<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How is it that your default in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958217#M156124</link>
    <description>&lt;P&gt;How is it that your default route points to your outside interface IP?&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;interface GigabitEthernet0/0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;nameif Outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;security-level 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;ip address 172.19.53.54 255.255.255.252&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;route Outside 0.0.0.0 0.0.0.0 172.19.53.54 1&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Normally the ASA wouldn't allow you to do that. Maybe you sanitized the config and made a typo? The default route should be the next hop, the ISPs router probably.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 23 Jul 2016 00:23:53 GMT</pubDate>
    <dc:creator>jaysoo</dc:creator>
    <dc:date>2016-07-23T00:23:53Z</dc:date>
    <item>
      <title>ASA 5512x  - interface routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958214#M156121</link>
      <description>&lt;P&gt;Evening people - looking for some help with an ASA that no longer wants to pass traffic over interfaces, or more specifically to the outside interface.&lt;/P&gt;
&lt;P&gt;Background.&lt;/P&gt;
&lt;P&gt;I work in a school, not ASA savvy - our ISP was the local authority, the ASA was setup some times ago and we used dynamic PAT to forward traffic onto the County WAN. All has worked lovely until recently.&lt;/P&gt;
&lt;P&gt;We have changed our ISP using a 100Mb connection over a 1Gb bearer. We are now behind their firewall which provides NATing. Bear with me....when we migrated to the new ISP some 4 weeks ago I did not remove the Dynamic PAT on our end with a view to doing it later as I want to reconfigure the internal IP schemes.&lt;/P&gt;
&lt;P&gt;2 days ago as some of you may know BT was hit with a Data Centre outage which had ramifications for many ISPs, ours included so we lost connectivity.&lt;/P&gt;
&lt;P&gt;By the end of the day the ISP claimed our link was up as they could remote into their router and ping the outside interface of our firewall - however, even after a reboot we were no longer able to access the internet. No changes have been made to the ASA so I am completely lost.&lt;/P&gt;
&lt;P&gt;Where as before I was able from a LAN PC to ping the firewall interfaces and the ISPs router I am no longer able to. If I run packet traces from within the ASDM software it shows no errors or blocks.&lt;/P&gt;
&lt;P&gt;Data seems not to be able to travers the firewall between the interfaces anymore and I can't figure out what it is.&lt;/P&gt;
&lt;P&gt;To ensure the ISP router was working I plugged my laptop directly into the interface and was able to access the net without issues so it's definitely not their end.&lt;/P&gt;
&lt;P&gt;I would really appreciate one of you guru's help - please remember I'm not ASA savvy!! Many thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Running Config:&lt;/P&gt;
&lt;DIV&gt;ASA5512-X# sho run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.6(1)2 &lt;BR /&gt;!&lt;BR /&gt;hostname ASA5512-X&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif Outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 172.19.53.54 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif Inside&lt;BR /&gt;&amp;nbsp;security-level 90&lt;BR /&gt;&amp;nbsp;ip address 10.5.107.134 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&amp;nbsp; &lt;BR /&gt;&amp;nbsp;nameif Apple_Network&lt;BR /&gt;&amp;nbsp;security-level 40&lt;BR /&gt;&amp;nbsp;ip address 192.168.201.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif Wireless&lt;BR /&gt;&amp;nbsp;security-level 40&lt;BR /&gt;&amp;nbsp;ip address 172.20.255.254 255.255.0.