<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: from inside to inside in a pix515e in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839284#M950715</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So what I have figured out is this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the same-security commands allows anyone on the same lan as the address that gets NAT'ed to get to the NAT'd address.  Anyone not on that LAN cannot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User A 10.7.7.20&lt;/P&gt;&lt;P&gt;Server 10.7.7.10=204.50.200.1=site.intweb.com&lt;/P&gt;&lt;P&gt;User B 10.6.6.20 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User A can now get to &lt;A class="jive-link-custom" href="http://site.intweb.com" target="_blank"&gt;http://site.intweb.com&lt;/A&gt; but user B cannot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone know what can be done here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 Jan 2008 23:15:28 GMT</pubDate>
    <dc:creator>vanagon2tdi</dc:creator>
    <dc:date>2008-01-14T23:15:28Z</dc:date>
    <item>
      <title>from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839280#M950711</link>
      <description>&lt;P&gt;hi all i'm experiencing problem in a pix515e &lt;/P&gt;&lt;P&gt;client on inside are natted with a pool of public addresses on outside interface and all works fine but if i try to access inside client with their public address fron another client in inside network with his different pubblic address doesn't work ... idem from dmz to inside ... otherwise from inside to dmz all works fine ... from outside i can access anything &lt;/P&gt;&lt;P&gt;is there any special command to make this ?&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839280#M950711</guid>
      <dc:creator>roberto.costantini</dc:creator>
      <dc:date>2019-03-11T11:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839281#M950712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I understand your question correctly, you want IP traffic to enter the Pix and then exit it using the same interface right?  If so then the command 'same-security-traffic permit intra-interface' may solve your problem.  This command permits communication in and out of the same interface, which is not enabled by default. The only caveat would be that the code must be at least at v7.0x as I don't believe this command existed in the v6.3(5) and previous code.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2008 20:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839281#M950712</guid>
      <dc:creator>1cmerchant</dc:creator>
      <dc:date>2008-01-14T20:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839282#M950713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank for your response ...&lt;/P&gt;&lt;P&gt;i've tried &lt;/P&gt;&lt;P&gt;pixfirewall(config)# same-security-traffic permit ?               &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;  inter-interface  Permit communication between different interfaces with the&lt;/P&gt;&lt;P&gt;                   same security level &lt;/P&gt;&lt;P&gt;  intra-interface  Permit communication between VPN peers connected to the same&lt;/P&gt;&lt;P&gt;                   interface&lt;/P&gt;&lt;P&gt;pixfirewall(config)# same-security-traffic permit in&lt;/P&gt;&lt;P&gt;pixfirewall(config)# same-security-traffic permit inte&lt;/P&gt;&lt;P&gt;pixfirewall(config)# same-security-traffic permit inter-interface &lt;/P&gt;&lt;P&gt;pixfirewall(config)# same-security-traffic permit intra           &lt;/P&gt;&lt;P&gt;pixfirewall(config)# same-security-traffic permit intra-interface &lt;/P&gt;&lt;P&gt;pixfirewall(config)# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but it doesn't work enough ! &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2008 20:25:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839282#M950713</guid>
      <dc:creator>roberto.costantini</dc:creator>
      <dc:date>2008-01-14T20:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839283#M950714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry this does not help your post, but I have the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal client trying to get to internal server via host name.  The host name gets translated to the public address so it does not work.  AHHHHH!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone find any more on this?&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2008 22:17:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839283#M950714</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2008-01-14T22:17:54Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839284#M950715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So what I have figured out is this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the same-security commands allows anyone on the same lan as the address that gets NAT'ed to get to the NAT'd address.  Anyone not on that LAN cannot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User A 10.7.7.20&lt;/P&gt;&lt;P&gt;Server 10.7.7.10=204.50.200.1=site.intweb.com&lt;/P&gt;&lt;P&gt;User B 10.6.6.20 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User A can now get to &lt;A class="jive-link-custom" href="http://site.intweb.com" target="_blank"&gt;http://site.intweb.com&lt;/A&gt; but user B cannot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone know what can be done here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2008 23:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839284#M950715</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2008-01-14T23:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839285#M950716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;maybe a bug in cisco ios ? &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2008 12:27:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839285#M950716</guid>
      <dc:creator>roberto.costantini</dc:creator>
