<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global IP communications problems with outside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/global-ip-communications-problems-with-outside-interface/m-p/800631#M990015</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is recommended to use static nat translation for servers within a DMZ, for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 66.44.44.33 192.168.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If 192.168.1.1 (real address) is a webserver, then do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l outside_in permit tcp any host 66.44.44.33 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_in in interface OUTSIDE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 12 May 2007 23:04:18 GMT</pubDate>
    <dc:creator>joshua.walton</dc:creator>
    <dc:date>2007-05-12T23:04:18Z</dc:date>
    <item>
      <title>Global IP communications problems with outside interface</title>
      <link>https://community.cisco.com/t5/network-security/global-ip-communications-problems-with-outside-interface/m-p/800628#M990012</link>
      <description>&lt;P&gt;Hi all. I have small problem I need help to figure out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Global statement:&lt;/P&gt;&lt;P&gt;global (outside) 2 1.1.1.10 netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;And my nat statement is:&lt;/P&gt;&lt;P&gt;nat (dmz2) 2 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I have a host inside DMZ2 that wants to talk to my PIX's outside interface which is: 1.1.1.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the traffic goes from insidehost -&amp;gt; gets PAT/NAT with 1.1.1.10 (global interface) and then trying to contact the real outside interface 1.1.1.3. But it dont work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my DMZ2 ACL i have the rule "permit ip any any" just to be on the safe side.&lt;/P&gt;&lt;P&gt;My insidehost can contact other sites outside my PIX. (I Have 2 other pix with other ip-ranges that the inside host can contact without problems.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, is it possible for the global interface to contact the outside interface or is that denied somehow intentionaly`?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or do i need to add a rule in the outside ACL that permits the outside interface to communicate with the global interface?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Anders&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-ip-communications-problems-with-outside-interface/m-p/800628#M990012</guid>
      <dc:creator>anders.lindback</dc:creator>
      <dc:date>2019-03-11T10:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: Global IP communications problems with outside interface</title>
      <link>https://community.cisco.com/t5/network-security/global-ip-communications-problems-with-outside-interface/m-p/800629#M990013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This wont work. But why exactly do you need a DMZ host to communicate with PIX's outside interface IP address? If you can tell the requirement like a webserver on inside using PIX's outside interface IP address, we may be able to help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2007 09:41:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-ip-communications-problems-with-outside-interface/m-p/800629#M990013</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-05-11T09:41:34Z</dc:date>
    </item>
    <item>
      <title>Re: Global IP communications problems with outside interface</title>
      <link>https://community.cisco.com/t5/network-security/global-ip-communications-problems-with-outside-interface/m-p/800630#M990014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;might have figured something out, gonna test and come back later&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;brb&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2007 10:03:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-ip-communications-problems-with-outside-interface/m-p/800630#M990014</guid>
      <dc:creator>anders.lindback</dc:creator>
      <dc:date>2007-05-11T10:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: Global IP communications problems with outside interface</title>
      <link>https://community.cisco.com/t5/network-security/global-ip-communications-problems-with-outside-interface/m-p/800631#M990015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is recommended to use static nat translation for servers within a DMZ, for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 66.44.44.33 192.168.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If 192.168.1.1 (real address) is a webserver, then do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l outside_in permit tcp any host 66.44.44.33 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_in in interface OUTSIDE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 May 2007 23:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-ip-communications-problems-with-outside-interface/m-p/800631#M990015</guid>
      <dc:creator>joshua.walton</dc:creator>
      <dc:date>2007-05-12T23:04:18Z</dc:date>
    </item>
  </channel>
</rss>

