<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL on ASA5506 issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4259927#M1076723</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324818"&gt;@Ditlev Weinreich&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What direction and on what interface(s) is that ACL applied?&lt;/P&gt;
&lt;P&gt;Does the destination 10.100.20.1 have a route back to 10.150.128.0/24 via the ASA?&lt;/P&gt;
&lt;P&gt;Run a packet-tracer from the CLI and provide the output&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 17 Dec 2020 10:22:00 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-12-17T10:22:00Z</dc:date>
    <item>
      <title>ACL on ASA5506 issue</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4259907#M1076721</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've just finished creating NAT on my ASA, which is mentioned in &lt;A href="https://community.cisco.com/t5/network-security/hide-a-subnet-to-another-subnet-nat/m-p/4258890#M1076678" target="_self"&gt;another discussion&lt;/A&gt;. Now I'm doing a test with laptops, but it seems that I can't get traffic through. I believe it's an ACL-issue. I need to pass all traffic through from both sides.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My setup:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MY LAN --- (outside) ASA5506 (inside) --- 10.150.128.0/24 seen from MY LAN (but really 192.168.1.x/24)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My config:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif RK-LAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.100.20.20 255.255.252.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif CTS-LAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network CTS-LAN&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network CTS-LAN-nat&lt;BR /&gt;subnet 10.150.128.0 255.255.255.0&lt;BR /&gt;access-list ALLOW-ALL extended permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (CTS-LAN,RK-LAN) source static CTS-LAN CTS-LAN-nat&lt;/P&gt;&lt;P&gt;route RK-LAN 0.0.0.0 0.0.0.0 10.100.20.1 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RK-ASA-CTS# sh xlate&lt;BR /&gt;2 in use, 2 most used&lt;BR /&gt;Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,&lt;BR /&gt;s - static, T - twice, N - net-to-net&lt;BR /&gt;NAT from CTS-LAN:192.168.1.0/24 to RK-LAN:10.150.128.0/24&lt;BR /&gt;flags sT idle 43:32:35 timeout 0:00:00&lt;BR /&gt;NAT from RK-LAN:0.0.0.0/0 to CTS-LAN:0.0.0.0/0&lt;BR /&gt;flags sIT idle 43:32:35 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RK-ASA-CTS# sh access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;alert-interval 300&lt;BR /&gt;access-list ALLOW-ALL; 1 elements; name hash: 0x141503bb&lt;BR /&gt;access-list ALLOW-ALL line 1 extended permit ip any any (hitcnt=52) 0x381ae15c&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying with my laptop (192.168.1.5) on the CTS-LAN to ping IP: 10.100.20.1 on the RK-LAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What did I miss?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 09:59:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4259907#M1076721</guid>
      <dc:creator>Ditlev Weinreich</dc:creator>
      <dc:date>2020-12-17T09:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ASA5506 issue</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4259927#M1076723</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324818"&gt;@Ditlev Weinreich&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What direction and on what interface(s) is that ACL applied?&lt;/P&gt;
&lt;P&gt;Does the destination 10.100.20.1 have a route back to 10.150.128.0/24 via the ASA?&lt;/P&gt;
&lt;P&gt;Run a packet-tracer from the CLI and provide the output&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 10:22:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4259927#M1076723</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-12-17T10:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ASA5506 issue</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4259989#M1076727</link>
      <description>&lt;P&gt;Hi Rob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for taking your time to reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My test-setup right now is:&lt;/P&gt;&lt;P&gt;Laptop (10.100.20.1/22 - Default Gateway: 10.100.20.20) --- (outside/RK-LAN/10.100.20.20/22) ASA (inside/CTS-LAN/192.168.1.1/24) --- Laptop (192.168.1.5/24 - Default Gateway: 192.168.1.1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So to answer your question, then yes. Since both of my laptops have default gateways pointing to the ASA interfaces, then the route to 10.150.128.0/24 should be handled in the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;RK-ASA-CTS# packet-tracer input CTS-LAN tcp 192.168.1.5 1234 10.100.20.1 80&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Phase: 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ROUTE-LOOKUP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: Resolve Egress Interface&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;found next-hop 10.100.20.1 using egress ifc RK-LAN&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Phase: 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ACCESS-LIST&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: DROP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Implicit Rule&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Result:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-interface: RK-LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-line-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Action: drop&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 11:33:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4259989#M1076727</guid>
      <dc:creator>Ditlev Weinreich</dc:creator>
      <dc:date>2020-12-17T11:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ASA5506 issue</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4259993#M1076728</link>
      <description>&lt;P&gt;Is that all the output of packet-tracer? What ASA version are you running?&lt;/P&gt;
&lt;P&gt;Please provide the full configuration for review&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 11:49:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4259993#M1076728</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-12-17T11:49:07Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ASA5506 issue</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4260010#M1076729</link>
      <description>&lt;P&gt;Well,... this I don't understand.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the setup described above, I get no hits on the ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both laptops are pinging the opposite laptop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Laptop1 (10.100.20.1) pinging: 10.150.128.5&lt;/P&gt;&lt;P&gt;Laptop2 (192.168.1.5) pinging: 10.100.20.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;RK-ASA-CTS# sh access-list &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;alert-interval 300&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list ALLOW-ALL; 1 elements; name hash: 0x141503bb&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list ALLOW-ALL line 1 extended permit ip any any (hitcnt=0) 0x381ae15c &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;RK-ASA-CTS# packet-tracer input CTS-LAN tcp 192.168.1.5 1234 10.100.20.1 80&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Phase: 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ROUTE-LOOKUP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: Resolve Egress Interface&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: ALLOW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;found next-hop 10.100.20.1 using egress ifc RK-LAN&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Phase: 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Type: ACCESS-LIST&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subtype: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Result: DROP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Config:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Implicit Rule&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Additional Information:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Result:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-interface: RK-LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;output-line-status: up&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Action: drop&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;RK-ASA-CTS#&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when I connect my C3560CX instead of Laptop1, then I get hits on the ACL, but still no reply. The C3560CX has a dedicaded VLAN and interface, configured with same IP as Laptop1 - just without the route to 10.150.128.0/24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just saw your reply. I'll send complete config in my next reply.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 11:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4260010#M1076729</guid>
      <dc:creator>Ditlev Weinreich</dc:creator>
      <dc:date>2020-12-17T11:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ASA5506 issue</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4260011#M1076730</link>