      <dc:date>2008-01-15T12:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839286#M950717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm having the same problem running 7.0(2) on a PIX 515e.  I have a second routed network inside my LAN.  The PIX inside interface is the default gateway for the network.  When a device on the routed network - 192.168.1.x - tries to access servers on the LAN - 192.168.50.x, the PIX drops the packets.  I see it in the logs.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried the same-interface commands but no good.  Anyone found anything yet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2008 22:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839286#M950717</guid>
      <dc:creator>brian.wilson</dc:creator>
      <dc:date>2008-01-22T22:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839287#M950718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Only PIX v7.2 or later supports "hairpinning" for unencrypted traffic,also you probably have to do NAT on the Inside interface. I just drew a diagram and wrote some code, but don't have PIX/ASA to test it, anybody could test the code,please post the result.&lt;/P&gt;&lt;P&gt;If it helps, please rate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 03:47:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839287#M950718</guid>
      <dc:creator>pengfang</dc:creator>
      <dc:date>2008-01-23T03:47:40Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839288#M950719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the help.  I had everything except the version.  I'll upgrade and that should do it.  Thanks again for the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 14:38:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839288#M950719</guid>
      <dc:creator>brian.wilson</dc:creator>
      <dc:date>2008-01-23T14:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839289#M950720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have two PIX's running in fail over mode with the below config and I still cannot get the hair pinning to work.&lt;/P&gt;&lt;P&gt;Again this is what I am trying to accomplish:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User A 10.7.7.20&lt;/P&gt;&lt;P&gt;Server 10.7.7.27=204.50.200.51=site.intweb.com&lt;/P&gt;&lt;P&gt;User B 10.7.4.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User A can now get to &lt;A class="jive-link-custom" href="http://site.intweb.com" target="_blank"&gt;http://site.intweb.com&lt;/A&gt; but user B cannot.  User B cannot even ping the public address 204.50.200.51?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX-01# sh ver&lt;/P&gt;&lt;P&gt;Cisco PIX Security Appliance Software Version 7.2(3) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 204.50.200.250 255.255.255.248 standby 204.50.200.251 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 4.0.4.4 255.255.255.0 standby 4.0.4.5 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any host 204.50.200.51 &lt;/P&gt;&lt;P&gt;static (inside,Outside) 204.50.200.51 10.7.7.27 netmask 255.255.255.255 dns      &lt;/P&gt;&lt;P&gt;global (Outside) 10 interface&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 30 10.7.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;route inside 10.7.4.0 255.255.255.252 4.0.4.1 1             &lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I missing anything?&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 17:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839289#M950720</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2008-01-23T17:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839290#M950721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What happens when you remove - nat (inside) 30 10.7.4.0 255.255.255.0?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no matching global statement and the nat 30 line is more specific than the nat 10 line.  Doesn't the NAT statement that is more specific apply?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do the logs say when you try this?  Does it say no matching translation?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 18:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839290#M950721</guid>
      <dc:creator>brian.wilson</dc:creator>
      <dc:date>2008-01-23T18:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839291#M950722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No difference if I take it off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What debugs should I run to watch the NAT translation?  Keep in mind this is a live system.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 18:19:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839291#M950722</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2008-01-23T18:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839292#M950723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Being a production system, I wouldn't use debug unless it came to that, and then only out-of-hours.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could set buffer logging to warn - &lt;/P&gt;&lt;P&gt;logging buffered warnings&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then use - &lt;/P&gt;&lt;P&gt;sho logg | inc "ip address of bad box"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to see entries for your specific box only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to see that my routed network wasn't getting nat'ed at one point because it was logging something about no translation available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also used this to see that it was eating the traffic going in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that doesn't give enough info set buffer logging to debug and use the same filtered search of the logs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 18:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839292#M950723</guid>
      <dc:creator>brian.wilson</dc:creator>
