<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: No route to...error message, Cisco PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818459#M979784</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  The two internal ftp servers are:&lt;/P&gt;&lt;P&gt;172.16.5.182&lt;/P&gt;&lt;P&gt;172.16.5.112&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They correspond to two nat'ed addresses on our outside PIX interface:&lt;/P&gt;&lt;P&gt;192.168.219.11&lt;/P&gt;&lt;P&gt;192.168.219.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The two external hosts that need access to the ftp servers are:&lt;/P&gt;&lt;P&gt;192.168.219.19 needs access to 192.168.219.11&lt;/P&gt;&lt;P&gt;RTMWINCLITEST needs access to 192.168.219.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other side of the connection (at our vendor with addresses 192.168.219.19 and RTMWINCLITEST), does not permit echo-replies.   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using the static to map the external addresses to the two internal ftp servers.  The two route commands were an attempt to correct the "no route error".  However, I do realise the 192.168.219.11, 192.168.219.12 are on the same subnet as the outside interface on our PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Strangely,  the vendor can connect (establish and ftp session) once (to both the 192.168.219.11 and 192.168.219.12).  The next session fails with the "no route" error.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 30 May 2007 15:06:24 GMT</pubDate>
    <dc:creator>mhum</dc:creator>
    <dc:date>2007-05-30T15:06:24Z</dc:date>
    <item>
      <title>No route to...error message, Cisco PIX</title>
      <link>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818457#M979782</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt; I'm trying to setup a firewall rule on a Cisco PIX 506e (6.35) to permit inbound ftp traffic to two internal ftp servers.  I can successfully connect once, and each subsequent connection produces a 110001 error code, "no route to..." message in the firewall logs.  Here's the message in the log:&lt;/P&gt;&lt;P&gt;302013: Built inbound TCP connection 208 for outside:192.168.219.19/1065 (192.16&lt;/P&gt;&lt;P&gt;8.219.19/1065) to inside:172.16.5.182/21 (172.16.5.182/21)&lt;/P&gt;&lt;P&gt;110001: No route to 192.168.219.11 from 192.168.219.19&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;passwd xxxx&lt;/P&gt;&lt;P&gt;hostname xxxx&lt;/P&gt;&lt;P&gt;domain-name xxxx&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring 1 Sun Apr 2:00 4 Sun Oct 2:00&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.8.0 &lt;/P&gt;&lt;P&gt;name 192.168.8.19 &lt;/P&gt;&lt;P&gt;name 192.168.219.20 RTMWINCLTEST&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service 6785-tcp tcp&lt;/P&gt;&lt;P&gt;  port-object range 6785 6785&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_out permit tcp host 192.168.219.19 object-group 6785-tcp any object-group 6785-tcp&lt;/P&gt;&lt;P&gt;access-list acl_out permit tcp host RTMWINCLTEST object-group 6785-tcp any object-group 6785-tcp&lt;/P&gt;&lt;P&gt;access-list acl_out permit tcp host 192.168.219.19 host 192.168.219.11 eq ftp&lt;/P&gt;&lt;P&gt;access-list acl_out permit tcp host 192.168.219.19 host 192.168.219.11 eq ftp-data&lt;/P&gt;&lt;P&gt;access-list acl_out permit tcp host RTMWINCLTEST host 192.168.219.12 eq ftp&lt;/P&gt;&lt;P&gt;access-list acl_out permit tcp host RTMWINCLTEST host 192.168.219.12 eq ftp-data&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 192.168.219.10 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 172.16.1.29 255.255.0.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 192.168.219.19 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location RTMWINCLTEST 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.197.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside) 0 192.168.197.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 0 172.16.0.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 192.168.219.11 ftp 172.16.5.182 ftp netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 192.168.219.11 ftp-data 172.16.5.182 ftp-data netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 192.168.219.12 ftp 172.16.5.112 ftp netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 192.168.219.12 ftp-data 172.16.5.112 ftp-data netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group acl_out in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.219.9 1&lt;/P&gt;&lt;P&gt;route inside 192.168.197.0 255.255.255.0 172.16.1.4 1&lt;/P&gt;&lt;P&gt;route outside 192.168.219.11 255.255.255.255 192.168.219.10 1&lt;/P&gt;&lt;P&gt;route outside 192.168.219.12 255.255.255.255 192.168.219.10 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;snmp-server host inside 172.16.33.96 poll&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community xxxxx&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 172.16.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80 &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:22:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818457#M979782</guid>
