<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756685#M14865</link>
    <description>&lt;P&gt;Make your your hairpin NAT statement ("nat (outside,outside)...") comes before the dynamic NAT statement you listed.&lt;/P&gt;</description>
    <pubDate>Mon, 03 Dec 2018 10:34:20 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2018-12-03T10:34:20Z</dc:date>
    <item>
      <title>ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3721863#M14853</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;
&lt;P&gt;I'm planning an ASA hardware migration from a ASA 5510-K8 v9.1(7)23, ADSM v7.5(2)153 to a ASA 5516-FPWR-K9 v9.8(2), ADSM v7.8(2), FirePOWER v6.2.2-81.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm pretty new to the ASAs and I would like to get your help/advise for a migration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Areas of concern (current, but feel free to chime in if I should have something else on my radar)&lt;BR /&gt; &lt;BR /&gt;1) Would I be able to copy/paste the config? Are there any issues with config translation (NAT or ACL) with the sw versions I am running? I believe I'll have to update FirePOWER to a newer version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) What do I need to be aware of when migrating from a device that does not have FirePOWER to a device that does use FirePOWER?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) A primary function of this ASA is to support remote users using AnyConnect.&amp;nbsp; Are there any special considerations I'll need to take into account?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thank you so much in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3721863#M14853</guid>
      <dc:creator>Aberdo</dc:creator>
      <dc:date>2020-02-21T16:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3721954#M14856</link>
      <description>&lt;P&gt;That's a relatively straightforward migration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. NAT and ACL are OK to paste in as-is. You have to change your interface commands as the numberings is different in the ASA 5510 vs. the ASA 5516-X.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;5510:&amp;nbsp;GigabitEthernet 0/0 through GigabitEthernet 0/3 (assuming Security Plus license)&lt;BR /&gt; &lt;BR /&gt; 5516:&amp;nbsp;Gigabit Ethernet 1/1 through Gigabit Ethernet 1/8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. No big deal. Just add the standard bits on the 5516-X to select interesting traffic and redirect it to the Firepower module for inspection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. You need to be sure to migrate over the certificate. Depending on how it was issued, it may be easier to get one re-issued from your CA. (i.e. you will need the certificate private key). Your AnyConnect licenses need to be 4.x to be eligible to migrate them to a new appliance. If you are using a connection profile or a DAP policy you need to be sure to move those files over. Similarly you need to put the AnyConnect client images (pkg files) on the new ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Oct 2018 15:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3721954#M14856</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-09T15:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3729799#M14859</link>
      <description>&lt;P&gt;Thank you Marvin, I appreciate your response.&amp;nbsp; I'm good with number 1 and 3 but I'm unsure about number 2, could you elaborate more on "adding the standard bits" and "redirect interesting traffic to the Firepower module".&amp;nbsp; Again I'm fairly new to the ASAs so my apologies for the gap in translation.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Oct 2018 13:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3729799#M14859</guid>
      <dc:creator>Aberdo</dc:creator>
      <dc:date>2018-10-22T13:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3729816#M14861</link>
      <description>&lt;P&gt;You're welcome. Instructions for doing what I mentioned regarding traffic redirection can be found in the Quick Start Guide here:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/sfr/firepower-qsg.html#pgfId-150474" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/sfr/firepower-qsg.html#pgfId-150474&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically you decide whether to inspect all traffic or a subset of it. In the latter case you specify it using an ACL. That's then called out in a class-map / policy map /service policy combination and those bits serve to send the selected traffic to the Firepower module for inspection and disposition.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Oct 2018 13:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3729816#M14861</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-10-22T13:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756666#M14863</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hello ,&lt;/P&gt;