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.105 255.255.255.0 &lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;time-range Presto_Wireless_Access_Times&lt;BR /&gt;&amp;nbsp;periodic daily 6:00 to 20:00&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa861-2-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT/BST 0&lt;BR /&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup Outside&lt;BR /&gt;dns domain-lookup Inside&lt;BR /&gt;dns domain-lookup Apple_Network&lt;BR /&gt;dns domain-lookup Wireless&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name Sch4455.somerset.gov.uk&lt;BR /&gt;dns server-group Preston_School_DNS_Servers&lt;BR /&gt;&amp;nbsp;name-server 10.5.107.253&lt;BR /&gt;&amp;nbsp;name-server 10.5.107.250&lt;BR /&gt;dns-group Preston_School_DNS_Servers&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network 10.80.11.110&lt;BR /&gt;&amp;nbsp;host 10.80.11.110&lt;BR /&gt;object network 10.80.11.111&lt;BR /&gt;&amp;nbsp;host 10.80.11.111&lt;BR /&gt;object network 10.80.11.112&lt;BR /&gt;&amp;nbsp;host 10.80.11.112&lt;BR /&gt;object network 10.80.11.113&lt;BR /&gt;&amp;nbsp;host 10.80.11.113&lt;BR /&gt;object network 10.80.11.114&lt;BR /&gt;&amp;nbsp;host 10.80.11.114&lt;BR /&gt;object network 10.80.11.115&lt;BR /&gt;&amp;nbsp;host 10.80.11.115&lt;BR /&gt;object network Capita_VPN&lt;BR /&gt;&amp;nbsp;host 213.129.90.233&lt;BR /&gt;object network VLE_Server&lt;BR /&gt;&amp;nbsp;host 10.5.107.248&lt;BR /&gt;&amp;nbsp;description Moodle Server&lt;BR /&gt;object network SQL4455&lt;BR /&gt;&amp;nbsp;host 10.5.107.252&lt;BR /&gt;&amp;nbsp;description SIMS Server&lt;BR /&gt;object network Terminal_Server&lt;BR /&gt;&amp;nbsp;host 10.5.107.245&lt;BR /&gt;&amp;nbsp;description Terminal server for remote services&lt;BR /&gt;object network Print_Server&lt;BR /&gt;&amp;nbsp;host 10.5.107.244&lt;BR /&gt;&amp;nbsp;description Print Server&lt;BR /&gt;object network NAP_Server_SDC&lt;BR /&gt;&amp;nbsp;host 10.5.107.250&lt;BR /&gt;&amp;nbsp;description Microsoft Network Access Protection Server&lt;BR /&gt;object network Dynamic_PAT_Pool&lt;BR /&gt;&amp;nbsp;host 10.5.107.129&lt;BR /&gt;&amp;nbsp;description Port Address Translation IP&lt;BR /&gt;object network Inside_Wired_Network&lt;BR /&gt;&amp;nbsp;subnet 10.5.107.128 255.255.255.248&lt;BR /&gt;&amp;nbsp;description ASA Inside Interface Network&lt;BR /&gt;object network Wireless_NAT&lt;BR /&gt;&amp;nbsp;subnet 172.20.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;description Wireless NAT to Outside Interface&lt;BR /&gt;object network Apple_NAT&lt;BR /&gt;&amp;nbsp;subnet 192.168.201.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;description Apple NAT to Outside Interface&lt;BR /&gt;object network RDC4455&lt;BR /&gt;&amp;nbsp;host 10.5.107.253&lt;BR /&gt;&amp;nbsp;description Primary DNS&lt;BR /&gt;object network SDC4455&lt;BR /&gt;&amp;nbsp;host 10.5.107.250&lt;BR /&gt;&amp;nbsp;description Secondary DNS&lt;BR /&gt;object network NETWORK_OBJ_10.5.107.136_29&lt;BR /&gt;&amp;nbsp;subnet 10.5.107.136 255.255.255.248&lt;BR /&gt;object network WLC_1&lt;BR /&gt;&amp;nbsp;host 172.20.255.201&lt;BR /&gt;&amp;nbsp;description Primary Wireless LAN Controller&lt;BR /&gt;object network WLC_2&lt;BR /&gt;&amp;nbsp;host 172.20.255.202&lt;BR /&gt;&amp;nbsp;description Secondary Wireless LAN Controller&lt;BR /&gt;object network WLC_to_RADIUS&lt;BR /&gt;&amp;nbsp;host 172.20.255.201&lt;BR /&gt;object network RDC_NAP_Server&lt;BR /&gt;&amp;nbsp;host 10.5.107.253&lt;BR /&gt;&amp;nbsp;description RDC&lt;BR /&gt;object network SDC_NAP_Server&lt;BR /&gt;&amp;nbsp;host 10.5.107.250&lt;BR /&gt;&amp;nbsp;description SDC&lt;BR /&gt;object service GC&lt;BR /&gt;&amp;nbsp;service tcp destination eq 3268 &lt;BR /&gt;&amp;nbsp;description Global Catalogue&lt;BR /&gt;object service Kpassword&lt;BR /&gt;&amp;nbsp;service tcp destination eq 464 &lt;BR /&gt;object network Server_VLAN&lt;BR /&gt;&amp;nbsp;range 10.5.107.195 10.5.107.240&lt;BR /&gt;object network Tech_PC_01&lt;BR /&gt;&amp;nbsp;fqdn v4 Tech01.sch4455.somerset.gov.uk&lt;BR /&gt;object network Tech_PC_02&lt;BR /&gt;&amp;nbsp;fqdn v4 Tech02.sch4455.somerset.gov.uk&lt;BR /&gt;object network Apple_Server&lt;BR /&gt;&amp;nbsp;host 192.168.201.253&lt;BR /&gt;object network Imaging_Network&lt;BR /&gt;&amp;nbsp;subnet 192.168.160.0 255.255.255.0&lt;BR /&gt;object network Imaging_VLAN_Internet&lt;BR /&gt;&amp;nbsp;subnet 192.168.160.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;description Internet Access&lt;BR /&gt;object service Apple_Keberos_Port&lt;BR /&gt;&amp;nbsp;service udp destination eq 88 &lt;BR /&gt;&amp;nbsp;description Apple Keberos Port&lt;BR /&gt;object service Apple_Keberos_Port_TCP&lt;BR /&gt;&amp;nbsp;service tcp destination eq 88 &lt;BR /&gt;&amp;nbsp;description Apple Keberos Port TCP&lt;BR /&gt;object service kPassword_UDP&lt;BR /&gt;&amp;nbsp;service udp destination eq 464 &lt;BR /&gt;&amp;nbsp;description kPassowrd UDP&lt;BR /&gt;object-group network County_SLG_Access&lt;BR /&gt;&amp;nbsp;description Allow SLG update requests from the local SIMS server&lt;BR /&gt;&amp;nbsp;network-object object 10.80.11.110&lt;BR /&gt;&amp;nbsp;network-object object 10.80.11.111&lt;BR /&gt;&amp;nbsp;network-object object 10.80.11.112&lt;BR /&gt;&amp;nbsp;network-object object 10.80.11.113&lt;BR /&gt;&amp;nbsp;network-object object 10.80.11.114&lt;BR /&gt;&amp;nbsp;network-object object 10.80.11.115&lt;BR /&gt;object-group service Capita udp&lt;BR /&gt;&amp;nbsp;description Capita VPN Circuit&lt;BR /&gt;&amp;nbsp;port-object eq 1194&lt;BR /&gt;object-group service Remote_Desktop tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;object-group service Somerset_Learning_Gateway tcp&lt;BR /&gt;&amp;nbsp;description SLG Update Service&lt;BR /&gt;&amp;nbsp;port-object eq 120&lt;BR /&gt;&amp;nbsp;port-object eq 121&lt;BR /&gt;&amp;nbsp;port-object eq 1435&lt;BR /&gt;&amp;nbsp;port-object eq 3829&lt;BR /&gt;&amp;nbsp;port-object eq 90&lt;BR /&gt;object-group service NAP_Access udp&lt;BR /&gt;&amp;nbsp;port-object eq 1812&lt;BR /&gt;&amp;nbsp;port-object eq 1813&lt;BR /&gt;&amp;nbsp;port-object eq radius&lt;BR /&gt;&amp;nbsp;port-object eq radius-acct&lt;BR /&gt;&amp;nbsp;port-object eq 32768&lt;BR /&gt;object-group network Apple_Network_Group&lt;BR /&gt;&amp;nbsp;network-object 192.168.201.0 255.255.255.0&lt;BR /&gt;object-group network DNS_Servers&lt;BR /&gt;&amp;nbsp;network-object object RDC4455&lt;BR /&gt;&amp;nbsp;network-object object SDC4455&lt;BR /&gt;object-group service Exchange tcp&lt;BR /&gt;&amp;nbsp;description Exchange Listening Port&lt;BR /&gt;&amp;nbsp;port-object eq 993&lt;BR /&gt;object-group service Apple_Push_Notification_service tcp&lt;BR /&gt;&amp;nbsp;description Apple Push notification service&lt;BR /&gt;&amp;nbsp;port-object eq 5223&lt;BR /&gt;object-group service SSL_SMTP tcp&lt;BR /&gt;&amp;nbsp;description SSL SMTP&lt;BR /&gt;&amp;nbsp;port-object eq 465&lt;BR /&gt;object-group service Apple_Facetime udp&lt;BR /&gt;&amp;nbsp;description Apple Facetime Port Group&lt;BR /&gt;&amp;nbsp;port-object eq 16384&lt;BR /&gt;&amp;nbsp;port-object eq 16385&lt;BR /&gt;&amp;nbsp;port-object eq 16386&lt;BR /&gt;object-group service Proxy_Settings tcp&lt;BR /&gt;&amp;nbsp;description Proxy Port&lt;BR /&gt;&amp;nbsp;port-object eq 8080&lt;BR /&gt;&amp;nbsp;port-object eq 9443&lt;BR /&gt;object-group service Android_Market tcp&lt;BR /&gt;&amp;nbsp;description Android Market Place&lt;BR /&gt;&amp;nbsp;port-object eq 5228&lt;BR /&gt;object-group service Print_Server_Ports tcp&lt;BR /&gt;&amp;nbsp;description Print Server Ports&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq 