<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 501 Issue redirecting HTTP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414345#M857483</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;172.20.1.243 - is the IP address of the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only logs that pertain to port 80 access are these below:&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: TCP request discarded from 172.20.1.101/1303 to inside:172.20.1.243/www&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: TCP request discarded from 172.20.1.101/1303 to inside:172.20.1.243/www&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: TCP request discarded from 172.20.1.101/1303 to inside:172.20.1.243/www&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;All of these are talking about accessing the inside interface using port 80.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;This tells me that either the static line is missing or it is refering to the IP address 172.20.1.243 and not the keyword "interface"&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;You mentioned that the website is fine and working on the computer.&lt;/P&gt;&lt;P class="MsoNormal"&gt;This web server is unable to go out to the internet.&lt;/P&gt;&lt;P class="MsoNormal"&gt;No one from the internet is able to reach this web server.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Pls. provide the following:&lt;/P&gt;&lt;P class="MsoNormal"&gt;1. inside ip addres of the web server&lt;/P&gt;&lt;P class="MsoNormal"&gt;2. sh&amp;nbsp; static&lt;/P&gt;&lt;P class="MsoNormal"&gt;3. sh access-group&lt;/P&gt;&lt;P class="MsoNormal"&gt;4. sh access-list (for the access-lists that show up in the above command)&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Jan 2010 02:06:51 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-01-20T02:06:51Z</dc:date>
    <item>
      <title>PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414333#M857444</link>
      <description>&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Hello,&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;I am using a PIX 501 with IOS 6.3 (1) installed.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;My issue is that I am attempting to configure my PIX to direct HTTP traffic to a local computer that is running a program to share files.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I am able to access the program from a browser on another workstation.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Therefore, the program is working.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;However, when I attempt to access the program from outside the PIX – I cannot.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Here are the steps I took to set up my configuration:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;Needed to configure the Interfaces&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip address outside ***.***.***.18 255.255.255.248&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip address inside 172.20.1.241 255.255.0.0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;Needed to apply an access-list:&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;EM&gt;This allows Https traffic through the PIX.&lt;/EM&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;access-list 101; 1 elements&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;access-list 101 line 1 permit tcp any interface outside eq http&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;Created a Static route:&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;EM&gt;This is a route that will direct traffic directly to the SSL Concentrator (172.20.1.225)&lt;/EM&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;static (inside,outside) tcp interface http 172.20.1.101 http netmask 255.255.255.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;Verified the routes:&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;outside 0.0.0.0 0.0.0.0 ***.***.***.81 1 OTHER static&lt;/P&gt;&lt;P class="MsoNormal"&gt;outside ***.***.***.16 255.255.255.248 ***.***.***.18 1 CONNECT static&lt;/P&gt;&lt;P class="MsoNormal"&gt;inside 172.20.0.0 255.255.0.0 172.20.1.241 1 CONNECT static&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;global (outside) 1 interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;nat (inside) 1 172.20.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414333#M857444</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2019-03-11T16:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414334#M857449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Hufcor wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Hello,&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;I am using a PIX 501 with IOS 6.3 (1) installed.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;My issue is that I am attempting to configure my PIX to direct HTTP traffic to a local computer that is running a program to share files.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I am able to access the program from a browser on another workstation.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Therefore, the program is working.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;However, when I attempt to access the program from outside the PIX – I cannot.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Here are the steps I took to set up my configuration:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;Needed to configure the Interfaces&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip address outside ***.***.***.18 255.255.255.248&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip address inside 172.20.1.241 255.255.0.0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;Needed to apply an access-list:&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;EM&gt;This allows Https traffic through the PIX.