<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring ACL's 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770088#M1003575</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We first have a rule to check the global catalog for the user. then it gets pushed to the mail server internal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to the command line so I am using the gui.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would the source port be any?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Jun 2007 17:19:13 GMT</pubDate>
    <dc:creator>kmcilvaine</dc:creator>
    <dc:date>2007-06-07T17:19:13Z</dc:date>
    <item>
      <title>Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770081#M1003506</link>
      <description>&lt;P&gt;I am new to Cisco firewalls and am having trouble getting the acls to work. I have a asa 5520 with version 7.2.2 software. I have it connected and can get to the internet but when I configure an acl to get my mail from the outside spam quarentine company I get no mail. I am not sure if I am doing the acl right or not.I did 1 from outside ip to inside ip allowing only port 3389 to go through.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770081#M1003506</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2019-03-11T10:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770082#M1003524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port 3389 is for terminal services. Mail is typically on port 25. Is this a typo ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you send copy of config of ASA minus any sensitive info. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 16:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770082#M1003524</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-06-07T16:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770083#M1003540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. 3389 is rdp (remote desktop protocol)&lt;/P&gt;&lt;P&gt;2. You need a static translation for the destination of the mail&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 192.168.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;1.1.1.1=external address&lt;/P&gt;&lt;P&gt;192.168.1.1=internal address&lt;/P&gt;&lt;P&gt;3. Write the acl, this is for smtp tcp 25.&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host &lt;SPAM.QUARANTINE.IP&gt; host 1.1.1.1 eq 25&lt;/SPAM.QUARANTINE.IP&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post you config if you have problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 16:46:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770083#M1003540</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-07T16:46:53Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770084#M1003552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA Version 7.2(2)19                    &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;hostname ciscoasa                 &lt;/P&gt;&lt;P&gt;domain-name xxxxxxxx.com                        &lt;/P&gt;&lt;P&gt;enable password xxxxxxxx encrypted                                          &lt;/P&gt;&lt;P&gt;names     &lt;/P&gt;&lt;P&gt;dns-guard         &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0                            &lt;/P&gt;&lt;P&gt; nameif Wan           &lt;/P&gt;&lt;P&gt; security-level 0                 &lt;/P&gt;&lt;P&gt; ip address xx.xxx.xxx.xx 255.255.255.224                                         &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1                            &lt;/P&gt;&lt;P&gt; nameif Lan           &lt;/P&gt;&lt;P&gt; security-level 100                   &lt;/P&gt;&lt;P&gt; ip address xx.xxx.x.xx 255.255.255.0                                     &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2                            &lt;/P&gt;&lt;P&gt; shutdown         &lt;/P&gt;&lt;P&gt; no nameif          &lt;/P&gt;&lt;P&gt; no security-level                  &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3                            &lt;/P&gt;&lt;P&gt; shutdown         &lt;/P&gt;&lt;P&gt; no nameif          &lt;/P&gt;&lt;P&gt; no security-level                  &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Management0/0                       &lt;/P&gt;&lt;P&gt; nameif management                  &lt;/P&gt;&lt;P&gt; security-level 100                   &lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0                                     &lt;/P&gt;&lt;P&gt; management-only                &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxx encrypted                                 &lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-19-k8.bin                                   &lt;/P&gt;&lt;P&gt;ftp mode passive                &lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS                           &lt;/P&gt;&lt;P&gt; domain-name xxxxxxx.com                         &lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xx.xxx.xxx.xxx eq https host xx.xxx.x.x                                                                                &lt;/P&gt;&lt;P&gt;x eq https          &lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xxx.xxx.xx.xx range 3268 3268 host xx.x                                                                                &lt;/P&gt;&lt;P&gt;xx.x.xx range 3268 3268                       &lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xxx.xxx.xx.xx eq smtp host xx.xxx.x.xx                                                                               &lt;/P&gt;&lt;P&gt;eq smtp       &lt;/P&gt;&lt;P&gt;access-list Lan_nat_static extended permit ip interface Lan interface Wan                                                                         &lt;/P&gt;&lt;P&gt;pager lines 24              &lt;/P&gt;&lt;P&gt;logging enable              &lt;/P&gt;&lt;P&gt;logging asdm informational                          &lt;/P&gt;&lt;P&gt;mtu Wan 1500            &lt;/P&gt;&lt;P&gt;mtu Lan 1500            &lt;/P&gt;&lt;P&gt;mtu management 1500                   &lt;/P&gt;&lt;P&gt;no failover           &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1                                          &lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin                              &lt;/P&gt;&lt;P&gt;no asdm history enable                      &lt;/P&gt;&lt;P&gt;arp timeout 14400                 &lt;/P&gt;&lt;P&gt;nat-control           &lt;/P&gt;&lt;P&gt;global (Wan) 1 interface                        &lt;/P&gt;&lt;P&gt;nat (Lan) 1 0.0.0.0 0.0.0.0                           &lt;/P&gt;&lt;P&gt;access-group 110 in interface Wan                                 &lt;/P&gt;&lt;P&gt;route Wan 0.0.0.0 0.0.0.0 xx.xxx.xxx.xx 1                                         &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00                     &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 17:05:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770084#M1003552</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-07T17:05:17Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770085#M1003561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry..3268 was the port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have these 3 in the access rules for mail&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 17:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770085#M1003561</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-07T17:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770086#M1003568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Don't use source ports in your acl's &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xx.xxx.xxx.xxx host xx.xxx.x.x &lt;/P&gt;&lt;P&gt;x eq https &lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xxx.xxx.xx.xx host xx.x &lt;/P&gt;&lt;P&gt;xx.x.xx eq 3268 &lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xxx.xxx.xx.xx host xx.xxx.x.xx &lt;/P&gt;&lt;P&gt;eq smtp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 17:09:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770086#M1003568</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-07T17:09:01Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770087#M1003572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What ip are they forwarding your mail to? You need a static translation for this address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 192.168.1.1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;1.1.1.1=external address &lt;/P&gt;&lt;P&gt;192.168.1.1=internal address &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or if the address is the outside interface of ASA you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 25 192.168.1.1 25 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;192.168.1.1=internal address &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 17:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770087#M1003572</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-07T17:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770088#M1003575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We first have a rule to check the global catalog for the user. then it gets pushed to the mail server internal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to the command line so I am using the gui.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would the source port be any?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 17:19:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770088#M1003575</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-07T17:19:13Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770089#M1003581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A source port would normally be a random port above 1024. You do not use these in your acl as you would have no idea what it would be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;About the mail server, I mean what is the ip address that the spam quarantine company uses to send you mail?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 17:25:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770089#M1003581</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-07T17:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770090#M1003584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it would be an external one&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 17:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770090#M1003584</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-07T17:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770091#M1003589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you need a static statement for this address if you want to get the mail.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 17:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770091#M1003589</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-07T17:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770092#M1003593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added the static and still no luck.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 18:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770092#M1003593</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-07T18:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770093#M1003594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post what the static is? Feel free to change the address to something different.