<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Tim, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909485#M153948</link>
    <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;Still doesn't work, but I am getting hits on my nat rule now:&lt;/P&gt;
&lt;P&gt;(inside) to (outside) source static AMS-EXCHANGE EXCHANGE-EXTERNAL-IP&lt;BR /&gt; translate_hits = 93, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;Where as before I wasn't even getting that. &amp;nbsp;I am thinking it could be one of the following now:&lt;/P&gt;
&lt;P&gt;I need to add our certificate to the new ASA&lt;/P&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;P&gt;Something in our barracuda spam filter needs to change, but really don't think so as the IP address is not changing.&lt;/P&gt;
&lt;P&gt;I am not changing anything on the Exchange Server, just replacing the ASA. &amp;nbsp;Our old ASA is running the old 8.2 code, so I was not able to just copy it over.&lt;/P&gt;
&lt;P&gt;I will have to explore more tomorrow, but happy I was able to get this far with your help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Ken~&lt;/P&gt;</description>
    <pubDate>Fri, 13 May 2016 01:29:53 GMT</pubDate>
    <dc:creator>Ken C. Musk</dc:creator>
    <dc:date>2016-05-13T01:29:53Z</dc:date>
    <item>
      <title>Not able to access my Exchange server from outside on new ASA-5516</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909481#M153944</link>
      <description>&lt;P&gt;I have a new 5516 ASA that I am trying to get working with our internal Exchange server. &amp;nbsp;For some reason it only works internally. &amp;nbsp;I am not able to hit: &amp;nbsp;&lt;A href="https://mail.mydomain.com" target="_blank"&gt;https://mail.mydomain.com&lt;/A&gt; from the outside.&lt;/P&gt;
&lt;P&gt;I have read through the different types of NAT rules and thought I understood, but guess I don't. &amp;nbsp;Anyone able to help out?&lt;/P&gt;
&lt;P&gt;My Exchange server has a static NAT for outside use in my subnet so I do not have to my outside interface.&lt;/P&gt;
&lt;P&gt;I removed real outside IPs with x.x.x.x and copied the important parts over from the running-config.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;AMS-ASA-5516# sho run&lt;BR /&gt;: Saved&lt;/P&gt;
&lt;P&gt;:&lt;BR /&gt;: Serial Number: JAD193800D9&lt;BR /&gt;: Hardware: ASA5516, 8192 MB RAM, CPU Atom C2000 series 2416 MHz, 1 CPU (8 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.5(1)&lt;BR /&gt;!&lt;BR /&gt;hostname AMS-ASA-5516&lt;BR /&gt;domain-name ams.int&lt;BR /&gt;enable password ml/91DiSZjZ9eqWz encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd ml/91DiSZjZ9eqWz encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool AMS-VPN-POOL 10.10.4.1-10.10.4.200 mask 255.255.255.0&lt;BR /&gt;ip local pool AMS-TEST-VPN-POOL 172.16.1.1-172.16.1.50 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.41.188 255.255.252.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;description Gift-Store-VLAN&lt;BR /&gt;nameif VLAN110&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.110.110.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 10.10.40.23&lt;BR /&gt;name-server 10.10.40.24&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;domain-name ams.int&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network AMS-FOX-CAMERA&lt;BR /&gt;host 10.10.40.44&lt;BR /&gt;object network obj-192.168.40.0&lt;BR /&gt;subnet 192.168.40.0 255.255.255.0&lt;BR /&gt;object network AMS-INSIDE-SUBNET&lt;BR /&gt;subnet 10.10.40.0 255.255.252.0&lt;BR /&gt;object network AMS-VPN-HOSTS&lt;BR /&gt;subnet 10.10.4.0 255.255.255.0&lt;BR /&gt;object network AMS-TEST-VPN-HOSTS&lt;BR /&gt;subnet 172.16.1.0 255.255.255.0&lt;BR /&gt;object network VLAN110&lt;BR /&gt;subnet 10.110.110.0 255.255.255.0&lt;BR /&gt;object network EXCHANGE-EXTERNAL-IP&lt;BR /&gt;host x.x.x.x&lt;BR /&gt;object network AMS-EXCHANGE&lt;BR /&gt;host 10.10.40.4&lt;BR /&gt;object network EXCHANGE-WWW&lt;BR /&gt;host 10.10.40.4&lt;BR /&gt;object network EXCHANGE-SMTP&lt;BR /&gt;host 10.10.40.4&lt;BR /&gt;object network EXCHANGE-HTTPS&lt;BR /&gt;host 10.10.40.4&lt;BR /&gt;object-group network TIX_SERVERS&lt;BR /&gt;network-object host 10.10.40.21&lt;BR /&gt;network-object host 10.10.40.22&lt;BR /&gt;network-object