&lt;/EM&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;access-list 101; 1 elements&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;access-list 101 line 1 permit tcp any interface outside eq http&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;Created a Static route:&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;EM&gt;This is a route that will direct traffic directly to the SSL Concentrator (172.20.1.225)&lt;/EM&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;static (inside,outside) tcp interface http 172.20.1.101 http netmask 255.255.255.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;Verified the routes:&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;outside 0.0.0.0 0.0.0.0 ***.***.***.81 1 OTHER static&lt;/P&gt;&lt;P class="MsoNormal"&gt;outside ***.***.***.16 255.255.255.248 ***.***.***.18 1 CONNECT static&lt;/P&gt;&lt;P class="MsoNormal"&gt;inside 172.20.0.0 255.255.0.0 172.20.1.241 1 CONNECT static&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;global (outside) 1 interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;nat (inside) 1 172.20.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post full config of pix ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, have you applied the acl to the outside interface ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 07:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414334#M857449</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-01-08T07:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414335#M857451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Ooops!&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I forgot to assign the ACL to an interface.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;However, I am still not able to ping the outside address – much less gain access.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Leo&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface ethernet0 auto shutdown&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface ethernet1 100full&lt;/P&gt;&lt;P class="MsoNormal"&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P class="MsoNormal"&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P class="MsoNormal"&gt;enable password cPlBJP0wS8qSVcsh encrypted&lt;/P&gt;&lt;P class="MsoNormal"&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P class="MsoNormal"&gt;hostname airwall&lt;/P&gt;&lt;P class="MsoNormal"&gt;domain-name MyDomain.com&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol http 80&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol ils 389&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P class="MsoNormal"&gt;names&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list 101 permit tcp any interface outside eq www&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list 101 permit tcp any interface outside eq https&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list 101 permit tcp any interface outside eq ftp&lt;/P&gt;&lt;P class="MsoNormal"&gt;pager lines 24&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging console debugging&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging buffered informational&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging trap debugging&lt;/P&gt;&lt;P class="MsoNormal"&gt;mtu outside 1500&lt;/P&gt;&lt;P class="MsoNormal"&gt;mtu inside 1500&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip address outside ***.***.***.84 255.255.255.248&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip address inside 172.20.1.243 255.255.0.0&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip audit info action alarm&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip audit attack action alarm&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip local pool ippool1 192.168.221.1-192.168.221.23&lt;/P&gt;&lt;P class="MsoNormal"&gt;pdm logging informational 100&lt;/P&gt;&lt;P class="MsoNormal"&gt;pdm history enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;arp timeout 14400&lt;/P&gt;&lt;P class="MsoNormal"&gt;global (outside) 1 interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;nat (inside) 1 172.20.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface www 172.20.1.101 www netmask 255.255.255.2&lt;/P&gt;&lt;P class="MsoNormal"&gt;55 0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface ftp 172.20.1.4 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface https 172.20.1.225 https netmask 255.255.2&lt;/P&gt;&lt;P class="MsoNormal"&gt;55.255 0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;route outside 0.0.0.0 0.0.0.0 ***.***.***.81 1&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P class="MsoNormal"&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P class="MsoNormal"&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P class="MsoNormal"&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P class="MsoNormal"&gt;http server enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;http ***.***.***.84 255.255.255.255 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server location&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server contact&lt;/P&gt;&lt;P class="MsoNormal"&gt;snmp-server community public&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server enable traps&lt;/P&gt;&lt;P class="MsoNormal"&gt;floodguard enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto ipsec transform-set TransSet1 esp-des esp-md5-hmac&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto dynamic-map DynMap1 10 set transform-set TransSet1&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto map CryptMap1 10 ipsec-isakmp dynamic DynMap1&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto map CryptMap1 interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp enable outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp identity address&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P class="MsoNormal"&gt;vpngroup GroupVpn1 address-pool ippool1&lt;/P&gt;&lt;P class="MsoNormal"&gt;vpngroup GroupVpn1 idle-time 1800&lt;/P&gt;&lt;P class="MsoNormal"&gt;vpngroup