<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN on PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960471#M940934</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please respond asap.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Jun 2008 12:02:16 GMT</pubDate>
    <dc:creator>ray_stone</dc:creator>
    <dc:date>2008-06-06T12:02:16Z</dc:date>
    <item>
      <title>VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960464#M940922</link>
      <description>&lt;P&gt;Hi, We have configured Pix firewall on two sites and both are connected by Tunnel and everything is working fine and as well as we have configured remote vpn on both firewall and we have set the DHCP range of remote Vpn which is different of the inside network and configured exempt traffic between Vpn and Inside network in both firewall. But now I want that the Vpn client nodes access the other fireall inside network as well. Details are given below:-&lt;/P&gt;&lt;P&gt;1) First Firewall (India) Conf:-&lt;/P&gt;&lt;P&gt;Inside 192.168.12.0/24&lt;/P&gt;&lt;P&gt;Outside *.*.*.*&lt;/P&gt;&lt;P&gt;VPN DHCP Range 192.168.253.0\24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)Second Firewall conf:-&lt;/P&gt;&lt;P&gt;Inside 192.168.10.0/254&lt;/P&gt;&lt;P&gt;Outside :- ****&lt;/P&gt;&lt;P&gt;VPN DHCP Range 192.168.252.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now what configuration should I made so that the vpn client of ist firewall could able to access the other Firewall network. And is it possible on Pix 500 series or ASA Series. Thanks&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:18:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960464#M940922</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2019-03-11T12:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960465#M940926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can anyone reply??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Mar 2008 13:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960465#M940926</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-03-15T13:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960466#M940928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Definitely possible.  It's called hairpin.&lt;/P&gt;&lt;P&gt;you can do it with Pix or ASA  in version &lt;/P&gt;&lt;P&gt;7.x or higher.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCIE Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Mar 2008 13:04:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960466#M940928</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-03-16T13:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960467#M940930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;firstly make sure the tunnel is active between both firewalls and make sure both firewalls can ping each other inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;since your ipsec tunnel already exit between your PIX you only need to define the traffic you are interested in on your ipsec tunnel between your pix. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example, to allow the first firewall vpn clients (192.168.253.0/24) to access firewall 2 inside interface (192.168.10.0/24), you will need to  Defines interesting traffic that is protected by the IPSec tunnel &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on firewall 2:&lt;/P&gt;&lt;P&gt;1, Defines interesting traffic that is protected by the IPSec tunnel.&lt;/P&gt;&lt;P&gt;access-list 101 (use current acl applied to your currect ipsec policy)  permit ip 192.168.10.0 255.255.255.0 192.168.253.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2, Do not perform NAT for traffic to other PIX Firewall.&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip 192.168.10.0 255.255.255.0 192.168.253.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3, Tell the PIX not to NAT any traffic deemed interesting for IPSec.&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Might be a good idea to upload your pix vpn config so i can be more helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Franco. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Mar 2008 15:31:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960467#M940930</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2008-03-16T15:31:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960468#M940931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i suggest you use the PIX PDM to make changes instead if you are not familiar with the CLI. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Mar 2008 15:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960468#M940931</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2008-03-16T15:32:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960469#M940932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I went with the same above example but not able to access the Firewall 2 inside network as I am connecting to Firewall 1 by remote VPN. Now anyone give me the solution. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it required any access-list crypto setting?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The site to site tunnel is set with esp-des-md5 but when i connect to VPN and see the status then it shows the encryption 128 AES and authentication Hmac-sha1Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 10:57:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960469#M940932</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-06-06T10:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960470#M940933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, can anyone responds please... I have to resolve this issue on priority basis. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 11:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960470#M940933</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-06-06T11:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960471#M940934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please respond asap.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 12:02:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960471#M940934</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-06-06T12:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960472#M940935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ray,&lt;/P&gt;&lt;P&gt;   1) A very important detail, what you want to do is allowing traffic which enters outside interface to exit the same interface. (VPN client at outside interface enters interface and exits to VPN tunnel that is again connected to outside) This is called hairpinning or U-Turn. And the command which enables this is NOT! same-security-traffic permit inter-interface. It is intra-interface&lt;/P&gt;&lt;P&gt;   2)Exempt NAT statement should not be applied to inside interface. This traffic never enters inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;India&lt;/P&gt;&lt;P&gt;access-list outside_nat0_outbound permit ip 192.168.253.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_nat0_outbound outside&lt;/P&gt;&lt;P&gt;access-list Interestingtrafficacl permit ip 192.168.253.0 255.255.255.0 192.168.10.0&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second Firewall&lt;/P&gt;&lt;P&gt;access-list outside_nat0_outbound permit ip 192.168.252.0 255.255.255.0 192.168.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_nat0_outbound outside&lt;/P&gt;&lt;P&gt;access-list Interestingtrafficacl permit ip 192.168.252.0 255.255.255.0 192.168.12.0&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you post sanitized config of sites, I will do on-config corrections&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 12:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960472#M940935</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-06-06T12:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960473#M940936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I didn't able to understand following command:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 12:14:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960473#M940936</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-06-06T12:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960474#M940937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I explained, it will make you able to connect your VPN client which is terminated at outside interface of firewall1 over the tunnel to the remote VPN peer firewall2 which is also terminated at outside interface. Simply follow the commands I posted&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 12:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960474#M940937</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-06-06T12:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960475#M940938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, both FW configuration are attached and here I would like to provide the access of  VPN only on India FW and want to access other DMZ and Inside network of Rwanda FW. Please suggest which of the command has to be add and which of the commands has to be remove. Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 12:34:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960475#M940938</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-06-06T12:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960476#M940939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;India&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_nat0_outbound permit ip 192.168.13.0 255.255.255.0 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_nat0_outbound permit ip 192.168.13.0 255.255.255.0 192.168.51.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_nat0_outbound outside&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_2 extended permit ip 192.168.13.0 255.255.255.0 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_2 extended permit ip 192.168.13.0 255.255.255.0 192.168.51.0 255.255.255.0&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rwanda&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_1 extended permit ip 192.168.51.0 255.255.255.0 192.168.13.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_1 extended permit ip 192.168.50.0 255.255.255.0 192.168.13.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the above in their respective order&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 12:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960476#M940939</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-06-06T12:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960477#M940940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks everyone... The problem has been solved. I appreciate...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 13:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960477#M940940</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-06-06T13:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960478#M940941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are welcome &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 13:36:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960478#M940941</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-06-06T13:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960479#M940942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, how can i start the ping from Vpn to firewall rwanda network. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 13:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960479#M940942</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-06-06T13:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960480#M940943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After connecting VPN, when I try to ping the Rwanda Network then the ICMP request is getting blocked as I review in ASDM login details. Anyone suggest what should I do to open ICMP request. Thanks..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jun 2008 05:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960480#M940943</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-06-07T05:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: VPN on PIX</title>
      <link>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960481#M940944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ray,&lt;/P&gt;&lt;P&gt;  In both india and Rwanda, add the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;  class inspection_default&lt;/P&gt;&lt;P&gt;    inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jun 2008 12:30:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-on-pix/m-p/960481#M940944</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-06-07T12:30:10Z</dc:date>
    </item>
  </channel>
</rss>

