<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA-5520 Send all HTTP and HTTPS traffic to Public External Proxy Server and Port in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-send-all-http-and-https-traffic-to-public/m-p/2684682#M190408</link>
    <description>&lt;P&gt;Current Device is a Cisco ASA-5520&lt;/P&gt;&lt;P&gt;Software Version = 9.1(5)21&lt;/P&gt;&lt;P&gt;ASDM Version = 7.3(2)102&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Outside Public IP = xx.xx.xx.xx&lt;/P&gt;&lt;P&gt;I have purchased a Private Proxy Service which gives me a Public IP Proxy Server and Port Number, I have this working from a browser so I know the Proxy Service works correctly. &amp;nbsp;I am trying to figure out how to send all HTTPS and HTTP traffic to the Proxy Server IP and Port number on the ASA-5520. &amp;nbsp;I don't want to have to configure all my client browser to use the proxy server and port number. &amp;nbsp;For the purposes of this example lets say the public proxy server ip = 10.10.10.10 and the port is 25510&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Their must me a way to do this and I am just not sure: &amp;nbsp;Below is my Config with a few things blocked out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA-5520# show run&lt;BR /&gt;: Saved&lt;BR /&gt;:&amp;nbsp;&lt;BR /&gt;: Serial Number: XXXXXXXXX&lt;BR /&gt;: Hardware: &amp;nbsp; ASA5520, 3072 MB RAM, CPU Pentium 4 Celeron 2000 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(5)21&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname ASA-5520&lt;BR /&gt;domain-name XXXXXXX&lt;BR /&gt;enable password XXXXXXXXX encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool vpnpool 172.16.75.100-172.16.75.110&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;description OUTSIDE Network DHCP FIOS&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description DMZ 50 Network 172.16.50.0/24&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 172.16.50.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;description INSIDE 100 Network 10.0.100.0/24&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.0.100.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.1 255.255.255.252&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;banner login&amp;nbsp;&lt;BR /&gt;banner login ########################################&lt;BR /&gt;banner login ### &amp;nbsp;UNATHORIZED ACCESS PROHIBITED &amp;nbsp; ###&lt;BR /&gt;banner login ########################################&lt;BR /&gt;banner login&amp;nbsp;&lt;BR /&gt;banner motd &amp;nbsp;&amp;nbsp;&lt;BR /&gt;banner motd ##########################################################################&lt;BR /&gt;banner motd ### &amp;nbsp;WELCOME PETE, ENJOY YOUR SESSION, DON't FORGET to WRITE MEMEORY! &amp;nbsp;###&lt;BR /&gt;banner motd ##########################################################################&lt;BR /&gt;banner motd&amp;nbsp;&lt;BR /&gt;boot system disk0:/asa915-21-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name XXXXXXXXXXX&lt;BR /&gt;object network INSIDE-NET&lt;BR /&gt;&amp;nbsp;subnet 10.0.100.0 255.255.255.0&lt;BR /&gt;object network DMZ-NET&lt;BR /&gt;&amp;nbsp;subnet 172.16.50.0 255.255.255.0&lt;BR /&gt;object network cam1- xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam2- &amp;nbsp;xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam3- xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam4- xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam5- xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam6- xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam7- xxxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.97&lt;BR /&gt;object network SSH- xxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network SW1-3033&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network SW2-3034&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network SW3-3035&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network SW4-3036&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R1-3037&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R2-3038&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R3-3039&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R4-3040&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R5-3041&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R6-3042&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network VERIZON- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.3&lt;BR /&gt;object network VERIZON- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.3&lt;BR /&gt;object network VERIZON- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.3&lt;BR /&gt;object network VERIZON- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.3&lt;BR /&gt;object network PDU1- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.5&lt;BR /&gt;object network PDU2- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.6&lt;BR /&gt;object network PETEWKS-RDP- xxxxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.10&lt;BR /&gt;object network PETELAP-RDP- xxxxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.20&lt;BR /&gt;object network PETEWKS-BITTORENT- xxxxxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.10&lt;BR /&gt;object network PETEWKS-FTP-xxxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.10&lt;BR /&gt;object network VERIZON-WAP- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network NETWORK_OBJ_10.0.100.0_Net1&lt;BR /&gt;&amp;nbsp;subnet 10.0.100.