GroupVpn1 password ********&lt;/P&gt;&lt;P class="MsoNormal"&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;telnet timeout 60&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh timeout 60&lt;/P&gt;&lt;P class="MsoNormal"&gt;console timeout 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;dhcpd lease 3600&lt;/P&gt;&lt;P class="MsoNormal"&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P class="MsoNormal"&gt;terminal width 80&lt;/P&gt;&lt;P class="MsoNormal"&gt;Cryptochecksum:373876906db09cc3dbfe01db3eb2409b&lt;/P&gt;&lt;P class="MsoNormal"&gt;: end&lt;/P&gt;&lt;P class="MsoNormal"&gt;MyDomain(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 20:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414335#M857451</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2010-01-08T20:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414336#M857455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Follow up message…&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;I have been attempting to diagnose this problem.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I ran Debug and the following is what I received when I attempted to open a browser session directed to the inside interface of my PIX (172.20.1.243).&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Entries:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: black;"&gt;710005: TCP request discarded from 172.20.1.101/2757 to inside:172.20.1.243/www&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: black;"&gt;710005: TCP request discarded from 172.20.1.101/2758 to inside:172.20.1.243/www&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: black;"&gt;710005: TCP request discarded from 172.20.1.101/2758 to inside:172.20.1.243/www&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: black;"&gt;710005: TCP request discarded from 172.20.1.101/2758 to inside:172.20.1.243/www&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: black;"&gt;710005: TCP request discarded from 172.20.1.101/2759 to inside:172.20.1.243/www&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;This is after I decided to just open it up by allowing anything (ACL's).&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Yet I am still not able to ping the outside address from another node or am I able to reach any other device from the PIX (cannot ping an outside address).&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Latest Config:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;:&lt;/P&gt;&lt;P class="MsoNormal"&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface ethernet0 auto shutdown&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface ethernet1 100full&lt;/P&gt;&lt;P class="MsoNormal"&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P class="MsoNormal"&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P class="MsoNormal"&gt;enable password cPlBJP0wS8qSVcsh encrypted&lt;/P&gt;&lt;P class="MsoNormal"&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P class="MsoNormal"&gt;hostname MyDomain&lt;/P&gt;&lt;P class="MsoNormal"&gt;domain-name hufcorairwall.com&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol http 80&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol ils 389&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P class="MsoNormal"&gt;names&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="color: red; "&gt;access-list 101 permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;pager lines 24&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging console debugging&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging buffered informational&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging trap debugging&lt;/P&gt;&lt;P class="MsoNormal"&gt;icmp permit any outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;mtu outside 1500&lt;/P&gt;&lt;P class="MsoNormal"&gt;mtu inside 1500&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip address outside ***.***.***.84 255.255.255.248&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip address inside 172.20.1.243 255.255.0.0&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip audit info action alarm&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip audit attack action alarm&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip local pool ippool1 192.168.221.1-192.168.221.23&lt;/P&gt;&lt;P class="MsoNormal"&gt;pdm logging informational 100&lt;/P&gt;&lt;P class="MsoNormal"&gt;pdm history enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;arp timeout 14400&lt;/P&gt;&lt;P class="MsoNormal"&gt;global (outside) 1 interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;nat (inside) 1 172.20.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface www 172.20.1.101 www netmask 255.255.255.2&lt;/P&gt;&lt;P class="MsoNormal"&gt;55 0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="color: red; "&gt;access-group 101 in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;route outside 0.0.0.0 0.0.0.0 ***.***.***.81 1&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P class="MsoNormal"&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P class="MsoNormal"&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P class="MsoNormal"&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P class="MsoNormal"&gt;http server enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;http ***.***.