It's configured with an outside2 interface with security level 4 (here I have an AIX-server, 10.174.253.24/27), and DMZ with security level 10 (here I have a windows-server with 192.168.102.13/24). Inside inteface of the PIX has 10.174.102.86/24.
From the server in the outside2 net, I can ping the PIX outside2 interface . Nice!
But when pinging from the outside2 AIX-server 10.174.253.24 to the 192.168.102.13, it doesn't work. The PIX sends the reply packet out on the inside interface, instead og directly back out on the outside2 interface. Why?
The pix has a route that says:
route inside 10.174.0.0 255.255.0.0 10.174.0.1 1
This is in the same range as the outside2 interface, but shouldn't it use the directly connected instead of the routing information?
The problem is that the ouside interface is local to the PIX, as for the DMZ-interface.
I ping from a AIX server sitting on the outside interface, to a windows server in the dmz interface. The request goes to the windows server, which then replies. But the return reply is by the pix sent out on the inside interface.
The only thing I can say is thath the pic has an route to the inside, 10.174.0.0/16, and that the subnet of the outside interface of the pix is 10.174.253.0/27. So a spesific route cannot be entered.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :