<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pix 506E access rules modification in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016052#M917186</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm not much up on Pix firewalls, so I am hoping someone here can answer this question: How would I modify the config below to allow ONLY The following IP's to access 10.2.2.8&lt;/P&gt;&lt;P&gt;192.168.102.85&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.111.60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.111.62&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.111.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Running Config:(all I have to go on right now, attached)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 13:10:27 GMT</pubDate>
    <dc:creator>jamesbruce</dc:creator>
    <dc:date>2019-03-11T13:10:27Z</dc:date>
    <item>
      <title>Pix 506E access rules modification</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016052#M917186</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm not much up on Pix firewalls, so I am hoping someone here can answer this question: How would I modify the config below to allow ONLY The following IP's to access 10.2.2.8&lt;/P&gt;&lt;P&gt;192.168.102.85&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.111.60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.111.62&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.111.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Running Config:(all I have to go on right now, attached)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016052#M917186</guid>
      <dc:creator>jamesbruce</dc:creator>
      <dc:date>2019-03-11T13:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E access rules modification</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016053#M917187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi James&lt;/P&gt;&lt;P&gt;  access-list outside_access_in permit ip host 192.168.111.60 host s-gc-docimg&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip host 192.168.102.85 host s-gc-docimg&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip host 192.168.111.62 host s-gc-docimg&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip host 192.168.111.50 host s-gc-docimg&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jul 2008 22:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016053#M917187</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-07T22:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E access rules modification</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016054#M917188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Btw, the following command makes all other nat statements useless&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any any&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jul 2008 22:34:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016054#M917188</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-07T22:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E access rules modification</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016055#M917189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your response.  So if i understand you correctly, remove the nat statements you mentioned, create and apply tghe access-list statements you mentioned and it should work, am I correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jul 2008 22:41:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016055#M917189</guid>
      <dc:creator>jamesbruce</dc:creator>
      <dc:date>2008-07-07T22:41:51Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E access rules modification</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016056#M917190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Removing the nat satatement would affect some traffic if this firewall is used like a router that doesnt have nat enabled by default. That statement might have been issued on purpose to not to spend time on detailed traffic definitions with statics.&lt;/P&gt;&lt;P&gt;If you decide to remove that NAT statement, make sure you enter the following &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) s-gc-docimg s-gc-docimg netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 20:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016056#M917190</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-08T20:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E access rules modification</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016057#M917191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply:&lt;/P&gt;&lt;P&gt;Question, I did as you suggested and also added the nat statement you recommended after removing the others and no connection by those ip addreses was able to be made. i also tried it without your recommended nat stement and putting the exisiting ones back in with no luck.  Since their is a site to site vpn involved, wouldn't similiar changes need to be made on the other side?  (They do not have access to the other side device)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jul 2008 01:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016057#M917191</guid>
      <dc:creator>jamesbruce</dc:creator>
      <dc:date>2008-07-09T01:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E access rules modification</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016058#M917192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Since their is a site to site vpn involved"&lt;/P&gt;&lt;P&gt;  Ah... Now all makes sense.&lt;/P&gt;&lt;P&gt;  First of all, your interesting traffic ACL 120 should not contain any any statement unless you want all your connection (including your internet) to go over the tunnel.&lt;/P&gt;&lt;P&gt;  Assuming that remote site's local network is 192.168.111.0/24, here is the necessary config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip 10.4.28.0 255.255.255.0 192.168.111.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;access-list 120 permit ip 10.4.28.0 255.255.255.0 192.168.111.0 255.255.255.0&lt;/P&gt;&lt;P&gt;no access-list 120 permit ip any any&lt;/P&gt;&lt;P&gt;no static (inside,outside) s-gc-docimg s-gc-docimg netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;no access-list 100 permit ip any any&lt;/P&gt;&lt;P&gt;no access-list AgendaManager permit ip any any&lt;/P&gt;&lt;P&gt;no access-list AgendaManager permit icmp any any&lt;/P&gt;&lt;P&gt;no access-list AgendaManager permit tcp any any&lt;/P&gt;&lt;P&gt;no access-list outside_access_in permit ip host 192.168.111.60 host s-gc-docimg &lt;/P&gt;&lt;P&gt;no access-list outside_access_in permit ip host 192.168.102.85 host s-gc-docimg &lt;/P&gt;&lt;P&gt;no access-list outside_access_in permit ip host 192.168.111.62 host s-gc-docimg &lt;/P&gt;&lt;P&gt;no access-list outside_access_in permit ip host 192.168.111.50 host s-gc-docimg &lt;/P&gt;&lt;P&gt;no access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;fixup protocol icmp&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post the latest config after above modifications.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jul 2008 11:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-access-rules-modification/m-p/1016058#M917192</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-09T11:30:42Z</dc:date>
    </item>
  </channel>
</rss>