***.84 255.255.255.255 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server location&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server contact&lt;/P&gt;&lt;P class="MsoNormal"&gt;snmp-server community public&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server enable traps&lt;/P&gt;&lt;P class="MsoNormal"&gt;floodguard enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto ipsec transform-set TransSet1 esp-des esp-md5-hmac&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto dynamic-map DynMap1 10 set transform-set TransSet1&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto map CryptMap1 10 ipsec-isakmp dynamic DynMap1&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto map CryptMap1 interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp enable outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp identity address&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P class="MsoNormal"&gt;vpngroup GroupVpn1 address-pool ippool1&lt;/P&gt;&lt;P class="MsoNormal"&gt;vpngroup GroupVpn1 idle-time 1800&lt;/P&gt;&lt;P class="MsoNormal"&gt;vpngroup GroupVpn1 password ********&lt;/P&gt;&lt;P class="MsoNormal"&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;telnet timeout 60&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh timeout 60&lt;/P&gt;&lt;P class="MsoNormal"&gt;console timeout 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;dhcpd lease 3600&lt;/P&gt;&lt;P class="MsoNormal"&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P class="MsoNormal"&gt;terminal width 80&lt;/P&gt;&lt;P class="MsoNormal"&gt;Cryptochecksum:e4c2cae3dba87baccb4de8656975ce73&lt;/P&gt;&lt;P class="MsoNormal"&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jan 2010 04:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414336#M857455</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2010-01-09T04:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414337#M857462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Leo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; You have enabed HTTP management service(PDM or ASDM) on outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And using smae interface to SNAT internal IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you pelase disable that and check it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dileep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jan 2010 05:12:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414337#M857462</guid>
      <dc:creator>Dileep Sivadas Padmini</dc:creator>
      <dc:date>2010-01-09T05:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414338#M857467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you have already mapped port 80 access to outside ifc of PIX, you can not map the same port 80 access of outside ifc to another internal IIP using static translations. Hence, I agree with Dileep.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might wanna use a separate external IP in the static command and then allow traffic to the ext IP using access-list on the outside ifc IN direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will surely help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VIjaya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jan 2010 20:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414338#M857467</guid>
      <dc:creator>vilaxmi</dc:creator>
      <dc:date>2010-01-09T20:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414339#M857470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Thanks for your help…&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;But it did not seem to resolve my issue.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I am attempting to understand this process.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;As I mentioned at the beginning, I have a program that I am attempting to gain access from outside my network.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;User will gain access via their browser.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Therefore, I do not believe I need to have a route from my internal node (172.20.1.101) to my PIX (.243).&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Since, the .101 computer will be pointing to the PIX as the Gateway.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;But I need a static route from my PIX to the .101 node (I don’t want HTTP traffic going anywhere else).&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Therefore, I removed the following:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface www 172.20.1.101 www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;I also removed all the http entries – I do not use the PDM:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;http server enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Also, at one time – I use to use this as my VPN server.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;But, I no longer have users access the device through the PIX.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Therefore, is it critical to remove it (all the entries)?&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;Current Config.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface ethernet0 auto shutdown&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface ethernet1 100full&lt;/P&gt;&lt;P class="MsoNormal"&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P class="MsoNormal"&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P class="MsoNormal"&gt;enable password cPlBJP0wS8qSVcsh encrypted&lt;/P&gt;&lt;P class="MsoNormal"&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P class="MsoNormal"&gt;hostname hufcorairwall&lt;/P&gt;&lt;P class="MsoNormal"&gt;domain-name hufcorairwall.com&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol http 80&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol ils 389&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P class="MsoNormal"&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P class="MsoNormal"&gt;names&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list 101 permit ip any any&lt;/P&gt;&lt;P class="MsoNormal"&gt;pager lines 24&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging console debugging&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging buffered informational&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging trap debugging&lt;/P&gt;&lt;P class="MsoNormal"&gt;icmp permit any outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;mtu outside 1500&lt;/P&gt;&lt;P class="MsoNormal"&gt;mtu inside 1500&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip address outside ***.