host 10.10.40.25&lt;BR /&gt;access-list outside-acl extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside-acl extended permit icmp any any time-exceeded&lt;BR /&gt;access-list outside-acl extended permit icmp any any unreachable&lt;BR /&gt;access-list outside-acl extended permit ip 10.10.4.0 255.255.255.0 any&lt;BR /&gt;access-list outside-acl extended permit tcp any host x.x.x.x eq 8001&lt;BR /&gt;access-list outside-acl extended permit ip 172.16.1.0 255.255.255.0 any&lt;BR /&gt;access-list outside-acl extended permit tcp any host x.x.x.x eq smtp&lt;BR /&gt;access-list outside-acl extended permit tcp any host x.x.x.x eq www&lt;BR /&gt;access-list outside-acl extended permit tcp any host x.x.x.x eq https&lt;BR /&gt;access-list inside-acl extended permit tcp host 10.10.40.5 any eq smtp&lt;BR /&gt;access-list inside-acl extended permit ip any any&lt;BR /&gt;access-list inside-acl extended permit tcp any any eq 69&lt;BR /&gt;access-list inside-acl extended permit ip 10.10.40.0 255.255.252.0 interface outside&lt;BR /&gt;access-list inside-acl extended permit tcp any any eq https&lt;BR /&gt;access-list inside-acl extended permit ip 172.16.1.0 255.255.255.0 10.10.40.0 255.255.252.0&lt;BR /&gt;access-list AMS-SPLIT-TUNNEL standard permit 10.10.40.0 255.255.252.0&lt;BR /&gt;access-list AMS-SPLIT-TUNNEL standard permit 10.44.22.0 255.255.255.0&lt;BR /&gt;access-list AMS-SPLIT-TUNNEL standard permit 10.44.24.0 255.255.255.0&lt;BR /&gt;access-list AMS-SPLIT-TUNNEL standard permit 216.27.79.0 255.255.255.0&lt;BR /&gt;access-list AMS-SPLIT-TUNNEL standard permit 172.16.1.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging trap warnings&lt;BR /&gt;logging asdm errors&lt;BR /&gt;logging queue 0&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu VLAN110 1500&lt;BR /&gt;ip audit info action drop&lt;BR /&gt;ip audit attack action reset&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any unreachable outside&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any unreachable inside&lt;BR /&gt;icmp permit any echo inside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (VLAN110,outside) source dynamic VLAN110 interface&lt;BR /&gt;nat (inside,outside) source static AMS-INSIDE-SUBNET AMS-INSIDE-SUBNET destination static AMS-VPN-HO&lt;BR /&gt;STS AMS-VPN-HOSTS no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static AMS-INSIDE-SUBNET AMS-INSIDE-SUBNET destination static AMS-TEST-V&lt;BR /&gt;PN-HOSTS AMS-TEST-VPN-HOSTS no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source dynamic AMS-INSIDE-SUBNET interface&lt;BR /&gt;!&lt;BR /&gt;object network AMS-FOX-CAMERA&lt;BR /&gt;nat (inside,outside) static x.x.x.x&lt;BR /&gt;object network AMS-EXCHANGE&lt;BR /&gt;nat (inside,outside) static x.x.x.x&lt;BR /&gt;object network EXCHANGE-WWW&lt;BR /&gt;nat (inside,outside) static x.x.x.x service tcp www www&lt;BR /&gt;object network EXCHANGE-SMTP&lt;BR /&gt;nat (inside,outside) static x.x.x.x service tcp smtp smtp&lt;BR /&gt;object network EXCHANGE-HTTPS&lt;BR /&gt;nat (inside,outside) static x.x.x.x service tcp https https&lt;BR /&gt;access-group outside-acl in interface outside&lt;BR /&gt;access-group inside-acl in interface inside&lt;BR /&gt;route inside 10.10.10.0 255.255.255.0 10.10.40.1 128 track 10&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;route inside 10.10.1.0 255.255.255.0 10.10.40.1 1&lt;BR /&gt;route inside 10.44.22.0 255.255.255.0 10.10.40.1 1&lt;BR /&gt;route inside 10.44.24.0 255.255.255.0 10.10.40.1 1&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ken~&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:58:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909481#M153944</guid>
      <dc:creator>Ken C. Musk</dc:creator>