&lt;P&gt;I just migrated from from asa 5510 ver(9.1) to asa 5516 ver(9.8) . After migration our vpn clients&lt;SPAN&gt;&amp;nbsp;can talk to the “File Server”, on the main site but they are not able to communicate with&amp;nbsp;servers on the other sites. site to site has been configured and hair pinning is also enabled on the main server.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;when i compared the running config of both the firewalls, i found below extra thing on asa 5516 which was not there in 5510,&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;object network obj_any&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;no failover&lt;/LI&gt;
&lt;LI&gt;no monitor-interface service-module&lt;/LI&gt;
&lt;LI&gt;arp rate-limit 16384&lt;/LI&gt;
&lt;LI&gt;object network obj_any&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;nat (any,outside) dynamic interface&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;timeout conn-holddown 0:00:15&lt;/LI&gt;
&lt;LI&gt;timeout igp stale-route 0:01:10&lt;/LI&gt;
&lt;LI&gt;aaa authentication login-history&lt;/LI&gt;
&lt;LI&gt;http 192.168.1.0 255.255.255.0 inet-backup&lt;/LI&gt;
&lt;LI&gt;dhcpd auto_config outside&lt;/LI&gt;
&lt;LI&gt;no tcp-inspection&lt;/LI&gt;
&lt;LI&gt;inspect esmtp&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;can anyone please suggest the troubleshooting steps, thanks in advance.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Dec 2018 09:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756666#M14863</guid>
      <dc:creator>PRAVEENJ</dc:creator>
      <dc:date>2018-12-03T09:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756685#M14865</link>
      <description>&lt;P&gt;Make your your hairpin NAT statement ("nat (outside,outside)...") comes before the dynamic NAT statement you listed.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Dec 2018 10:34:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756685#M14865</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-12-03T10:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756706#M14868</link>
      <description>&lt;P&gt;Hello marvin,&lt;/P&gt;
&lt;P&gt;sorry there is no &lt;SPAN&gt;("nat (outside,outside)...")&lt;/SPAN&gt; statement in my configuration. The dynamic NAT statement that i listed before was automatically&amp;nbsp;added in the new firewall,&amp;nbsp; do i need to remove that..???&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you so much for you quick response.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Dec 2018 10:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756706#M14868</guid>
      <dc:creator>PRAVEENJ</dc:creator>
      <dc:date>2018-12-03T10:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756811#M14870</link>
      <description>&lt;P&gt;Sorry - I incorrectly assumed you were using NAT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're not using NAT then, yes - definitely remove that.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Dec 2018 13:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756811#M14870</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-12-03T13:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756914#M14872</link>
      <description>&lt;P&gt;Yes we are using nat,but nat(outside, outside) statement is not there in configuration. Only nat(inside, outside) we are using...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Dec 2018 15:35:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3756914#M14872</guid>
      <dc:creator>PRAVEENJ</dc:creator>
      <dc:date>2018-12-03T15:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3757258#M14874</link>
      <description>&lt;P&gt;hello marvin,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In show run, the NAT statement appears like below,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_RANGES Azure_RANGES&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static dubai-ranges dubai-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static london-ranges london-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static chicago-ranges chicago-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static singapore-ranges singapore-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static sydney-ranges sydney-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static capetown-ranges capetown-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static lithuania-ranges lithuania-ranges no-proxy-arp route-lookup&lt;BR /&gt; nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static remoteaccessvpn-ranges remoteaccessvpn-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static remoteaccessvpn-ranges remoteaccessvpn-ranges destination static singapore-ranges singapore-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static remoteaccessvpn-ranges remoteaccessvpn-ranges destination static london-ranges london-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static shanghai-ranges shanghai-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static santiago-ranges santiago-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static remoteaccessvpn-ranges remoteaccessvpn-ranges destination static chicago-ranges chicago-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NONATSOURCES NONATSOURCES destination