access-group "name" in interface "if_name"

I garantee this will do it for you.
> 
> From: "Albert Lu" 
> Date: 2003/02/20 Thu AM 10:10:09 EST
> To: [EMAIL PROTECTED]
> Subject: RE: Traffic thru PIX [7:63347]
> 
> Hi,
> 
> You say you can't ping through pix. I imagine you mean from a PC on the
> inside network to the internet address on the outside network. Did you
check
> your xlate table if it's doing the translation? (ie. show xlate). I also
> notice that you have a VPN, make sure that the address you ping isn't in
the
> subnet that you define for the VPN nat0 and for interesting traffic.
> 
> Looking at your ping results, it looks like you can ping hosts in the
inside
> and outside interfaces. So you just have to figure out why your pix is
> stopping your traffic.
> 
> Albert
> 
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> Tunji Suleiman
> Sent: Thursday, February 20, 2003 4:27 PM
> To: [EMAIL PROTECTED]
> Subject: Traffic thru PIX [7:63347]
> 
> 
> Hello All,
> 
> Can someone pls tell me how I can allow pings and other traffic thru the
> PIX? I've added both access-list and conduits for testing. Can ping from
pix
> to a test PC on LAN, to Internet router and to UUNet DNS but not from test
> PC thru PIX as per below:
> 
> PIX# wr t
> Building configuration...
> : Saved
> :
> PIX Version 6.1(2)
> nameif ethernet0 outside security0
> nameif ethernet1 inside security100
> enable password J470/UhJVN.5DRKT encrypted
> passwd J470/UhJVN.5DRKT encrypted
> hostname PIX
> domain-name pixdomain.com
> fixup protocol ftp 21
> fixup protocol http 80
> fixup protocol h323 1720
> fixup protocol rsh 514
> fixup protocol rtsp 554
> fixup protocol smtp 25
> fixup protocol sqlnet 1521
> fixup protocol sip 5060
> fixup protocol skinny 2000
> names
> name 10.250.77.3 testpc
> name 66.120.182.121 gateway
> access-list nat0 permit ip 10.250.77.0 255.255.255.0 10.250.0.0 255.255.0.0
> access-list nat0 permit ip 10.250.77.0 255.255.255.0 10.249.0.0 255.255.0.0
> access-list oxfordhub permit ip 10.250.77.0 255.255.255.0 10.250.4.0
> 255.255.255
> .0
> access-list oxfordhub permit ip 10.250.77.0 255.255.255.0 10.249.48.0
> 255.255.24
> 0.0
> access-list ipalcohub permit ip 10.250.77.0 255.255.255.0 10.250.3.0
> 255.255.255
> .0
> access-list ipalcohub permit ip 10.250.77.0 255.255.255.0 10.249.32.0
> 255.255.24
> 0.0
> access-list arlhub permit ip 10.250.77.0 255.255.255.0 10.250.0.0
> 255.255.255.0
> access-list arlhub permit ip 10.250.77.0 255.255.255.0 10.249.64.0
> 255.255.240.0
> 
> access-list arlington permit ip 10.250.77.0 255.255.255.0 10.250.2.0
> 255.255.255
> .0
> access-list arlington permit ip 10.250.77.0 255.255.255.0 10.249.16.0
> 255.255.24
> 0.0
> access-list richmond permit ip 10.250.77.0 255.255.255.0 10.250.75.0
> 255.255.255
> .0
> access-list aclout permit icmp any any
> pager lines 24
> logging console debugging
> interface ethernet0 auto
> interface ethernet1 auto
> mtu outside 1500
> mtu inside 1500
> ip address outside 66.120.182.122 255.255.255.248
> ip address inside 10.250.77.1 255.255.255.0
> ip audit info action alarm
> ip audit attack action alarm
> pdm history enable
> arp timeout 14400
> global (outside) 1 66.120.182.123 netmask 255.255.255.248
> nat (inside) 0 access-list nat0
> nat (inside) 1 0.0.0.0 0.0.0.0 0 0
> access-group aclout in interface outside
> conduit permit icmp any any
> conduit permit tcp any any
> route outside 0.0.0.0 0.0.0.0 gateway 1
> timeout xlate 3:00:00
> timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323
> 0:05:00 si
> p 0:30:00 sip_media 0:02:00
> timeout uauth 0:05:00 absolute
> aaa-server TACACS+ protocol tacacs+
> aaa-server RADIUS protocol radius
> http server enable
> http 10.250.78.3 255.255.255.255 inside
> http 10.250.77.2 255.255.255.255 inside
> no snmp-server location
> no snmp-server contact
> snmp-server community public
> no snmp-server enable traps
> floodguard enable
> sysopt connection permit-ipsec
> no sysopt route dnat
> crypto ipsec transform-set strong3 esp-3des esp-sha-hmac
> crypto map cmap 1 ipsec-isakmp
> crypto map cmap 1 match address oxfordhub
> crypto map cmap 1 set peer 217.33.153.3
> crypto map cmap 1 set transform-set strong3
> crypto map cmap 2 ipsec-isakmp
> crypto map cmap 2 match address ipalcohub
> crypto map cmap 2 set peer 216.37.39.66
> crypto map cmap 2 set transform-set strong3
> crypto map cmap 3 ipsec-isakmp
> crypto map cmap 3 match address arlhub
> crypto map cmap 3 set peer 206.154.225.2
> crypto map cmap 3 set transform-set strong3
> crypto map cmap 4 ipsec-isakmp
> crypto map cmap 4 match address arlington
> crypto map cmap 4 set peer 65.204.31.2
> crypto map cmap 4 set transform-set strong3
> crypto map cmap 5 ipsec-isakmp
> crypto map cmap 5 match address richmond
> crypto map cmap 5 set peer 195.172.96.66
> crypto map cmap 5 set transform-set strong3
> crypto map cmap interface outside
> isakmp enable outside
> isakmp key ******** address 217.33.153.3 netmask 255.255.255.255
> isakmp key ******** address 216.37.39.66 netmask 255.255.255.255
> isakmp key ******** address 208.171.213.2 netmask 255.255.255.255
> isakmp key ******** address 65.204.31.2 netmask 255.255.255.255
> isakmp key ******** address 195.172.96.66 netmask 255.255.255.255
> isakmp policy 10 authentication pre-share
> isakmp policy 10 encryption 3des
> isakmp policy 10 hash sha
> isakmp policy 10 group 1
> isakmp policy 10 lifetime 3600
> telnet 10.250.77.0 255.255.255.0 inside
> telnet timeout 60
> ssh timeout 5
> terminal width 80
> Cryptochecksum:91a83ee76d6bfefd0155f5f7f2181f6c
> : end
> [OK]
> PIX#
> PIX# ping gateway
>      gateway response received -- 0ms
>      gateway response received -- 0ms
>      gateway response received -- 0ms
> PIX# ping 198.6.1.1
>      198.6.1.1 response received -- 650ms
>      198.6.1.1 response received -- 660ms
>      198.6.1.1 response received -- 640ms
> PIX# ping 198.6.1.1
>      198.6.1.1 response received -- 700ms
>      198.6.1.1 response received -- 640ms
>      198.6.1.1 response received -- 640ms
> PIX# ping testpc
>      testpc response received -- 0ms
>      testpc response received -- 0ms
>      testpc response received -- 0ms
> PIX#
> 
> TIA.
> 
> 
> 
> 
> 
> 
> 
> 
> _________________________________________________________________
> Protect your PC - get McAfee.com VirusScan Online
> http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=63428&t=63347
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to