      <dc:date>2019-03-26T00:58:38Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909482#M153945</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm not sure I'm understanding your setup necessarily, however I'll make some assumptions and we can go from there. I am assuming&lt;SPAN&gt;&amp;nbsp;10.10.40.4 is the IP address of the Exchange server, and X.X.X.X is the static NAT IP you are assigning to it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;In this case, you can configure it this way:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network EXCHANGE-EXTERNAL-IP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;host x.x.x.x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network AMS-EXCHANGE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;host 10.10.40.4&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object-group service EXCHANGE-PORTS ! include whatever you need&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;service-object tcp destination eq 80&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;SPAN&gt;service-object tcp destination eq 443&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;SPAN&gt;service-object tcp destination eq 25&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,outside) source static AMS-EXCHANGE EXCHANGE-EXTERNAL-IP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list outside-acl line 1 permit object-group EXCHANGE-PORTS any object AMS-EXCHANGE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, your ASA needs a route back to 10.10.40.X subnet. I don't know if it's missing or if you just didn't include it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tim&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 03:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909482#M153945</guid>
      <dc:creator>Tim Y</dc:creator>
      <dc:date>2016-05-12T03:41:11Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909483#M153946</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;I added what you suggested and think that may work. &amp;nbsp;I am not able to test until after hours, so will test again tonight.&lt;/P&gt;
&lt;P&gt;Yeah I do have a route back to my inside network. &amp;nbsp;I am able to get everything working, just not OWA, but learning a lot on how to configure an ASA especially the new NAT way.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ken~&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 13:52:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909483#M153946</guid>
      <dc:creator>Ken C. Musk</dc:creator>
      <dc:date>2016-05-12T13:52:30Z</dc:date>
    </item>
    <item>
      <title>Hi Ken,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909484#M153947</link>
      <description>&lt;P&gt;Hi Ken,&lt;/P&gt;
&lt;P&gt;Let me know how the testing goes. Make certain&amp;nbsp;to remove any previous NAT's for the Exchange server that might&amp;nbsp;overlap as they can conflict and possibly prevent the new NAT you added from working.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Tim&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Please don't forget to rate useful posts and mark answers as correct&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 15:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909484#M153947</guid>
      <dc:creator>Tim Y</dc:creator>
      <dc:date>2016-05-12T15:10:49Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909485#M153948</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;Still doesn't work, but I am getting hits on my nat rule now:&lt;/P&gt;
&lt;P&gt;(inside) to (outside) source static AMS-EXCHANGE EXCHANGE-EXTERNAL-IP&lt;BR /&gt; translate_hits = 93, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;Where as before I wasn't even getting that. &amp;nbsp;I am thinking it could be one of the following now:&lt;/P&gt;
&lt;P&gt;I need to add our certificate to the new ASA&lt;/P&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;P&gt;Something in our barracuda spam filter needs to change, but really don't think so as the IP address is not changing.&lt;/P&gt;
&lt;P&gt;I am not changing anything on the Exchange Server, just replacing the ASA. &amp;nbsp;Our old ASA is running the old 8.2 code, so I was not able to just copy it over.&lt;/P&gt;
&lt;P&gt;I will have to explore more tomorrow, but happy I was able to get this far with your help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Ken~&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 01:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909485#M153948</guid>
      <dc:creator>Ken C. Musk</dc:creator>
