RE: how to disable NAT in PIX firewall (both insid [7:29408]

2001-12-19 Thread Kent Hundley
what, the workstation can get to the Internet just fine but workstation on the "inside" interface can not. Strange thing is that the pix can ping the Internet (4.2.2.2) as well. Any more ideas. Thanks. David - Original Message - From: "Jon Tucker" To: Sent: Tuesday, December

RE: how to disable NAT in PIX firewall (both insid [7:29408]

2001-12-19 Thread Bill Carter
keep failing after 10 minutes. Static worked like a charm. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Jon Tucker Sent: Tuesday, December 18, 2001 8:03 PM To: [EMAIL PROTECTED] Subject: RE: how to disable NAT in PIX firewall (both insid [7:29408] usin

Re: how to disable NAT in PIX firewall (both insid [7:29408]

2001-12-19 Thread David Tran
"inside" interface can not. Strange thing is that the pix can ping the Internet (4.2.2.2) as well. Any more ideas. Thanks. David - Original Message - From: "Jon Tucker" To: Sent: Tuesday, December 18, 2001 9:03 PM Subject: RE: how to disable NAT in PIX firewall

Re: how to disable NAT in PIX firewall (both insid [7:29408]

2001-12-19 Thread David Tran
"inside" interface can not. Strange thing is that the pix can ping the Internet (4.2.2.2) as well. Any more ideas. Thanks. David - Original Message - From: "Jon Tucker" To: Sent: Tuesday, December 18, 2001 9:03 PM Subject: RE: how to disable NAT in PIX firewall

RE: how to disable NAT in PIX firewall (both insid [7:29408]

2001-12-18 Thread Jon Tucker
using the NAT 0 command will allow the inside systems to go through the PIX unaltered. - Jon -Original Message- From: Michael J. Doherty [mailto:[EMAIL PROTECTED]] Sent: Tuesday, December 18, 2001 11:56 AM To: [EMAIL PROTECTED] Subject: Re: how to disable NAT in PIX firewall (both insid

Re: how to disable NAT in PIX firewall (both insid [7:29408]

2001-12-18 Thread Michael J. Doherty
Since the PIX is a native NAT device, built around it, subsistent on it, you cannot turn it off and allow the PIX to function in its correct manner. The example that you mention (VPNs) is a special scenario. Once VPN clients are authenticated by the PIX, they are treated as if they exist on the