<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic did apply the rule did not in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071029#M147199</link>
    <description>&lt;P&gt;did apply the rule did not work i did not write this configuration but if u can see theres already a nat between printer &amp;amp; outside which means i dont need extra nat on port&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (proxy,outside) source dynamic any interface&lt;BR /&gt;nat (student's-laptops,outside) source dynamic any interface&lt;BR /&gt;nat(server, student's-laptops) source dynamic any interface&lt;BR /&gt;nat (server,outside) source dynamic any interface&lt;BR /&gt;nat (IC&amp;amp;ID,server) source dynamic any interface&lt;BR /&gt;nat (IC&amp;amp;ID,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network printer&lt;BR /&gt; nat (any,any) static 192.168.160.10&lt;/P&gt;
&lt;P&gt;as u can see in previous configuration &amp;nbsp;also as i said i can ping 192.168.200.6 from printer vlan what is the problem? should i delete all nat ru;es and keep only configuration u mentioned&lt;/P&gt;</description>
    <pubDate>Sun, 05 Feb 2017 10:06:32 GMT</pubDate>
    <dc:creator>ranasaadnoori</dc:creator>
    <dc:date>2017-02-05T10:06:32Z</dc:date>
    <item>
      <title>outside to inside access problem</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071021#M147191</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;i have an asa 5520 firewall transparent mode i configured samba on my server i have hosts from outside and need them to login to shared files no server theres a ping from server vlan to hosts i configured an outbound access list on server interface but don't get reply from server an users cant login to shared folder&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:51:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071021#M147191</guid>
      <dc:creator>ranasaadnoori</dc:creator>
      <dc:date>2019-03-12T08:51:04Z</dc:date>
    </item>
    <item>
      <title>FYI. The configuration you</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071022#M147192</link>
      <description>&lt;P&gt;FYI. The configuration you posted is not for a Transparent firewall.&lt;/P&gt;
&lt;P&gt;But If you are going to keep the ASA in routed mode you need to add static PAT for the server you want to access from the outside (translate it to the outside interface) and specify the real and translated ports. &amp;nbsp;Quite simple to do in the ASDM if you are using that.&lt;/P&gt;
&lt;P&gt;Then you will need to add an ACL allowing the required traffic and assign it to the interface where traffic is being sourced from.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 18:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071022#M147192</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-31T18:20:41Z</dc:date>
    </item>
    <item>
      <title>Thank you for the correction</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071023#M147193</link>
      <description>&lt;P&gt;Thank you for the correction i am not really good at firewalls i usually look for code in device manuals i don't use asdm can you further explain, if i am right u mean i should add port number to&lt;/P&gt;
&lt;P&gt;my previous nat :&lt;/P&gt;
&lt;P&gt;nat (any,any) static 192.168.110.2&lt;/P&gt;
&lt;P&gt;Thank you for replying&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 05:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071023#M147193</guid>
      <dc:creator>ranasaadnoori</dc:creator>
      <dc:date>2017-02-01T05:55:14Z</dc:date>
    </item>
    <item>
      <title>Yes add port number to the</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071024#M147194</link>
      <description>&lt;P&gt;Yes add port number to the nat statement and add an access list allowing traffic towards the servers on the required port.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 20:57:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071024#M147194</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-01T20:57:39Z</dc:date>
    </item>
    <item>
      <title>hi,</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071025#M147195</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;as you explained earlier i did try do give access to print on inside printer 192.168.160.10&lt;/P&gt;
&lt;P&gt;from outside host 192.168.200.6&lt;/P&gt;
&lt;P&gt;added the following but did not work&lt;/P&gt;