static NONATDESTINATIONS NONATDESTINATIONS no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,inet-backup) source static NONATSOURCES NONATSOURCES destination static NONATDESTINATIONS NONATDESTINATIONS no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,inet-backup) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_RANGES Azure_RANGES&lt;BR /&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_Dev_RANGES Azure_Dev_RANGES&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static lithuania_clientvpn_ranges lithuania_clientvpn_ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_PROD_SEA_RANGES Azure_PROD_SEA_RANGES&lt;BR /&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_PROD_WE_RANGES Azure_PROD_WE_RANGES&lt;BR /&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_Dev_WEU_RANGES Azure_Dev_WEU_RANGES&lt;BR /&gt;nat (inside,inet-backup) source static bangalore-ranges bangalore-ranges destination static london-ranges london-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_BESPIN_WE_RANGES Azure_BESPIN_WE_RANGES&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;object network obj-192.168.48.20-ldap&lt;BR /&gt; nat (inside,outside) static interface service tcp ldap ldap &lt;BR /&gt;object network obj-192.168.48.20-https&lt;BR /&gt; nat (inside,outside) static xxx.xxx.xxx.xxx service tcp https https &lt;BR /&gt;object network OUTSIDE-RDP&lt;BR /&gt;nat (inside,inet-backup) static interface service tcp 3389 3389 &lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;nat (inside,inet-backup) after-auto source dynamic any interface&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Dec 2018 04:38:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3757258#M14874</guid>
      <dc:creator>PRAVEENJ</dc:creator>
      <dc:date>2018-12-04T04:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3757260#M14877</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I am having issues getting my VPNclients to be able to hairpin.&amp;nbsp; I had this functional on my 5510, and used the same configuration from the 5510 to establish the setup on the 5516.&amp;nbsp; Clients are able to talk to resources on the LAN, but unable to get out to the internet on a hairpin.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;WHEN I COMPARED THE RUNNING CONFIG OF BOTH 5510 AND 5516 I FOUND BELOW EXTRA LINES ON 5516.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;object network obj_any&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;no failover&lt;/LI&gt;
&lt;LI&gt;no monitor-interface service-module&lt;/LI&gt;
&lt;LI&gt;arp rate-limit 16384&lt;/LI&gt;
&lt;LI&gt;object network obj_any&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;nat (any,outside) dynamic interface&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;timeout conn-holddown 0:00:15&lt;/LI&gt;
&lt;LI&gt;timeout igp stale-route 0:01:10&lt;/LI&gt;
&lt;LI&gt;aaa authentication login-history&lt;/LI&gt;
&lt;LI&gt;http 192.168.1.0 255.255.255.0 inet-backup&lt;/LI&gt;
&lt;LI&gt;dhcpd auto_config outside&lt;/LI&gt;
&lt;LI&gt;no tcp-inspection&lt;/LI&gt;
&lt;LI&gt;inspect esmtp&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 04 Dec 2018 04:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3757260#M14877</guid>
      <dc:creator>PRAVEENJ</dc:creator>
      <dc:date>2018-12-04T04:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3757276#M14879</link>
      <description>&lt;P&gt;When you say VPN clients, do you mean remote access VPN using AnyConnect?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The situation is that when on VPN to the main site, they cannot reach hosts at a different site which is connected to the main site via a site-site VPN - correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We would need to see the NAT configuration as well as the ACL referenced by the split-tunnel section of the ASA configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show run nat&lt;/P&gt;
&lt;P&gt;show run group-policy | i split-tunnel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;...plus the access-list as mentioned.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Dec 2018 05:47:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3757276#M14879</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-12-04T05:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510-K8 (ver 9.1) to ASA 5516-FPWR-K9 (ver 9.8) Migration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3757294#M14881</link>
