<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CISCO ASA 5525 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871268#M1102500</link>
    <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/troubleshooting-access-problems-using-packet-tracer/ta-p/3114976" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/troubleshooting-access-problems-using-packet-tracer/ta-p/3114976&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 10 Jul 2023 19:22:57 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-07-10T19:22:57Z</dc:date>
    <item>
      <title>CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871256#M1102497</link>
      <description>&lt;P&gt;How will I verify that which policy is currently active for incoming traffic received from Dmz ?&lt;/P&gt;&lt;P&gt;I will need to move internal traffic which is coming from Dmz to another firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advice&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 19:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871256#M1102497</guid>
      <dc:creator>ddesai</dc:creator>
      <dc:date>2023-07-10T19:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871258#M1102498</link>
      <description>&lt;P&gt;best way is using packet tracer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;see traffic which ACL hitting.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 19:13:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871258#M1102498</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-10T19:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871263#M1102499</link>
      <description>&lt;P&gt;Thanks for the update.&lt;/P&gt;&lt;P&gt;Can we check with heat count?&lt;/P&gt;&lt;P&gt;Can we check from any logs ?&lt;/P&gt;&lt;P&gt;Do I need to download packet tracert or is it inbuild in cisco ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;I never use CISCO ASA so please guide me step by step that will be great help.&lt;/P&gt;&lt;P&gt;few applications pending to move from cisco ASA to new firewall so I am looking for which application still running in CISCO ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 19:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871263#M1102499</guid>
      <dc:creator>ddesai</dc:creator>
      <dc:date>2023-07-10T19:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871268#M1102500</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/troubleshooting-access-problems-using-packet-tracer/ta-p/3114976" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/troubleshooting-access-problems-using-packet-tracer/ta-p/3114976&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 19:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871268#M1102500</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-10T19:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871313#M1102504</link>
      <description>&lt;P&gt;you can see which rules are being hit in the access-list using either ASDM where you will see the hit count on the right of each rule, or using show access-list &amp;lt;access-list name&amp;gt; which will also show you a hit count for each rule.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 21:28:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871313#M1102504</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-07-10T21:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871339#M1102506</link>
      <description>&lt;P&gt;in Packet tracer which port mention as source&amp;nbsp; port&amp;nbsp; ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;destination port details i found from policy&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 22:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871339#M1102506</guid>
      <dc:creator>ddesai</dc:creator>
      <dc:date>2023-07-10T22:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871341#M1102507</link>
      <description>&lt;P&gt;Can i get heat count latest date and time stamp to know when policy used last date and time?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 22:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871341#M1102507</guid>
      <dc:creator>ddesai</dc:creator>
      <dc:date>2023-07-10T22:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871350#M1102508</link>
      <description>&lt;P&gt;How i can find out interal traffic to DMZ policy details from cisco asa 5525 ?&amp;gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jul 2023 23:06:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871350#M1102508</guid>
      <dc:creator>ddesai</dc:creator>
      <dc:date>2023-07-10T23:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871483#M1102513</link>
      <description>&lt;P&gt;DMZ interfaces are usually set at 50 security level, but they could be with any security level between 0 and 100. If you do "sh nameif" you should see the interfaces names as well as their security levels. From there take the interfaces names that are configured with a security level between 0 and 100 and run some packet capture on them while you are generating some traffic and check if you get any output. You can run packet capture with the command "cap &amp;lt; name &amp;gt; interface &amp;lt; the interface name &amp;gt; match ip host &amp;lt; source IP &amp;gt; host &amp;lt; destination IP &amp;gt;. Regarding the ACL hits, they won't give any details about the date/time, if you want to get those details you would need to add "log" keyword at the end of the interested ACL entries and then look at the firewall logs, but it is not recommended as it would consume more resources on the device.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 06:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871483#M1102513</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-11T06:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871541#M1102521</link>