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_172.16.50.0_Net2&lt;BR /&gt;&amp;nbsp;subnet 172.16.50.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_172.16.75.0_RemotePool&lt;BR /&gt;&amp;nbsp;subnet 172.16.75.0 255.255.255.0&lt;BR /&gt;object network PRINTER&lt;BR /&gt;&amp;nbsp;host 10.0.100.18&lt;BR /&gt;object network rdp-3389&lt;BR /&gt;&amp;nbsp;host 172.16.50.104&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam1-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam2-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam3-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam4-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam5-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam6-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam7-xxxx eq xxxx&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SSH-xx eq xxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SW1-3033 eq 3033&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SW2-3034 eq 3034&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SW3-3035 eq 3035&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SW4-3036 eq 3036&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R1-3037 eq 3037&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R2-3038 eq 3038&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R3-3039 eq 3039&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R4-3040 eq 3040&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R5-3041 eq 3041&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R6-3042 eq 3042&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object VERIZON-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any object VERIZON-xxxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any object VERIZON-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object VERIZON-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PDU1-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PDU2-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PETEWKS-RDP-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PETELAP-RDP-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PETEWKS-BITTORENT-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PETEWKS-FTP-xx eq xx&lt;BR /&gt;access-list outside_access_in extended permit tcp any object VERIZON-WAP-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any time-exceeded&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any unreachable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any traceroute&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object rdp-xxxx eq xxxx&lt;BR /&gt;access-list outside_access_in extended permit udp any object rdp-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list Split_Tunnel_List_ACL remark ****** Split Tunnel Encrypted Traffic ******&lt;BR /&gt;access-list Split_Tunnel_List_ACL standard permit 10.0.100.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list Split_Tunnel_List_ACL standard permit 172.16.50.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit tcp any object PRINTER eq 9100&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit udp any object PRINTER eq 9100&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit udp any object PRINTER eq snmp&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging list ALL-MESSAGES level emergencies&lt;BR /&gt;logging console emergencies&lt;BR /&gt;logging monitor emergencies&lt;BR /&gt;logging buffered emergencies&lt;BR /&gt;logging trap warnings&lt;BR /&gt;logging history alerts&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging mail emergencies&lt;BR /&gt;logging facility 21&lt;BR /&gt;logging device-id hostname&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any dmz&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-732-102.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.0.100.0_Net1 NETWORK_OBJ_10.0.100.0_Net1 destination static NETWORK_OBJ_172.16.75.0_RemotePool NETWORK_OBJ_172.16.75.0_RemotePool&lt;BR /&gt;nat (dmz,outside) source static NETWORK_OBJ_172.16.50.0_Net2 NETWORK_OBJ_172.16.50.0_Net2 destination static NETWORK_OBJ_172.16.75.0_RemotePool NETWORK_OBJ_172.16.75.0_RemotePool&lt;BR /&gt;!&lt;BR /&gt;object network INSIDE-NET&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network DMZ-NET&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) dynamic interface&lt;BR /&gt;object network cam1-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network cam2-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&amp;nbsp;&lt;BR /&gt;object network cam3-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&amp;nbsp;&lt;BR /&gt;object network cam4-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network cam5-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&amp;nbsp;&lt;BR /&gt;object network cam6-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network cam7-xxxx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 8097 8097&amp;nbsp;&lt;BR /&gt;object network SSH-xx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxx xxx&amp;nbsp;&lt;BR /&gt;object network SW1-3033&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3033 3033&amp;nbsp;&lt;BR /&gt;object network