      <dc:date>2016-05-13T01:29:53Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909486#M153949</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Glad to hear you're making progress. I didn't realize we were talking about pre 8.3 code. In that case, the ACL rule I provided needs to change as well to:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;access-list outside-acl line 1 permit object-group EXCHANGE-PORTS any object EXCHANGE-EXTERNAL-IP&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please make that change and test again. Ensure that you're testing from an external internet connection and that any NAT rules that are overlapping with the new rule are removed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;If it is not working still, then check if there are hits on the new ACL rule. If there are not, then you can set up a packet capture to see what the drop reason is. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;If there are hits, then set up a packet trace to debug all the steps and make sure it's getting through. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="line-height: normal;"&gt;If that test passes, then something else past the firewall could be blocking the connection.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: normal;"&gt;Tim&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 02:16:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909486#M153949</guid>
      <dc:creator>Tim Y</dc:creator>
      <dc:date>2016-05-13T02:16:16Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909487#M153950</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;Uhh sorry didn't mean this was the correct answer and no clue how to undo it. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;My old ASA which is still in production is on the old code, while the new ASA I am trying to get into production is on the new 9.1 code.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After I made the change yesterday I started getting users saying email was slow when accessing from "Outside" my network, mainly on mobile devices. &amp;nbsp;As soon as I shut the port down on the new ASA the problem went away. &amp;nbsp;Thinking because I as asymmetrical routing going on since both ASA's were up and hosting the same Exchange IP. &amp;nbsp;The new and old ASA have different outside IP address. &amp;nbsp;This way I can have both up next to each other as I migrate over. &amp;nbsp;When I do my testing at night, I just change my default route on my Gateway switch to point to the new ASA.&lt;/P&gt;
&lt;P&gt;Below is my current config now:&lt;/P&gt;
&lt;P&gt;hostname AMS-ASA-5516&lt;BR /&gt;domain-name ams.int&lt;BR /&gt;enable password ml/91DiSZjZ9eqWz encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd ml/91DiSZjZ9eqWz encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool AMS-VPN-POOL 10.10.4.1-10.10.4.200 mask 255.255.255.0&lt;BR /&gt;ip local pool AMS-TEST-VPN-POOL 172.16.1.1-172.16.1.50 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address x.x.x.33 255.x.x.x&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.10.41.188 255.255.252.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; description Gift-Store-VLAN&lt;BR /&gt; nameif VLAN110&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 10.110.110.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 10.10.40.23&lt;BR /&gt; name-server 10.10.40.24&lt;BR /&gt; name-server 8.8.8.8&lt;BR /&gt; domain-name ams.int&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network AMS-FOX-CAMERA&lt;BR /&gt; host 10.10.40.44&lt;BR /&gt;object network obj-192.168.40.0&lt;BR /&gt; subnet 192.168.40.0 255.255.255.0&lt;BR /&gt;object network AMS-INSIDE-SUBNET&lt;BR /&gt; subnet 10.10.40.0 255.255.252.0&lt;BR /&gt;object network AMS-VPN-HOSTS&lt;BR /&gt; subnet 10.10.4.0 255.255.255.0&lt;BR /&gt;object network AMS-TEST-VPN-HOSTS&lt;BR /&gt; subnet 172.16.1.0 255.255.255.0&lt;BR /&gt;object network VLAN110&lt;BR /&gt; subnet 10.110.110.0 255.255.255.0&lt;BR /&gt;object network EXCHANGE-EXTERNAL-IP&lt;BR /&gt; host x.x.x.31&lt;BR /&gt;object network AMS-EXCHANGE&lt;BR /&gt; host 10.10.40.4&lt;BR /&gt;object-group network TIX_SERVERS&lt;BR /&gt; network-object host 10.10.40.21&lt;BR /&gt; network-object host 10.10.40.22&lt;BR /&gt; network-object host 10.10.40.25&lt;BR /&gt;object-group service EXCHANGE-PORTS&lt;BR /&gt; service-object tcp destination eq https&lt;BR /&gt; service-object tcp destination eq www&lt;BR /&gt; service-object tcp destination eq smtp&lt;BR /&gt; service-object tcp destination eq pop3&lt;BR /&gt; service-object tcp destination eq 102&lt;BR /&gt; service-object tcp destination eq 103&lt;BR /&gt; service-object tcp destination eq 5993&lt;BR /&gt; service-object tcp destination eq 8001&lt;/P&gt;