48111&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network RADIUS_Servers&lt;BR /&gt;&amp;nbsp;network-object object RDC4455&lt;BR /&gt;&amp;nbsp;network-object object SDC4455&lt;BR /&gt;object-group network WLAN_Controllers&lt;BR /&gt;&amp;nbsp;description Wireless LAN Controllers&lt;BR /&gt;&amp;nbsp;network-object object WLC_1&lt;BR /&gt;&amp;nbsp;network-object object WLC_2&lt;BR /&gt;object-group network NAP_Servers1&lt;BR /&gt;&amp;nbsp;description Allow RADIUS authentication traffic from wireless clients&lt;BR /&gt;&amp;nbsp;network-object object RDC_NAP_Server&lt;BR /&gt;&amp;nbsp;network-object object SDC_NAP_Server&lt;BR /&gt;object-group service MirrorOpTCP tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3268&lt;BR /&gt;&amp;nbsp;port-object eq ldap&lt;BR /&gt;object-group network Domain_Controllers&lt;BR /&gt;&amp;nbsp;description SCH4455 Controllers&lt;BR /&gt;&amp;nbsp;network-object object RDC4455&lt;BR /&gt;&amp;nbsp;network-object object SDC4455&lt;BR /&gt;object-group service Kebros&lt;BR /&gt;&amp;nbsp;description authentication Ports&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq kerberos &lt;BR /&gt;&amp;nbsp;service-object udp destination eq kerberos &lt;BR /&gt;&amp;nbsp;service-object object GC &lt;BR /&gt;&amp;nbsp;service-object object Kpassword &lt;BR /&gt;&amp;nbsp;service-object tcp destination eq ldap &lt;BR /&gt;object-group network Server_and_Tech_VLAN&lt;BR /&gt;&amp;nbsp;network-object object Server_VLAN&lt;BR /&gt;&amp;nbsp;network-object object Tech_PC_01&lt;BR /&gt;&amp;nbsp;network-object object Tech_PC_02&lt;BR /&gt;object-group service VNC_Viewer tcp&lt;BR /&gt;&amp;nbsp;port-object eq 6900&lt;BR /&gt;&amp;nbsp;port-object eq 6901&lt;BR /&gt;&amp;nbsp;port-object eq 6902&lt;BR /&gt;&amp;nbsp;port-object eq 6903&lt;BR /&gt;&amp;nbsp;port-object eq 6904&lt;BR /&gt;&amp;nbsp;port-object eq 6905&lt;BR /&gt;&amp;nbsp;port-object eq 6906&lt;BR /&gt;&amp;nbsp;port-object eq 6907&lt;BR /&gt;&amp;nbsp;port-object eq 6908&lt;BR /&gt;&amp;nbsp;port-object eq 6909&lt;BR /&gt;object-group service Apple_Bind&lt;BR /&gt;&amp;nbsp;description Ports to allow&lt;BR /&gt;&amp;nbsp;service-object object GC &lt;BR /&gt;&amp;nbsp;service-object object Kpassword &lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq kerberos &lt;BR /&gt;&amp;nbsp;service-object tcp destination eq kerberos &lt;BR /&gt;&amp;nbsp;service-object tcp destination eq ldap &lt;BR /&gt;&amp;nbsp;service-object object Apple_Keberos_Port &lt;BR /&gt;&amp;nbsp;service-object object Apple_Keberos_Port_TCP &lt;BR /&gt;&amp;nbsp;service-object object kPassword_UDP &lt;BR /&gt;access-list Wireless_access_in remark Deny traffic to the Moodle Server via HTTPS only.&lt;BR /&gt;access-list Wireless_access_in extended deny tcp 172.20.0.0 255.255.0.0 object VLE_Server eq https inactive &lt;BR /&gt;access-list Wireless_access_in extended permit tcp any object Inside_Wired_Network object-group MirrorOpTCP inactive &lt;BR /&gt;access-list Wireless_access_in extended permit tcp any any object-group Proxy_Settings &lt;BR /&gt;access-list Wireless_access_in remark Permit the sending of data to be printed.&lt;BR /&gt;access-list Wireless_access_in extended permit tcp any object Print_Server object-group Print_Server_Ports &lt;BR /&gt;access-list Wireless_access_in remark Allow RADIUS authentication traffic from wirless clients to the NAP RADIUS Server&lt;BR /&gt;access-list Wireless_access_in extended permit udp any object-group NAP_Servers1 object-group NAP_Access &lt;BR /&gt;access-list Wireless_access_in extended permit udp any object NAP_Server_SDC object-group NAP_Access inactive &lt;BR /&gt;access-list Wireless_access_in extended permit tcp any any eq www &lt;BR /&gt;access-list Wireless_access_in extended permit udp any any eq domain &lt;BR /&gt;access-list Wireless_access_in extended permit tcp any any eq https &lt;BR /&gt;access-list Wireless_access_in extended permit tcp any any object-group Exchange &lt;BR /&gt;access-list Wireless_access_in extended permit tcp any any object-group Apple_Push_Notification_service &lt;BR /&gt;access-list Wireless_access_in extended permit udp any any object-group Apple_Facetime &lt;BR /&gt;access-list Wireless_access_in extended permit tcp any any object-group SSL_SMTP &lt;BR /&gt;access-list Wireless_access_in extended permit tcp any any object-group Android_Market &lt;BR /&gt;access-list Wireless_access_in remark NetBIOS Naming Serivce&lt;BR /&gt;access-list Wireless_access_in extended permit udp any any eq netbios-ns &lt;BR /&gt;access-list Wireless_access_in remark Network time Protocol Port&lt;BR /&gt;access-list Wireless_access_in extended permit udp any any eq ntp &lt;BR /&gt;access-list Wireless_access_in extended permit udp any any eq bootps &lt;BR /&gt;access-list Wireless_access_in extended deny icmp any any &lt;BR /&gt;access-list Wireless_access_in extended deny ip any any &lt;BR /&gt;access-list Outside_access_in extended permit ip any any inactive &lt;BR /&gt;access-list Outside_access_in remark Permit Internet access to the Moodle Server via HTTPS only.&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object VLE_Server eq https &lt;BR /&gt;access-list Outside_access_in extended permit tcp any object Terminal_Server eq 3389 &lt;BR /&gt;access-list Outside_access_in remark County Access to the SQL Server for SLG synch and updates&lt;BR /&gt;access-list Outside_access_in extended permit tcp object-group County_SLG_Access object SQL4455 object-group Somerset_Learning_Gateway &lt;BR /&gt;access-list Outside_access_in extended permit udp object Capita_VPN object SQL4455 object-group Capita &lt;BR /&gt;access-list Outside_access_in extended permit icmp any any &lt;BR /&gt;access-list Apple_Network_access_in remark Kebbros Authentication - Apple to AD&lt;BR /&gt;access-list Apple_Network_access_in extended permit object-group Apple_Bind 192.168.201.0 255.255.255.0 object-group Domain_Controllers inactive &lt;BR /&gt;access-list Apple_Network_access_in extended permit tcp any any eq telnet inactive &lt;BR /&gt;access-list Apple_Network_access_in remark Permit traffic to the Moodle Server via HTTPS only.&lt;BR /&gt;access-list Apple_Network_access_in extended permit tcp 192.168.201.0 255.255.255.0 object VLE_Server eq https &lt;BR /&gt;access-list Apple_Network_access_in extended permit udp any any eq domain &lt;BR /&gt;access-list Apple_Network_access_in extended permit tcp any any eq domain inactive &lt;BR /&gt;access-list Apple_Network_access_in extended permit tcp any any object-group Proxy_Settings &lt;BR /&gt;access-list Apple_Network_access_in extended permit tcp any any eq https &lt;BR /&gt;access-list Apple_Network_access_in extended permit udp any any eq ntp &lt;BR /&gt;access-list Apple_Network_access_in extended permit tcp any any eq www &lt;BR /&gt;access-list Apple_Network_access_in extended permit tcp object-group Server_and_Tech_VLAN object Apple_Server object-group VNC_Viewer &lt;BR /&gt;access-list Apple_Network_access_in extended deny icmp any any &lt;BR /&gt;access-list Apple_Network_access_in extended deny ip any any &lt;BR /&gt;access-list Inside_access_in extended permit ip any any &lt;BR /&gt;access-list Inside_access_in extended permit icmp any any &lt;BR /&gt;access-list Inside_access_in extended permit tcp any any &lt;BR /&gt;access-list global_access extended permit ip any any &lt;BR /&gt;access-list global_access extended permit tcp any any &lt;BR /&gt;access-list global_access extended permit icmp any any &lt;BR /&gt;access-list Inside_mpc remark Allow HTTPs traffice to the VLE.