      <dc:date>2008-01-23T18:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839293#M950724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok so when I do the debug it shows the packets from 10.7.4.1 trying to get to 204.50.209.51, BUT when 10.7.4.1 tries to hit that address it actually goes out the firewall.  It is being translated to 204.50.200.250 which is the public  that all the others on our network use.  If I put in this command:&lt;/P&gt;&lt;P&gt;nat (inside) 20 10.7.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;which means 10.7.4.1 will be translated to 204.50.200.27 the same as anyone on the 10.7.7.0 network or the same as the web server I am trying to get to (10.7.7.27) then it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So basically what we are saying here is that if you use the outside address of your FW as the PAT address for everyone, then you cannot do hairpinning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sense?  Comments?&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 19:17:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839293#M950724</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2008-01-23T19:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839294#M950725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dave,&lt;/P&gt;&lt;P&gt;This is a little bit interesting, so why user A can access Server,it should have same behavior with user B (only difference is source IP),right? when u saying &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User A 10.7.7.20&lt;/P&gt;&lt;P&gt;Server 10.7.7.27=204.50.200.51=site.intweb.com&lt;/P&gt;&lt;P&gt;User B 10.7.4.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User A can now get to &lt;A class="jive-link-custom" href="http://site.intweb.com" target="_blank"&gt;http://site.intweb.com&lt;/A&gt; but user B cannot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Did u put " global (inside) 10 interface " when user A can get to &lt;A class="jive-link-custom" href="http://site.intweb.com" target="_blank"&gt;http://site.intweb.com&lt;/A&gt; ?&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;2. If not, that means firewall doesn't do NAT at Inside interface. Can you do the same debug for User A to see if it been PATted to 204.50.200.250 ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 19:42:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839294#M950725</guid>
      <dc:creator>pengfang</dc:creator>
      <dc:date>2008-01-23T19:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839295#M950726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah sorry my response was a mouthful and hard to understand.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User A is setup to go out as 204.50.200.27&lt;/P&gt;&lt;P&gt;User B is setup to go out as 204.50.200.250 which is also the IP of the Outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (Outside) 10 interface&lt;/P&gt;&lt;P&gt;global (Outside) 20 204.50.200.227 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 20 10.7.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this config user B cannot get to &lt;A class="jive-link-custom" href="http://site.intweb.com" target="_blank"&gt;http://site.intweb.com&lt;/A&gt; but A can.  This is because he is not going out as the Outside interface of the PIX.&lt;/P&gt;&lt;P&gt;So if I add in this command:&lt;/P&gt;&lt;P&gt;nat (inside) 20 10.7.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;then it works from the 10.7.4.0 LAN as his new public (nat) is 204.50.200.27&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I think the hairpinning will not work when you are nat'd to the IP of the Outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer question 2. the user A is translated to 204.50.200.27.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 19:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839295#M950726</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2008-01-23T19:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839296#M950727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I have confirmed that if the users are going out as the public IP of the Outside interface or the PIX then the same-security-traffic permit intra-interface or hair pinning will not work.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I changed all the users to go out with a different IP than the Outside interface everyone  internal can access the web page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps someone else!&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 20:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839296#M950727</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2008-01-23T20:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839297#M950728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is great, in this case , I think "global (inside) 10 interface" is not functioning, if you remove this code, you should get same result.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 20:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839297#M950728</guid>
      <dc:creator>pengfang</dc:creator>
      <dc:date>2008-01-23T20:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839298#M950729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep removed that line as it is not doing anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 20:52:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839298#M950729</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2008-01-23T20:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: from inside to inside in a pix515e</title>
      <link>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839299#M950730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi all, i've upgraded the ios in my pix but i can't arrive to the public natted address from inside interface ...&lt;/P&gt;&lt;P&gt;i've set same-security-traffic permit intra-interface command. &lt;/P&gt;&lt;P&gt;some ideas ? &lt;/P&gt;&lt;P&gt;this is my ver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall# show version &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco PIX Security Appliance Software Version 8.0(2) &lt;/P&gt;&lt;P&gt;Device Manager Version 6.0(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2008 05:02:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/from-inside-to-inside-in-a-pix515e/m-p/839299#M950730</guid>
      <dc:creator>roberto.costantini</dc:creator>
      <dc:date>2008-04-11T05:02:43Z</dc:date>
    </item>
  </channel>
</rss>

