Kindly help me with this PIX6 problem

Why can't I ping the host 209.178.196.211? Please see the config below.

The IP belongs to a Windows 2000 mail server. Because it is blocked by PIX, our company cannot send or receive email. I called the ISP (Wave2Wave) and they are atrocious. Even though they have set up the firewall several years ago, they don't assume any responsibility for it. So I am left to trouble shoot this. I don't have any CISCO training. I am a software programmer. I tried to learn PIX as much as I

can and now it is way above my head.I am earnestly hoping someone will read this and respond with some logic. I am sorry for starting multiple threads. I need help desperately. Kindly let me know any comments by replying to this thread. I won't be able to access the PIX until Monday. That is another issue. The PIX has an outside IP of

209.178.196.210 (please see the config below). When I telnet to it using Putty (secure shell) there was no response. However, if someone has a solution to my problem, I will able to implement it in the weekend. Once again I apologize for starting multiple threads. Many thanks for reading this post.

: Saved : PIX Version 6.1(1) nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password 9Hxv6QfoEUwhwV2T encrypted passwd 9Hxv6QfoEUwhwV2T encrypted hostname iexpect-corp fixup protocol ftp 21 fixup protocol http 80 fixup protocol h323 1720 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sqlnet 1521 fixup protocol sip 5060 fixup protocol skinny 2000 fixup protocol smtp 25 names name 192.168.5.10 corp-smtp name 192.168.5.13 njrep1 name 192.168.5.150 trig1 name 192.168.5.151 trig2 name 192.168.5.61 brett name 192.168.5.58 sfg name 192.168.5.152 sfg2 name 192.168.5.63 pepsanchez name 192.168.5.9 corp-smtp2 access-list ipsec permit ip 192.168.5.0 255.255.255.0 10.0.255.0

255.255.255.0 access-list ipsec permit ip 192.168.11.0 255.255.255.0 10.0.255.0 255.255.255.0 access-list incoming permit tcp any host 209.178.196.211 eq smtp access-list incoming permit tcp any host 209.178.196.212 eq smtp access-list incoming permit tcp any host 209.178.196.211 eq 5631 access-list incoming permit tcp any host 209.178.196.211 eq 5632 access-list incoming permit udp any host 209.178.196.211 eq 5632 access-list incoming permit udp host 216.34.112.198 eq dnsix any access-list incoming permit udp host 216.33.202.54 eq dnsix any access-list incoming permit tcp any eq telnet host 216.74.138.147 access-list incoming permit tcp any host 209.178.196.212 eq telnet access-list incoming permit tcp any eq telnet host 209.178.196.212 access-list incoming permit tcp any host 209.178.196.211 eq www access-list incoming permit tcp any host 209.178.196.212 eq www access-list incoming permit tcp any host 209.178.196.212 eq ftp access-list incoming permit tcp any eq ftp host 209.178.196.212 access-list incoming permit tcp any host 209.178.196.213 eq 22 access-list incoming permit tcp any host 209.178.196.213 eq www access-list incoming permit tcp any host 209.178.196.211 eq 3389 access-list incoming permit tcp any host 209.178.196.212 eq 3389 access-list incoming permit tcp any host njrep1 eq 22 access-list incoming permit tcp any host njrep1 eq ftp access-list incoming permit tcp any host 209.178.196.215 eq 4662 access-list incoming permit udp any host 209.178.196.215 eq 4672 access-list incoming permit tcp any host 209.178.196.217 eq www access-list incoming permit tcp any host 209.178.196.213 eq 443 access-list incoming permit tcp any host 209.178.196.217 eq 22 access-list incoming permit tcp any host 209.178.196.222 eq 5900 access-list incoming permit tcp 202.138.142.224 255.255.255.224 host 209.178.196.216 eq 443 access-list incoming permit tcp any host 209.178.196.217 eq 443 access-list incoming permit tcp any host 209.178.196.222 eq www access-list incoming permit tcp any host 209.178.196.222 eq 129 access-list incoming permit tcp any host 209.178.196.222 eq 132 access-list incoming permit tcp any host 209.178.196.211 eq ftp access-list incoming permit tcp any host 209.178.196.216 access-list incoming permit icmp any host 209.178.196.222 access-list incoming permit tcp any host 209.178.196.211 access-list incoming permit icmp any host 209.178.196.211 access-list outgoing permit tcp any any access-list outgoing permit icmp any any access-list outgoing permit icmp any any echo-reply access-list outgoing permit udp any any access-list outgoing permit tcp any any eq www access-list outgoing permit tcp any host 216.239.35.101 eq www access-list outgoing permit udp any host 216.34.112.198 eq dnsix access-list outgoing permit udp any host 216.33.202.54 eq dnsix pager lines 24 logging on interface ethernet0 10baset interface ethernet1 10baset mtu outside 1500 mtu inside 1500 ip address outside 209.178.196.210 255.255.255.240 ip address inside 192.168.5.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool corp-home 192.168.99.1-192.168.99.224 pdm history enable arp timeout 60 global (outside) 1 209.178.196.220-209.178.196.221 global (outside) 1 209.178.196.219 nat (inside) 1 0.0.0.0 0.0.0.0 0 0 alias (inside) sfg 209.178.196.216 255.255.255.255 alias (inside) sfg2 209.178.196.217 255.255.255.255 alias (inside) corp-smtp 209.178.196.211 255.255.255.255 alias (inside) 192.168.11.150 209.178.196.213 255.255.255.255 alias (inside) 192.168.5.149 209.178.196.222 255.255.255.255 static (inside,outside) 209.178.196.213 trig1 netmask 255.255.255.255 0

