<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I see, you have not added in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059443#M135750</link>
    <description>&lt;P&gt;I see, you have not added access-group to apply to interface. Please add the following command and test:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-group OUTSIDE in interface&amp;nbsp;OUTSIDE&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
    <pubDate>Tue, 09 May 2017 16:42:54 GMT</pubDate>
    <dc:creator>Ajay Saini</dc:creator>
    <dc:date>2017-05-09T16:42:54Z</dc:date>
    <item>
      <title>ASA configuration help</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059440#M135745</link>
      <description>&lt;P&gt;Hello, Im having a lot of trouble setting up an ASA 5505 in Packet Tracer v7&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I keep getting the same message when in Simulation mode "The ASA does not allow and traffic from a lower security interface to a higher security interface unless it is explicitly permitted by an extended access list"&lt;/P&gt;
&lt;P&gt;I am trying to allow HTTP, FTP and ICMP through the ASA firewall.&lt;/P&gt;
&lt;P&gt;network is simply R1 -- ASA -- R2&lt;/P&gt;
&lt;P&gt;R1 G0/0: 77.97.151.1 255.255.248&lt;/P&gt;
&lt;P&gt;ASA Vlan1: 77.97.151.2 255.255.255.248&lt;/P&gt;
&lt;P&gt;ASA Vlan2: 77.97.151.3 255.255.255.248&lt;/P&gt;
&lt;P&gt;R2 G0/1: 77.97.151.4 255.255.255.248&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA configs:&lt;/P&gt;
&lt;P&gt;interface Vlan1&lt;/P&gt;
&lt;P&gt;nameif INSIDE&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip address 77.97.151.2 255.255.255.248&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan2&lt;/P&gt;
&lt;P&gt;nameif OUTSIDE&lt;/P&gt;
&lt;P&gt;security-level 0&lt;/P&gt;
&lt;P&gt;ip address 77.97.151.3 255.255.255.248&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;route OUTSIDE 0.0.0.0 0.0.0.0 77.97.151.1 1&lt;/P&gt;
&lt;P&gt;route INSIDE 0.0.0.0 0.0.0.0 77.97.151.4 1&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list OUTSIDE extended permit tcp any any eq www&lt;/P&gt;
&lt;P&gt;access-list OUTSIDE extended permit tcp any any eq ftp&lt;/P&gt;
&lt;P&gt;access-list OUTSIDE extended permit icmp any any echo&lt;/P&gt;
&lt;P&gt;access-list OUTSIDE extended permit icmp any any unreachable&lt;/P&gt;
&lt;P&gt;access-list OUTSIDE extended permit icmp any any echo-reply&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;class-map inspection_default&lt;/P&gt;
&lt;P&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;policy-map asa_global_fw_policy&lt;/P&gt;
&lt;P&gt;class inspection_default&lt;/P&gt;
&lt;P&gt;inspect ftp&lt;/P&gt;
&lt;P&gt;inspect icmp&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;service-policy asa_global_fw_policy global&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Im not sure what im missing to make this work, currently i cant get any traffic through the firewall.&lt;/P&gt;
&lt;P&gt;attached full config file for reference.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059440#M135745</guid>
      <dc:creator>AceScottie</dc:creator>
      <dc:date>2019-03-12T09:20:10Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059441#M135747</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;By default, you would require an access-list to allow traffic from low security level to high security level. That the design of ASA. If you have an access-list and its not working, please attach the packet-tracer output.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/traffic.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 16:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059441#M135747</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-09T16:28:20Z</dc:date>
    </item>
    <item>
      <title>What output ?</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059442#M135749</link>
      <description>&lt;P&gt;What output ?&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 16:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059442#M135749</guid>
      <dc:creator>AceScottie</dc:creator>
      <dc:date>2017-05-09T16:29:24Z</dc:date>
    </item>
    <item>
      <title>I see, you have not added</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059443#M135750</link>
      <description>&lt;P&gt;I see, you have not added access-group to apply to interface. Please add the following command and test:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-group OUTSIDE in interface&amp;nbsp;OUTSIDE&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 16:42:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059443#M135750</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-09T16:42:54Z</dc:date>
