From previous topic, but the advice given there isn't working, here is a copy & paste of the problem:
fe0/0 with a 209.x.x.x address going to a switch.
fe0/1 with a 28.x.x.x going out to WAN
e0 outside with a 209.x.x.x address going to same switch as router.
e1 inside with a 192.168.0.1 address going to LAN. This acts as the network firewall/gateway
Client just purchased a Cisco AccessPoint 1130AG. Client wishes to have two SSID's. One "Guest" SSID which only gives access to HTTP/HTTPS. And one "Staff" SSID which gives access to everything (network servers/shares/printers/etc).
I have tried creating subinterfaces on the PIX, but it apparently doesn't support this (it is IOS 6.3). I tried messing around with the eth2 (which is not in use) and creating "logical" interfaces, but I'm not really sure where to go with that.
I'm including a rough Visio JPG of the network. I'd rather not touch the Router config; would rather do anything I need on the PIX.
Is there any way to get these VLANs working on PIX 515e with IOS 6.3? Would it help to see the current running-config on the PIX?
I am not sure if you can create object-group with that version of PIX but object-group and ACL inside and ACL outside might be able to help out. You will create an object-group for the guest network and another one for the regular users. And then create an inside acl that will allow guest network access to http and https and the other group access to any.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...