<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Just Internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969737#M918329</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No the PIX does not need the DNS information. It just 'relays' the DNS packets/requests (after performing the configured security checks) from the users towards the DNS server on the internet, just like a router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Jun 2008 13:43:25 GMT</pubDate>
    <dc:creator>Farrukh Haroon</dc:creator>
    <dc:date>2008-06-17T13:43:25Z</dc:date>
    <item>
      <title>Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969726#M918311</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anybody give me some link where i can find how to configure a new pix 515e just for internet access for my internal network clients?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:00:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969726#M918311</guid>
      <dc:creator>cscisco_admin</dc:creator>
      <dc:date>2019-03-11T13:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969727#M918313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094768.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094768.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jun 2008 17:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969727#M918313</guid>
      <dc:creator>spremkumar</dc:creator>
      <dc:date>2008-06-16T17:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969728#M918317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi! Thanks for your help. I followed the first link but internet did not work on my pc. Here is the pix config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall(config)# sh run                           &lt;/P&gt;&lt;P&gt;: Saved       &lt;/P&gt;&lt;P&gt;: &lt;/P&gt;&lt;P&gt;PIX Version 6.3(4)                  &lt;/P&gt;&lt;P&gt;interface ethernet0 auto                        &lt;/P&gt;&lt;P&gt;interface ethernet1 auto                        &lt;/P&gt;&lt;P&gt;interface ethernet2 100full                           &lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0                                  &lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100                                   &lt;/P&gt;&lt;P&gt;nameif ethernet2 intf2 security10                                 &lt;/P&gt;&lt;P&gt;enable password  encrypted                                          &lt;/P&gt;&lt;P&gt;passwd  encrypted                                 &lt;/P&gt;&lt;P&gt;hostname pixfirewall                    &lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512                                     &lt;/P&gt;&lt;P&gt;fixup protocol ftp 21                     &lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720                             &lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719                                 &lt;/P&gt;&lt;P&gt;fixup protocol http 80                      &lt;/P&gt;&lt;P&gt;fixup protocol rsh 514                      &lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554                       &lt;/P&gt;&lt;P&gt;fixup protocol sip 5060                       &lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060                           &lt;/P&gt;&lt;P&gt;fixup protocol skin                 &lt;/P&gt;&lt;P&gt;fixup protocol smtp 25                      &lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521                          &lt;/P&gt;&lt;P&gt;fixup protocol tftp 69                      &lt;/P&gt;&lt;P&gt;names     &lt;/P&gt;&lt;P&gt;pager lines 24              &lt;/P&gt;&lt;P&gt;logging on          &lt;/P&gt;&lt;P&gt;mtu outside 1500                &lt;/P&gt;&lt;P&gt;mtu inside 1500               &lt;/P&gt;&lt;P&gt;mtu intf2 1500              &lt;/P&gt;&lt;P&gt;ip address outside (my public ip)                                            &lt;/P&gt;&lt;P&gt;ip address inside 10.1.1.1 255.255.255.0                                        &lt;/P&gt;&lt;P&gt;ip address intf2 127.0.0.1 255.255.255.255                                          &lt;/P&gt;&lt;P&gt;ip audit info action alarm                          &lt;/P&gt;&lt;P&gt;ip audit attack action alarm                            &lt;/P&gt;&lt;P&gt;pdm history enable                  &lt;/P&gt;&lt;P&gt;arp timeout 14400                 &lt;/P&gt;&lt;P&gt;global (outside) 1 (public ip range-public ip range) netmask (net mask)                                  &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0                                  &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 public ip 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;am i missing something like allowing http traffic or something else?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 08:01:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969728#M918317</guid>
      <dc:creator>cscisco_admin</dc:creator>
      <dc:date>2008-06-17T08:01:02Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969729#M918319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, when going from higher security level (inside) to outside, the only thing you need in PIX 6.x is NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are you seeing in the firewall's log?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging console 7 &lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;IF telnet:&lt;/P&gt;&lt;P&gt;logging monitor 7&lt;/P&gt;&lt;P&gt;terminal monitor&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 09:09:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969729#M918319</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-17T09:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969730#M918320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When i try to access any website.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;710005: UDP request discarded from 10.1.1.2/137 to inside:10.1.1.255/netbios-ns&lt;/P&gt;&lt;P&gt;710005: UDP request discarded from 10.1.1.2/137 to inside:10.1.1.255/netbios-ns&lt;/P&gt;&lt;P&gt;710005: UDP request discarded from 10.1.1.2/137 to inside:10.1.1.255/netbios-ns&lt;/P&gt;&lt;P&gt;710005: UDP request discarded from &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 09:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969730#M918320</guid>
      <dc:creator>cscisco_admin</dc:creator>
      <dc:date>2008-06-17T09:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969731#M918321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That message has nothing to do with internet access, those are just netbios broadcasts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 10:18:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969731#M918321</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-17T10:18:04Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969732#M918322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know but then that means the http request is not even reaching pix. What is missing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 10:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969732#M918322</guid>
      <dc:creator>cscisco_admin</dc:creator>