    </item>
    <item>
      <title>Added that command after</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059444#M135752</link>
      <description>&lt;P&gt;Added that command after reading the link you provided.&lt;BR /&gt;Still having some issues however.&lt;/P&gt;
&lt;P&gt;The ping can only travel one way.&lt;/P&gt;
&lt;P&gt;This is due to default route being set to "&lt;SPAN&gt;route INSIDE 0.0.0.0 0.0.0.0 77.97.151.4 1"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;im not sure how to rout both incoming traffic and out going traffic without using 0.0.0.0 0.0.0.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;currently the ping from R1 will reach R2 but the response will then bounce back from the ASA back to R2 and fail.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 08:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059444#M135752</guid>
      <dc:creator>AceScottie</dc:creator>
      <dc:date>2017-05-10T08:23:49Z</dc:date>
    </item>
    <item>
      <title>I also noticied that you have</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059445#M135754</link>
      <description>&lt;P&gt;I also noticied that you have 2 default gateways:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;route OUTSIDE 0.0.0.0 0.0.0.0 77.97.151.1 1&lt;/P&gt;
&lt;P&gt;route INSIDE 0.0.0.0 0.0.0.0 77.97.151.4 1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;you can only have one gateway where you can not define specific routes. Remove the INSIDE route and test. ASA knows the inside subnet, so you can test it without that route. The default route on ASA will be needed to send any traffic to non-directly connected subnets.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 13:16:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059445#M135754</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-10T13:16:25Z</dc:date>
    </item>
    <item>
      <title>I think you have wrong subnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059446#M135755</link>
      <description>&lt;P&gt;I think you have wrong subnet mask assigned on ASA and R2. if you have 255.255.255.248 on R2 it will think that&amp;nbsp;&lt;SPAN&gt;77.97.151.1 is in my same subnet, So R2 will do a local ARP instead sending traffic to its gateway(ASA LAN interface).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ashish&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 14:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059446#M135755</guid>
      <dc:creator>Ashish Jhaldiyal</dc:creator>
      <dc:date>2017-05-10T14:32:42Z</dc:date>
    </item>
    <item>
      <title>This is one of the main</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059447#M135756</link>
      <description>&lt;P&gt;This is one of the main issues. I dont need it to connect to any non directly connected subnets.&lt;/P&gt;
&lt;P&gt;I removed the inside default route and now it wont ping past the firewall.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have included the packet tracer file i am using inside the zip. Using Packet Tracer v7&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 15:45:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059447#M135756</guid>
      <dc:creator>AceScottie</dc:creator>
      <dc:date>2017-05-10T15:45:15Z</dc:date>
    </item>
    <item>
      <title>finally found a solution</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059448#M135757</link>
      <description>&lt;P&gt;finally found a solution thanks to one of your comments.&lt;/P&gt;
&lt;P&gt;you said it would auto forward to the inside interface so i changed each side to be a 252 mask and reconfigured the ip address.&lt;/P&gt;
&lt;P&gt;I had it as a 248 network due to an earlier error where it wouldnt try pining due to the next hop not being on the same network, it seems that that error and the fix i made went into creating this error&lt;/P&gt;
&lt;P&gt;so now i have R1 - ASA - R2&lt;/P&gt;
&lt;P&gt;R1 77.97.151.1 255.255.255.252&lt;/P&gt;
&lt;P&gt;ASA outside 77.97.151.2 255.255.255.252&lt;/P&gt;
&lt;P&gt;ASA inside 77.97.151.5 255.255.255.252&lt;/P&gt;
&lt;P&gt;R2 77.97.151.6 255.255.255.252&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This now seems to work perfectly, thanks everyone for their help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 17:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-help/m-p/3059448#M135757</guid>
      <dc:creator>AceScottie</dc:creator>
      <dc:date>2017-05-10T17:19:18Z</dc:date>
    </item>
  </channel>
</rss>

