<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CISCO ASA 5505 vs CISCO ASA 5506-x in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-vs-cisco-asa-5506-x/m-p/2876255#M167314</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;First of all I really hope to find someone who is able to help me.&lt;/P&gt;
&lt;P&gt;We have in our (small) office a CISCO ASA 5505 but it died and I have&amp;nbsp;ordered a new ASA device. As we had a template for the 5505 Series&amp;nbsp;I tried to order a 5505 and use the template. But I heard from our supplier that the 5505 is oudated and only a 5506-x can be ordered.&lt;/P&gt;
&lt;P&gt;unfurtunately, because now my template isn't working. I dont have loads of cisco knowledge, and I have searched on the web for solutions. The port configuration has been changed and I found a usefull document to change it, but all the rest of my commands are not working to...&lt;/P&gt;
&lt;P&gt;my task now to get our new purchased 5506-x working, and I hope to find someone who can help me?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have copied the code from the template below:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup Trust&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 172.xx.1.xx&lt;BR /&gt;&amp;nbsp;name-server 172.xx.1.xx&lt;BR /&gt;&amp;nbsp;domain-name domain-xxx&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list Untrust_cryptomap extended permit ip 172.FPC#IP.0 255.255.254.0 172.16.0.0 255.255.0.0 &lt;BR /&gt;access-list Trust_access_in extended permit ip 172.FPC#IP.0 255.255.254.0 10.0.0.0 255.0.0.0 &lt;BR /&gt;access-list Trust_access_in extended permit ip 172.FPC#IP.0 255.255.254.0 172.16.0.0 255.255.0.0 &lt;BR /&gt;access-list Trust_nat0_outbound extended permit ip 172.FPC#IP.0 255.255.254.0 172.16.0.0 255.255.0.0 &lt;BR /&gt;access-list Untrust_access_in extended permit ip 10.0.0.0 255.0.0.0 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging console errors&lt;BR /&gt;logging asdm warnings&lt;BR /&gt;logging mail errors&lt;BR /&gt;logging from-address FW-TMPL@xxxxxxxx.nl&lt;BR /&gt;logging recipient-address servicedesk@xxxxxxxx.nl level errors&lt;BR /&gt;mtu Trust 1500&lt;BR /&gt;mtu Untrust 1500&lt;BR /&gt;ip verify reverse-path interface Untrust&lt;BR /&gt;icmp unreachable rate-limit 10 burst-size 1&lt;BR /&gt;icmp permit any Trust&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (Untrust) 1 interface&lt;BR /&gt;nat (Trust) 0 access-list Trust_nat0_outbound&lt;BR /&gt;no nat (Trust) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (Trust) 1 172.FPC#IP.0 255.255.254.0&lt;BR /&gt;access-group Trust_access_in in interface Trust&lt;BR /&gt;access-group Untrust_access_in in interface Untrust&lt;BR /&gt;route Untrust 0.0.0.0 0.0.0.0 172.FPC#RT 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;no http 192.168.1.0 255.255.255.0 Trust&lt;BR /&gt;http 172.FPC#IP.0 255.255.254.0 Trust&lt;BR /&gt;http 172.xx.xx.0 255.255.255.0 Trust&lt;BR /&gt;http redirect Trust 80&lt;BR /&gt;snmp-server host Trust 172.xx.1.xx community public version 2c&lt;BR /&gt;snmp-server host Trust 172.xx.1.xx community public version 2c&lt;BR /&gt;snmp-server host Trust 172.xx.1.xx community public version 2c&lt;BR /&gt;snmp-server location FPC#LOC&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sysopt noproxyarp Trust&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map Untrust_map1 1 match address Untrust_cryptomap&lt;BR /&gt;crypto map Untrust_map1 1 set pfs &lt;BR /&gt;crypto map Untrust_map1 1 set peer 172.xx.xx.xx &lt;BR /&gt;crypto map Untrust_map1 1 set transform-set ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map Untrust_map1 1 set reverse-route&lt;BR /&gt;crypto map Untrust_map1 interface Untrust&lt;BR /&gt;crypto isakmp enable Untrust&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 2&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 3&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access Trust&lt;BR /&gt;no dhcpd auto_config