SW2-3034&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3034 3034&amp;nbsp;&lt;BR /&gt;object network SW3-3035&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3035 3035&amp;nbsp;&lt;BR /&gt;object network SW4-3036&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3036 3036&amp;nbsp;&lt;BR /&gt;object network R1-3037&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3037 3037&amp;nbsp;&lt;BR /&gt;object network R2-3038&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3038 3038&amp;nbsp;&lt;BR /&gt;object network R3-3039&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3039 3039&amp;nbsp;&lt;BR /&gt;object network R4-3040&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3040 3040&amp;nbsp;&lt;BR /&gt;object network R5-3041&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3041 3041&amp;nbsp;&lt;BR /&gt;object network R6-3042&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network VERIZON-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&amp;nbsp;&lt;BR /&gt;object network VERIZON-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network VERIZON-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network VERIZON-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PDU1-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PDU2-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PETEWKS-RDP-xxxx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PETELAP-RDP-xxxx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PETEWKS-BITTORENT-xxxx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PETEWKS-FTP-xx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxxxxx&lt;BR /&gt;object network VERIZON-WAP-xxxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PRINTER&lt;BR /&gt;&amp;nbsp;nat (inside,dmz) static 172.16.50.18&lt;BR /&gt;object network rdp-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication http console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication enable console LOCAL&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.100.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.100.2 255.255.255.255 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set vpnset esp-3des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ipsec df-bit clear-df outside&lt;BR /&gt;crypto dynamic-map dynmap 65535 set pfs&amp;nbsp;&lt;BR /&gt;crypto dynamic-map dynmap 65535 set ikev1 transform-set vpnset&lt;BR /&gt;crypto dynamic-map dynmap 65535 set security-association lifetime seconds 86400&lt;BR /&gt;crypto dynamic-map dynmap 65535 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map vpnmap 65535 ipsec-isakmp dynamic dynmap&lt;BR /&gt;crypto map vpnmap interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 1&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 10.0.100.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 10&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access management&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.16.50.100-172.16.50.110 dmz&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface dmz&lt;BR /&gt;dhcpd lease 86400 interface dmz&lt;BR /&gt;dhcpd enable dmz&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.0.100.100-10.0.100.110 inside&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface inside&lt;BR /&gt;dhcpd lease 86400 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 192.5.41.41 source outside&lt;BR /&gt;ntp server 192.5.41.40 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;anyconnect-essentials&lt;BR /&gt;group-policy vpnclientgroup internal&lt;BR /&gt;group-policy vpnclientgroup attributes&lt;BR /&gt;&amp;nbsp;dns-server value 8.8.8.8 208.67.222.222&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1&amp;nbsp;&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value Split_Tunnel_List_ACL&lt;BR /&gt;&amp;nbsp;default-domain value xxxxxxxxx&lt;BR /&gt;username XXXXXXX password XXXXXXXXXXXXX encrypted privilege 15&lt;BR /&gt;tunnel-group vpnclientgroup type remote-access&lt;BR /&gt;tunnel-group vpnclientgroup general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpnpool&lt;BR /&gt;&amp;nbsp;default-group-policy vpnclientgroup&lt;BR /&gt;tunnel-group vpnclientgroup ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map exit&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp error&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:XXXXXXXXXXXXXXXX&lt;BR /&gt;: end&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:09:22 GMT</pubDate>
    <dc:creator>TODD PETERSON</dc:creator>
    <dc:date>2019-03-12T06:09:22Z</dc:date>
    <item>
      <title>Cisco ASA-5520 Send all HTTP and HTTPS traffic to Public External Proxy Server and Port</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-send-all-http-and-https-traffic-to-public/m-p/2684682#M190408</link>