***.***.84 255.255.255.248&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip address inside 172.20.1.243 255.255.0.0&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip audit info action alarm&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip audit attack action alarm&lt;/P&gt;&lt;P class="MsoNormal"&gt;ip local pool ippool1 192.168.221.1-192.168.221.23&lt;/P&gt;&lt;P class="MsoNormal"&gt;pdm logging informational 100&lt;/P&gt;&lt;P class="MsoNormal"&gt;pdm history enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;arp timeout 14400&lt;/P&gt;&lt;P class="MsoNormal"&gt;global (outside) 1 interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;nat (inside) 1 172.20.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;route outside 0.0.0.0 0.0.0.0 ***.***.***.81 1&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P class="MsoNormal"&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P class="MsoNormal"&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P class="MsoNormal"&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server location&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server contact&lt;/P&gt;&lt;P class="MsoNormal"&gt;snmp-server community public&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server enable traps&lt;/P&gt;&lt;P class="MsoNormal"&gt;floodguard enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto ipsec transform-set TransSet1 esp-des esp-md5-hmac&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto dynamic-map DynMap1 10 set transform-set TransSet1&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto map CryptMap1 10 ipsec-isakmp dynamic DynMap1&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto map CryptMap1 interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp enable outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp identity address&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 encryption des&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P class="MsoNormal"&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P class="MsoNormal"&gt;vpngroup GroupVpn1 address-pool ippool1&lt;/P&gt;&lt;P class="MsoNormal"&gt;vpngroup GroupVpn1 idle-time 1800&lt;/P&gt;&lt;P class="MsoNormal"&gt;vpngroup GroupVpn1 password ********&lt;/P&gt;&lt;P class="MsoNormal"&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;telnet timeout 60&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh timeout 60&lt;/P&gt;&lt;P class="MsoNormal"&gt;console timeout 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;dhcpd lease 3600&lt;/P&gt;&lt;P class="MsoNormal"&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P class="MsoNormal"&gt;terminal width 80&lt;/P&gt;&lt;P class="MsoNormal"&gt;Cryptochecksum:1225e257808d8147151d8fd06b471c3a&lt;/P&gt;&lt;P class="MsoNormal"&gt;: end&lt;/P&gt;&lt;P class="MsoNormal"&gt;hufcorairwall(config)#&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jan 2010 19:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414339#M857470</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2010-01-10T19:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414340#M857475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I went through your config, and I see the static command still missing. We need to add a static as I explained in my previous post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anytime you need to be able to access from outside (lower-security level) to any of the inside servers (connected on higher security-level ifc), then you need to add a static translation for the server's inside IP to the server's external IP. And then on the outside ACL (101 in your case) you just need to allow users to access the external IP of server, instead of allowing ALL (like you have done now, as it is not secure at al)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vijaya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2010 02:10:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414340#M857475</guid>
      <dc:creator>vilaxmi</dc:creator>
      <dc:date>2010-01-11T02:10:08Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414341#M857478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your config shows that eth0 is shutdown??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jan 2010 04:04:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414341#M857478</guid>
      <dc:creator>Dileep Sivadas Padmini</dc:creator>
      <dc:date>2010-01-11T04:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414342#M857480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Thank you!&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Uuugh!&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Once I got the Outside interface up – I was able to ping.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I was also able to access the resource that I had been attempting.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I plan to tighten my ACL and just limit it to HTTP traffic to my .243 node.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Yes, I will change my ACL to limit traffic.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I opened it up simply because I could not determine where the problem existed.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I plan on only having one entry in my ACL:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin-left: 0.5in;"&gt;Access-list 101 permit tcp any interface outside eq http&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;One last thing…I am attempting to understand what is going on?&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I notice that I can access the resource from outside my network.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;However, when I open up my browser from the node hosting my program – it fails to connect.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Not critical – but I am just attempting to understand.