&lt;P&gt;object network PrintOut&lt;BR /&gt;host 192.168.160.10&amp;nbsp;&lt;BR /&gt; nat (hp-printer,outside) static 192.168.200.6 service tcp 9100 9100&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;access-list allowprint extended permit tcp host 192.168.200.6 192.168.160.10 eq 9100&lt;BR /&gt;access-group allowprint in interface hp-printer&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;but could not print from outside host&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 09:46:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071025#M147195</guid>
      <dc:creator>ranasaadnoori</dc:creator>
      <dc:date>2017-02-02T09:46:19Z</dc:date>
    </item>
    <item>
      <title>You should not be NATing to</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071026#M147196</link>
      <description>&lt;P&gt;You should not be NATing to the outside host IP. &amp;nbsp;use the interface command instead of an IP. like this:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network PrintOut&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;host 192.168.160.10&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (hp-printer,outside) static interface service tcp 9100 9100&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;also run a packet tracer in both directions:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer input hp-printer tcp&amp;nbsp;192.168.160.10 9100&amp;nbsp;192.168.200.6 9100 detail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp&amp;nbsp;192.168.200.6 9100&amp;nbsp;&amp;lt;interface IP&amp;gt;&amp;nbsp;9100&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;This will give us an idea where the problem is.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 19:40:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071026#M147196</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-02T19:40:23Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071027#M147197</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Bellow my packet tracer output and i did ping outside host 192.168.200.6 from printer vlan and got a reply&lt;/P&gt;
&lt;P&gt;#packet-tracer input hp-printer tcp 192.168.160.10 9100 192.168.200.6 9100 detail&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xce970e90, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=125, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt; input_ifc=hp-printer, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 outside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xce974b98, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=43, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=hp-printer, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Printer1&lt;BR /&gt; nat (hp-printer,outside) static interface service tcp 9100 9100&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.160.10/9100 to 10.20.20.2/9100&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xcabafba8, priority=6, domain=nat, deny=false&lt;BR /&gt; hits=1, user_data=0xce9f17d8, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=192.168.160.10, mask=255.255.255.255, port=9100&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=hp-printer, output_ifc=outside&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0xce899bd0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=4278, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 4477, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: hp-printer&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;# packet-tracer input outside tcp 192.168.200.6 9100 192.168.160.1 9100&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 192.168.160.1 255.255.255.255 identity&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network printer&lt;BR /&gt; nat (any,any) static 192.168.160.10&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface identity&lt;BR /&gt;Untranslate 192.168.160.1/9100 to 192.168.160.1/9100&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;why is it dropped is it access list issue&lt;/P&gt;</description>
      <pubDate>Sun, 05 Feb 2017 09:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071027#M147197</guid>
      <dc:creator>ranasaadnoori</dc:creator>
      <dc:date>2017-02-05T09:08:50Z</dc:date>
    </item>
    <item>
      <title>But did you allow the traffic</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071028#M147198</link>