      <description>&lt;P&gt;again use packet tracer,&amp;nbsp;&lt;BR /&gt;packet tracer input DMZ &amp;lt;subet in DMZ you want to check&amp;gt;&amp;lt;subet in INside or OUTside&amp;gt; detail&amp;nbsp;&lt;BR /&gt;this will give you exactly&amp;nbsp;&lt;BR /&gt;1- NATing using&amp;nbsp;&lt;BR /&gt;2- ACL using (INbound and OUTbound)&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 08:49:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871541#M1102521</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-11T08:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871550#M1102526</link>
      <description>&lt;P&gt;You will not get a time and date on the hitcount unfortunately. So what you could do is clear the counter and let it run a week or two to get an indication of what is being used.&lt;/P&gt;
&lt;P&gt;To see which access-list is being used for which interface, if that is what you mean, you can issue the show running-config access-group which will give you the access-list name and the interface it is associated with&lt;/P&gt;
&lt;P&gt;ASAt# show running-config access-group &lt;BR /&gt;access-group &amp;lt;access-list&amp;gt; in interface &amp;lt;interface name&amp;gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 08:59:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871550#M1102526</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-07-11T08:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871852#M1102550</link>
      <description>&lt;P&gt;Thanks, and appreciated your answer,&amp;nbsp;&lt;/P&gt;&lt;P&gt;which option will clear heat counter?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 15:39:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871852#M1102550</guid>
      <dc:creator>ddesai</dc:creator>
      <dc:date>2023-07-11T15:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871854#M1102551</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts - for sure will do Thanks&amp;nbsp;for reminding&amp;nbsp;me appreciated.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 15:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871854#M1102551</guid>
      <dc:creator>ddesai</dc:creator>
      <dc:date>2023-07-11T15:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871855#M1102552</link>
      <description>&lt;P&gt;Thanks, and appreciated your update but when i open packet tracer in firewall policy i could not find source port details rest of things i can find out so what port mention as a source port.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 15:43:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871855#M1102552</guid>
      <dc:creator>ddesai</dc:creator>
      <dc:date>2023-07-11T15:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871868#M1102553</link>
      <description>&lt;P&gt;You can use as port&amp;nbsp;&lt;/P&gt;
&lt;P&gt;12345 &amp;lt;&amp;lt;- randomly port number&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Specific port number&amp;nbsp; if you want to check server.&lt;/P&gt;
&lt;P&gt;For example&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Packet tracer input DMZ tcp 1.1.1.1 80 2.2.2.2 12345&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Packet tracer input OUTside tcp 2.2.2.2 12345 1.1.1.1 80&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 15:55:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871868#M1102553</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-07-11T15:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871881#M1102554</link>
      <description>If I am adding source port as a random than it give me error.&lt;BR /&gt;&lt;BR /&gt;Can I add for all in pakcet tracer souce port 80 or https ?&lt;BR /&gt;&lt;BR /&gt;Destination port I have mentioned as per Cisco policy.&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Jul 2023 16:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871881#M1102554</guid>
      <dc:creator>ddesai</dc:creator>
      <dc:date>2023-07-11T16:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871906#M1102557</link>
      <description>&lt;P&gt;In Cisco ASA ASDM login while I am taking backup manually it was asking for key what is key about ?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 17:25:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871906#M1102557</guid>
      <dc:creator>ddesai</dc:creator>
      <dc:date>2023-07-11T17:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871936#M1102564</link>
      <description>&lt;P&gt;You can use the command "clear access-list &amp;lt; the access list name &amp;gt; counters".&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 18:58:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871936#M1102564</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-11T18:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871940#M1102565</link>
      <description>&lt;P&gt;Could you please share that screen? I think that key is the protection key that you would use in case you need to restore the config from that backup file.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 19:19:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871940#M1102565</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-11T19:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871945#M1102566</link>
      <description>&lt;P&gt;When you run packet tracer you should have the traffic flow that you want to test in mind. You can put any port in the source or in the destination, but those ports should match the traffic flow that you are trying to simulate.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 19:20:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5525/m-p/4871945#M1102566</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-11T19:20:38Z</dc:date>
    </item>
  </channel>
</rss>