Untrust&lt;BR /&gt;dhcprelay server 172.xx.xx.xx Untrust&lt;BR /&gt;dhcprelay enable Trust&lt;BR /&gt;dhcprelay timeout 60&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 172.xx.xx.xx source Trust&lt;BR /&gt;ntp server 172.xx.xx.xx source Trust prefer&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol IPSec &lt;BR /&gt;username admin password EIzFbn/fVy4aIhV3 encrypted privilege 15&lt;BR /&gt;username 2invision password js/4oXuKmz.tSZYq encrypted privilege 15&lt;BR /&gt;tunnel-group 172.xx.xx.xx type ipsec-l2l&lt;BR /&gt;tunnel-group 172.xx.xx.xx general-attributes&lt;BR /&gt;&amp;nbsp;default-group-policy GroupPolicy1&lt;BR /&gt;tunnel-group 172.xx.xx.xx ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key JH,virtual47&lt;BR /&gt;&amp;nbsp;peer-id-validate nocheck&lt;BR /&gt;&amp;nbsp;isakmp keepalive disable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 172.xx.xx.xx &lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:30:45 GMT</pubDate>
    <dc:creator>theincredibles19821</dc:creator>
    <dc:date>2019-03-12T07:30:45Z</dc:date>
    <item>
      <title>CISCO ASA 5505 vs CISCO ASA 5506-x</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-vs-cisco-asa-5506-x/m-p/2876255#M167314</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;First of all I really hope to find someone who is able to help me.&lt;/P&gt;
&lt;P&gt;We have in our (small) office a CISCO ASA 5505 but it died and I have&amp;nbsp;ordered a new ASA device. As we had a template for the 5505 Series&amp;nbsp;I tried to order a 5505 and use the template. But I heard from our supplier that the 5505 is oudated and only a 5506-x can be ordered.&lt;/P&gt;
&lt;P&gt;unfurtunately, because now my template isn't working. I dont have loads of cisco knowledge, and I have searched on the web for solutions. The port configuration has been changed and I found a usefull document to change it, but all the rest of my commands are not working to...&lt;/P&gt;
&lt;P&gt;my task now to get our new purchased 5506-x working, and I hope to find someone who can help me?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have copied the code from the template below:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup Trust&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 172.xx.1.xx&lt;BR /&gt;&amp;nbsp;name-server 172.xx.1.xx&lt;BR /&gt;&amp;nbsp;domain-name domain-xxx&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list Untrust_cryptomap extended permit ip 172.FPC#IP.0 255.255.254.0 172.16.0.0 255.255.0.0 &lt;BR /&gt;access-list Trust_access_in extended permit ip 172.FPC#IP.0 255.255.254.0 10.0.0.0 255.0.0.0 &lt;BR /&gt;access-list Trust_access_in extended permit ip 172.FPC#IP.0 255.255.254.0 172.16.0.0 255.255.0.0 &lt;BR /&gt;access-list Trust_nat0_outbound extended permit ip 172.FPC#IP.0 255.255.254.0 172.16.0.0 255.255.0.0 &lt;BR /&gt;access-list Untrust_access_in extended permit ip 10.0.0.0 255.0.0.0 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging console errors&lt;BR /&gt;logging asdm warnings&lt;BR /&gt;logging mail errors&lt;BR /&gt;logging from-address FW-TMPL@xxxxxxxx.nl&lt;BR /&gt;logging recipient-address servicedesk@xxxxxxxx.nl level errors&lt;BR /&gt;mtu Trust 1500&lt;BR /&gt;mtu Untrust 1500&lt;BR /&gt;ip verify reverse-path interface Untrust&lt;BR /&gt;icmp unreachable rate-limit 10 burst-size 1&lt;BR /&gt;icmp permit any Trust&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (Untrust) 1 interface&lt;BR /&gt;nat (Trust) 0 access-list Trust_nat0_outbound&lt;BR /&gt;no nat (Trust) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (Trust) 1 172.FPC#IP.0 255.255.254.0&lt;BR /&gt;access-group Trust_access_in in interface Trust&lt;BR /&gt;access-group Untrust_access_in in interface Untrust&lt;BR /&gt;route Untrust 0.0.0.0 0.0.0.0 172.FPC#RT 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;no http 192.168.1.0 255.255.255.0 Trust&lt;BR /&gt;http 172.FPC#IP.0 255.255.254.0 Trust&lt;BR /&gt;http 172.xx.xx.0 255.255.255.0 