&lt;P&gt;****Pretty sure this is not needed, but I added just to see****&lt;BR /&gt;access-list outside-acl extended permit object-group EXCHANGE-PORTS any object EXCHANGE-EXTERNAL-IP&lt;/P&gt;
&lt;P&gt;****This is what you had me add****&lt;BR /&gt;access-list outside-acl extended permit object-group EXCHANGE-PORTS any object AMS-EXCHANGE&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;access-list outside-acl extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside-acl extended permit icmp any any time-exceeded&lt;BR /&gt;access-list outside-acl extended permit icmp any any unreachable&lt;BR /&gt;access-list outside-acl extended permit ip 10.11.11.0 255.255.255.0 object-group TIX_SERVERS&lt;BR /&gt;access-list outside-acl extended permit ip 10.10.4.0 255.255.255.0 any&lt;BR /&gt;access-list outside-acl extended permit ip 172.16.1.0 255.255.255.0 any&lt;BR /&gt;access-list outside-acl extended permit tcp any host x.x.x.141 eq 8001&lt;BR /&gt;access-list inside-acl extended permit tcp host 10.10.40.5 any eq smtp&lt;BR /&gt;access-list inside-acl extended permit ip any any&lt;BR /&gt;access-list inside-acl extended permit tcp any any eq 69&lt;BR /&gt;access-list inside-acl extended permit ip 10.10.40.0 255.255.252.0 interface outside&lt;BR /&gt;access-list inside-acl extended permit tcp any any eq https&lt;BR /&gt;access-list inside-acl extended permit ip 172.16.1.0 255.255.255.0 10.10.40.0 255.255.252.0&lt;BR /&gt;&lt;BR /&gt;access-list AMS-SPLIT-TUNNEL standard permit 10.10.40.0 255.255.252.0&lt;BR /&gt;access-list AMS-SPLIT-TUNNEL standard permit 10.44.22.0 255.255.255.0&lt;BR /&gt;access-list AMS-SPLIT-TUNNEL standard permit 10.44.24.0 255.255.255.0&lt;BR /&gt;access-list AMS-SPLIT-TUNNEL standard permit 216.27.79.0 255.255.255.0&lt;BR /&gt;access-list AMS-SPLIT-TUNNEL standard permit 172.16.1.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging trap warnings&lt;BR /&gt;logging asdm errors&lt;BR /&gt;logging queue 0&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu VLAN110 1500&lt;BR /&gt;ip audit info action drop&lt;BR /&gt;ip audit attack action reset&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any unreachable outside&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any unreachable inside&lt;BR /&gt;icmp permit any echo inside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;nat (VLAN110,outside) source dynamic VLAN110 interface&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;nat (inside,outside) source static AMS-INSIDE-SUBNET AMS-INSIDE-SUBNET destination static AMS-VPN-HOSTS AMS-VPN-HOSTS no-proxy-arp route-lookup&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;nat (inside,outside) source static AMS-INSIDE-SUBNET AMS-INSIDE-SUBNET destination static AMS-TEST-VPN-HOSTS AMS-TEST-VPN-HOSTS no-proxy-arp route-lookup&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;nat (inside,outside) source static AMS-EXCHANGE EXCHANGE-EXTERNAL-IP&lt;BR /&gt;!&lt;BR /&gt;object network AMS-FOX-CAMERA&lt;BR /&gt; nat (inside,outside) static 71.81.16.141&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic AMS-INSIDE-SUBNET interface&lt;BR /&gt;access-group outside-acl in interface outside&lt;BR /&gt;access-group inside-acl in interface inside&lt;BR /&gt;route inside 10.10.10.0 255.255.255.0 10.10.40.1 128 track 10&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.29 1&lt;BR /&gt;route inside 10.10.1.0 255.255.255.0 10.10.40.1 1&lt;BR /&gt;route inside 10.44.22.0 255.255.255.0 10.10.40.1 1&lt;BR /&gt;route inside 10.44.24.0 255.255.255.0 10.10.40.1 1&lt;/P&gt;
&lt;P&gt;Ken~&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 13:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909487#M153950</guid>
      <dc:creator>Ken C. Musk</dc:creator>
      <dc:date>2016-05-13T13:38:28Z</dc:date>
    </item>
    <item>
      <title>Oh... I didn't know you were</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909488#M153951</link>
