<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: shh help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949546#M917578</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;those ip's were juct changed for the post... but i get connection refused from putty&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Jun 2008 21:10:02 GMT</pubDate>
    <dc:creator>Danny Guillory Jr</dc:creator>
    <dc:date>2008-06-26T21:10:02Z</dc:date>
    <item>
      <title>shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949544#M917576</link>
      <description>&lt;P&gt;Trying to figure out why i cannot ssh to my pix501 from a outside connection!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;hostname AB01-GR-PIX&lt;/P&gt;&lt;P&gt;domain-name tobar.COM&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.4.2.0 AB01-GR&lt;/P&gt;&lt;P&gt;name 10.9.2.0 AB01-LF&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip AB01-GR 255.255.255.0 AB01-LF 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_40 permit ip AB01-GR 255.255.255.0 AB01-LF 255.255.255.0&lt;/P&gt;&lt;P&gt;no pager&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 45.10.15.74 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 10.4.2.30 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location AB01-GR 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location AB01-LF 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location AB01-LF 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 65.100.175.78 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http AB01-LF 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http AB01-GR 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 match address outside_cryptomap_40&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 set peer 12.166.199.2&lt;/P&gt;&lt;P&gt;crypto map outside_map 40 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 12.166.199.2 netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet AB01-GR 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet AB01-LF 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 10.4.2.150-10.4.2.180 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 10.9.2.5 10.9.2.6&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain abvalve.com&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:06:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949544#M917576</guid>
      <dc:creator>Danny Guillory Jr</dc:creator>
      <dc:date>2019-03-11T13:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949545#M917577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Couple of things&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not a good idea to post config with public IP addresses in it although i suspect you have changed them ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your outside interface is 45.10.15.74 &lt;/P&gt;&lt;P&gt;Your default route is 65.100.175.78&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it looks like you have modified your addressing ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, when you try to ssh how far do you get ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 21:04:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949545#M917577</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-06-26T21:04:04Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949546#M917578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;those ip's were juct changed for the post... but i get connection refused from putty&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 21:10:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949546#M917578</guid>
      <dc:creator>Danny Guillory Jr</dc:creator>
      <dc:date>2008-06-26T21:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949547#M917579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you know if ssh works from the inside ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 21:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949547#M917579</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-06-26T21:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949548#M917580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nope but let me try&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 21:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949548#M917580</guid>
      <dc:creator>Danny Guillory Jr</dc:creator>
      <dc:date>2008-06-26T21:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949549#M917581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;ca generate rsa key 2048&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after that try again ssh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 21:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949549#M917581</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2008-06-26T21:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949550#M917582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yeah i can ssh from inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOT outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 21:23:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949550#M917582</guid>
      <dc:creator>Danny Guillory Jr</dc:creator>
      <dc:date>2008-06-26T21:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949551#M917583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can test ie. see if i get a prompt if you let me know public IP &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:jon.marshall4@btinternet.com"&gt;jon.marshall4@btinternet.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but obviously you don't have to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 21:28:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949551#M917583</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-06-26T21:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949552#M917585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;maybe your provider is blocking SSH?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jun 2008 21:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949552#M917585</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2008-06-26T21:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949553#M917587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no, because i can ssh into the 506e thats the 501's are VPN'ing into!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jun 2008 12:46:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949553#M917587</guid>
      <dc:creator>Danny Guillory Jr</dc:creator>
      <dc:date>2008-06-27T12:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949554#M917589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is a good PIX config... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password qaAv.Ii3BE9UHjeE encrypted&lt;/P&gt;&lt;P&gt;passwd lfL9YkXcpVI8j9gT encrypted&lt;/P&gt;&lt;P&gt;hostname AB01-CC-PIX&lt;/P&gt;&lt;P&gt;domain-name rupurt.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;no fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;no fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;no fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;no fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;no fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;no fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;no fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;no fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;no fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.7.2.0 AB01-CC&lt;/P&gt;&lt;P&gt;name 10.9.2.0 AB01-LF&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip AB01-CC 255.255.255.0 AB01-LF 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_100 permit ip AB01-CC 255.255.255.0 AB01-LF 255.255.255.0&lt;/P&gt;&lt;P&gt;no pager&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no ip address outside&lt;/P&gt;&lt;P&gt;ip address inside 10.7.2.30 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location AB01-CC 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location AB01-LF 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;static (inside,outside) 68.213.152.84 10.7.2.13 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 68.213.152.81 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http AB01-CC 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http AB01-LF 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map outside_map 100 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map outside_map 100 match address outside_cryptomap_100&lt;/P&gt;&lt;P&gt;crypto map outside_map 100 set peer 69.2.60.228&lt;/P&gt;&lt;P&gt;crypto map outside_map 100 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 12.166.199.2 netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;isakmp key ******** address 69.2.60.228 netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet AB01-CC 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet AB01-LF 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 10.7.2.100-10.7.2.130 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 10.9.2.5 10.9.2.6&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain rupert.com&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jun 2008 12:52:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949554#M917589</guid>
      <dc:creator>Danny Guillory Jr</dc:creator>
      <dc:date>2008-06-27T12:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949555#M917591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Forgot Outside Ip...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;hostname AB01-CC-PIX&lt;/P&gt;&lt;P&gt;domain-name abvalve.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;no fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;no fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;no fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;no fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;no fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;no fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;no fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;no fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;no fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.7.2.0 AB01-CC&lt;/P&gt;&lt;P&gt;name 10.9.2.0 AB01-LF&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip AB01-CC 255.255.255.0 AB01-LF 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_100 permit ip AB01-CC 255.255.255.0 AB01-LF 255.255.255.0&lt;/P&gt;&lt;P&gt;no pager&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 68.x.x.84 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 10.7.2.30 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location AB01-CC 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm location AB01-LF 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;static (inside,outside) 68.213.152.84 10.7.2.13 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 68.213.152.81 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http AB01-CC 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http AB01-LF 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map outside_map 100 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map outside_map 100 match address outside_cryptomap_100&lt;/P&gt;&lt;P&gt;crypto map outside_map 100 set peer 69.2.60.228&lt;/P&gt;&lt;P&gt;crypto map outside_map 100 set transform-set ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 12.166.199.2 netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;isakmp key ******** address 69.2.60.228 netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet AB01-CC 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet AB01-LF 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 10.7.2.100-10.7.2.130 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 10.9.2.5 10.9.2.6&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain abvalve.com&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jun 2008 12:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949555#M917591</guid>
      <dc:creator>Danny Guillory Jr</dc:creator>
      <dc:date>2008-06-27T12:54:48Z</dc:date>
    </item>
    <item>
      <title>Re: shh help</title>
      <link>https://community.cisco.com/t5/network-security/shh-help/m-p/949556#M917593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;using the configuration above i cannot ping the outside address either!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jun 2008 13:15:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shh-help/m-p/949556#M917593</guid>
      <dc:creator>Danny Guillory Jr</dc:creator>
      <dc:date>2008-06-27T13:15:23Z</dc:date>
    </item>
  </channel>
</rss>