&lt;BR /&gt;access-list Inside_mpc extended permit tcp 172.20.0.0 255.255.0.0 object VLE_Server eq https &lt;BR /&gt;access-list Inside_mpc extended permit tcp 172.20.0.0 255.255.0.0 object Print_Server object-group Print_Server_Ports &lt;BR /&gt;access-list Inside_mpc extended permit udp object-group WLAN_Controllers object-group RADIUS_Servers object-group NAP_Access inactive &lt;BR /&gt;access-list Apple_Network_access_out extended permit icmp any any &lt;BR /&gt;access-list Apple_Network_access_out extended permit tcp object-group Server_and_Tech_VLAN object-group VNC_Viewer object Apple_Server object-group VNC_Viewer &lt;BR /&gt;access-list Apple_Network_access_out extended permit ip object-group Server_and_Tech_VLAN object Apple_Server &lt;BR /&gt;access-list Apple_Network_access_out extended deny ip any any &lt;BR /&gt;access-list Test_access_in extended permit icmp any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host management 192.168.1.200&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu Apple_Network 1500&lt;BR /&gt;mtu Wireless 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool Staff_VPN_DHCP_Pool 10.5.107.137-10.5.107.141 mask 255.255.255.248&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any Inside&lt;BR /&gt;asdm image disk0:/asdm-66114.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (Inside,Outside) source static Inside_Wired_Network Inside_Wired_Network destination static NETWORK_OBJ_10.5.107.136_29 NETWORK_OBJ_10.5.107.136_29 no-proxy-arp route-lookup&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-group Apple_Network_access_in in interface Apple_Network&lt;BR /&gt;access-group Apple_Network_access_out out interface Apple_Network&lt;BR /&gt;access-group Wireless_access_in in interface Wireless&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 172.19.53.54 1&lt;BR /&gt;route Inside 10.5.104.0 255.255.252.0 10.5.107.131 1&lt;BR /&gt;route Inside 192.168.160.0 255.255.255.0 10.5.107.131 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server NPS protocol radius&lt;BR /&gt;aaa-server NPS (Inside) host 10.5.107.250&lt;BR /&gt;&amp;nbsp;timeout 5&lt;BR /&gt;&amp;nbsp;key *****&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;snmp-server location Server Room&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh scopy enable&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access management&lt;BR /&gt;dhcpd dns 10.80.11.235&lt;BR /&gt;!&lt;BR /&gt;dhcprelay server 10.5.107.253 Inside&lt;BR /&gt;dhcprelay enable Wireless&lt;BR /&gt;dhcprelay timeout 60&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 10.5.107.253 source Inside prefer&lt;BR /&gt;tftp-server management 192.168.1.200 /&lt;BR /&gt;ssl encryption aes128-sha1 3des-sha1&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy StaffVPN internal&lt;BR /&gt;group-policy StaffVPN attributes&lt;BR /&gt;&amp;nbsp;dns-server value 10.5.107.253 10.5.107.250&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 l2tp-ipsec &lt;BR /&gt;&amp;nbsp;default-domain value Sch4455.somerset.gov.uk&lt;BR /&gt;username sysadmin password S6VzqkQ7Jv+nx3sv5VbFXg== nt-encrypted privilege 15&lt;BR /&gt;tunnel-group StaffVPN type remote-access&lt;BR /&gt;tunnel-group StaffVPN general-attributes&lt;BR /&gt;&amp;nbsp;address-pool Staff_VPN_DHCP_Pool&lt;BR /&gt;&amp;nbsp;authentication-server-group NPS&lt;BR /&gt;&amp;nbsp;default-group-policy StaffVPN&lt;BR /&gt;tunnel-group StaffVPN ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map Inside-class&lt;BR /&gt;&amp;nbsp;match access-list Inside_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map Inside-policy&lt;BR /&gt;&amp;nbsp;description Allow Access through the firewall to the RADIUS Servers&lt;BR /&gt;&amp;nbsp;class Inside-class&lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;policy-map type inspect http Wireless_to_Printserver&lt;BR /&gt;&amp;nbsp;description HTTP inspection&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy Inside-policy interface Inside&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;hpm topN enable&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:03:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958214#M156121</guid>