      <description>&lt;P&gt;Hello marvin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat configuration details&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_RANGES Azure_RANGES&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static dubai-ranges dubai-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static london-ranges london-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static chicago-ranges chicago-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static singapore-ranges singapore-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static sydney-ranges sydney-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static capetown-ranges capetown-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static lithuania-ranges lithuania-ranges no-proxy-arp route-lookup&lt;BR /&gt; nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static remoteaccessvpn-ranges remoteaccessvpn-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static remoteaccessvpn-ranges remoteaccessvpn-ranges destination static singapore-ranges singapore-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static remoteaccessvpn-ranges remoteaccessvpn-ranges destination static london-ranges london-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static shanghai-ranges shanghai-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static santiago-ranges santiago-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static remoteaccessvpn-ranges remoteaccessvpn-ranges destination static chicago-ranges chicago-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NONATSOURCES NONATSOURCES destination static NONATDESTINATIONS NONATDESTINATIONS no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,inet-backup) source static NONATSOURCES NONATSOURCES destination static NONATDESTINATIONS NONATDESTINATIONS no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,inet-backup) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_RANGES Azure_RANGES&lt;BR /&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_Dev_RANGES Azure_Dev_RANGES&lt;BR /&gt;nat (inside,outside) source static bangalore-ranges bangalore-ranges destination static lithuania_clientvpn_ranges lithuania_clientvpn_ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_PROD_SEA_RANGES Azure_PROD_SEA_RANGES&lt;BR /&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_PROD_WE_RANGES Azure_PROD_WE_RANGES&lt;BR /&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_Dev_WEU_RANGES Azure_Dev_WEU_RANGES&lt;BR /&gt;nat (inside,inet-backup) source static bangalore-ranges bangalore-ranges destination static london-ranges london-ranges no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Bangalore_To_Azure Bangalore_To_Azure destination static Azure_BESPIN_WE_RANGES Azure_BESPIN_WE_RANGES&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;object network obj-192.168.48.20-ldap&lt;BR /&gt; nat (inside,outside) static interface service tcp ldap ldap &lt;BR /&gt;object network obj-192.168.48.20-https&lt;BR /&gt; nat (inside,outside) static xxx.xxx.xxx.xxx service tcp https https &lt;BR /&gt;object network OUTSIDE-RDP&lt;BR /&gt;nat (inside,inet-backup) static interface service tcp 3389 3389 &lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;nat (inside,inet-backup) after-auto source dynamic any interface&lt;/P&gt;
&lt;P&gt;access-group outsidein in interface outside&lt;BR /&gt;access-group inet-backupin in interface inet-backup&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 *.*.*.* 1 track 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 *.*.*.* 1&lt;BR /&gt;route inet-backup 0.0.0.0 0.0.0.0&amp;nbsp;*.*.*.* 254&lt;BR /&gt;route inside 192.168.148.0 255.255.254.0 192.168.48.10 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;group-policy | i split-tunnel&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;group-policy default_remoteaccess internal&lt;BR /&gt;group-policy default_remoteaccess attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value default_remoteaccess_split&lt;BR /&gt;group-policy bangalore_remoteaccess internal&lt;BR /&gt;group-policy bangalore_remoteaccess attributes&lt;BR /&gt; dns-server value 192.168.48.20&lt;BR /&gt; vpn-tunnel-protocol ikev1 &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value default_remoteaccess_split&lt;BR /&gt; default-domain value ***.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ACL referenced by the split-tunnel&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list default_remoteaccess_split extended permit ip 192.168.48.0 255.255.255.0 xxx.xxx.xxx.xxx 255.255.255.0 &lt;BR /&gt;access-list default_remoteaccess_split extended permit ip 192.168.42.0 255.255.255.0&amp;nbsp;xxx.xxx.xxx.xxx 255.255.255.0 &lt;BR /&gt;access-list default_remoteaccess_split extended permit ip object-group london-ranges&amp;nbsp;xxx.xxx.xxx.xxx 255.255.255.0 &lt;BR /&gt;access-list default_remoteaccess_split extended permit ip 192.168.40.0 255.255.255.0 xxx.xxx.xxx.xxx 255.255.255.0 &lt;BR /&gt;access-list default_remoteaccess_split extended permit ip 192.168.148.0 255.255.254.0 xxx.xxx.xxx.xxx 255.255.255.0 &lt;BR /&gt;access-list default_remoteaccess_split extended permit ip object-group Azure_RANGES object-group VPNPOOL_BANGALORE &lt;BR /&gt;access-list default_remoteaccess_split extended permit ip object-group Azure_PROD_SEA_RANGES object-group VPNPOOL_BANGALORE &lt;BR /&gt;access-list default_remoteaccess_split extended permit ip object-group Azure_BESPIN_WE_RANGES object-group VPNPOOL_BANGALORE &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Dec 2018 06:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-k8-ver-9-1-to-asa-5516-fpwr-k9-ver-9-8-migration/m-p/3757294#M14881</guid>
      <dc:creator>PRAVEENJ</dc:creator>
      <dc:date>2018-12-04T06:50:18Z</dc:date>
    </item>
  </channel>
</rss>

