Software Firewalls
--
Questions
--
Followers
Top Experts
errrrrrrrrrrrrm, all of a sudden my access-lists are not showing hit counts? They were when they looked like this;
access-list acl_inside_out permit tcp any any eq www (hitcnt=3074)
access-list acl_inside_out permit icmp any any (hitcnt=3)
access-list acl_inside_out permit udp any any eq domain (hitcnt=1305)
access-list acl_inside_out permit tcp any host X.X.X.X eq pop3 (hitcnt=174)
access-list acl_inside_out permit tcp any host X.X.X.X eq smtp (hitcnt=6)
access-list acl_inside_out permit tcp any host X.X.X.X eq pop3 (hitcnt=16)
access-list acl_inside_out permit tcp any host X.X.X.X eq smtp (hitcnt=0)
access-list acl_inside_out permit tcp any host X.X.X.X eq pop3 (hitcnt=18)
access-list acl_inside_out permit tcp any host X.X.X.X eq smtp (hitcnt=0)
And then when I added the lines below my whole access-list shows no hits against it? I have tried removing back to just the original inside_out lists and still no hit counts?
access-list acl_inside_out permit udp any host X.X.X.X eq 4190
access-list acl_outside_in permit icmp any any unreachable
access-list acl_outside_in permit icmp any any echo-reply
access-list acl_outside_in permit icmp any any time-exceeded
what have I done wrong? ? ?
linuxunil
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
I have 40-60 users accessing the internet for flight bookings so I assume there would be atleast some traffic thats why I cant understand it? How do I check xlate? I have tried to find the command but there is no man file for it? and how do you test a connection? Sorry if thats a lame question but I am a newb to PIX, well firewalls in general!
linuxunil
SHOW XLATE Â will list all the NAT'ed addresses. Â You should see some info here. Â
Are you people working fine? Â Or are they having connection issues?






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
there r 47 in use and and 291 most used! There are no connection issues and i have reloaded the PIX just to see if it was that?
linuxunil
I have just had a thought! I added the lists after several tests that by pasting to host! Now having thought about it, I wonder if it is because I have used this method instead of writing each line? I mean this would be bizarre but its all that I can think of?
linuxunil

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
what am  i looking for in the run config?
linuxunil
It seems that maybe my theory was correct/partially correct as I have re-written the access-lists individually and all is now working? Maybe I should do a test by clearing the access-lists again and then copying and pasting to host to see if it happens again? If so then a post is order of the day? ? ?
thx for all your help MikeKane. . . The sh xlate cmd was interesting!
linuxunil






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
It is interesting to see your comment irmoore because since I have started configuing  firewall(s) I have always used the command:
#clear access-list acl_outside_in
#clear access-list acl_indside_out
before reapplying access-lists and but never disabled the access-group before reapplying! I will use the suggested procedure in future, especially if this is what happens when using the PDM. Perhaps I will try my suggested comment; It seems that maybe my theory was correct/partially correct as I have ............ and your procedure just to see if thats what the problem really was! hmmmmmmmmm interesting.
linuxunil
Â

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Software Firewalls
--
Questions
--
Followers
Top Experts
Software firewalls, also known as host-based firewalls, provide a layer of software on one host that controls network traffic in and out of that single machine. Most operating systems now include firewall software, but many available software firewalls include central distribution, antivirus systems and disaster recovery.