      <description>&lt;P&gt;But did you allow the traffic in the ACL on the outside interface? remember to replace the ACL name with the actual ACL name if you decide to use the following example.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp host&amp;nbsp;192.168.200.6 host&amp;nbsp;192.168.160.10 eq 9100&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Feb 2017 09:34:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071028#M147198</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-05T09:34:38Z</dc:date>
    </item>
    <item>
      <title>did apply the rule did not</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071029#M147199</link>
      <description>&lt;P&gt;did apply the rule did not work i did not write this configuration but if u can see theres already a nat between printer &amp;amp; outside which means i dont need extra nat on port&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (proxy,outside) source dynamic any interface&lt;BR /&gt;nat (student's-laptops,outside) source dynamic any interface&lt;BR /&gt;nat(server, student's-laptops) source dynamic any interface&lt;BR /&gt;nat (server,outside) source dynamic any interface&lt;BR /&gt;nat (IC&amp;amp;ID,server) source dynamic any interface&lt;BR /&gt;nat (IC&amp;amp;ID,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network printer&lt;BR /&gt; nat (any,any) static 192.168.160.10&lt;/P&gt;
&lt;P&gt;as u can see in previous configuration &amp;nbsp;also as i said i can ping 192.168.200.6 from printer vlan what is the problem? should i delete all nat ru;es and keep only configuration u mentioned&lt;/P&gt;</description>
      <pubDate>Sun, 05 Feb 2017 10:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071029#M147199</guid>
      <dc:creator>ranasaadnoori</dc:creator>
      <dc:date>2017-02-05T10:06:32Z</dc:date>
    </item>
    <item>
      <title>Just noticed that you packet</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071030#M147200</link>
      <description>&lt;P&gt;Just noticed that you packet tracer is not correct. &amp;nbsp;you have specified the interface IP of the hp-printer but you need to specify the IP address of the ingress interface (in this case it would seem it is the outside interface).&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input outside tcp 192.168.200.6 9100 10.20.20.2 9100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Also, I am not talking about NAT now. &amp;nbsp;You need to also allow the traffic, that is originating from the outside, to pass through the ASA with the use of an access-list.&lt;/P&gt;
&lt;P&gt;I am assuming that you are sending print requests from the outside interface to the hp-printer network?&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 05 Feb 2017 10:20:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071030#M147200</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-05T10:20:01Z</dc:date>
    </item>
    <item>
      <title>hi ,</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071031#M147201</link>
      <description>&lt;P&gt;hi ,&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Thank you i did solve my problem and print and share are ok&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 06:44:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3071031#M147201</guid>
      <dc:creator>ranasaadnoori</dc:creator>
      <dc:date>2017-02-07T06:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: outside to inside access problem</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3912150#M147202</link>
      <description>&lt;P&gt;I have a similar problem.&amp;nbsp; I have been able to setup my Cisco ASA5540 for Internet access from inside servers to the outside (i.e., I can hit websites, and ping hosts to the outside), but I cannot figure out how to allow access from outside public IPs, to NATed IPs on the inside network.&amp;nbsp; I feel that the problem is related to no mapping between outside IPs to the inside IPs, which have been assigned to servers.&amp;nbsp; There used to be a "static route" command, which has not been deprecated.&amp;nbsp; This is my current, very simple configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa5540# show config&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number: JMX1112L1JH&lt;BR /&gt;: Hardware: ASA5540-K8, 2560 MB RAM, CPU Pentium 4 2000 MHz&lt;BR /&gt;: Written by enable_15 at 19:15:49.949 UTC Wed Aug 21 2019&lt;BR /&gt;!&lt;BR /&gt;ASA Version 9.1(7)32&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa5540&lt;BR /&gt;domain-name edenhosting.net&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 12.43.6.90 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.252.