<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PixFirewall Problems. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161616#M877277</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I once setup Polycom and I had to add the followings:&lt;/P&gt;&lt;P&gt;1. Create an object group for the ports used by polycom&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service VIDEO tcp-udp&lt;/P&gt;&lt;P&gt; port-object range 3230 3235&lt;/P&gt;&lt;P&gt; port-object eq 1720&lt;/P&gt;&lt;P&gt; port-object eq 3603&lt;/P&gt;&lt;P&gt; port-object eq 389&lt;/P&gt;&lt;P&gt; port-object range 1718 1719&lt;/P&gt;&lt;P&gt; port-object range 3235 3258&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Create an acl to allow video traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list from-Internet-In extended permit object-group TCP_UDP any host 208.x.x.x bject-group VIDEO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 26 Jan 2009 13:59:14 GMT</pubDate>
    <dc:creator>Tshi M</dc:creator>
    <dc:date>2009-01-26T13:59:14Z</dc:date>
    <item>
      <title>PixFirewall Problems.</title>
      <link>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161613#M877274</link>
      <description>&lt;P&gt;Hi. In my office I have a Pix Firewall 525. That equipment had the 6.3 software version and it was updated to 7.2(4) and now I have a problem: When I try to do a Videoconference with a Polycom Camera, is no possible to connect. I've checked the protocols and I see that with this version, the PixFirewall doesn't manage the "fixup" command for use the h323 protocol. this was changed for a MPF command, because when in the pix I wrote "fixup protocol h323" I recieve an answer "INFO: converting 'fixup protocol h323' to MPF commands". Somebady can tell me how can I do to activate this service again? I think that for this reason I can't use the Videoconferece System. Thanks a lot.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161613#M877274</guid>
      <dc:creator>fvelasco_rojas</dc:creator>
      <dc:date>2019-03-11T14:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: PixFirewall Problems.</title>
      <link>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161614#M877275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check the last part of your config. You should have several entries under a heading titled "policy-map global_policy" that looks something like this:&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect http&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect icmp&lt;/P&gt;&lt;P&gt;  inspect pptp&lt;/P&gt;&lt;P&gt;  inspect snmp&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the 'inspect h323' line is not in there, that is where you would add it instead of doing a 'fixup'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Jan 2009 22:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161614#M877275</guid>
      <dc:creator>pstebner10</dc:creator>
      <dc:date>2009-01-23T22:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: PixFirewall Problems.</title>
      <link>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161615#M877276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul and I apreciate your help, but it was the first instruction I checked, and that instruction is ok. I don't now if is necesary all the protocols that you say me, because my pix only has the following: policy-map global_policy class inspection_default  inspect ftp  inspect h323 h225  inspect h323 ras  inspect http  inspect netbios  inspect ptp  inspect rsh  inspect rtsp  inspect skinny  inspect esmtp  inspect sqlnet  inspect sunrpc  inspect tftp  inspect sip  inspect xdmcp  inspect dns preset_dns_map --- Thanks a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2009 13:00:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161615#M877276</guid>
      <dc:creator>fvelasco_rojas</dc:creator>
      <dc:date>2009-01-26T13:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: PixFirewall Problems.</title>
      <link>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161616#M877277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I once setup Polycom and I had to add the followings:&lt;/P&gt;&lt;P&gt;1. Create an object group for the ports used by polycom&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service VIDEO tcp-udp&lt;/P&gt;&lt;P&gt; port-object range 3230 3235&lt;/P&gt;&lt;P&gt; port-object eq 1720&lt;/P&gt;&lt;P&gt; port-object eq 3603&lt;/P&gt;&lt;P&gt; port-object eq 389&lt;/P&gt;&lt;P&gt; port-object range 1718 1719&lt;/P&gt;&lt;P&gt; port-object range 3235 3258&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Create an acl to allow video traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list from-Internet-In extended permit object-group TCP_UDP any host 208.x.x.x bject-group VIDEO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2009 13:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161616#M877277</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2009-01-26T13:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: PixFirewall Problems.</title>
      <link>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161617#M877278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I gotta ask, what does the PIX say? You either have a ACL drop or a policy drop. The PIX will log both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you run packet tracer?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/p_72.html#wp1724426" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/p_72.html#wp1724426&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Jan 2009 16:53:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pixfirewall-problems/m-p/1161617#M877278</guid>
      <dc:creator>duncanm</dc:creator>
      <dc:date>2009-01-26T16:53:43Z</dc:date>
    </item>
  </channel>
</rss>

