This reply is a loooong one! Please allow me to clear up a couple of misconceptions I have read on this thread.
First, a while it is true a PIX blocks everything by default, this only applies to inbound traffic initiated from the outside. Outbound sessions initiated from the inside are all allowed out by default with no access lists needed. Your config looks okay in this regard. The only thing you might want to do is add "access-list outside permit icmp any any echo-reply" and "access-group outside in interface outside" to allow PING responses to come back in for testing connectivity. Second, even though the "nat (inside) 0" has nat in the line, this doesn't mean specifically that you are using nat (one-to-one translation). It's actually the "global" statement that defines whether NAT or PAT is used. When a single address (or interface option) is used in this statement, PAT is used as is indicated by the console message that appears. Otherwise, if a range of addresses is used, nat will be enabled. This could be a problem if you use a range and don't back it up with another global statement with just a single address for PAT (PAT is also called NAT overload) as the first hosts to connect will use up the NAT addresses and no other connections will be allowed. Unless, of course, you have as many public addresses as you have internal hosts. You config looks fine in this regard also. The only thing I might question is your use of the the following lines: dhcpd auto_config outside sysopt connection permit-ipsec sysopt connection permit-pptp None of these is necessary and may be causing a problem. I would remove these and see if it resolves anything for you. Also, be sure to cycle the power on the PIX. I have to do this more and more on Cisco boxes as they get more complex and bloated with "functionality". I have seen weirdness with PIXes before. One such time I saved the config, erased and rebooted the PIX, and then pasted the config back in to have it work fine at that time. Re-flashing the code has also fixed oddball problems for most of us on this list from time to time. Using "show interface" will give you a bunch of info including addressing you're getting from the ISP and "show route" will give you the default route you "supposedly" pull down from them. Are you sure you're not using PPPOE? If so, this requires a totally different config. Otherwise, with the exception of the 3 lines I mentioned earlier, your config looks good. One question - why did you turn off fixup on SMTP? This is generally a good thing. I would check this features out unless you already know that you need it turned off. Good luck! Rik -----Original Message----- From: Mark W. Odette II [mailto:[EMAIL PROTECTED]] Sent: Friday, July 26, 2002 4:30 PM To: [EMAIL PROTECTED] Subject: RE: Can get it to work (Pix 515 behind cable modem [7:49744] >From what I can see, you've initiated NAT, but didn't define a NAT Pool of addresses. So, I can only deduce that the PIX is defaulting to PAT operation rather than just not allowing traffic across the PIX at all. (wasn't that nice of Cisco :-] ) I'm just starting to study the ins/outs of PIX, so I could be wrong. Try defining a NAT Pool, and see what happens; let us know! Mark -----Original Message----- From: Kevin O'Gilvie [mailto:[EMAIL PROTECTED]] Sent: Friday, July 26, 2002 12:20 AM To: [EMAIL PROTECTED] Subject: Can get it to work (Pix 515 behind cable modem) [7:49744] Dear All, Below is my config. Can someone tell me why ckients on the inside interface cant get to the internet (browwse, ping, nothing) Yet show xlate shows clients Pat(ing) to outside address.. I am so frustrated, dont know whats the issue???!!! PIX Version 6.2(2) nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif ethernet2 dmz security50 enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted hostname pixfirewall fixup protocol ftp 21 fixup protocol http 80 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol ils 389 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sqlnet 1521 fixup protocol sip 5060 fixup protocol skinny 2000 no fixup protocol smtp 25 names pager lines 24 logging on logging trap debugging logging host inside 192.168.0.2 interface ethernet0 100full interface ethernet1 100full interface ethernet2 100full mtu outside 1500 mtu inside 1500 mtu dmz 1500 ip address outside dhcp setroute ip address inside 192.168.0.1 255.255.255.0 ip address dmz 127.0.0.1 255.255.255.255 ip audit info action alarm ip audit attack action alarm pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 0.0.0.0 0.0.0.0 0 0 timeout xlate 0:30:00 timeout conn 0:15:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si p 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec sysopt connection permit-pptp no sysopt route dnat telnet 192.168.0.2 255.255.255.255 inside telnet timeout 60 ssh timeout 5 dhcpd auto_config outside terminal width 80 Cryptochecksum:0d7e04757f9b50f2a77acb163265e3ea : end [OK] _________________________________________________________________ Send and receive Hotmail on your mobile device: http://mobile.msn.com Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=49845&t=49845 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]