<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pass IPSec through PIX 506 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pass-ipsec-through-pix-506/m-p/940268#M937794</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;both side can initiate traffics without any &lt;/P&gt;&lt;P&gt;issues.  This is because your DMZ has higher&lt;/P&gt;&lt;P&gt;priority than the "outside" interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 May 2008 13:51:35 GMT</pubDate>
    <dc:creator>cisco24x7</dc:creator>
    <dc:date>2008-05-14T13:51:35Z</dc:date>
    <item>
      <title>Pass IPSec through PIX 506</title>
      <link>https://community.cisco.com/t5/network-security/pass-ipsec-through-pix-506/m-p/940265#M937791</link>
      <description>&lt;P&gt;Hope this is the right spot...I've done searches and foud posts that are close, but no solution that has worked for me....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Summary: My firewall is a PIX 506E. The other company is using Cisco routers on both ends to maintain the VPN. I have no access to their equipment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Issue&lt;/P&gt;&lt;P&gt;I have a vendor that has put a Cisco VPN device behind my firewall. They originally told me to make sure I could ping 4 IP addresses (they supplied) and all would be fine. I was able to setup my firewall to allow the pinging to the internet. However, now they say I am reaching their end of the VPN, but my firewall is blocking IPSec. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do I need to do so I can allow this traffic to pass through my PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any help.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pass-ipsec-through-pix-506/m-p/940265#M937791</guid>
      <dc:creator>jcorirossi</dc:creator>
      <dc:date>2019-03-11T12:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: Pass IPSec through PIX 506</title>
      <link>https://community.cisco.com/t5/network-security/pass-ipsec-through-pix-506/m-p/940266#M937792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is how I would do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Your pix 506E only has two physical interface, e0 and e1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- create a DMZ on your Pix506E via 802.1q and assign public&lt;/P&gt;&lt;P&gt;Ip address on the DMZ interface. For example, 1.1.1.1/30 will be&lt;/P&gt;&lt;P&gt;the ip address of the DMZ and you assign the Cisco VPN device with an&lt;/P&gt;&lt;P&gt;IP address of 1.1.1.2/30,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3- create another DMZ1 on your Pix506E with 802.1q and&lt;/P&gt;&lt;P&gt;assign an IP address 10.1.1.1/30 and give the Cisco vpn Device &lt;/P&gt;&lt;P&gt;internal ip address of 10.1.1.2/30.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4- static (dmz,outside) 1.1.1.2 1.1.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5- access-list External permit udp 4-IP_address host 1.1.1.2 eq 500 log&lt;/P&gt;&lt;P&gt;   access-list External permit esp 4-ip-address host 1.1.1.2 log&lt;/P&gt;&lt;P&gt;   access-list External permit udp 4-ip-address host 1.1.1.2 eq 4500 log&lt;/P&gt;&lt;P&gt;   access-group External in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That way, you will protect your internal network from virus traversing&lt;/P&gt;&lt;P&gt;the VPN.  This is classic design called sandwiching your VPN device&lt;/P&gt;&lt;P&gt;between the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCIE Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2008 01:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pass-ipsec-through-pix-506/m-p/940266#M937792</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-05-14T01:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: Pass IPSec through PIX 506</title>
      <link>https://community.cisco.com/t5/network-security/pass-ipsec-through-pix-506/m-p/940267#M937793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For this solution to work, does it matter that the VPN device on my end is the one starting the connection? The VPN is established by certain traffic on my side going to the specific host.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2008 13:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pass-ipsec-through-pix-506/m-p/940267#M937793</guid>
      <dc:creator>jcorirossi</dc:creator>
      <dc:date>2008-05-14T13:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: Pass IPSec through PIX 506</title>
      <link>https://community.cisco.com/t5/network-security/pass-ipsec-through-pix-506/m-p/940268#M937794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;both side can initiate traffics without any &lt;/P&gt;&lt;P&gt;issues.  This is because your DMZ has higher&lt;/P&gt;&lt;P&gt;priority than the "outside" interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2008 13:51:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pass-ipsec-through-pix-506/m-p/940268#M937794</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-05-14T13:51:35Z</dc:date>
    </item>
  </channel>
</rss>