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jan 2010 23:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414342#M857480</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2010-01-12T23:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414343#M857481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;Pls. try &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://127.0.0.1"&gt;http://127.0.0.1&lt;/A&gt;&lt;SPAN&gt; - from the computer that is hosting it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. do not use the translated (public) ip address on the host that is hosting it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2010 00:45:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414343#M857481</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-13T00:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414344#M857482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Hello,&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;I am still having issues…&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;My original intention was to have a file sharing program that can be viewed outside my network via a browser – that part works.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;However, the software has some functions that require access to the Internet via Port 80.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Therefore, when I opened my browser from the host machine – it does not work – meaning I cannot access a page on the Internet.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;I know it is nothing wrong with the host computer (I can ping the local host) – when I type it within my browser – I get the interface of my program that I want others to see outside my network.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;When I connect it via another source and it gains access.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;When I ran debug on the PIX – this is what I received:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: UDP request discarded from 172.20.1.101/138 to inside:172.20.255.255/net bios-dgm&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: UDP request discarded from 172.20.1.157/137 to inside:172.20.255.255/net&lt;/P&gt;&lt;P class="MsoNormal"&gt;bios-ns&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: TCP request discarded from 172.20.1.101/1303 to inside:172.20.1.243/www&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: TCP request discarded from 172.20.1.101/1303 to inside:172.20.1.243/www&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: UDP request discarded from 172.20.1.157/137 to inside:172.20.255.255/net&lt;/P&gt;&lt;P class="MsoNormal"&gt;bios-ns&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: TCP request discarded from 172.20.1.101/1303 to inside:172.20.1.243/www&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: UDP request discarded from 172.20.1.19/1185 to inside:172.20.255.255/net&lt;/P&gt;&lt;P class="MsoNormal"&gt;bios-ns&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: UDP request discarded from 172.20.1.101/138 to inside:172.20.255.255/net&lt;/P&gt;&lt;P class="MsoNormal"&gt;bios-dgm&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: UDP request discarded from 172.20.1.157/137 to inside:172.20.255.255/net&lt;/P&gt;&lt;P class="MsoNormal"&gt;bios-ns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jan 2010 01:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414344#M857482</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2010-01-20T01:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414345#M857483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;172.20.1.243 - is the IP address of the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only logs that pertain to port 80 access are these below:&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: TCP request discarded from 172.20.1.101/1303 to inside:172.20.1.243/www&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: TCP request discarded from 172.20.1.101/1303 to inside:172.20.1.243/www&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: TCP request discarded from 172.20.1.101/1303 to inside:172.20.1.243/www&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;All of these are talking about accessing the inside interface using port 80.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;This tells me that either the static line is missing or it is refering to the IP address 172.20.1.243 and not the keyword "interface"&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;You mentioned that the website is fine and working on the computer.&lt;/P&gt;&lt;P class="MsoNormal"&gt;This web server is unable to go out to the internet.&lt;/P&gt;&lt;P class="MsoNormal"&gt;No one from the internet is able to reach this web server.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Pls. provide the following:&lt;/P&gt;&lt;P class="MsoNormal"&gt;1. inside ip addres of the web server&lt;/P&gt;&lt;P class="MsoNormal"&gt;2. sh&amp;nbsp; static&lt;/P&gt;&lt;P class="MsoNormal"&gt;3. sh access-group&lt;/P&gt;&lt;P class="MsoNormal"&gt;4. sh access-list (for the access-lists that show up in the above command)&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jan 2010 02:06:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414345#M857483</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-20T02:06:51Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414346#M857486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;My internal web server is 172.20.1.101.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;The inside interface on the PIX is .243.