      <dc:creator>Sean Haynes</dc:creator>
      <dc:date>2019-03-12T08:03:21Z</dc:date>
    </item>
    <item>
      <title>Is your outside interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958215#M156122</link>
      <description>&lt;P&gt;Is your outside interface plugged into your new ISP? &amp;nbsp;Are you meant to be using the IP address&amp;nbsp;&lt;SPAN&gt;172.19.53.54 (or are you meant to be using DHCP)?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also your default route is pointing to your own IP address. &amp;nbsp;This needs to be removed and pointed to whatever IP address your ISP has on their router.&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;&lt;SPAN&gt;route Outside 0.0.0.0 0.0.0.0 172.19.53.54 1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 22 Jul 2016 19:54:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958215#M156122</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-07-22T19:54:09Z</dc:date>
    </item>
    <item>
      <title>I can't see anything to NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958216#M156123</link>
      <description>&lt;P&gt;I can't see anything to NAT traffic to your Outside IP address. &amp;nbsp;You'll need something like:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,Outside) dynamic interface&lt;/PRE&gt;</description>
      <pubDate>Fri, 22 Jul 2016 19:59:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958216#M156123</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-07-22T19:59:24Z</dc:date>
    </item>
    <item>
      <title>How is it that your default</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958217#M156124</link>
      <description>&lt;P&gt;How is it that your default route points to your outside interface IP?&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;interface GigabitEthernet0/0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;nameif Outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;security-level 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;ip address 172.19.53.54 255.255.255.252&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;route Outside 0.0.0.0 0.0.0.0 172.19.53.54 1&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Normally the ASA wouldn't allow you to do that. Maybe you sanitized the config and made a typo? The default route should be the next hop, the ISPs router probably.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2016 00:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958217#M156124</guid>
      <dc:creator>jaysoo</dc:creator>
      <dc:date>2016-07-23T00:23:53Z</dc:date>
    </item>
    <item>
      <title>OK I'll check that when I'm</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958218#M156125</link>
      <description>&lt;P&gt;OK I'll check that when I'm back in work - but from memory I'm sure that is actually where it's pointing.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2016 05:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958218#M156125</guid>
      <dc:creator>Sean Haynes</dc:creator>
      <dc:date>2016-07-23T05:37:24Z</dc:date>
    </item>
    <item>
      <title>Thank you, yes the outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958219#M156126</link>
      <description>&lt;P&gt;Thank you, yes the outside interface is plugged directly into their router. I'll check this when back in work.&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2016 05:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512x-interface-routing/m-p/2958219#M156126</guid>
      <dc:creator>Sean Haynes</dc:creator>
      <dc:date>2016-07-23T05:39:24Z</dc:date>
    </item>
  </channel>
</rss>

