<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall Services Module blocking traffic when it should be  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863288#M974066</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are you trying to ping on the inside network. You will need to setup static translations for the machines on the inside of the FWSM eg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you want to ping 10.1.0.20 from the 3750&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.0.20 10.1.0.20 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and you need to do this for all servers on the inside or for testing you can just present the entire network &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.0.0 10.1.0.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course this will now conflict with &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.113.59 &lt;/P&gt;&lt;P&gt;nat (inside) 1 10.1.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you need to initiate connections from outside to inside then you cannot use dynamic PAT like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 02 Oct 2007 19:57:06 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2007-10-02T19:57:06Z</dc:date>
    <item>
      <title>Firewall Services Module blocking traffic when it should be allowed</title>
      <link>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863287#M974065</link>
      <description>&lt;P&gt;Hi all, Im trying to set up a 6509 with a FWSM and am having some trouble. I have most of the config set up and working, I can ping from inside of the 6509 to a cisco 3750 that is connected on the outside with a L3 SVI with ip 192.168.113.10(represents real IPs) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Outside interface on fwsm is 192.168.113.8, inside interface is 10.1.0.10. Sup720 L3 SVI 10.1.0.11. Both 10.x.x.x ips are on vlan10, the 192.168.x.x ips are on vlan113. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that the 3750 with ip 192.168.113.10 cannot ping anything past 192.168.113.8. It is my understanding that my access lists should allow everything thru for testing purposes and I will lock it down more once I have it figured out. I have posted the fwsm config to help with any questions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;======FWSM config=======&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;FWSM Version 2.3(4)&lt;/P&gt;&lt;P&gt;nameif vlan113 outside security0&lt;/P&gt;&lt;P&gt;nameif vlan10 inside security100&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;hostname FWSM&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 H225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;no fixup protocol icmp&lt;/P&gt;&lt;P&gt;fixup protocol icmp error&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;no fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list deny-flow-max 4096&lt;/P&gt;&lt;P&gt;access-list alert-interval 300&lt;/P&gt;&lt;P&gt;access-list in_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list in_out extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list out_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list out_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list test extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list test extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 22&lt;/P&gt;&lt;P&gt;logging buffer-size 4096&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 192.168.113.8 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 10.1.0.10 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover lan unit secondary&lt;/P&gt;&lt;P&gt;failover polltime unit 1 holdtime 15&lt;/P&gt;&lt;P&gt;failover polltime interface 15&lt;/P&gt;&lt;P&gt;failover interface-policy 50%&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;no pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.113.57&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.113.58&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.113.59&lt;/P&gt;&lt;P&gt;nat (outside) 0 192.168.113.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 192.168.113.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-group test in interface outside&lt;/P&gt;&lt;P&gt;access-group test out interface outside&lt;/P&gt;&lt;P&gt;access-group test in interface inside&lt;/P&gt;&lt;P&gt;access-group test out interface inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.113.10 1&lt;/P&gt;&lt;P&gt;route inside 10.1.0.0 255.255.0.0 10.1.0.11 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 rpc 0:10:00 h3&lt;/P&gt;&lt;P&gt;23 0:05:00 h225 1:00:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;fragment size 200 outside&lt;/P&gt;&lt;P&gt;fragment chain 24 outside&lt;/P&gt;&lt;P&gt;fragment size 200 inside&lt;/P&gt;&lt;P&gt;fragment chain 24 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum: xxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;===Relevant Sup720 configs====&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall module 2 vlan-group 2&lt;/P&gt;&lt;P&gt;firewall vlan-group 2  10,113&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;&lt;P&gt; switchport&lt;/P&gt;&lt;P&gt; switchport access vlan 113&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;/P&gt;&lt;P&gt; switchport&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; ip address 10.1.0.11 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.1.0.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863287#M974065</guid>
      <dc:creator>amadeusri</dc:creator>
      <dc:date>2019-03-11T11:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Services Module blocking traffic when it should be</title>
      <link>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863288#M974066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are you trying to ping on the inside network. You will need to setup static translations for the machines on the inside of the FWSM eg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you want to ping 10.1.0.20 from the 3750&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.0.20 10.1.0.20 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and you need to do this for all servers on the inside or for testing you can just present the entire network &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.0.0 10.1.0.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course this will now conflict with &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.113.59 &lt;/P&gt;&lt;P&gt;nat (inside) 1 10.1.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you need to initiate connections from outside to inside then you cannot use dynamic PAT like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2007 19:57:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863288#M974066</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-10-02T19:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Services Module blocking traffic when it should be</title>
      <link>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863289#M974067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a workstation sitting on the inside network with ip address 10.1.0.50. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to have NAT setup so that the internal computers can access outside networks but also be reachable from the outside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What Im saying is I dont want to have static routes set up for all the computers and I dont want the 'global' static route for ALL computers with the ip 10.1.x.x since it will not NAT if I do that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2007 20:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863289#M974067</guid>
      <dc:creator>amadeusri</dc:creator>
      <dc:date>2007-10-02T20:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Services Module blocking traffic when it should be</title>
      <link>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863290#M974068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Is there a way to have NAT setup so that the internal computers can access outside networks but also be reachable from the outside?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to initiate connections from the outside to your internal machines you have 2 options&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Setup static translations for them&lt;/P&gt;&lt;P&gt;2) Turn off NAT, but then the inside addresses must be routable from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem you face is that you Dynamically NAT all your 10.1.0.x address to one outside address. This is fine for connections initiated from the inside but if you wanted to inititate a connection to 10.1.0.50 from outside, in your current setup you would have to connect to the 192.168.113.59 address. But how would the firewall know which 10.1.0.x address this was meant to be going to ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your inside machines are routable from outside then as i say either turn off NAT or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.0.0 10.1.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2007 05:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863290#M974068</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-10-03T05:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Services Module blocking traffic when it should be</title>
      <link>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863291#M974069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, thats what I thought was going to be the problem. The 192.x.x.x addresses actually represent public addresses on the network where I work, we are trying to do a network migration to private addresses (10.1.x.x.) but would need to still be reachable for about a week. Im thinking the only way to do this is move all physical connections to the 6509 in one day and then start changing addresses, since everything will be behind the firewall there would be no problems with connectivity, Im assuming. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the help, its truely appreciated&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2007 12:39:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-services-module-blocking-traffic-when-it-should-be/m-p/863291#M974069</guid>
      <dc:creator>amadeusri</dc:creator>
      <dc:date>2007-10-03T12:39:13Z</dc:date>
    </item>
  </channel>
</rss>