      <dc:creator>mhum</dc:creator>
      <dc:date>2019-03-11T10:22:47Z</dc:date>
    </item>
    <item>
      <title>Re: No route to...error message, Cisco PIX</title>
      <link>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818458#M979783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what do these commands accomplish for you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 192.168.219.11 255.255.255.255 192.168.219.10 1&lt;/P&gt;&lt;P&gt;route outside 192.168.219.12 255.255.255.255 192.168.219.10 1 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 192.168.219.11 ftp 172.16.5.182 ftp netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 192.168.219.11 ftp-data 172.16.5.182 ftp-data netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 192.168.219.12 ftp 172.16.5.112 ftp netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 192.168.219.12 ftp-data 172.16.5.112 ftp-data netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you're pointing the firewall to take a specific route (or just the outside interface) for 192.168.219.11/192.168.219.12 but yet you're statically nat'ing them to the outside interface?  take those route statements out and test it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, to be sure, can you ping RTMWINCLTEST and 192.168.219.19 from the PIX in question?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2007 14:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818458#M979783</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-05-30T14:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: No route to...error message, Cisco PIX</title>
      <link>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818459#M979784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  The two internal ftp servers are:&lt;/P&gt;&lt;P&gt;172.16.5.182&lt;/P&gt;&lt;P&gt;172.16.5.112&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They correspond to two nat'ed addresses on our outside PIX interface:&lt;/P&gt;&lt;P&gt;192.168.219.11&lt;/P&gt;&lt;P&gt;192.168.219.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The two external hosts that need access to the ftp servers are:&lt;/P&gt;&lt;P&gt;192.168.219.19 needs access to 192.168.219.11&lt;/P&gt;&lt;P&gt;RTMWINCLITEST needs access to 192.168.219.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other side of the connection (at our vendor with addresses 192.168.219.19 and RTMWINCLITEST), does not permit echo-replies.   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using the static to map the external addresses to the two internal ftp servers.  The two route commands were an attempt to correct the "no route error".  However, I do realise the 192.168.219.11, 192.168.219.12 are on the same subnet as the outside interface on our PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Strangely,  the vendor can connect (establish and ftp session) once (to both the 192.168.219.11 and 192.168.219.12).  The next session fails with the "no route" error.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2007 15:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818459#M979784</guid>
      <dc:creator>mhum</dc:creator>
      <dc:date>2007-05-30T15:06:24Z</dc:date>
    </item>
    <item>
      <title>Re: No route to...error message, Cisco PIX</title>
      <link>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818460#M979785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Someone mentioned to me that he read somewhere, that this was a very common error, and it was related to nat'ting?  I'm baffled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2007 04:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818460#M979785</guid>
      <dc:creator>mhum</dc:creator>
      <dc:date>2007-05-31T04:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: No route to...error message, Cisco PIX</title>
      <link>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818461#M979786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It was NAT vs STATIC order problem.  I removed the NAT 0 (172.16.0.0) line and this solved the problem.  The "no route to" error message in the PIX log is misleading, if taken literally.  I should have read the Cisco PIX online docs describing the NAT, GLOBAL and STATIC commands.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2007 14:44:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-route-to-error-message-cisco-pix/m-p/818461#M979786</guid>
      <dc:creator>mhum</dc:creator>
      <dc:date>2007-06-04T14:44:45Z</dc:date>
    </item>
  </channel>
</rss>

