For pix v6.2 if you want to have IPSec flow through, but not to, the pix you will need to allow udp traffic between the two ipsec peers for ike (that is source and dest ports are eq 500), and you will need to allow the esp and/or ah protocols between the two endpoints (permit ah ..... and permit esp .....) on both pix interfaces that will send and receive the ike and ipsec traffic. This is beacuse you do not know which end will initiate the traffic.
That is in addition to the static statements that will be needed to allow the traffic to reach an inside host.
As an example:
1. Say hosts 10.20.2.2 and 10.30.3.3 are the two endpoints and your pix interface names are in and out. Let's say that NAT will not be used, so that the inside server, 10.20.2.2 is seen as 10.20.2.2 by the other host.
2. Your inside interface acl would look like this:
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...