<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,I don't see any NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-config-question/m-p/2751148#M178594</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I don't see any NAT statements for these subnets on the ASA device:-&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 172.16.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;Create similar NAT statement for the other networks as this statement:-&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
    <pubDate>Tue, 22 Sep 2015 19:49:43 GMT</pubDate>
    <dc:creator>Vibhor Amrodia</dc:creator>
    <dc:date>2015-09-22T19:49:43Z</dc:date>
    <item>
      <title>ASA5505 Config Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-config-question/m-p/2751147#M178593</link>
      <description>&lt;P&gt;I have a remote site at a customer I am working with and they have a 5505 at the head-end. We have put in a L3 switch behind the ASA with 4 networks on it and the switch is handing out DHCP and all of that is working fine. The networks can ping each other, etc. The issue becomes when we try to take one of the new networks to the Internet we hit the ASA but the traffic does not get routed out to the outside interface. VLAN 1 traffic, which is the network that the ASA sits can access Internet with no issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is ASA config:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(5)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname Solon-ASA&lt;BR /&gt;domain-name schwebels.com&lt;BR /&gt;enable password i5aKZHZh.g2TF6I8 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 172.17.1.0 Youngstown&lt;BR /&gt;name 24.182.156.188 PhoneSys2&lt;BR /&gt;name 172.19.51.0 syvox&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.18.3.252 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address PhoneSys2 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;banner exec &amp;nbsp;****************************&lt;BR /&gt;banner exec &amp;nbsp;Authorized Access Only!&lt;BR /&gt;banner exec &amp;nbsp;****************************&lt;BR /&gt;banner login &amp;nbsp;****************************&lt;BR /&gt;banner login &amp;nbsp;Authorized Access Only!&lt;BR /&gt;banner login &amp;nbsp;****************************&lt;BR /&gt;boot system disk0:/asa805-k8.bin&lt;BR /&gt;boot system disk0:/asa821-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name schwebels.com&lt;BR /&gt;object-group network Solon_Local&lt;BR /&gt;&amp;nbsp;network-object 172.17.3.0 255.255.255.0&lt;BR /&gt;object-group network Youngstown&lt;BR /&gt;&amp;nbsp;network-object Youngstown 255.255.255.0&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;access-list TECCOMVPN_splitTunnelAcl standard permit 172.16.3.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.16.3.0 255.255.255.0 172.16.254.80 255.255.255.240&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.16.3.0 255.255.255.0 Youngstown 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.16.3.0 255.255.255.0 syvox 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 172.16.3.0 255.255.255.0 Youngstown 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list outside_access_in remark allow ping&lt;BR /&gt;access-list outside_access_in extended permit icmp any any&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host PhoneSys2 eq sip&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host PhoneSys2 eq 5080&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host PhoneSys2 eq 5090&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host PhoneSys2 eq 5003&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host PhoneSys2 range 6000 6001&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host PhoneSys2 eq 6100&amp;nbsp;&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host PhoneSys2 range 9000 9001&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host PhoneSys2 eq 8000&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any host PhoneSys2 range 30000 30008&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host PhoneSys2 eq 443 inactive&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool VPN_Pool 172.16.254.80-172.16.254.95 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;asdm image disk0:/asdm-623.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 172.16.3.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp interface sip 172.16.3.250 sip netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface sip 172.16.3.250 sip netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) tcp interface 5080 172.16.3.250 5080 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) tcp interface 5090 172.16.3.250 5090 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) tcp interface 5003 172.16.3.250 5003 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;static (inside,outside) tcp interface 6000 172.16.3.250 6000 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 6000 172.16.3.250 6000 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) tcp interface 6001 172.16.3.250 6001 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 6001 172.16.3.250 6001 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) tcp interface 6100 172.16.3.250 6100 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) tcp interface 9000 172.16.3.250 9000 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 9000 172.16.3.250 9000 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) tcp interface 8000 172.16.3.250 8000 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 8000 172.16.3.250 8000 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 3000 172.16.3.250 3000 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30000 172.16.3.250 30000 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30001 172.16.3.250 30001 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30002 172.16.3.250 30002 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30003 172.16.3.250 30003 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30004 172.16.3.250 30004 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30005 172.16.3.250 30005 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30006 172.16.3.250 30006 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30007 172.16.3.250 