      <description>&lt;P&gt;Oh... I didn't know you were trying to have both running and migrate over. Yeah as you say it is asymmetrical and you can't do that. Firewalls are stateful. If you connect to Exchange from the outside of the new ASA, the Exchange server will route out the other firewall as the network dictates. And since there is no state on this firewall, it will drop the traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now that the new ASA is correctly configured, you just have to cut over DNS and routing so that only the new ASA is used. If testing goes well then you're done. Otherwise you can just roll back.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tim&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 14:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909488#M153951</guid>
      <dc:creator>Tim Y</dc:creator>
      <dc:date>2016-05-13T14:49:14Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909489#M153952</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;I did make the cut last night after hours, but still was not able to get &lt;A href="https://mail.mycompany.com" target="_blank"&gt;https://mail.mycompany.com&lt;/A&gt; to work. &amp;nbsp;I guess I don't see how DNS has to change as nothing IP wise is changing..?&lt;/P&gt;
&lt;P&gt;On my Gateway switch I just change the default route to point to the new "Inside" interface of the new ASA when I want to fully test.&lt;/P&gt;
&lt;P&gt;I even went as far as changing my old ASA outside IP and put it on the new ASA outside IP address. &amp;nbsp;I shut the outside interface down on the old ASA first to not have it overlap, but still didn't fix my issue.&lt;/P&gt;
&lt;P&gt;Ken~&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 15:04:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909489#M153952</guid>
      <dc:creator>Ken C. Musk</dc:creator>
      <dc:date>2016-05-13T15:04:35Z</dc:date>
    </item>
    <item>
      <title>Hi Ken,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909490#M153953</link>
      <description>&lt;P&gt;Hi Ken,&lt;/P&gt;
&lt;P&gt;You had a different public IP address on the new ASA.&amp;nbsp;&lt;SPAN&gt;mail.mycompany.com resolves to the IP address on the old ASA. So if you're using the new IP address, you need to update your external DNS record for&amp;nbsp;mail.mycompany.com.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;If you decide to transfer the IP address of the old ASA to the new ASA, then you may have to wait because your default gateway (the ISP) has an ARP entry cached for your old ASA. It thinks X.X.X.X belongs to old ASA MAC. Once that ARP entry times out and it ARP's again, then you would be back in business.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The ASA looks configured properly to me, but that's based on the context that I have. Every time you reply, I learn something new about the network topology. At this point, it's just a matter of analyzing the situation carefully and testing.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tim&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 15:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909490#M153953</guid>
      <dc:creator>Tim Y</dc:creator>
      <dc:date>2016-05-13T15:40:59Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909491#M153954</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;Forgive me for not understanding, but let me explain how this is setup.&lt;/P&gt;
&lt;P&gt;The "Old" ASA has an outside IP of: x.x.x.133&lt;/P&gt;
&lt;P&gt;The "New" ASA has an outside IP of: x.x.x.136&lt;/P&gt;
&lt;P&gt;The "Exchange" has an outside IP of: x.x.x.131 and this has not changed from old ASA to new ASA.&lt;/P&gt;
&lt;P&gt;I get the concept of arp cache needing to clear out, but the Exchange server IP has not changed, so why would the provider need to clear its arp cache out..?&lt;/P&gt;
&lt;P&gt;Is it because the provider see's that its connected to .133 and knows to push .131 traffic there for mail?&lt;/P&gt;
&lt;P&gt;I would LOVE, LOVE, LOVE if this were an arp cache issue. &amp;nbsp;I can test this theory out on Sunday as events are going on this Sat. &amp;nbsp;I will set it backup so the new ASA is working and wait to see if the arp cache clears out by Monday morning. &amp;nbsp;If not, I can have someone there reboot the providers equipment.&lt;/P&gt;