0 static (inside,outside) 209.178.196.214 trig2 netmask 255.255.255.255 0

0 static (inside,outside) 209.178.196.211 corp-smtp netmask 255.255.255.255 0 0 static (inside,outside) 209.178.196.215 brett netmask 255.255.255.255 0

0 static (inside,outside) 209.178.196.216 sfg netmask 255.255.255.255 0 0

static (inside,outside) 209.178.196.217 sfg2 netmask 255.255.255.255 0

0 static (inside,outside) 209.178.196.222 192.168.5.149 netmask 255.255.255.255 0 0 static (inside,outside) 209.178.196.218 pepsanchez netmask 255.255.255.255 0 0 static (inside,outside) 209.178.196.212 corp-smtp2 netmask 255.255.255.255 0 0 access-group incoming in interface outside route outside 0.0.0.0 0.0.0.0 209.178.196.209 1 route inside 192.168.11.0 255.255.255.0 192.168.5.2 1 route inside 192.168.254.0 255.255.255.0 192.168.5.2 1 timeout xlate 3:00:00 timeout conn 3:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius http server enable http corp-smtp2 255.255.255.255 inside no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-ipsec sysopt ipsec pl-compatible no sysopt route dnat crypto ipsec transform-set iexpect esp-des esp-md5-hmac crypto ipsec transform-set myset esp-des esp-md5-hmac crypto dynamic-map dynmap 10 set transform-set myset crypto map corp 1 ipsec-isakmp crypto map corp 1 match address ipsec crypto map corp 1 set peer 216.74.138.157 crypto map corp 1 set transform-set iexpect crypto map corp 10 ipsec-isakmp dynamic dynmap crypto map corp client configuration address initiate crypto map corp client configuration address respond crypto map corp interface outside isakmp enable outside isakmp key ******** address 216.74.138.157 netmask 255.255.255.255 isakmp identity address isakmp policy 1 authentication pre-share isakmp policy 1 encryption des isakmp policy 1 hash md5 isakmp policy 1 group 1 isakmp policy 1 lifetime 86400 isakmp policy 10 authentication pre-share isakmp policy 10 encryption des isakmp policy 10 hash md5 isakmp policy 10 group 2 isakmp policy 10 lifetime 86400 vpngroup corphome address-pool corp-home vpngroup corphome dns-server 192.168.1.6 vpngroup corphome wins-server 192.168.1.6 vpngroup corphome default-domain corp.iexpect.com vpngroup corphome idle-time 1800 vpngroup corphome password ******** telnet corp-smtp 255.255.255.255 inside telnet 192.168.5.2 255.255.255.255 inside telnet 192.168.11.0 255.255.255.0 inside telnet 192.168.5.0 255.255.255.0 inside telnet njrep1 255.255.255.255 inside telnet corp-smtp2 255.255.255.255 inside telnet timeout 5 ssh njrep1 255.255.255.255 inside ssh timeout 5 terminal width 80 Cryptochecksum:b74f20411172389725f6e85195e68c9b
Reply to
soup_or_power
Loading thread data ...

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.