      <description>&lt;P&gt;Current Device is a Cisco ASA-5520&lt;/P&gt;&lt;P&gt;Software Version = 9.1(5)21&lt;/P&gt;&lt;P&gt;ASDM Version = 7.3(2)102&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Outside Public IP = xx.xx.xx.xx&lt;/P&gt;&lt;P&gt;I have purchased a Private Proxy Service which gives me a Public IP Proxy Server and Port Number, I have this working from a browser so I know the Proxy Service works correctly. &amp;nbsp;I am trying to figure out how to send all HTTPS and HTTP traffic to the Proxy Server IP and Port number on the ASA-5520. &amp;nbsp;I don't want to have to configure all my client browser to use the proxy server and port number. &amp;nbsp;For the purposes of this example lets say the public proxy server ip = 10.10.10.10 and the port is 25510&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Their must me a way to do this and I am just not sure: &amp;nbsp;Below is my Config with a few things blocked out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA-5520# show run&lt;BR /&gt;: Saved&lt;BR /&gt;:&amp;nbsp;&lt;BR /&gt;: Serial Number: XXXXXXXXX&lt;BR /&gt;: Hardware: &amp;nbsp; ASA5520, 3072 MB RAM, CPU Pentium 4 Celeron 2000 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(5)21&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname ASA-5520&lt;BR /&gt;domain-name XXXXXXX&lt;BR /&gt;enable password XXXXXXXXX encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool vpnpool 172.16.75.100-172.16.75.110&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;description OUTSIDE Network DHCP FIOS&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description DMZ 50 Network 172.16.50.0/24&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 172.16.50.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;description INSIDE 100 Network 10.0.100.0/24&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.0.100.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.1 255.255.255.252&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;banner login&amp;nbsp;&lt;BR /&gt;banner login ########################################&lt;BR /&gt;banner login ### &amp;nbsp;UNATHORIZED ACCESS PROHIBITED &amp;nbsp; ###&lt;BR /&gt;banner login ########################################&lt;BR /&gt;banner login&amp;nbsp;&lt;BR /&gt;banner motd &amp;nbsp;&amp;nbsp;&lt;BR /&gt;banner motd ##########################################################################&lt;BR /&gt;banner motd ### &amp;nbsp;WELCOME PETE, ENJOY YOUR SESSION, DON't FORGET to WRITE MEMEORY! &amp;nbsp;###&lt;BR /&gt;banner motd ##########################################################################&lt;BR /&gt;banner motd&amp;nbsp;&lt;BR /&gt;boot system disk0:/asa915-21-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name XXXXXXXXXXX&lt;BR /&gt;object network INSIDE-NET&lt;BR /&gt;&amp;nbsp;subnet 10.0.100.0 255.255.255.0&lt;BR /&gt;object network DMZ-NET&lt;BR /&gt;&amp;nbsp;subnet 172.16.50.0 255.255.255.0&lt;BR /&gt;object network cam1- xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam2- &amp;nbsp;xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam3- xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam4- xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam5- xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam6- xxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network cam7- xxxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.97&lt;BR /&gt;object network SSH- xxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network SW1-3033&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network SW2-3034&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network SW3-3035&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network SW4-3036&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R1-3037&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R2-3038&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R3-3039&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R4-3040&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R5-3041&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network R6-3042&lt;BR /&gt;&amp;nbsp;host 10.0.100.88&lt;BR /&gt;object network VERIZON- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.3&lt;BR /&gt;object network VERIZON- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.3&lt;BR /&gt;object network VERIZON- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.3&lt;BR /&gt;object network VERIZON- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.3&lt;BR /&gt;object network PDU1- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.5&lt;BR /&gt;object network PDU2- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.6&lt;BR /&gt;object network PETEWKS-RDP- xxxxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.10&lt;BR /&gt;object network PETELAP-RDP- xxxxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.20&lt;BR /&gt;object network PETEWKS-BITTORENT- xxxxxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.10&lt;BR /&gt;object network PETEWKS-FTP-xxxx&lt;BR /&gt;&amp;nbsp;host 10.0.100.10&lt;BR /&gt;object network VERIZON-WAP- xxxxx&lt;BR /&gt;&amp;nbsp;host 172.16.50.4&lt;BR /&gt;object network NETWORK_OBJ_10.0.100.0_Net1&lt;BR /&gt;&amp;nbsp;subnet 10.0.100.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_172.16.50.0_Net2&lt;BR /&gt;&amp;nbsp;subnet 172.16.50.