Trust&lt;BR /&gt;http redirect Trust 80&lt;BR /&gt;snmp-server host Trust 172.xx.1.xx community public version 2c&lt;BR /&gt;snmp-server host Trust 172.xx.1.xx community public version 2c&lt;BR /&gt;snmp-server host Trust 172.xx.1.xx community public version 2c&lt;BR /&gt;snmp-server location FPC#LOC&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sysopt noproxyarp Trust&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map Untrust_map1 1 match address Untrust_cryptomap&lt;BR /&gt;crypto map Untrust_map1 1 set pfs &lt;BR /&gt;crypto map Untrust_map1 1 set peer 172.xx.xx.xx &lt;BR /&gt;crypto map Untrust_map1 1 set transform-set ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map Untrust_map1 1 set reverse-route&lt;BR /&gt;crypto map Untrust_map1 interface Untrust&lt;BR /&gt;crypto isakmp enable Untrust&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 2&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 3&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access Trust&lt;BR /&gt;no dhcpd auto_config Untrust&lt;BR /&gt;dhcprelay server 172.xx.xx.xx Untrust&lt;BR /&gt;dhcprelay enable Trust&lt;BR /&gt;dhcprelay timeout 60&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 172.xx.xx.xx source Trust&lt;BR /&gt;ntp server 172.xx.xx.xx source Trust prefer&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol IPSec &lt;BR /&gt;username admin password EIzFbn/fVy4aIhV3 encrypted privilege 15&lt;BR /&gt;username 2invision password js/4oXuKmz.tSZYq encrypted privilege 15&lt;BR /&gt;tunnel-group 172.xx.xx.xx type ipsec-l2l&lt;BR /&gt;tunnel-group 172.xx.xx.xx general-attributes&lt;BR /&gt;&amp;nbsp;default-group-policy GroupPolicy1&lt;BR /&gt;tunnel-group 172.xx.xx.xx ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key JH,virtual47&lt;BR /&gt;&amp;nbsp;peer-id-validate nocheck&lt;BR /&gt;&amp;nbsp;isakmp keepalive disable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 172.xx.xx.xx &lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:30:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-vs-cisco-asa-5506-x/m-p/2876255#M167314</guid>
      <dc:creator>theincredibles19821</dc:creator>
      <dc:date>2019-03-12T07:30:45Z</dc:date>
    </item>
    <item>
      <title>The 5506-X differs from the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-vs-cisco-asa-5506-x/m-p/2876256#M167315</link>
      <description>&lt;P&gt;The 5506-X differs from the 5505 in several ways. Most notably for purposes of configuration there are two major differences"&lt;/P&gt;
&lt;P&gt;1. There are no switchports. All interfaces are routed and require an IP address. If you were using the switching (VLAN assignment) feature on the 505, a redesign is required.&lt;/P&gt;
&lt;P&gt;2. The new ASA only runs ASA software 9.1 or higher. If you had a configuration built with old software (8.2(x) or lower - such as your template appears to be built from) then you will have to convert several configuration bits - most notably NAT and access-lists.&lt;/P&gt;
&lt;P&gt;I don't see any interface configurations in your template. They will also need to be updated to reflect the lack of VLAN interfaces in the 5506.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2016 13:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-vs-cisco-asa-5506-x/m-p/2876256#M167315</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-03-18T13:26:24Z</dc:date>
    </item>
    <item>
      <title>interface configurations can</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-vs-cisco-asa-5506-x/m-p/2876257#M167316</link>
      <description>&lt;P&gt;interface configurations can be as factory default for 5505. that means ip dhcp for outside and something like 192.168.1.1 for inside&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2016 17:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-vs-cisco-asa-5506-x/m-p/2876257#M167316</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2016-03-18T17:00:30Z</dc:date>
    </item>
  </channel>
</rss>

