<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 501 simple setup  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082197#M961771</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;hostname catalystpix&lt;/P&gt;&lt;P&gt;domain-name catcomtec.com&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol pptp 47&lt;/P&gt;&lt;P&gt;fixup protocol pptp 1723&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;object-group service VPN tcp-udp&lt;/P&gt;&lt;P&gt;  port-object eq pim-auto-rp&lt;/P&gt;&lt;P&gt;  port-object eq echo&lt;/P&gt;&lt;P&gt;  port-object eq kerberos&lt;/P&gt;&lt;P&gt;  port-object eq discard&lt;/P&gt;&lt;P&gt;  port-object eq sunrpc&lt;/P&gt;&lt;P&gt;  port-object eq domain&lt;/P&gt;&lt;P&gt;  port-object eq tacacs&lt;/P&gt;&lt;P&gt;  port-object eq talk&lt;/P&gt;&lt;P&gt;object-group network VPN1&lt;/P&gt;&lt;P&gt;  description IP Addresses of VPN user&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network Everyone&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 216.12.74.100 eq pptp &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 216.12.74.100 eq netbios-ssn &lt;/P&gt;&lt;P&gt;access-list 101 permit udp any host 216.12.74.100 eq netbios-ns &lt;/P&gt;&lt;P&gt;access-list 101 permit udp any host 216.12.74.100 eq netbios-dgm &lt;/P&gt;&lt;P&gt;access-list 101 permit gre any host 216.12.74.100 &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any eq www any eq www &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip object-group Everyone object-group VPN1 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip any 192.168.0.128 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 206.248.243.98 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool VPN_POOL 192.168.0.130-192.168.0.145&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.30 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 216.178.39.13 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 208.65.153.253 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 216.178.39.13 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 208.65.153.253 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.128 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;pdm group VPN1 outside&lt;/P&gt;&lt;P&gt;pdm group Everyone inside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 206.248.243.97 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;aaa-server VPN protocol radius &lt;/P&gt;&lt;P&gt;aaa-server VPN (inside) host 192.168.0.30 catalyst timeout 15&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Dec 2008 19:12:47 GMT</pubDate>
    <dc:creator>cworsham80</dc:creator>
    <dc:date>2008-12-03T19:12:47Z</dc:date>
    <item>
      <title>PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082194#M961766</link>
      <description>&lt;P&gt;I am trying to setup my PIX 501e and i am having trouble. i'm trying to set it up as simple as possible. authentication to be done local on the PIX, just one user is fine. no AAA server. once in, i want to permit all ports for all traffic. i think i have it setup but i cant seem to log into it, is there anyone that can help me? I can post my show command if helpful. &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:08:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082194#M961766</guid>
      <dc:creator>cworsham80</dc:creator>
      <dc:date>2020-02-21T11:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082195#M961768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post the configuration along with information on how you are trying to log in. That is through telnet, SSH, console, VPN, etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 18:57:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082195#M961768</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2008-12-03T18:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082196#M961769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I currently have two ASA 5505's in place and to VPN into those i have been using the cisco VPN client 5.0.00.0340. I would love to be able to use this same client to log into my PIX network as well but not manditory, i can get the vpn client to connect to my PIX, it authenticates on the group level, prompts for user info, but just remains at contacting security gateway until it times out. I have been programming (or call myself programming) the PIX using the PDM with an old win 2000 box. hope this is what you were looking for. Any and all help is greatly appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 19:12:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082196#M961769</guid>
      <dc:creator>cworsham80</dc:creator>
      <dc:date>2008-12-03T19:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082197#M961771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;hostname catalystpix&lt;/P&gt;&lt;P&gt;domain-name catcomtec.com&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol pptp 47&lt;/P&gt;&lt;P&gt;fixup protocol pptp 1723&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;object-group service VPN tcp-udp&lt;/P&gt;&lt;P&gt;  port-object eq pim-auto-rp&lt;/P&gt;&lt;P&gt;  port-object eq echo&lt;/P&gt;&lt;P&gt;  port-object eq kerberos&lt;/P&gt;&lt;P&gt;  port-object eq discard&lt;/P&gt;&lt;P&gt;  port-object eq sunrpc&lt;/P&gt;&lt;P&gt;  port-object eq domain&lt;/P&gt;&lt;P&gt;  port-object eq tacacs&lt;/P&gt;&lt;P&gt;  port-object eq talk&lt;/P&gt;&lt;P&gt;object-group network VPN1&lt;/P&gt;&lt;P&gt;  description IP Addresses of VPN user&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network Everyone&lt;/P&gt;&lt;P&gt;  network-object 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 216.12.74.100 eq pptp &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 216.12.74.100 eq netbios-ssn &lt;/P&gt;&lt;P&gt;access-list 101 permit udp any host 216.12.74.100 eq netbios-ns &lt;/P&gt;&lt;P&gt;access-list 101 permit udp any host 216.12.74.100 eq netbios-dgm &lt;/P&gt;&lt;P&gt;access-list 101 permit gre any host 216.12.74.100 &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any eq www any eq www &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip object-group Everyone object-group VPN1 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip any 192.168.0.128 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 206.248.243.98 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool VPN_POOL 192.168.0.130-192.168.0.145&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.30 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 216.178.39.13 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 208.65.153.253 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 216.178.39.13 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 208.65.153.253 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.128 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;pdm group VPN1 outside&lt;/P&gt;&lt;P&gt;pdm group Everyone inside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 206.248.243.97 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;aaa-server VPN protocol radius &lt;/P&gt;&lt;P&gt;aaa-server VPN (inside) host 192.168.0.30 catalyst timeout 15&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 19:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082197#M961771</guid>
      <dc:creator>cworsham80</dc:creator>
