<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to configure Cisco ASA 5510 behind a Router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015432#M23159</link>
    <description>&lt;P&gt;There is still no handshake between Router and Firewall!. I had to bypass the firewall to avoid downtime. Below is the working config on the router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AMENITY_ROUTER#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 5539 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 12:07:04 UTC Tue Jan 21 2020 by .....&lt;BR /&gt;!&lt;BR /&gt;version 15.5&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname AMENITY_ROUTER&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging buffered 51200 warnings&lt;BR /&gt;enable secret 5 $1$.e89$Fr1KFh3/5uOkVQWmzMzIZ1&lt;BR /&gt;enable password 666666&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;bsd-client server url &lt;A href="https://cloudsso.cisco.com/as/token.oauth2" target="_blank"&gt;https://cloudsso.cisco.com/as/token.oauth2&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;ip dhcp excluded-address 192.168.1.0 192.168.1.5&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool INTERNAL_NETWORK&lt;BR /&gt;network 192.168.1.0 255.255.255.0&lt;BR /&gt;default-router 192.168.1.1&lt;BR /&gt;dns-server 8.8.8.8&lt;BR /&gt;lease 2&lt;BR /&gt;&lt;BR /&gt;ip domain name yourdomain.com&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;cts logging verbose&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-&lt;BR /&gt;enrollment selfsigned&lt;BR /&gt;subject-name cn=IOS-Self-Signed-Certificate-&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair TP-self-signed-549131248&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-5&lt;BR /&gt;certificate self-signed 01&lt;BR /&gt;3&lt;BR /&gt;license udi pid CISCO1941/&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username A privilege 15 secret 5 $1$Q2Gq$cvhgvoNDYAgTN6oTaW6fj0&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;&lt;BR /&gt;interface Embedded-Service-Engine0/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description INTERNAL LINK TO THE LAN&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description EXTERNAL LINK TO ISP&lt;BR /&gt;ip address m.x.y.z. 255.255.255.224&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway A.B.C.D&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;ip http access-class 23&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface GigabitEthernet0/1 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 A.B.C.D&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 1 permit 192.168.2.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;banner exec ^C&lt;BR /&gt;% Password expiration warning.&lt;BR /&gt;-----------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Cisco Configuration Professional (Cisco CP) is installed on this device&lt;BR /&gt;and it provides the default username "cisco" for one-time use. If you have&lt;BR /&gt;already used the username "cisco" to login to the router and your IOS image&lt;BR /&gt;supports the "one-time" user option, then this username has already expired.&lt;BR /&gt;You will not be able to login to the router with this username after you exit&lt;BR /&gt;this session.&lt;/P&gt;&lt;P&gt;It is strongly suggested that you create a new username with a privilege level&lt;BR /&gt;of 15 using the following command.&lt;/P&gt;&lt;P&gt;username &amp;lt;myuser&amp;gt; privilege 15 secret 0 &amp;lt;mypassword&amp;gt;&lt;/P&gt;&lt;P&gt;Replace &amp;lt;myuser&amp;gt; and &amp;lt;mypassword&amp;gt; with the username and password you want to&lt;BR /&gt;use.&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------&lt;BR /&gt;^C&lt;BR /&gt;banner login ^C&lt;BR /&gt;-----------------------------------------------------------------------&lt;BR /&gt;Cisco Configuration Professional (Cisco CP) is installed on this device.&lt;BR /&gt;This feature requires the one-time use of the username "cisco" with the&lt;BR /&gt;password "cisco". These default credentials have a privilege level of 15.&lt;/P&gt;&lt;P&gt;YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE PUBLICLY-KNOWN&lt;BR /&gt;CREDENTIALS&lt;/P&gt;&lt;P&gt;Here are the Cisco IOS commands.&lt;/P&gt;&lt;P&gt;username &amp;lt;myuser&amp;gt; privilege 15 secret 0 &amp;lt;mypassword&amp;gt;&lt;BR /&gt;no username cisco&lt;/P&gt;&lt;P&gt;Replace &amp;lt;myuser&amp;gt; and &amp;lt;mypassword&amp;gt; with the username and password you want&lt;BR /&gt;to use.&lt;/P&gt;&lt;P&gt;IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT BE ABLE&lt;BR /&gt;TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.&lt;/P&gt;&lt;P&gt;For more information about Cisco CP please follow the instructions in the&lt;BR /&gt;QUICK START GUIDE for your router or go to &lt;A href="http://www.cisco.com/go/ciscocp" target="_blank"&gt;http://www.cisco.com/go/ciscocp&lt;/A&gt;&lt;BR /&gt;-----------------------------------------------------------------------&lt;BR /&gt;^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;login local&lt;BR /&gt;line aux 0&lt;BR /&gt;line 2&lt;BR /&gt;no activation-character&lt;BR /&gt;no exec&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport output pad telnet rlogin lapb-ta mop udptn v120 ssh&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class 23 in&lt;BR /&gt;privilege level 15&lt;BR /&gt;login local&lt;BR /&gt;transport input telnet ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;access-class 23 in&lt;BR /&gt;privilege level 15&lt;BR /&gt;login local&lt;BR /&gt;transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;AMENITY_ROUTER#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FIREWALL CONFIG:&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password W.AKqMdQEbiC07IP encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description to LAN_INSIDE&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp 192.168.2.0 255.255.255.0 any eq www&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;access-group OUTSIDE_IN in interface INSIDE&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 OUTSIDE&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:aa64576aef38f9593a31c31ebcb0e5b8&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please Help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jan 2020 15:53:28 GMT</pubDate>
    <dc:creator>IsiakaBayonle27219</dc:creator>
    <dc:date>2020-01-21T15:53:28Z</dc:date>
    <item>
