP traffic to one host you can change the mask to 255.255.255.255 instead of the entire network.&lt;BR /&gt;5) access-list outside permit ip object-group administrative-servers E.F.G.H 255.255.255.128&amp;nbsp; ---&amp;gt; it you want to allow IP traffic to one host you can change the mask to 255.255.255.255 instead of the entire network.&lt;BR /&gt;6) access-list outside permit icmp object-group administrative-servers any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we do not have a webserver behind the firewall, do I need this line?&lt;BR /&gt;1) access-list outside permit tcp any any eq www ----&amp;gt; instead of any as the destination you can specify which ever host is your webserver.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 03:06:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419757#M856877</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-13T03:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419758#M856879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I remove this line, does it affect internet navigation? there are no webservers behind the firewall.&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[KS]No removing that line does not affect internet access. That will flow fine. fixup protocol http does extra checks on http traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we do not have a webserver behind the firewall, do I need this line?&lt;BR /&gt;1) access-list outside permit tcp any any eq www ----&amp;gt; instead of any as the destination you can specify which ever host is your webserver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[KS]If you don't have a web server on the inside, you can remove this line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any any eq domain&amp;nbsp; ----&amp;gt; you can remove this as DNS uses udp 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[KS]If you have active directory servers that are running DNS and doing zone transfers then you may need the above line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 03:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419758#M856879</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-13T03:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: configuring pix for public ip address internal and external</title>
      <link>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419759#M856882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Standard Access-List:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Standard ACL, filtering is based on source IP address.where as in extended ACL, filtering is bases on Source IP&lt;BR /&gt;address, Destination IP address, Protocol Type, Source Port Number &amp;amp; Destination Port Number.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Base on this information, after a standard acl list is created (access-list per, mit source destination), the communication will flow back and forth. Then, if I understand correctly, I don't have to create another access-list permit destination source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using one of my rules as an example: access-list outside permit icmp object-group administrative-servers any&lt;/P&gt;&lt;P&gt;This rule shows communication permited from the outside ( firewall interface) to the remote host.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But, this rule does not say if it trust the other way around (remote host to outside (firewall interface))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some other firewall brands one needs to create an out going rule and an incoming rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extended Access-List:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extended ACL is basically used to block particular services like telnet. ftp, tftp, ICMP echo etc..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 11:08:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-pix-for-public-ip-address-internal-and-external/m-p/1419759#M856882</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-13T11:08:26Z</dc:date>
    </item>
  </channel>
</rss>

