>From inside to outside its OK.


------------------------------------
Alberto Martmn Sinopoli
Microsoft MCP+I,  MCSE
Cisco CCNA,  CCNP
Buenos Aires - Argentina
------------------------------------
""Anh Lam""  escribis en el mensaje
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi Everyone,
>
> I am always under the impression that one can NOT ping the outside
interface
> of a Cisco PIX firewall unless the command is used:
>
> conduit permit icmp any any
> conduit permit ip any any
>
> Well, I have a Cisco pix Firewall 515-UR model (96MB RAM/16MB Flash).
> This PIX firewall is running code version 6.0(1) with pdm version 1.11.
> Guess what, I can ping the outside interface just fine without the two
> commands mentioned above.
>
> Am I missing something?  Below is the config:
>
>
>
> pixfirewall# wr t
> Building configuration...
> : Saved
> :
> PIX Version 6.0(1)
> nameif ethernet0 outside security0
> nameif ethernet1 inside security100
> nameif ethernet2 intf2 security10
> enable password 8Ry2YjIyt7RRXU24 encrypted
> passwd 2KFQnbNIdI.2KYOU encrypted
> hostname pixfirewall
> fixup protocol ftp 21
> fixup protocol http 80
> fixup protocol h323 1720
> fixup protocol rsh 514
> fixup protocol smtp 25
> fixup protocol sqlnet 1521
> fixup protocol sip 5060
> fixup protocol skinny 2000
> names
> pager lines 24
> interface ethernet0 auto
> interface ethernet1 auto
> interface ethernet2 auto shutdown
> mtu outside 1500
> mtu inside 1500
> mtu intf2 1500
> ip address outside 172.16.1.73 255.255.255.0
> ip address inside 192.168.1.73 255.255.255.0
> ip address intf2 127.0.0.1 255.255.255.255
> ip audit info action alarm
> ip audit attack action alarm
> no failover
> failover timeout 0:00:00
> failover poll 15
> failover ip address outside 0.0.0.0
> failover ip address inside 0.0.0.0
> failover ip address intf2 0.0.0.0
> pdm history enable
> arp timeout 14400
> static (inside,outside) 172.16.1.71 192.168.1.71 netmask 255.255.255.255 0
0
> route outside 0.0.0.0 0.0.0.0 172.16.1.254 1
> timeout xlate 3:00:00
> timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323
> 0:05:00 sip 0:30:00 sip_media 0:02:00
> timeout uauth 0:05:00 absolute
> aaa-server TACACS+ protocol tacacs+
> aaa-server RADIUS protocol radius
> no snmp-server location
> no snmp-server contact
> snmp-server community public
> no snmp-server enable traps
> floodguard enable
> no sysopt route dnat
> telnet timeout 5
> ssh timeout 5
> terminal width 80
> : end
>
> pixfirewall(config)# sh ver
>
> Cisco Secure PIX Firewall Version 6.0(1)
> PIX Device Manager Version 1.1(1)
>
> Compiled on Thu 17-May-01 20:05 by morlee
>
> pixfirewall up 12 hours 18 mins
>
> Hardware:   PIX-515, 96 MB RAM, CPU Pentium 200 MHz
> Flash i28F640J5 @ 0x300, 16MB
> BIOS Flash AT29C257 @ 0xfffd8000, 32KB
>
> 0: ethernet0: address is 0050.54ff.7a24, irq 10
> 1: ethernet1: address is 0050.54ff.7a25, irq 7
> 2: ethernet2: address is 00aa.00bc.ba87, irq 11
>
> Licensed Features:
> Failover:       Enabled
> VPN-DES:        Enabled
> VPN-3DES:       Disabled
> Maximum Interfaces:     6
> Cut-through Proxy:      Enabled
> Guards:         Enabled
> Websense:       Enabled
> Throughput:     Unlimited
> ISAKMP peers:   Unlimited
>
> [alam@linux-ccie]$ ping 172.16.1.73
> PING 172.16.1.73 (172.16.1.73) from 172.16.1.253 : 56(84) bytes of data.
> Warning: time of day goes back, taking countermeasures.
> 64 bytes from 172.16.1.73: icmp_seq=0 ttl=255 time=962 usec
> 64 bytes from 172.16.1.73: icmp_seq=1 ttl=255 time=297 usec
> 64 bytes from 172.16.1.73: icmp_seq=2 ttl=255 time=288 usec
>
> --- 172.16.1.73 ping statistics ---
> 3 packets transmitted, 3 packets received, 0% packet loss
> round-trip min/avg/max/mdev = 0.288/0.515/0.962/0.316 ms
> [alam@linux-ccie]$
>
> _________________________________________________________________
> Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=26678&t=26678
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to