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 18:06:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770093#M1003594</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-07T18:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770094#M1003601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA Version 7.2(2)194  02  00   8086   1&lt;/P&gt;&lt;P&gt;!9&lt;/P&gt;&lt;P&gt;hostname ciscoasa   11            &lt;/P&gt;&lt;P&gt;domain-name xxxxxxx.com           &lt;/P&gt;&lt;P&gt; 04  03  00 &lt;/P&gt;&lt;P&gt;enable password xxxxxxxx encrypted                                       &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;&lt;P&gt;namesing B&lt;/P&gt;&lt;P&gt;dns-guards ...    &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0IOS Extension to setup ROMMO&lt;/P&gt;&lt;P&gt; nameif Wan           &lt;/P&gt;&lt;P&gt; security-level 0isco Systems ROMM&lt;/P&gt;&lt;P&gt; ip address xx.xxx.xxx.xx 255.255.255.224:08 PST 2006                             &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1           &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Platform ASA552&lt;/P&gt;&lt;P&gt; nameif Lan           &lt;/P&gt;&lt;P&gt; security-level 100o interrupt boot.  &lt;/P&gt;&lt;P&gt; ip address xx.xxx.x.xx 255.255.255.0SPACE to begin boot immediately.     &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;Launching BootLoader...    &lt;/P&gt;&lt;P&gt; shutdown         &lt;/P&gt;&lt;P&gt; no nameifguration f&lt;/P&gt;&lt;P&gt; no security-levely.                &lt;/P&gt;&lt;P&gt; no ip address          &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;L&lt;/P&gt;&lt;P&gt;!d&lt;/P&gt;&lt;P&gt;interface GigabitEthe                    &lt;/P&gt;&lt;P&gt;!#&lt;/P&gt;&lt;P&gt;passwd xxxxencrypted##########################       &lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-19-k8.bin                                   &lt;/P&gt;&lt;P&gt;ftp mode passive################&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS######################     &lt;/P&gt;&lt;P&gt; domain-name xxxxxx.com                         &lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xx.xxx.xxx.xxx eq https host xx.xxx.x.x########################                                                        &lt;/P&gt;&lt;P&gt;7 eq https          &lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xxx.xxx.xx.xx host xx.xxx.x.xx range 32                                                                         &lt;/P&gt;&lt;P&gt;512MB &lt;/P&gt;&lt;P&gt;68 3268    &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;T&lt;/P&gt;&lt;P&gt;access-list Lan_nat_static extended permit ip interface Lan interface Wan2546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 00 MAC: 001a.6d7c.8468 &lt;/P&gt;&lt;P&gt;pager lines 24              &lt;/P&gt;&lt;P&gt;logging enable              &lt;/P&gt;&lt;P&gt;logging asdm informationalv03 Gigabit Ethernet @ irq&lt;/P&gt;&lt;P&gt;mtu Wan 1500x 01 MAC: 00&lt;/P&gt;&lt;P&gt;mtu Lan 1500            &lt;/P&gt;&lt;P&gt;mtu management 1500                   &lt;/P&gt;&lt;P&gt;no failover          &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1 2 index 02 MAC: 001a.6d7c.846a           &lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin                              &lt;/P&gt;&lt;P&gt;no asdm history enableit Ethernet @ irq09 de&lt;/P&gt;&lt;P&gt;arp timeout 14400001a.6d7c.846b   &lt;/P&gt;&lt;P&gt;nat-control           &lt;/P&gt;&lt;P&gt;global (Wan) 1 interface                       &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Lan) 1 0.0.0.0 0.0.0.0net @ irq11 dev 1 index 05 &lt;/P&gt;&lt;P&gt;static (Lan,Wan) xx.xxx.xxx.xxx xx.xxx.x.xx netmask 255.255.255.                            &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                                &lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 18:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770094#M1003601</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-07T18:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770095#M1003604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. you don't need the source port in this acl line.&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xx.xxx.xxx.xxx eq https host xx.xxx.x.x eq https &lt;/P&gt;&lt;P&gt;it should be...&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xx.xxx.xxx.xxx host xx.xxx.x.x eq https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. There is no point to have a "range 3268 3268"&lt;/P&gt;&lt;P&gt;it should be...&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp host xxx.xxx.xx.xx host xx.xxx.x.xx eq 3268 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. access-group 110 in interface Wan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Is the address in your static the same as the Wan address on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 18:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770095#M1003604</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-07T18:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770096#M1003608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The static is different then the wan ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the static is a 1-1 nat rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2007 18:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770096#M1003608</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-07T18:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770097#M1003612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still cannot get traffic to flow correctly. If I configure the same as my current firewall nothing works.I think I'm missing something simple but just cannot figure it out. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2007 12:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770097#M1003612</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-11T12:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770098#M1003618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you post latest config without all the extra characters that were included in your last one? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, it's ok to block out your external ip's with x's but could you just change the external addresses to something we can follow throughout the config, like 64.x.x.x? That way we know you haven't flipped your statics etc. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2007 13:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770098#M1003618</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-11T13:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770099#M1003620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA Version 7.2(2)19                    &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;Encryp&lt;/P&gt;&lt;P&gt;  shun   &lt;/P&gt;&lt;P&gt;domain-name fvxxc.comering of packets from un&lt;/P&gt;&lt;P&gt;enable password xnxxxsdsXC1MM encrypted                                         &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names     &lt;/P&gt;&lt;P&gt;dns-guardconnect a&lt;/P&gt;&lt;P&gt;!p&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0te-MC-Boot-Cisco-1.2t_static&lt;/P&gt;&lt;P&gt; nameif Wan&lt;/P&gt;&lt;P&gt;  terminal&lt;/P&gt;&lt;P&gt; security-level 0f syslogging to t&lt;/P&gt;&lt;P&gt; ip address 65.444.444.98 255.255.255.224KE microcode: CNlite-MC-IP&lt;/P&gt;&lt;P&gt;  test       &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1d interfacesg asdm informati&lt;/P&gt;&lt;P&gt; nameif Lan   &lt;/P&gt;&lt;P&gt;       &lt;/P&gt;&lt;P&gt; security-level 100 undebug         Di&lt;/P&gt;&lt;P&gt; ip address 10.146.4.12 255.255.255.0                   &lt;/P&gt;&lt;P&gt;no failover      &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt; no security-levelon to memory, netw&lt;/P&gt;&lt;P&gt; no ip addressl.0 0.0.0.0   &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Management0/0                    |||&lt;/P&gt;&lt;P&gt; nameif managementoasa#         &lt;/P&gt;&lt;P&gt;cis&lt;/P&gt;&lt;P&gt; security-level 100.0 0&lt;/P&gt;&lt;P&gt;        &lt;/P&gt;&lt;P&gt;cisco&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0-19-k8.bin&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00     &lt;/P&gt;&lt;P&gt; management-only         &lt;/P&gt;&lt;P&gt;INFO: &lt;/P&gt;&lt;P&gt;!n&lt;/P&gt;&lt;P&gt;passwd 2KxxxxdU encrypted disk0:/asa722-19-k8.bin         &lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-19-k8.bin        C i s c o  S y&lt;/P&gt;&lt;P&gt;ciscoasa(con&lt;/P&gt;&lt;P&gt;ftp mode passive00:00 mgcp 0:05:&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNSrsion 7.0(6)---------------&lt;/P&gt;&lt;P&gt; domain-name dsfff.com------------   &lt;/P&gt;&lt;P&gt;domain-na&lt;/P&gt;&lt;P&gt;access-list Wan_access_in extended permit tcp host 205.333.33.36 host 10.146.4.3hxxxC1MM encryptedtware Version 7.2(2)19                    &lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;time&lt;/P&gt;&lt;P&gt;dns-g&lt;/P&gt;&lt;P&gt;2 eq 3286   &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;mtu Lan 1500local countr&lt;/P&gt;&lt;P&gt;mtu Wan 1500dress       &lt;/P&gt;&lt;P&gt;no failovernterface Gi&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1e&lt;/P&gt;&lt;P&gt; shutdown.        &lt;/P&gt;&lt;P&gt; no nameifle timeout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin Cisc&lt;/P&gt;&lt;P&gt; no ip address products &lt;/P&gt;&lt;P&gt;no asdm history enableitEthernet0/3         &lt;/P&gt;&lt;P&gt;arp timeout 14400m&lt;/P&gt;&lt;P&gt; shutdownparty &lt;/P&gt;&lt;P&gt;nat-controlifmport, ex&lt;/P&gt;&lt;P&gt;nat (Lan) 0 0.0.0.0 0.0.0.0context   &lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;static (Lan,Wan) 65.444.444.106 10.146.4.32 netmask 255.255.255.255if management                 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; security-level 100ors and users ar&lt;/P&gt;&lt;P&gt;static (Lan,Wan) 65.444.444.101 10.146.4.47 netmask 255.255.255.255          &lt;/P&gt;&lt;P&gt; management-only and local count&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;passwd 2KdsdsfdsfsdfK&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2007 14:28:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770099#M1003620</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-11T14:28:57Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ACL's 5520</title>
      <link>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770100#M1003623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How are you capturing your config, it's still got a lot of extra/missing words and characters. But anyway your acl is wrong, and you have no access-group command to apply it. You need to use the 65. address in the acl, not the 10. Also not sure what you are trying to allow as it's not showing up in the config. I did this one for smtp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Wan_access_in extended permit tcp host 205.333.33.36 host 65.444.444.106 eq smtp&lt;/P&gt;&lt;P&gt;access-group Wan_access_in in interface Wan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2007 15:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-acl-s-5520/m-p/770100#M1003623</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-11T15:04:20Z</dc:date>
    </item>
  </channel>
</rss>

