<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I applied same access-list in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2564973#M205656</link>
    <description>&lt;P&gt;I applied same access-list with private ip addresses (non-mapped) and it worked.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Oct 2014 06:15:17 GMT</pubDate>
    <dc:creator>Rizwan</dc:creator>
    <dc:date>2014-10-27T06:15:17Z</dc:date>
    <item>
      <title>Outside access</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2564968#M205651</link>
      <description>&lt;P&gt;I am using ASA 5515-X version 9.1&lt;/P&gt;&lt;P&gt;I have created access-list to allow email servers ports from outside. The email server is having static NAT on firewall. But the access-list to ping and to allow tcp ports is not working properly. its working with any any only.&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 2 extended permit icmp any host 203.1.1.1&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 3 extended permit tcp any host 203.1.1.1&amp;nbsp;eq smtp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:59:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2564968#M205651</guid>
      <dc:creator>Rizwan</dc:creator>
      <dc:date>2019-03-12T04:59:04Z</dc:date>
    </item>
    <item>
      <title>Hi,I think you are missing</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2564969#M205652</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think you are missing some ports for the Email server communication.&lt;/P&gt;&lt;P&gt;You would be able to apply the capture on the ASA device and see the ports on which the communication works.&lt;/P&gt;&lt;P&gt;Then , just allow those ports.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sat, 25 Oct 2014 07:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2564969#M205652</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-25T07:30:44Z</dc:date>
    </item>
    <item>
      <title>No, it was some other issue.</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2564970#M205653</link>
      <description>&lt;P&gt;No, it was some other issue. I have sorted out, thanks anyways.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Oct 2014 07:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2564970#M205653</guid>
      <dc:creator>Rizwan</dc:creator>
      <dc:date>2014-10-25T07:48:39Z</dc:date>
    </item>
    <item>
      <title>Please indicate what the</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2564971#M205654</link>
      <description>&lt;P&gt;Please indicate what the solution was so others can benefit from the solution.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Oct 2014 19:27:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2564971#M205654</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-25T19:27:24Z</dc:date>
    </item>
    <item>
      <title>Hi rizwansiddiqi, Did you use</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2564972#M205655</link>
      <description>&lt;P&gt;&lt;SPAN class="fullname" itemprop="author"&gt;Hi &lt;A about="/users/rizwansiddiqi" class="username" datatype="" href="https://supportforums.cisco.com/users/rizwansiddiqi" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;rizwansiddiqi&lt;/A&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you use the private (non-mapped) ip address of the email server in the access lists?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Aref&lt;/P&gt;</description>
      <pubDate>Sat, 25 Oct 2014 21:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2564972#M205655</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2014-10-25T21:50:05Z</dc:date>
    </item>
    <item>
      <title>I applied same access-list</title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2564973#M205656</link>
      <description>&lt;P&gt;I applied same access-list with private ip addresses (non-mapped) and it worked.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Oct 2014 06:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2564973#M205656</guid>
      <dc:creator>Rizwan</dc:creator>
      <dc:date>2014-10-27T06:15:17Z</dc:date>
    </item>
    <item>
      <title>yep, true. </title>
      <link>https://community.cisco.com/t5/network-security/outside-access/m-p/2564974#M205657</link>
      <description>&lt;P&gt;yep, true.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Oct 2014 06:16:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-access/m-p/2564974#M205657</guid>
      <dc:creator>Rizwan</dc:creator>
      <dc:date>2014-10-27T06:16:25Z</dc:date>
    </item>
  </channel>
</rss>

