<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 5510 config  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/5510-config/m-p/679454#M1031149</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I pulled it off to clean addressing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Feb 2007 21:07:53 GMT</pubDate>
    <dc:creator>woody48055</dc:creator>
    <dc:date>2007-02-12T21:07:53Z</dc:date>
    <item>
      <title>5510 config</title>
      <link>https://community.cisco.com/t5/network-security/5510-config/m-p/679452#M1031093</link>
      <description>&lt;P&gt;Help&lt;/P&gt;&lt;P&gt;I have been hitting my head against this brick wall called an ASA5510. I was trying to configure it as a straight firewall with a DMZ interface and connecting a DNS server to that. But right now I would be happy with just passing HTTP between int 0/0 to 0/2&lt;/P&gt;&lt;P&gt;Current config is attached&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:32:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-config/m-p/679452#M1031093</guid>
      <dc:creator>woody48055</dc:creator>
      <dc:date>2019-03-11T09:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 config</title>
      <link>https://community.cisco.com/t5/network-security/5510-config/m-p/679453#M1031116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config is missing ..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2007 21:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-config/m-p/679453#M1031116</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-02-12T21:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 config</title>
      <link>https://community.cisco.com/t5/network-security/5510-config/m-p/679454#M1031149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I pulled it off to clean addressing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2007 21:07:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-config/m-p/679454#M1031149</guid>
      <dc:creator>woody48055</dc:creator>
      <dc:date>2007-02-12T21:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 config</title>
      <link>https://community.cisco.com/t5/network-security/5510-config/m-p/679455#M1031180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;config is attached after edits&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2007 21:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-config/m-p/679455#M1031180</guid>
      <dc:creator>woody48055</dc:creator>
      <dc:date>2007-02-12T21:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 config</title>
      <link>https://community.cisco.com/t5/network-security/5510-config/m-p/679456#M1031203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Setting all the 3 interfaces at same security-level will cause problems. Here is what is recommended:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside interface (security-level 0)&lt;/P&gt;&lt;P&gt;DMZ interface (security-level 50)&lt;/P&gt;&lt;P&gt;Inside interface (security-level 100), you can enter following commands to set interfaces accordingly-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; security 0&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; security 100&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; security 50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (DMZ) 200 10.10.RRR.RRR 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 200 10.30.xxx.xxx 255.255.255.0&lt;/P&gt;&lt;P&gt;no global (DMZ) 200 10.30.RRR.RRR-10.30.RRR.RRR netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;global (DMZ) 200 interface&lt;/P&gt;&lt;P&gt;nat (inside) 200 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please implement above commands.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2007 21:18:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-config/m-p/679456#M1031203</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-02-12T21:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 config</title>
      <link>https://community.cisco.com/t5/network-security/5510-config/m-p/679457#M1031219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;still not passing any traffic attached updated config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Feb 2007 21:42:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-config/m-p/679457#M1031219</guid>
      <dc:creator>woody48055</dc:creator>
      <dc:date>2007-02-12T21:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 config</title>
      <link>https://community.cisco.com/t5/network-security/5510-config/m-p/679458#M1031233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi still using security 50 for all the interfaces.  You could use the below command to allow traffic to traverse the firewall but you really should change the secutity levels as recommended on previous posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps   ..  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 00:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-config/m-p/679458#M1031233</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2007-02-13T00:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 config</title>
      <link>https://community.cisco.com/t5/network-security/5510-config/m-p/679459#M1031242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you also add following commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no service-policy outside-policy interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had mentioned these command also earlier:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 200 10.30.xxx.xxx 255.255.255.0&lt;/P&gt;&lt;P&gt;global (DMZ) 200 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then issue "clear xlate".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After these commands, let me know from 10.30.x.x (DMZ) network if you&lt;/P&gt;&lt;P&gt;are able to ping the default gateway of PIX.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 00:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-config/m-p/679459#M1031242</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-02-13T00:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 config</title>
      <link>https://community.cisco.com/t5/network-security/5510-config/m-p/679460#M1031248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First off let me thank you for all your help it is greatly appreciated. I have attached the current config of the ASA5510 with the various commands highlighted; this is for my benefit, so that I am assured that they were entered correctly. As I have been working with this for 2+ weeks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some additional info this device is going in place of an old firewall that was on a NT4.0 server running gauntlet s/w. I have reused the addresses that are currently on the current FW and whenever testing of the ASA configuration it is inserted into the gauntlets place removing it from the circuit. None of our equipment filters MAC addresses so that cannot be an issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 14:05:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-config/m-p/679460#M1031248</guid>
      <dc:creator>woody48055</dc:creator>
      <dc:date>2007-02-13T14:05:07Z</dc:date>
    </item>
  </channel>
</rss>

