<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuration of Firewall ASA5505 with Basic license in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3231715#M1048287</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;More information is necessary. Can you share you firewall config, that would help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-If I helped you somehow, please, rate it as useful.-&lt;/P&gt;</description>
    <pubDate>Wed, 13 Dec 2017 16:07:22 GMT</pubDate>
    <dc:creator>Flavio Miranda</dc:creator>
    <dc:date>2017-12-13T16:07:22Z</dc:date>
    <item>
      <title>Configuration of Firewall ASA5505 with Basic license</title>
      <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3231487#M1048270</link>
      <description>&lt;P&gt;I have an ASA-5505 Firewall with basic license.&lt;/P&gt;
&lt;P&gt;In my Workplace I have IP pool of 10.2.0.0/16 and sub-netting them to 10.2.xxx.xxx/22 networks for ease of maintenence. Every subnet have default gateway of 10.2.XXX.1 (like 10.2.56.1 as gateway).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a application server for one of the web application.&lt;/P&gt;
&lt;P&gt;IP address of that server is 172.22.14.1.&lt;/P&gt;
&lt;P&gt;I had tried to configure ASA-5505 with Web-Server but not able to reach my web application.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please suggest me configuration for ASA-5505.&lt;/P&gt;
&lt;P&gt;Thanks in Advance for Help.&lt;/P&gt;
&lt;P&gt; My mail ID kishan.s.r@gmail.com&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:56:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3231487#M1048270</guid>
      <dc:creator>kishan.s.r@gail.com</dc:creator>
      <dc:date>2020-02-21T14:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration of Firewall ASA5505 with Basic license</title>
      <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3231715#M1048287</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;More information is necessary. Can you share you firewall config, that would help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-If I helped you somehow, please, rate it as useful.-&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2017 16:07:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3231715#M1048287</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-12-13T16:07:22Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration of Firewall ASA5505 with Basic license</title>
      <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3232040#M1048331</link>
      <description>Please find running configuration of firewall as below.

ASA Version 8.2(5) 
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
name 192.168.1.10 WEB_SERVER
name 10.2.56.100 WEB_SERVER_OUTSIDE
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 10.2.56.220 255.255.252.0 
!
ftp mode passive
object-group network DM_INLINE_NETWORK_1
 network-object host WEB_SERVER_OUTSIDE
 network-object host WEB_SERVER
object-group network DM_INLINE_NETWORK_2
 network-object host WEB_SERVER_OUTSIDE
 network-object host WEB_SERVER
object-group network DM_INLINE_NETWORK_3
 network-object host WEB_SERVER_OUTSIDE
 network-object host WEB_SERVER
object-group network DM_INLINE_NETWORK_4
 network-object host WEB_SERVER_OUTSIDE
 network-object host WEB_SERVER
object-group protocol DM_INLINE_PROTOCOL_1
 protocol-object ip
 protocol-object icmp
 protocol-object udp
 protocol-object tcp
object-group protocol DM_INLINE_PROTOCOL_2
 protocol-object ip
 protocol-object icmp
 protocol-object udp
 protocol-object tcp
object-group protocol DM_INLINE_PROTOCOL_3
 protocol-object ip
 protocol-object icmp
 protocol-object udp
 protocol-object tcp
object-group protocol DM_INLINE_PROTOCOL_4
 protocol-object ip
 protocol-object icmp
 protocol-object udp
 protocol-object tcp
access-list outside_access extended permit object-group DM_INLINE_PROTOCOL_2 any object-group DM_INLINE_NETWORK_2 
access-list outside_access extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_3 any 
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_4 any object-group DM_INLINE_NETWORK_1 
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_3 object-group DM_INLINE_NETWORK_4 any 
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
static (outside,inside) WEB_SERVER WEB_SERVER_OUTSIDE netmask 255.255.255.255 
access-group inside_access_in in interface inside
access-group outside_access in interface outside
route inside 0.0.0.0 0.0.0.0 10.2.56.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.1.5-192.168.1.254 inside
!

threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
Cryptochecksum:dcdfbc57eeea40716289b8bf0b33e484</description>
      <pubDate>Thu, 14 Dec 2017 04:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3232040#M1048331</guid>
      <dc:creator>kishan.s.r@gail.com</dc:creator>
      <dc:date>2017-12-14T04:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration of Firewall ASA5505 with Basic license</title>
      <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3296387#M1048339</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you please attach the config within a .txt file and add a show route?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2017 18:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3296387#M1048339</guid>
      <dc:creator>Kornelia Gutierrez</dc:creator>
      <dc:date>2017-12-14T18:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration of Firewall ASA5505 with Basic license</title>
      <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3296586#M1048346</link>
      <description>Result of the command: "show running-config"&lt;BR /&gt;&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.1.10 WEB_SERVER&lt;BR /&gt;name 10.2.56.100 WEB_SERVER_OUTSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.2.56.220 255.255.252.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object host WEB_SERVER_OUTSIDE&lt;BR /&gt; network-object host WEB_SERVER&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object host WEB_SERVER_OUTSIDE&lt;BR /&gt; network-object host WEB_SERVER&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt; network-object host WEB_SERVER_OUTSIDE&lt;BR /&gt; network-object host WEB_SERVER&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt; network-object host WEB_SERVER_OUTSIDE&lt;BR /&gt; network-object host WEB_SERVER&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt; protocol-object ip&lt;BR /&gt; protocol-object icmp&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt; protocol-object ip&lt;BR /&gt; protocol-object icmp&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;BR /&gt; protocol-object ip&lt;BR /&gt; protocol-object icmp&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_4&lt;BR /&gt; protocol-object ip&lt;BR /&gt; protocol-object icmp&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access extended permit object-group DM_INLINE_PROTOCOL_2 any object-group DM_INLINE_NETWORK_2 &lt;BR /&gt;access-list outside_access extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_3 any &lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_4 any object-group DM_INLINE_NETWORK_1 &lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_3 object-group DM_INLINE_NETWORK_4 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;static (outside,inside) WEB_SERVER WEB_SERVER_OUTSIDE netmask 255.255.255.255 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access in interface outside&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 10.2.56.220 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;  message-length maximum client auto&lt;BR /&gt;  message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;  inspect dns preset_dns_map &lt;BR /&gt;  inspect ftp &lt;BR /&gt;  inspect h323 h225 &lt;BR /&gt;  inspect h323 ras &lt;BR /&gt;  inspect rsh &lt;BR /&gt;  inspect rtsp &lt;BR /&gt;  inspect esmtp &lt;BR /&gt;  inspect sqlnet &lt;BR /&gt;  inspect skinny  &lt;BR /&gt;  inspect sunrpc &lt;BR /&gt;  inspect xdmcp &lt;BR /&gt;  inspect sip  &lt;BR /&gt;  inspect netbios &lt;BR /&gt;  inspect tftp &lt;BR /&gt;  inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:dcdfbc57eeea40716289b8bf0b33e484&lt;BR /&gt;: end</description>
      <pubDate>Fri, 15 Dec 2017 04:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3296586#M1048346</guid>
      <dc:creator>kishan.s.r@gail.com</dc:creator>
      <dc:date>2017-12-15T04:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration of Firewall ASA5505 with Basic license</title>
      <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3296712#M1048352</link>
      <description>&lt;P&gt;Please Find attached files of running configuration of CISCO ASA5505.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2017 09:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3296712#M1048352</guid>
      <dc:creator>kishan.s.r@gail.com</dc:creator>
      <dc:date>2017-12-15T09:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration of Firewall ASA5505 with Basic license</title>
      <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3296713#M1048354</link>
      <description>&lt;P&gt;Please Find attached files of running configuration of CISCO ASA5505.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2017 09:52:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3296713#M1048354</guid>
      <dc:creator>kishan.s.r@gail.com</dc:creator>
      <dc:date>2017-12-15T09:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration of Firewall ASA5505 with Basic license</title>
      <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3296890#M1048357</link>
      <description>&lt;P&gt;Hello Kishan,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was checking your configuration, and I have some doubts, could you please help me understand the following;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. The outside interface is configured within the network 10.2.56.0/22 as shown in the configuration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface Vlan2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 10.2.56.220 255.255.252.0&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;But the default route its missconfigured is pointing to the inside interface instead of the outside interface:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route inside 0.0.0.0 0.0.0.0 10.2.56.220 1&amp;nbsp; --&amp;gt; 10.2.56.220 is an ip address within the outside interface range, more over is the ip address of the outside interface itself.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. On the network diagram it seems that the 172.22.14.1 is behind the inside interface, I am not sure if it is directly connected but the ASA inside interface is configured within the&amp;nbsp;192.168.1.0 subnet and there is no route for 172.22.14 subnet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please let me know if thats the way it should be configured.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2017 15:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3296890#M1048357</guid>
      <dc:creator>Kornelia Gutierrez</dc:creator>
      <dc:date>2017-12-15T15:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration of Firewall ASA5505 with Basic license</title>
      <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3297572#M1048359</link>
      <description>&lt;P&gt;Dear,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Actually i am trying to find out by changing gateway and so om so might be the configuration is not so perfect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please go through pdf file attached with reply which clarify the network and accordingly please suggest me changes or send me new configuration file...&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 04:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3297572#M1048359</guid>
      <dc:creator>kishan.s.r@gail.com</dc:creator>
      <dc:date>2017-12-18T04:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration of Firewall ASA5505 with Basic license</title>
      <link>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3298371#M1048362</link>
      <description>Dear Kornelia Gutierrez,&lt;BR /&gt;&lt;BR /&gt;             Thanks for Prompt reply.&lt;BR /&gt;             Please Note that I want 192.168.1.0 interface is configure for&lt;BR /&gt;firewall only. And outside interface which is unsecured zone is 10.2.56.0/22&lt;BR /&gt;and secured zone is 172.22.14.0/24.&lt;BR /&gt;</description>
      <pubDate>Tue, 19 Dec 2017 03:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-of-firewall-asa5505-with-basic-license/m-p/3298371#M1048362</guid>
      <dc:creator>kishan.s.r@gail.com</dc:creator>
      <dc:date>2017-12-19T03:38:48Z</dc:date>
    </item>
  </channel>
</rss>

