<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL on Pix7 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-on-pix7/m-p/906603#M958600</link>
    <description>&lt;P&gt;hi everybody,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does anyone see what's wrong with the acl? although udp 500 is allowed, the pix blocks the traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;net1 - pix1 - router - pix2 - net2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%PIX-7-710005: UDP request discarded from 10.4.1.1/1024 to outside:10.2.1.1/500&lt;/P&gt;&lt;P&gt;%PIX-7-710005: UDP request discarded from 10.4.1.1/1024 to outside:10.2.1.1/500&lt;/P&gt;&lt;P&gt;%PIX-7-710005: UDP request discarded from 10.4.1.1/1024 to outside:10.2.1.1/500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix-1(config)# sal&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE; 7 elements&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 1 extended permit udp host 10.4.1.1 host 10.2.1.1 eq isakmp log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 2 extended permit esp host 10.4.1.1 host 10.2.1.1 log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 3 extended permit ah host 10.4.1.1 host 10.2.1.1 log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 4 extended permit ah host pix2 host 10.2.1.1 log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 5 extended permit esp host pix2 host 10.2.1.1 log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 6 extended permit udp host pix2 host 10.2.1.1 eq isakmp log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 7 extended deny ip any any log debugging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list BLOCK_INSIDE; 2 elements&lt;/P&gt;&lt;P&gt;access-list BLOCK_INSIDE line 1 extended permit tcp host A host B eq telnet log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_INSIDE line 2 extended deny ip any any log debugging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix-1(config)# siib&lt;/P&gt;&lt;P&gt;Interface                  IP-Address      OK? Method Status                Protocol&lt;/P&gt;&lt;P&gt;Ethernet0                  10.1.1.2        YES CONFIG up                    up&lt;/P&gt;&lt;P&gt;Ethernet1                  10.2.1.1        YES CONFIG up                    up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix-1(config)# sn&lt;/P&gt;&lt;P&gt;Interface                Name                     Security&lt;/P&gt;&lt;P&gt;Ethernet0                inside                   100&lt;/P&gt;&lt;P&gt;Ethernet1                outside                    0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix-1(config)# sag&lt;/P&gt;&lt;P&gt;access-group BLOCK_INSIDE in interface inside&lt;/P&gt;&lt;P&gt;access-group BLOCK_OUTSIDE in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tia&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tom&lt;/P&gt;</description>
    <pubDate>Wed, 13 Mar 2019 00:51:19 GMT</pubDate>
    <dc:creator>i.anfrage</dc:creator>
    <dc:date>2019-03-13T00:51:19Z</dc:date>
    <item>
      <title>ACL on Pix7</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-pix7/m-p/906603#M958600</link>
      <description>&lt;P&gt;hi everybody,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does anyone see what's wrong with the acl? although udp 500 is allowed, the pix blocks the traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;net1 - pix1 - router - pix2 - net2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%PIX-7-710005: UDP request discarded from 10.4.1.1/1024 to outside:10.2.1.1/500&lt;/P&gt;&lt;P&gt;%PIX-7-710005: UDP request discarded from 10.4.1.1/1024 to outside:10.2.1.1/500&lt;/P&gt;&lt;P&gt;%PIX-7-710005: UDP request discarded from 10.4.1.1/1024 to outside:10.2.1.1/500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix-1(config)# sal&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE; 7 elements&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 1 extended permit udp host 10.4.1.1 host 10.2.1.1 eq isakmp log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 2 extended permit esp host 10.4.1.1 host 10.2.1.1 log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 3 extended permit ah host 10.4.1.1 host 10.2.1.1 log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 4 extended permit ah host pix2 host 10.2.1.1 log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 5 extended permit esp host pix2 host 10.2.1.1 log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 6 extended permit udp host pix2 host 10.2.1.1 eq isakmp log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_OUTSIDE line 7 extended deny ip any any log debugging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list BLOCK_INSIDE; 2 elements&lt;/P&gt;&lt;P&gt;access-list BLOCK_INSIDE line 1 extended permit tcp host A host B eq telnet log debugging&lt;/P&gt;&lt;P&gt;access-list BLOCK_INSIDE line 2 extended deny ip any any log debugging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix-1(config)# siib&lt;/P&gt;&lt;P&gt;Interface                  IP-Address      OK? Method Status                Protocol&lt;/P&gt;&lt;P&gt;Ethernet0                  10.1.1.2        YES CONFIG up                    up&lt;/P&gt;&lt;P&gt;Ethernet1                  10.2.1.1        YES CONFIG up                    up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix-1(config)# sn&lt;/P&gt;&lt;P&gt;Interface                Name                     Security&lt;/P&gt;&lt;P&gt;Ethernet0                inside                   100&lt;/P&gt;&lt;P&gt;Ethernet1                outside                    0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix-1(config)# sag&lt;/P&gt;&lt;P&gt;access-group BLOCK_INSIDE in interface inside&lt;/P&gt;&lt;P&gt;access-group BLOCK_OUTSIDE in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tia&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tom&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:51:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-pix7/m-p/906603#M958600</guid>
      <dc:creator>i.anfrage</dc:creator>
      <dc:date>2019-03-13T00:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on Pix7</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-pix7/m-p/906604#M958601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what device does the address 10.2.1.1 belong to?&lt;/P&gt;&lt;P&gt;is that the inside interface of the pix?&lt;/P&gt;&lt;P&gt;if so, you need to terminate the vpn on the outside interface, and in which case you don't need your acl entries allowing udp/esp/ah to 10.2.1.1 (which should actually be 10.1.1.2 i believe).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Dec 2007 13:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-pix7/m-p/906604#M958601</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-12-16T13:40:35Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on Pix7</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-pix7/m-p/906605#M958602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pix-1(config)# siib&lt;/P&gt;&lt;P&gt;Interface                  IP-Address      OK? Method Status                Protocol&lt;/P&gt;&lt;P&gt;Ethernet0                  10.1.1.2        YES CONFIG up                    up&lt;/P&gt;&lt;P&gt;Ethernet1                  10.2.1.1        YES CONFIG up                    up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix-1(config)# sn&lt;/P&gt;&lt;P&gt;Interface                Name                     Security&lt;/P&gt;&lt;P&gt;Ethernet0                inside                   100&lt;/P&gt;&lt;P&gt;Ethernet1                outside                    0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix-1(config)# sag&lt;/P&gt;&lt;P&gt;access-group BLOCK_INSIDE in interface inside&lt;/P&gt;&lt;P&gt;access-group BLOCK_OUTSIDE in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it's the outside interface of pix1. &lt;/P&gt;&lt;P&gt;i sure need the acl entries allowing that traffic, cause i 've got a "blocking all ip traffic inside" entry on the inside an the outside interface. i don't want any traffic to be allowed except i allow it explicit. the default is to allow trafic from higher security-level to lower security-level. but i prefer the "checkpoint-default": everything is blocked unless you allow it by a rule.&lt;/P&gt;&lt;P&gt;i hope it's a little bit clearer now. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Dec 2007 13:57:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-pix7/m-p/906605#M958602</guid>
      <dc:creator>i.anfrage</dc:creator>
      <dc:date>2007-12-16T13:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on Pix7</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-pix7/m-p/906606#M958604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are terminating a VPN on the outside of the PIX, you'll need to enable ISAKMP on the outside interface as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow UDP/500 to the outside without it having to be specified in the ACL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Dec 2007 16:54:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-pix7/m-p/906606#M958604</guid>
      <dc:creator>john.dowson</dc:creator>
      <dc:date>2007-12-16T16:54:20Z</dc:date>
    </item>
  </channel>
</rss>