30007 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30008 172.16.3.250 30008 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30009 172.16.3.250 30009 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30010 172.16.3.250 30010 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30011 172.16.3.250 30011 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30012 172.16.3.250 30012 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30013 172.16.3.250 30013 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30014 172.16.3.250 30014 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 30015 172.16.3.250 30015 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40000 172.16.3.250 40000 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40001 172.16.3.250 40001 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40002 172.16.3.250 40002 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40003 172.16.3.250 40003 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40004 172.16.3.250 40004 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40005 172.16.3.250 40005 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40006 172.16.3.250 40006 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40007 172.16.3.250 40007 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40008 172.16.3.250 40008 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40009 172.16.3.250 40009 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40010 172.16.3.250 40010 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40011 172.16.3.250 40011 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40012 172.16.3.250 40012 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40013 172.16.3.250 40013 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40014 172.16.3.250 40014 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40015 172.16.3.250 40015 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40016 172.16.3.250 40016 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40017 172.16.3.250 40017 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40018 172.16.3.250 40018 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40019 172.16.3.250 40019 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40020 172.16.3.250 40020 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40021 172.16.3.250 40021 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40022 172.16.3.250 40022 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40023 172.16.3.250 40023 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40024 172.16.3.250 40024 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40025 172.16.3.250 40025 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40026 172.16.3.250 40026 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40027 172.16.3.250 40027 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40028 172.16.3.250 40028 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40029 172.16.3.250 40029 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40030 172.16.3.250 40030 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) udp interface 40031 172.16.3.250 40031 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 24.172.156.185 1&lt;BR /&gt;route inside 172.16.11.0 255.255.255.0 172.16.3.251 1&lt;BR /&gt;route inside 172.16.41.0 255.255.255.0 172.16.3.251 1&lt;BR /&gt;route inside syvox 255.255.255.0 172.16.3.251 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication serial console LOCAL&amp;nbsp;&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication telnet console LOCAL&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 68.109.237.64 255.255.255.240 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs group1&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;crypto map outside_map 1 set peer 98.100.68.98&amp;nbsp;&lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;group 1&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 50&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;group 1&lt;BR /&gt;&amp;nbsp;lifetime 28800&lt;BR /&gt;crypto isakmp policy 60&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp ipsec-over-tcp port 10000&amp;nbsp;&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 68.109.237.64 255.255.255.240 outside&lt;BR /&gt;ssh 98.100.68.98 255.255.255.255 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 10&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy TECCOMVPN internal&lt;BR /&gt;group-policy TECCOMVPN attributes&lt;BR /&gt;&amp;nbsp;dns-server value 4.2.2.2&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol IPSec&amp;nbsp;&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value TECCOMVPN_splitTunnelAcl&lt;BR /&gt;&amp;nbsp;default-domain value schwebels.com&lt;BR /&gt;username teccom password MHvFS8qYNozp1cjl encrypted privilege 15&lt;BR /&gt;username admin password WqQwLWMnhsnu0tPQ encrypted privilege 15&lt;BR /&gt;tunnel-group TECCOMVPN type remote-access&lt;BR /&gt;tunnel-group TECCOMVPN general-attributes&lt;BR /&gt;&amp;nbsp;address-pool VPN_Pool&lt;BR /&gt;&amp;nbsp;default-group-policy TECCOMVPN&lt;BR /&gt;tunnel-group TECCOMVPN ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *&lt;BR /&gt;tunnel-group 98.100.68.98 type ipsec-l2l&lt;BR /&gt;tunnel-group 98.100.68.98 ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;Cryptochecksum:a749cfc0d6310c3b6eb0e36a82fbd6b8&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-config-question/m-p/2751147#M178593</guid>
      <dc:creator>nshoe18</dc:creator>
      <dc:date>2019-03-12T06:38:10Z</dc:date>
    </item>
    <item>
      <title>Hi,I don't see any NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-config-question/m-p/2751148#M178594</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I don't see any NAT statements for these subnets on the ASA device:-&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 172.16.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;Create similar NAT statement for the other networks as this statement:-&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2015 19:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-config-question/m-p/2751148#M178594</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-09-22T19:49:43Z</dc:date>
    </item>
  </channel>
</rss>