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;airwall(config)# sh static&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface www 172.20.1.101 www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;airwall(config)# sh access-group&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;airwall(config)# sh access-list&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;alert-interval 300&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list 101; 1 elements&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list 101 line 1 permit ip any any (hitcnt=745)&lt;/P&gt;&lt;P class="MsoNormal"&gt;airwall(config)#&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Yes, currently I am permitting anything in an effort to get it to work first and then tighten it down (once I can verify it works).&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;My understanding of the PIX is that all information from the inside can go out unless it has been denied?&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Also, the web service is working fine from the host computer (.101).&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I am able to route this through my proxy gateway (another device…another IP) and send &amp;amp; receive information.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;It is when I attempt to route through the PIX (.243) is when I encounter problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jan 2010 02:52:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414346#M857486</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2010-01-20T02:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414347#M857487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It appears from the logs that you are trying to access 172.20.1.253 from 172.20.1.101.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Pls. use a computer on the internet (from home may be) and access the outside IP address using a browser (&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://"&gt;http://&lt;/A&gt;&lt;/SPAN&gt;***.***.***.84) &lt;SPAN&gt;and it will load the web page hosted in &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://172.20.1.101"&gt;172.20.1.101&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jan 2010 04:21:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414347#M857487</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-20T04:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414348#M857488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, currently I am permitting anything in an effort to get it to work&lt;BR /&gt;first and then tighten it down (once I can verify it works).&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;STRONG&gt;My understanding of the PIX is that all information from the inside can go out unless it has been denied?&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is when you do not have any access-list configured on interfaces. In your case the missing part may be an access-list on inside interface that permits http traffic from your internal web server to internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 102&amp;nbsp; permit tcp host 172.20.1.101 any eq http&lt;/P&gt;&lt;P&gt;access-list 102&amp;nbsp; permit tcp host 172.20.1.101 any eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 102 in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also make sure that you have proper DNS resolution for internet access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dileep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jan 2010 04:26:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414348#M857488</guid>
      <dc:creator>Dileep Sivadas Padmini</dc:creator>
      <dc:date>2010-01-20T04:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414349#M857489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;P class="MsoNormal"&gt;Hello,&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;I got my PIX working…however…&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;After over analyzing the issue, I decided to isolate the problem and remove the PIX from my network.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I plugged another node directly to the hub ports in the back of the PIX and it worked (after allowing nearly full access).&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;On the network, the node I was attempting to reach was not directly plugged into the hub of the PIX.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;But, I was able to ping the inside port of the PIX and the PIX was able to ping the node.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;Therefore, I did not believe that to be an issue?&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Anyway, now my problem is with ACL’s.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I basically had to allow anything in and out because when I applied the suggested ACL’s (the Access-list 102 suggestion) – I do not gain access.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;This is what I have currently applied:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="text-indent: 0.5in;"&gt;access-list 101; 1 elements&lt;/P&gt;&lt;P class="MsoNormal" style="text-indent: 0.5in;"&gt;access-list 101 line 1 permit ip any any (hitcnt=1167)&lt;/P&gt;&lt;P class="MsoNormal" style="text-indent: 0.5in;"&gt;access-list 102; 2 elements&lt;/P&gt;&lt;P class="MsoNormal" style="text-indent: 0.5in;"&gt;access-list 102 line 1 permit tcp any any eq www (hitcnt=0)&lt;/P&gt;&lt;P class="MsoNormal" style="text-indent: 0.5in;"&gt;access-list 102 line 2 permit tcp any any eq https (hitcnt=0)&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Log information (Note: The public address is the assign DNS server.