      <dc:date>2008-06-17T10:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969733#M918323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would check the routing, computer's default gateway, can it ping the PIX inside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have DNS properly configured on the end user machines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 10:44:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969733#M918323</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-17T10:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969734#M918325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. access-list outbound permit udp [Inside-LAN-Network] [Inside-Subnet] any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after trying the above internet started working but is it required. I did not find this anywhere on internet or on cisco website.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 11:57:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969734#M918325</guid>
      <dc:creator>cscisco_admin</dc:creator>
      <dc:date>2008-06-17T11:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969735#M918327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you sure that is the only line you have in your ACL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is an implicit deny at the end of every ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 12:05:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969735#M918327</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-17T12:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969736#M918328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I deleted the deny rule. I think there must be some DNS configuration on PIX outside or inside interface where i should enter my isp DNS Server address. Don't you think so?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 13:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969736#M918328</guid>
      <dc:creator>cscisco_admin</dc:creator>
      <dc:date>2008-06-17T13:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969737#M918329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No the PIX does not need the DNS information. It just 'relays' the DNS packets/requests (after performing the configured security checks) from the users towards the DNS server on the internet, just like a router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jun 2008 13:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969737#M918329</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-17T13:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969738#M918330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I left configuring PIX for Internet access. The only thing i need is using PIX to protect my Terminal Server by allowing only Remote Desktop Access to my Terminal Server so that my users can use this server. Does PIX provide maximum security with its default config and how can i configure RDP access from internet to my Terminal Server through PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Jun 2008 08:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969738#M918330</guid>
      <dc:creator>cscisco_admin</dc:creator>
      <dc:date>2008-06-21T08:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969739#M918331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Technically speaking RDP is not a secure protocol, on Windows you can tunnel it inside 'HTTPS' (check advanced options for the terminal services client). But it needs some extra configuration. Simple RDP can be opened like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807d287e.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807d287e.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Jun 2008 09:08:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969739#M918331</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-21T09:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969740#M918332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What can be the other option since i don't have a fixed IP in one of our branches and they are connecting through a wireless internet that can't have fixed ip?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jun 2008 06:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969740#M918332</guid>
      <dc:creator>cscisco_admin</dc:creator>
      <dc:date>2008-06-22T06:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969741#M918333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The RDP server does not have a fixed IP or the client? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use dynamic DNS to get the IP of the remote host dynamically but the ASA/PIX do not support ACL filtering based on hostnames. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jun 2008 09:19:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969741#M918333</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-22T09:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969742#M918334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Definitely the clients do not have fixed ips. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any other way i can use PIX to secure my Terminal Server instead of using RDP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jun 2008 06:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969742#M918334</guid>
      <dc:creator>cscisco_admin</dc:creator>
      <dc:date>2008-06-23T06:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969743#M918335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Clients having a dynamic IP is not the issue here. It is the server!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already suggested RDP over HTTPs, please do a google search on that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jun 2008 07:57:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969743#M918335</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-23T07:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: Just Internet</title>
      <link>https://community.cisco.com/t5/network-security/just-internet/m-p/969744#M918336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok Thanks but i got two other problems. One is that Internet Access is open on my Terminal Server through PIX. I don't know how but by chance i checked it and it was opening all the websites. How can i block it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly, I have a Cisco 1841 Router in head office in which i have two IPs. One is public and one private 192.168.2.1. This router is controlled by my ISP and i don't have access to it. People coming from all other branches are able to connect to my Terminal Server 192.168.2.2 through PIX from the Public IP but people behind 192.168.2.1 are not able to connect to Terminal Server. Do i need to add something else for this network in my PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jun 2008 09:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/just-internet/m-p/969744#M918336</guid>
      <dc:creator>cscisco_admin</dc:creator>
      <dc:date>2008-06-23T09:12:37Z</dc:date>
    </item>
  </channel>
</rss>