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_172.16.75.0_RemotePool&lt;BR /&gt;&amp;nbsp;subnet 172.16.75.0 255.255.255.0&lt;BR /&gt;object network PRINTER&lt;BR /&gt;&amp;nbsp;host 10.0.100.18&lt;BR /&gt;object network rdp-3389&lt;BR /&gt;&amp;nbsp;host 172.16.50.104&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam1-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam2-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam3-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam4-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam5-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam6-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object cam7-xxxx eq xxxx&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SSH-xx eq xxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SW1-3033 eq 3033&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SW2-3034 eq 3034&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SW3-3035 eq 3035&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SW4-3036 eq 3036&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R1-3037 eq 3037&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R2-3038 eq 3038&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R3-3039 eq 3039&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R4-3040 eq 3040&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R5-3041 eq 3041&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object R6-3042 eq 3042&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object VERIZON-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any object VERIZON-xxxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any object VERIZON-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object VERIZON-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PDU1-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PDU2-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PETEWKS-RDP-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PETELAP-RDP-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PETEWKS-BITTORENT-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PETEWKS-FTP-xx eq xx&lt;BR /&gt;access-list outside_access_in extended permit tcp any object VERIZON-WAP-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any time-exceeded&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any unreachable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any traceroute&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object rdp-xxxx eq xxxx&lt;BR /&gt;access-list outside_access_in extended permit udp any object rdp-xxxx eq xxxx&amp;nbsp;&lt;BR /&gt;access-list Split_Tunnel_List_ACL remark ****** Split Tunnel Encrypted Traffic ******&lt;BR /&gt;access-list Split_Tunnel_List_ACL standard permit 10.0.100.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list Split_Tunnel_List_ACL standard permit 172.16.50.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit tcp any object PRINTER eq 9100&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit udp any object PRINTER eq 9100&amp;nbsp;&lt;BR /&gt;access-list dmz_access_in extended permit udp any object PRINTER eq snmp&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging list ALL-MESSAGES level emergencies&lt;BR /&gt;logging console emergencies&lt;BR /&gt;logging monitor emergencies&lt;BR /&gt;logging buffered emergencies&lt;BR /&gt;logging trap warnings&lt;BR /&gt;logging history alerts&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging mail emergencies&lt;BR /&gt;logging facility 21&lt;BR /&gt;logging device-id hostname&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any dmz&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-732-102.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.0.100.0_Net1 NETWORK_OBJ_10.0.100.0_Net1 destination static NETWORK_OBJ_172.16.75.0_RemotePool NETWORK_OBJ_172.16.75.0_RemotePool&lt;BR /&gt;nat (dmz,outside) source static NETWORK_OBJ_172.16.50.0_Net2 NETWORK_OBJ_172.16.50.0_Net2 destination static NETWORK_OBJ_172.16.75.0_RemotePool NETWORK_OBJ_172.16.75.0_RemotePool&lt;BR /&gt;!&lt;BR /&gt;object network INSIDE-NET&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network DMZ-NET&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) dynamic interface&lt;BR /&gt;object network cam1-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network cam2-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&amp;nbsp;&lt;BR /&gt;object network cam3-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&amp;nbsp;&lt;BR /&gt;object network cam4-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network cam5-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&amp;nbsp;&lt;BR /&gt;object network cam6-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network cam7-xxxx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 8097 8097&amp;nbsp;&lt;BR /&gt;object network SSH-xx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxx xxx&amp;nbsp;&lt;BR /&gt;object network SW1-3033&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3033 3033&amp;nbsp;&lt;BR /&gt;object network SW2-3034&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3034 3034&amp;nbsp;&lt;BR /&gt;object network SW3-3035&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3035 3035&amp;nbsp;&lt;BR /&gt;object network SW4-3036&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3036 3036&amp;nbsp;&lt;BR /&gt;object network R1-3037&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3037 3037&amp;nbsp;&lt;BR /&gt;object network R2-3038&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3038 3038&amp;nbsp;&lt;BR /&gt;object network R3-3039&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3039 3039&amp;nbsp;&lt;BR /&gt;object network R4-3040&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3040 3040&amp;nbsp;&lt;BR /&gt;object network R5-3041&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3041 