&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;I transferred the application to my lab workstation which is 172.20.1.103):&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;106023: Deny udp src inside:172.20.1.103/54674 dst outside:64.105.132.250/53 by access-group "102"&lt;/P&gt;&lt;P class="MsoNormal"&gt;106023: Deny udp src inside:172.20.1.103/54674 dst outside:64.105.132.252/53 by access-group "102"&lt;/P&gt;&lt;P class="MsoNormal"&gt;106023: Deny udp src inside:172.20.1.103/54674 dst outside:64.105.132.250/53 by access-group "102"&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: UDP request discarded from 172.20.1.81/138 to inside:172.20.255.255/netbios-dgm&lt;/P&gt;&lt;P class="MsoNormal"&gt;106023: Deny udp src inside:172.20.1.103/54674 dst outside:64.105.132.250/53 by access-group "102"&lt;/P&gt;&lt;P class="MsoNormal"&gt;106023: Deny udp src inside:172.20.1.103/54674 dst outside:64.105.132.252/53 by access-group "102"&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: UDP request discarded from 172.20.1.11/137 to inside:172.20.255.255/netb ios-ns&lt;/P&gt;&lt;P class="MsoNormal"&gt;710005: UDP request discarded from 172.20.1.78/138 to inside:172.20.255.255/netb ios-dgm&lt;/P&gt;&lt;P class="MsoNormal"&gt;106023: Deny udp src inside:172.20.1.103/54674 dst outside:64.105.132.250/53 by access-group "102"&lt;/P&gt;&lt;P class="MsoNormal"&gt;106023: Deny udp src inside:172.20.1.103/54674 dst outside:64.105.132.252/53 by access-group "102"&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;What can I do to tighten my ACL’s while still allowing traffic to pass back and forth?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jan 2010 02:54:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414349#M857489</guid>
      <dc:creator>hufcor</dc:creator>
      <dc:date>2010-01-22T02:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Issue redirecting HTTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414350#M857490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __default_attr="xml" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;PIX Version 6.3(1)&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: #333333;"&gt;&lt;STRONG&gt;&lt;SPAN&gt;interface ethernet0 auto &lt;BR /&gt;&lt;BR /&gt;interface ethernet1 100full&lt;/SPAN&gt;&amp;nbsp; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;&lt;BR /&gt;enable password cPlBJP0wS8qSVcsh encrypted&lt;BR /&gt;&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;&lt;BR /&gt;hostname hufcorairwall&lt;BR /&gt;&lt;BR /&gt;domain-name hufcorairwall.com&lt;BR /&gt;&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;&lt;BR /&gt;fixup protocol http 80&lt;BR /&gt;&lt;BR /&gt;fixup protocol ils 389&lt;BR /&gt;&lt;BR /&gt;fixup protocol rsh 514&lt;BR /&gt;&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;&lt;BR /&gt;fixup protocol sqlnet 1521&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG style="color: #ff6600; "&gt;access-list 101 permit tcp any interface outside eq http&lt;BR /&gt;access-list 102 permit tcp 172.20.0.0 255.255.0.0 any eq http&lt;BR /&gt;access-list 102 permit tcp 172.20.0.0 255.255.0.0 any eq https&lt;BR /&gt;access-list 102 permit udp 172.20.0.0 255.255.0.0 any eq dns&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;pager lines 24&lt;BR /&gt;&lt;BR /&gt;logging console debugging&lt;BR /&gt;&lt;BR /&gt;logging buffered informational&lt;BR /&gt;&lt;BR /&gt;logging trap debugging&lt;BR /&gt;&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;&lt;BR /&gt;ip address outside ***.***.***.84 255.255.255.248&lt;BR /&gt;&lt;BR /&gt;ip address inside 172.20.1.243 255.255.0.0&lt;BR /&gt;&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;&lt;BR /&gt;ip audit attack action alarm&lt;BR /&gt;&lt;BR /&gt;ip local pool ippool1 192.168.221.1-192.168.221.23&lt;BR /&gt;&lt;BR /&gt;pdm logging informational 100&lt;BR /&gt;&lt;BR /&gt;pdm history enable&lt;BR /&gt;&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="color: #ff6600;"&gt;global (outside) 1 interface&lt;BR /&gt;&lt;BR /&gt;static (inside,outside) tcp interface www 172.20.1.101 www netmask 255.255.255.255 0 0&lt;BR /&gt;&lt;BR /&gt;nat (inside) 1 172.20.0.0 255.255.0.0 0 0&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff6600;"&gt;access-group 101 in interface outside&lt;BR /&gt;&lt;BR /&gt;access-group 102 in interface inside&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 ***.***.***.81 1&lt;BR /&gt;&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;&lt;BR /&gt;no snmp-server location&lt;BR /&gt;&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: #333333;"&gt;s&lt;/SPAN&gt;&lt;SPAN style="color: #333333;"&gt;&lt;SPAN style="color: #333333;"&gt;nmp-server community public&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR /&gt;no snmp-server enable traps&lt;BR /&gt;&lt;BR /&gt;floodguard enable&lt;BR /&gt;&lt;BR /&gt;sysopt connection permit-ipsec&lt;BR /&gt;&lt;BR /&gt;crypto ipsec transform-set TransSet1 esp-des esp-md5-hmac&lt;BR /&gt;&lt;BR /&gt;crypto dynamic-map DynMap1 10 set transform-set TransSet1&lt;BR /&gt;&lt;BR /&gt;crypto map CryptMap1 10 ipsec-isakmp dynamic DynMap1&lt;BR /&gt;&lt;BR /&gt;crypto map CryptMap1 interface outside&lt;BR /&gt;&lt;BR /&gt;isakmp enable outside&lt;BR /&gt;&lt;BR /&gt;isakmp identity address&lt;BR /&gt;&lt;BR /&gt;isakmp policy 10 authentication pre-share&lt;BR /&gt;&lt;BR /&gt;isakmp policy 10 encryption des&lt;BR /&gt;&lt;BR /&gt;isakmp policy 10 hash md5&lt;BR /&gt;&lt;BR /&gt;isakmp policy 10 group 2&lt;BR /&gt;&lt;BR /&gt;isakmp policy 10 lifetime 86400&lt;BR /&gt;&lt;BR /&gt;vpngroup GroupVpn1 address-pool ippool1&lt;BR /&gt;&lt;BR /&gt;vpngroup GroupVpn1 idle-time 1800&lt;BR /&gt;&lt;BR /&gt;vpngroup GroupVpn1 password ********&lt;BR /&gt;&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;&lt;BR /&gt;telnet timeout 60&lt;BR /&gt;&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;&lt;BR /&gt;console timeout 0&lt;BR /&gt;&lt;BR /&gt;dhcpd lease 3600&lt;BR /&gt;&lt;BR /&gt;dhcpd ping_timeout 750&lt;BR /&gt;&lt;BR /&gt;terminal width 80&lt;BR /&gt;&lt;BR /&gt;Cryptochecksum:1225e257808d8147151d8fd06b471c3a&lt;BR /&gt;&lt;BR /&gt;: end&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have pasted your config , edited lines are highlighted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dileep&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jan 2010 04:31:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-issue-redirecting-http/m-p/1414350#M857490</guid>
      <dc:creator>Dileep Sivadas Padmini</dc:creator>
      <dc:date>2010-01-22T04:31:12Z</dc:date>
    </item>
  </channel>
</rss>

