<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you it was in fact my in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903266#M153552</link>
    <description>&lt;P&gt;Thank you it was in fact my isp. They had a static arp entry for my old firewall's mac address, once they cleared that, everything was great. I appreciate everyone's help!&lt;/P&gt;</description>
    <pubDate>Wed, 01 Jun 2016 17:29:06 GMT</pubDate>
    <dc:creator>nwdls8725</dc:creator>
    <dc:date>2016-06-01T17:29:06Z</dc:date>
    <item>
      <title>New ASA 5505 setup</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903258#M153544</link>
      <description>&lt;P&gt;Hello, I am trying to setup my asa for first time use. And I am unable to get to the outside world. I am not sure where I am going wrong with my configuration. Thank you for your help. Here is my current config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "show run"&lt;/P&gt;
&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.0(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password xZplLFirrUSkXN1l encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.128.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 207.70.142.9 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 207.70.128.240&lt;BR /&gt;object network inside_subnet&lt;BR /&gt; subnet 192.168.128.0 255.255.255.0&lt;BR /&gt;object-group icmp-type ALLOW-ICMP&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object time-exceeded&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt; icmp-object traceroute&lt;BR /&gt;access-list INBOUND extended permit icmp any any object-group ALLOW-ICMP &lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.128.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_in extended permit icmp 192.168.128.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_out extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-711-52.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network inside_subnet&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group inside_access_out out interface inside&lt;BR /&gt;access-group INBOUND in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 207.70.142.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd dns 207.70.128.240&lt;BR /&gt;dhcpd lease 86400&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.128.100-192.168.128.131 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username admin password sM/cvVSkWC3aa0kQ encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home reporting anonymous prompt 2&lt;BR /&gt;Cryptochecksum:6edfbbd4c5f8c274151f287dac57b560&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903258#M153544</guid>
      <dc:creator>nwdls8725</dc:creator>
      <dc:date>2019-03-12T07:48:08Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903259#M153545</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Config is fine.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please enable fixup protocol &lt;G class="gr_ gr_24 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="24" data-gr-id="24"&gt;icmp&lt;/G&gt; on the ASA for allowing ICMP traffic through the box.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_254 gr-alert gr_gramm gr_run_anim Punctuation multiReplace" id="254" data-gr-id="254"&gt;Also&lt;/G&gt; make sure the DNS settings on the hosts is correct.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 17:01:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903259#M153545</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-05-25T17:01:16Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903260#M153546</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Config wise as Aditya said you are good.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There are certain things that I would change (just for a clean up) like the access-groups and the ACLs you are using at the moment as you are anyway permitting everything on the inside and most important the fixup protocol ICMP would take care of the echo replies so no need for the inbound ACL on the outside interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Make sure that you can ping from the ASA to your default gateway&amp;nbsp;&lt;SPAN&gt;207.70.142.254.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If that works then ping from your ASA to 4.2.2.2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Keep us posted&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Julio Carvajal&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Senior Network Security and Core Specialist&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;CCIE #42930, 2xCCNP, JNCIS-SEC&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;Rate all the helpful posts&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 17:53:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903260#M153546</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2016-05-25T17:53:30Z</dc:date>
    </item>
    <item>
      <title>Thank you Aditya, </title>
      <link>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903261#M153547</link>
      <description>&lt;P&gt;Thank you Aditya,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I enabled fixup protocol icmp, now it reads:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;policy-map type inspect dns preset_dns_map&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;parameters&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;message-length maximum client auto&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;message-length maximum 512&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;policy-map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class inspection_default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect dns preset_dns_map &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect ftp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect h323 h225 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect h323 ras &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect rsh &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect rtsp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect esmtp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect sqlnet &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect skinny &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect sunrpc &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect xdmcp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect sip &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect netbios &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect tftp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect ip-options&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;inspect icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;I also manually put it in the dns into the one laptop connected to the asa, still no access to the internet. I do see there are hits to the outside, i just can't browse. Anything else to check?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 19:02:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903261#M153547</guid>
      <dc:creator>nwdls8725</dc:creator>
      <dc:date>2016-05-25T19:02:26Z</dc:date>
    </item>
    <item>
      <title>Sorry, I just saw this. I</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903262#M153548</link>
      <description>&lt;P&gt;Sorry, I just saw this. I tried pinging my default gateway from the ASA and it was unsuccessful. I'm still unsure where I am going wrong?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 20:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903262#M153548</guid>
      <dc:creator>nwdls8725</dc:creator>
      <dc:date>2016-05-25T20:20:05Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903263#M153549</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So you are able to ping the public &lt;G class="gr_ gr_100 gr-alert gr_gramm gr_run_anim Grammar multiReplace" id="100" data-gr-id="100"&gt;IP's&lt;/G&gt; but no access to the internet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you change your DNS to 8.8.8.8 and then test ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 01:24:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903263#M153549</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-05-26T01:24:25Z</dc:date>
    </item>
    <item>
      <title>Hi Matt,</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903264#M153550</link>
      <description>&lt;P&gt;Hi Matt,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you see the ARP for the next hop on the ASA ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;sh run arp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You should see the &lt;G class="gr_ gr_96 gr-alert gr_spell gr_run_anim ContextualSpelling" id="96" data-gr-id="96"&gt;arp&lt;/G&gt; for this IP&amp;nbsp;&lt;SPAN&gt;207.70.142.254.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please rate helpful posts and mark correct answers.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 01:27:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903264#M153550</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-05-26T01:27:40Z</dc:date>
    </item>
    <item>
      <title>hi,</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903265#M153551</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;what's your topology like?&lt;/P&gt;
&lt;P&gt;can you bypass the ASA 5505 and directly assign a laptop with the WAN IP address and test if you have connectivity?&lt;/P&gt;
&lt;P&gt;PC IP: 207.70.142.9&lt;/P&gt;
&lt;P&gt;SM: 255.255.255.0&lt;/P&gt;
&lt;P&gt;GW: 207.70.142.254&lt;/P&gt;
&lt;P&gt;DNS: 8.8.8.8&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;try to ping 207.70.142.254 and if it failed, check your Layer1 and report to your ISP.&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2016 06:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903265#M153551</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-05-26T06:49:17Z</dc:date>
    </item>
    <item>
      <title>Thank you it was in fact my</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903266#M153552</link>
      <description>&lt;P&gt;Thank you it was in fact my isp. They had a static arp entry for my old firewall's mac address, once they cleared that, everything was great. I appreciate everyone's help!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2016 17:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-5505-setup/m-p/2903266#M153552</guid>
      <dc:creator>nwdls8725</dc:creator>
      <dc:date>2016-06-01T17:29:06Z</dc:date>
    </item>
  </channel>
</rss>