3041&amp;nbsp;&lt;BR /&gt;object network R6-3042&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network VERIZON-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&amp;nbsp;&lt;BR /&gt;object network VERIZON-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network VERIZON-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network VERIZON-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PDU1-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PDU2-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PETEWKS-RDP-xxxx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PETELAP-RDP-xxxx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PETEWKS-BITTORENT-xxxx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PETEWKS-FTP-xx&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp xxxxxx&lt;BR /&gt;object network VERIZON-WAP-xxxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network PRINTER&lt;BR /&gt;&amp;nbsp;nat (inside,dmz) static 172.16.50.18&lt;BR /&gt;object network rdp-xxxx&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static interface service tcp xxxx xxxx&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication http console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication enable console LOCAL&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.100.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.100.2 255.255.255.255 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set vpnset esp-3des esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ipsec df-bit clear-df outside&lt;BR /&gt;crypto dynamic-map dynmap 65535 set pfs&amp;nbsp;&lt;BR /&gt;crypto dynamic-map dynmap 65535 set ikev1 transform-set vpnset&lt;BR /&gt;crypto dynamic-map dynmap 65535 set security-association lifetime seconds 86400&lt;BR /&gt;crypto dynamic-map dynmap 65535 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map vpnmap 65535 ipsec-isakmp dynamic dynmap&lt;BR /&gt;crypto map vpnmap interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 1&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 10.0.100.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 10&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access management&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.16.50.100-172.16.50.110 dmz&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface dmz&lt;BR /&gt;dhcpd lease 86400 interface dmz&lt;BR /&gt;dhcpd enable dmz&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.0.100.100-10.0.100.110 inside&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface inside&lt;BR /&gt;dhcpd lease 86400 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 192.5.41.41 source outside&lt;BR /&gt;ntp server 192.5.41.40 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;anyconnect-essentials&lt;BR /&gt;group-policy vpnclientgroup internal&lt;BR /&gt;group-policy vpnclientgroup attributes&lt;BR /&gt;&amp;nbsp;dns-server value 8.8.8.8 208.67.222.222&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1&amp;nbsp;&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value Split_Tunnel_List_ACL&lt;BR /&gt;&amp;nbsp;default-domain value xxxxxxxxx&lt;BR /&gt;username XXXXXXX password XXXXXXXXXXXXX encrypted privilege 15&lt;BR /&gt;tunnel-group vpnclientgroup type remote-access&lt;BR /&gt;tunnel-group vpnclientgroup general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpnpool&lt;BR /&gt;&amp;nbsp;default-group-policy vpnclientgroup&lt;BR /&gt;tunnel-group vpnclientgroup ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map exit&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp error&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:XXXXXXXXXXXXXXXX&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:09:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-send-all-http-and-https-traffic-to-public/m-p/2684682#M190408</guid>
      <dc:creator>TODD PETERSON</dc:creator>
      <dc:date>2019-03-12T06:09:22Z</dc:date>
    </item>
    <item>
      <title>Hi,You can configure a manual</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-send-all-http-and-https-traffic-to-public/m-p/2684683#M190409</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can configure a manual NAT statement like this:-&lt;/P&gt;&lt;P&gt;object network protected-network&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;!&lt;BR /&gt;object network proxy&lt;BR /&gt;host 5.52.53.5&lt;BR /&gt;!&lt;BR /&gt;object service original-http&lt;BR /&gt;service tcp destination eq www&lt;/P&gt;&lt;P&gt;object service original-https&lt;BR /&gt;service tcp destination eq https&lt;BR /&gt;!&lt;BR /&gt;object service proxy-8080&lt;BR /&gt;service tcp destination eq 8080&lt;BR /&gt;!&lt;BR /&gt;nat (INSIDE,OUTSIDE) source dynamic protected-network interface&lt;BR /&gt;destination static protected-network proxy service&lt;BR /&gt;original-http proxy-8080&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) source dynamic protected-network interface&lt;BR /&gt;destination static protected-network proxy service&lt;BR /&gt;original-https proxy-8080&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jun 2015 11:15:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-send-all-http-and-https-traffic-to-public/m-p/2684683#M190409</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-06-19T11:15:56Z</dc:date>
    </item>
  </channel>
</rss>