      <dc:date>2008-12-03T19:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082198#M961772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;sysopt connection permit-pptp&lt;/P&gt;&lt;P&gt;sysopt connection permit-l2tp&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 1 set transform-set ESP-AES-256-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 21 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map client authentication VPN&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto map inside_map client authentication VPN&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup demo address-pool VPN_POOL&lt;/P&gt;&lt;P&gt;vpngroup demo idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup demo password ********&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;vpdn group catalyst_vpn accept dialin pptp&lt;/P&gt;&lt;P&gt;vpdn group catalyst_vpn ppp authentication pap&lt;/P&gt;&lt;P&gt;vpdn group catalyst_vpn client configuration address local VPN_POOL&lt;/P&gt;&lt;P&gt;vpdn group catalyst_vpn pptp echo 60&lt;/P&gt;&lt;P&gt;vpdn group catalyst_vpn client authentication local&lt;/P&gt;&lt;P&gt;vpdn username test password ********* &lt;/P&gt;&lt;P&gt;vpdn username demo password ********* &lt;/P&gt;&lt;P&gt;vpdn enable outside&lt;/P&gt;&lt;P&gt;vpdn enable inside&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.0.40-192.168.0.90 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 206.x.x.97 209.145.84.131&lt;/P&gt;&lt;P&gt;dhcpd lease 604800&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain catcomtec1.com&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;username demo password xxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 19:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082198#M961772</guid>
      <dc:creator>cworsham80</dc:creator>
      <dc:date>2008-12-03T19:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082199#M961773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup demo address-pool VPN_POOL&lt;/P&gt;&lt;P&gt;vpngroup demo idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup demo password ******** &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using the above vpngroup, that is Group - demo and password - *****  and VPN Client 5.0, then you should not be prompted for a username/password since there is no user authentication configured. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you enable "isakmp identity address" on the Pix and try connecting using the VPN Client 5.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still having issues, can you post the outputs of "deb cry is" and "deb cry ips" from the pix and logs from the VPN Client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Pls rate if it helps*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 19:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082199#M961773</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2008-12-03T19:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082200#M961775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I appreciate your willingness to work with me on this, just not getting very far. i put in the three commands you requested into the PIX and the only feedback that i got was "this command has been sent to the firewall" for each of the entries. I am also pasting what i have in the logs window of my client, which i'm afraid isn't much. its just not making good sense to me. am i making this harder than it has to be? I would like to be able to use the client with the group authentication, user and password both "demo" no further prompts would be nice. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Systems VPN Client Version 5.0.00.0340&lt;/P&gt;&lt;P&gt;Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.&lt;/P&gt;&lt;P&gt;Client Type(s): Windows, WinNT&lt;/P&gt;&lt;P&gt;Running on: 5.1.2600 Service Pack 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 20:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082200#M961775</guid>
      <dc:creator>cworsham80</dc:creator>
      <dc:date>2008-12-03T20:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082201#M961777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you remove the below command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map client authentication VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and configure this one and test the connection again. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map client authentication LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Pls rate if it helps*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 20:41:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082201#M961777</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2008-12-03T20:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082202#M961778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that helped a lot, it will now let me connect from my pc behind the ASA out to the internet then into the PIX i get authenticated there and get the local ip address of 192.168.0.130 which is the beginning of my ip pool. so far so good. behind the pix i have a machine sitting at 192.168.0.15.  I cannot ping from my .130 address to the .15 address. how can i open up the doors so that i am seen as being local to the .15 box?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 21:02:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082202#M961778</guid>
      <dc:creator>cworsham80</dc:creator>
      <dc:date>2008-12-03T21:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082203#M961779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the update and rating. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont see anything obvious that will block traffic between the VPN Client and the subnet behind the Pix. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the 192.168.0.15 a valid host on the network. Can you ping this ip address from the Pix itself. Also, what is the default gateway of this host. And, can you try pinging a different ip address via the vpn client and see if it works. Maybe 192.168.0.40 address, the first one in your DHCP Pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if everything looks good, try doing a "clear xlate" and then try the connectivity again through the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Pls rate if it helps*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 21:14:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082203#M961779</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2008-12-03T21:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 simple setup</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082204#M961780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the machine behind the pix (formerly .15) i have now made DHCP and it was assigned 192.168.0.40 from the PIX. my outside connection coming in is still 192.168.0.130.  from the 192.168.0.130, once connected I can ping the outside address of the pix (206.248.243.98) but cannot ping the inside address (192.168.0.1) nor can i ping the machine behind the pix (192.168.0.40)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from the .40 machine, i can ping 192.168.0.1 (inside of pix) but not outside or the .130 address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from the pix ping command, i can ping 192.168.0.40 but not 192.168.0.130, even though i can go into the monitor feature of the PDM and see there is one tunnel in place. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;am i running into something stupid because the machine that is getting a vpn address of 192.168.0.130 has a local address behind the ASA of 192.168.0.52.  All subnets for all 192 addresses are using 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 21:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-simple-setup/m-p/1082204#M961780</guid>
      <dc:creator>cworsham80</dc:creator>
      <dc:date>2008-12-03T21:36:58Z</dc:date>
    </item>
  </channel>
</rss>

