<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Basic PIX firewalling in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325836#M857746</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Nov 2009 19:17:58 GMT</pubDate>
    <dc:creator>sureshkrishnan</dc:creator>
    <dc:date>2009-11-20T19:17:58Z</dc:date>
    <item>
      <title>Basic PIX firewalling</title>
      <link>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325832#M857741</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A basic firewall issue-network topology is as follows-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R1-PIX-R2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R1 config-&lt;/P&gt;&lt;P&gt;interface Loopback 0&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface fastethernet 0/0&lt;/P&gt;&lt;P&gt; ip address 10.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.1.1.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2 config-&lt;/P&gt;&lt;P&gt;interface Loopback 0&lt;/P&gt;&lt;P&gt; ip address 1.1.1.1 255.255.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface fastethernet 0/0&lt;/P&gt;&lt;P&gt; ip address 10.2.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route 192.168.1.0 255.255.255.0 10.2.2.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX config in router mode-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface e0&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; ip address 10.1.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface e1&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; ip address 10.2.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.2.2.2&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 10.1.1.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list 101 extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 101 extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, the issue is I CANNOT ping between R1 &amp;amp; R2. However, I can ping from PIX to each device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Amit.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:40:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325832#M857741</guid>
      <dc:creator>amit.bhagat</dc:creator>
      <dc:date>2019-03-11T16:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: Basic PIX firewalling</title>
      <link>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325833#M857743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what version of the code are you running.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Nov 2009 09:22:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325833#M857743</guid>
      <dc:creator>vikram_anumukonda</dc:creator>
      <dc:date>2009-11-17T09:22:49Z</dc:date>
    </item>
    <item>
      <title>Re: Basic PIX firewalling</title>
      <link>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325834#M857744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PIX OS version 8.04&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Nov 2009 09:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325834#M857744</guid>
      <dc:creator>amit.bhagat</dc:creator>
      <dc:date>2009-11-17T09:38:10Z</dc:date>
    </item>
    <item>
      <title>Re: Basic PIX firewalling</title>
      <link>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325835#M857745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;config looks good, anything showing up in the logs ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Nov 2009 09:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325835#M857745</guid>
      <dc:creator>vikram_anumukonda</dc:creator>
      <dc:date>2009-11-17T09:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: Basic PIX firewalling</title>
      <link>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325836#M857746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Nov 2009 19:17:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325836#M857746</guid>
      <dc:creator>sureshkrishnan</dc:creator>
      <dc:date>2009-11-20T19:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: Basic PIX firewalling</title>
      <link>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325837#M857747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Suresh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried that too- applying the policy-map globally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I should mention that this lab was run on GNS3. I have tried it on two different computers with same config and I have to say that I have reached a breakthrough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been able to ping between two routers through the firewall in both, routed and transparent, modes. But this is only possible if I increase the timeout value to almost 20 seconds. I have even run OSPF on and through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My next questions would be- on a real PIX firewall, does it take too long for interesting traffic to pass through it? How do OSPF and other routing protocols manage to keep the adjacency UP if packets take too long to reach between connected devices? In my case, OSPF adjacency was flapping. But perhaps I can blame it to the CPU resources of the PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Amit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Nov 2009 23:38:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-pix-firewalling/m-p/1325837#M857747</guid>
      <dc:creator>amit.bhagat</dc:creator>
      <dc:date>2009-11-22T23:38:20Z</dc:date>
    </item>
  </channel>
</rss>