      <description>&lt;P&gt;Complete config&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;RK-ASA-CTS# sh run&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;: Saved&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;: &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;: Serial Number: JAD202005WX&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ASA Version 9.5(2) &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;hostname RK-ASA-CTS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;domain-name CTS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;enable password dgeB1J.VYUHUcYTL encrypted&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session deny tcp any4 any4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session deny tcp any4 any6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session deny tcp any6 any4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session deny tcp any6 any6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session deny udp any4 any4 eq domain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session deny udp any4 any6 eq domain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session deny udp any6 any4 eq domain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;xlate per-session deny udp any6 any6 eq domain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;names&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet1/1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif RK-LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 100&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address 10.100.20.20 255.255.252.0 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;! &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet1/2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif CTS-LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 100&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address 192.168.1.1 255.255.255.0 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet1/3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no nameif&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no security-level&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet1/4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no nameif&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no security-level&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet1/5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no nameif&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no security-level&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet1/6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no nameif&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no security-level&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet1/7&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no nameif&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no security-level&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet1/8&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no nameif&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no security-level&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Management1/1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;management-only&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif management&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ftp mode passive&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dns server-group DefaultDNS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;domain-name CTS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network CTS-LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;subnet 192.168.1.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network CTS-LAN-nat&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;subnet 10.150.128.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list ALLOW-ALL extended permit ip any any &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;pager lines 24&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu RK-LAN 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu CTS-LAN 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu management 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no asdm history enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;arp timeout 14400&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no arp permit-nonconnected&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (CTS-LAN,RK-LAN) source static CTS-LAN CTS-LAN-nat&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group ALLOW-ALL global&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route RK-LAN 0.0.0.0 0.0.0.0 10.100.20.1 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout xlate 3:00:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout pat-xlate 0:00:30&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout floating-conn 0:00:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;user-identity default-domain LOCAL&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;aaa authentication ssh console LOCAL &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http server enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http 10.20.40.0 255.255.255.0 RK-LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no snmp-server location&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no snmp-server contact&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;service sw-reset-button&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto ipsec security-association pmtu-aging infinite&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto ca trustpool policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;telnet timeout 5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh stricthostkeycheck&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh 10.20.40.0 255.255.255.0 RK-LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh timeout 5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh key-exchange group dh-group1-sha1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;console timeout 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;threat-detection basic-threat&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;threat-detection statistics access-list&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no threat-detection statistics tcp-intercept&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;username admin password DzZkG9zknNTbolp4 encrypted privilege 15&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;! &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class-map inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;match default-inspection-traffic&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map type inspect dns preset_dns_map&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;parameters&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;message-length maximum client auto&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;message-length maximum 512&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect ftp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect h323 h225 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect h323 ras &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect ip-options &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect netbios &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect rsh &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect rtsp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect skinny &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect esmtp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect sqlnet &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect sunrpc &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect tftp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect sip &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect xdmcp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect dns preset_dns_map &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map type inspect dns migrated_dns_map_1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;parameters&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;message-length maximum client auto&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;message-length maximum 512&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;service-policy global_policy global&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;prompt hostname context &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no call-home reporting anonymous&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;call-home&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;profile CiscoTAC-1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no active&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;destination address email callhome@cisco.com&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;destination transport-method http&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;subscribe-to-alert-group diagnostic&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;subscribe-to-alert-group environment&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;subscribe-to-alert-group inventory periodic monthly&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;subscribe-to-alert-group configuration periodic monthly&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;subscribe-to-alert-group telemetry periodic daily&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Cryptochecksum:360d62599d071045a47c6cace21a6715&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;: end&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 11:57:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4260011#M1076730</guid>
      <dc:creator>Ditlev Weinreich</dc:creator>
      <dc:date>2020-12-17T11:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ASA5506 issue</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4260013#M1076732</link>
      <description>&lt;P&gt;You've got the same security-level on both interfaces. Use the command &lt;STRONG&gt;same-security-traffic permit&amp;nbsp;inter-interface.&lt;/STRONG&gt; This allows traffic to enter an interface and exit from another interface of the same security level.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 12:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4260013#M1076732</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-12-17T12:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ASA5506 issue</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4260015#M1076734</link>
      <description>&lt;P&gt;AAAAAH. Thank you so much.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 12:03:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa5506-issue/m-p/4260015#M1076734</guid>
      <dc:creator>Ditlev Weinreich</dc:creator>
      <dc:date>2020-12-17T12:03:32Z</dc:date>
    </item>
  </channel>
</rss>