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name edenhosting.net&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network IIS85Server&lt;BR /&gt;host 10.1.252.249&lt;BR /&gt;access-list outside_access_in extended permit icmp any any&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 host 10.1.252.249 eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 host 10.1.252.249 eq https&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 12.43.6.81 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca 18dad19e267de8bb4a2158cdcc6b3b4a&lt;BR /&gt;308204d3 308203bb a0030201 02021018 dad19e26 7de8bb4a 2158cdcc 6b3b4a30&lt;BR /&gt;0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117&lt;BR /&gt;30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b&lt;BR /&gt;13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504&lt;BR /&gt;0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72&lt;BR /&gt;20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56&lt;BR /&gt;65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043&lt;BR /&gt;65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d30&lt;BR /&gt;36313130 38303030 3030305a 170d3336 30373136 32333539 35395a30 81ca310b&lt;BR /&gt;30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20&lt;BR /&gt;496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65&lt;BR /&gt;74776f72 6b313a30 38060355 040b1331 28632920 32303036 20566572 69536967&lt;BR /&gt;6e2c2049 6e632e20 2d20466f 72206175 74686f72 697a6564 20757365 206f6e6c&lt;BR /&gt;79314530 43060355 0403133c 56657269 5369676e 20436c61 73732033 20507562&lt;BR /&gt;6c696320 5072696d 61727920 43657274 69666963 6174696f 6e204175 74686f72&lt;BR /&gt;69747920 2d204735 30820122 300d0609 2a864886 f70d0101 01050003 82010f00&lt;BR /&gt;3082010a 02820101 00af2408 08297a35 9e600caa e74b3b4e dc7cbc3c 451cbb2b&lt;BR /&gt;e0fe2902 f95708a3 64851527 f5f1adc8 31895d22 e82aaaa6 42b38ff8 b955b7b1&lt;BR /&gt;b74bb3fe 8f7e0757 ecef43db 66621561 cf600da4 d8def8e0 c362083d 5413eb49&lt;BR /&gt;ca595485 26e52b8f 1b9febf5 a191c233 49d84363 6a524bd2 8fe87051 4dd18969&lt;BR /&gt;7bc770f6 b3dc1274 db7b5d4b 56d396bf 1577a1b0 f4a225f2 af1c9267 18e5f406&lt;BR /&gt;04ef90b9 e400e4dd 3ab519ff 02baf43c eee08beb 378becf4 d7acf2f6 f03dafdd&lt;BR /&gt;75913319 1d1c40cb 74241921 93d914fe ac2a52c7 8fd50449 e48d6347 883c6983&lt;BR /&gt;cbfe47bd 2b7e4fc5 95ae0e9d d4d143c0 6773e314 087ee53f 9f73b833 0acf5d3f&lt;BR /&gt;3487968a ee53e825 15020301 0001a381 b23081af 300f0603 551d1301 01ff0405&lt;BR /&gt;30030101 ff300e06 03551d0f 0101ff04 04030201 06306d06 082b0601 05050701&lt;BR /&gt;0c046130 5fa15da0 5b305930 57305516 09696d61 67652f67 69663021 301f3007&lt;BR /&gt;06052b0e 03021a04 148fe5d3 1a86ac8d 8e6bc3cf 806ad448 182c7b19 2e302516&lt;BR /&gt;23687474 703a2f2f 6c6f676f 2e766572 69736967 6e2e636f 6d2f7673 6c6f676f&lt;BR /&gt;2e676966 301d0603 551d0e04 1604147f d365a7c2 ddecbbf0 3009f343 39fa02af&lt;BR /&gt;33313330 0d06092a 864886f7 0d010105 05000382 01010093 244a305f 62cfd81a&lt;BR /&gt;982f3dea dc992dbd 77f6a579 2238ecc4 a7a07812 ad620e45 7064c5e7 97662d98&lt;BR /&gt;097e5faf d6cc2865 f201aa08 1a47def9 f97c925a 0869200d d93e6d6e 3c0d6ed8&lt;BR /&gt;e6069140 18b9f8c1 eddfdb41 aae09620 c9cd6415 3881c994 eea28429 0b136f8e&lt;BR /&gt;db0cdd25 02dba48b 1944d241 7a05694a 584f60ca 7e826a0b 02aa2517 39b5db7f&lt;BR /&gt;e784652a 958abd86 de5e8116 832d10cc defda882 2a6d281f 0d0bc4e5 e71a2619&lt;BR /&gt;e1f4116f 10b595fc e7420532 dbce9d51 5e28b69e 85d35bef a57d4540 728eb70e&lt;BR /&gt;6b0e06fb 33354871 b89d278b c4655f0d 86769c44 7af6955c f65d3208 33a454b6&lt;BR /&gt;183f685c f2424a85 3854835f d1e82cf2 ac11d6a8 ed636a&lt;BR /&gt;quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This has been an extremely difficult setup for me, as the server room is a 70-mile round trip, and I cannot get out there very often, and when I am there, I just can't figure this out.&amp;nbsp; I spent 8 hours on this today alone.&amp;nbsp; I did figure out how to get the ASDM working, but it doesn't help much.&amp;nbsp; Thank you very much for your help!&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 08:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-access-problem/m-p/3912150#M147202</guid>
      <dc:creator>beatinger</dc:creator>
      <dc:date>2019-08-22T08:49:39Z</dc:date>
    </item>
  </channel>
</rss>