&lt;P&gt;I am not local so can't do it myself &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Thanks for sticking with me on this, learning way more than just reading books &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Ken~&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 15:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909491#M153954</guid>
      <dc:creator>Ken C. Musk</dc:creator>
      <dc:date>2016-05-13T15:41:00Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909492#M153955</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It's because of proxy ARP. Your Exchange public IP doesn't physically exist anywhere so something has to respond for it. That something is your ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You wouldn't have this issue though if you used a different public IP for Exchange on the new ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It's hard to say if that's the issue or just one of as I don't have full visibility however it's certainly something to keep in mind.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What I would suggest is taking a step back and validating everything step by step.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate the useful posts so others can benefit as well.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tim&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 16:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909492#M153955</guid>
      <dc:creator>Tim Y</dc:creator>
      <dc:date>2016-05-13T16:10:07Z</dc:date>
    </item>
    <item>
      <title>Ahh okay that makes sense to</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909493#M153956</link>
      <description>&lt;P&gt;Ahh okay that makes sense to me now &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &amp;nbsp;Learning how everything is getting tied together.&lt;/P&gt;
&lt;P&gt;I will let you know Sunday/Monday what happens.&lt;/P&gt;
&lt;P&gt;The location in question is a 4.5hr drive for me and I am down there a few times a year when needed for on-site support. &amp;nbsp;If not, we have remote tools setup to do most of the work. &amp;nbsp;Will kick myself if its an arp issue as I was just there last week to test this at night, and could have rebooted the providers equipment then.&lt;/P&gt;
&lt;P&gt;Again thank you for all the help.&lt;/P&gt;
&lt;P&gt;Ken~&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 16:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909493#M153956</guid>
      <dc:creator>Ken C. Musk</dc:creator>
      <dc:date>2016-05-13T16:10:39Z</dc:date>
    </item>
    <item>
      <title>Hi Tim,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909494#M153957</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;
&lt;P&gt;I made the cut last night by changing my default route to point to the new inside ASA. &amp;nbsp;Then shutdown the outside of the old ASA. &amp;nbsp;Waited a few hours and boom! &amp;nbsp;My &lt;A href="https://mail.mycompany.com" target="_blank"&gt;https://mail.mycompany.com&lt;/A&gt; started to work.&lt;/P&gt;
&lt;P&gt;I tried to get a hold of the provider to have them bounce their equipment, but the tech didn't want to, so I just waited for the arp cache the clear.&lt;/P&gt;
&lt;P&gt;Thank you again for all the help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Ken~&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2016 12:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909494#M153957</guid>
      <dc:creator>Ken C. Musk</dc:creator>
      <dc:date>2016-05-16T12:58:19Z</dc:date>
    </item>
    <item>
      <title>Beautiful. You're welcome,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909495#M153958</link>
      <description>&lt;P&gt;Beautiful. You're welcome, have a great week!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tim&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Please rate useful posts and mark answers as correct.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2016 16:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-my-exchange-server-from-outside-on-new-asa/m-p/2909495#M153958</guid>
      <dc:creator>Tim Y</dc:creator>
      <dc:date>2016-05-16T16:23:43Z</dc:date>
    </item>
  </channel>
</rss>