      <title>How to configure Cisco ASA 5510 behind a Router</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4013232#M23150</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I&amp;nbsp;&lt;/SPAN&gt;have a cisco 1900 router connected to ISP with Static IP address and the router has been configured to act as DHCP to the 2 switches behind it and all hosts connected to the switches are browsing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, i want the ASA to be behind the router and allow traffic outwardly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What basic config can i do on the ASA to achieve this? Though, we are planning to introduce a centralized server such that some members of the LAN will be able to access it. Also, do i need to change any config on the router again?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pls help with the basic ASA config to achieve this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the config on the router:&lt;/P&gt;&lt;P&gt;FIRE_SERVICE_ROUTER#sh run&lt;BR /&gt;Building configuration...&lt;BR /&gt;&lt;BR /&gt;Current configuration : 1679 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 15:24:53 UTC Fri Dec 27 2019&lt;BR /&gt;!&lt;BR /&gt;version 15.5&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname FIRE_SERVICE_ROUTER&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 $1$MVkr$KNmqCTIFdyGOBTW75dl2Y0&lt;BR /&gt;enable password xxxxx&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;ethernet lmi ce&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 192.168.1.0 192.168.1.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool INTERNAL_NETWORK&lt;BR /&gt;network 192.168.1.0 255.255.255.0&lt;BR /&gt;default-router 192.168.1.1&lt;BR /&gt;dns-server 8.8.8.8&lt;BR /&gt;lease 2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip name-server 8.8.8.8&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid xxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Embedded-Service-Engine0/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description to the ISP&lt;BR /&gt;ip address xxxx&amp;nbsp; xxxx&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description to the SWITCH&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway xxxx&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 xxxx&lt;BR /&gt;!&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit 192.168.1.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line 2&lt;BR /&gt;no activation-character&lt;BR /&gt;no exec&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport output pad telnet rlogin lapb-ta mop udptn v120 ssh&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;password xxxx&lt;BR /&gt;login&lt;BR /&gt;transport input none&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;!&lt;BR /&gt;end&lt;BR /&gt;&lt;BR /&gt;FIRE_SERVICE_ROUTER#&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2020 08:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4013232#M23150</guid>
      <dc:creator>IsiakaBayonle27219</dc:creator>
      <dc:date>2020-01-17T08:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Cisco ASA 5510 behind a Router</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4014324#M23151</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you share the ASA model and OS version. Most likely you will be deploying ASA in L3 mode. Some changes will be required on the Router LAN side. Now your Router will be connected to your ASA and from ASA LAN your switches will be connected, which means we have to introduce a new subnet between ASA outside and Router LAN side. You have to change the Router existing LAN side IP to the new subnet IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On ASA, we have to create two interfaces 'inside and outside' where outside will be connected to the Router and inside will be connected to the LAN side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;below are the minimum configuration needed on ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface gi0/0&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address x.x.x.x&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface gi0/1&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address x.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may need to allow some traffic from Router ( traffic initiated from Router ) to internet Network, if you want, you need to created access-list and need to apply it to interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is example to allow Telnet from Router to any device internally:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_INBOUND permit tcp any any eq 23&lt;BR /&gt;access-group OUTSIDE_INBOUND in interface OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;depending on your needs and os version, we may need to disable nat-control.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 03:03:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4014324#M23151</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-01-20T03:03:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Cisco ASA 5510 behind a Router</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4014405#M23153</link>
      <description>The two interfaces created on the ASA, are they going to be on the same&lt;BR /&gt;subnet or different subnet?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Jan 2020 07:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4014405#M23153</guid>
      <dc:creator>IsiakaBayonle27219</dc:creator>
      <dc:date>2020-01-20T07:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Cisco ASA 5510 behind a Router</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4014418#M23154</link>
      <description>&lt;P&gt;It will be on different subnets. Treat it like a Router where every interface should be on different subnet&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 07:35:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4014418#M23154</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-01-20T07:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Cisco ASA 5510 behind a Router</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015008#M23156</link>
      <description>&lt;P&gt;You manage to configure it yet ? Let us know here for more info if needed&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 03:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015008#M23156</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-01-21T03:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Cisco ASA 5510 behind a Router</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015286#M23158</link>
      <description>&lt;P&gt;I am still on site and no success yet!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the router and firewall are not communicating.&amp;nbsp; I have configure OUTSIDE interface of firewall to the router with 192.168.2.1 255.255.255.0 while INSIDE with 192.168.1.1 255.255.255.0. Access list that allows both network and tied to EXTERNAL INTERFACE. yet i can not ping WAN IP on the router also, i can not ping other host on 192.168.1.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pls help&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 12:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015286#M23158</guid>
      <dc:creator>IsiakaBayonle27219</dc:creator>
      <dc:date>2020-01-21T12:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Cisco ASA 5510 behind a Router</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015432#M23159</link>
      <description>&lt;P&gt;There is still no handshake between Router and Firewall!. I had to bypass the firewall to avoid downtime. Below is the working config on the router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AMENITY_ROUTER#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 5539 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 12:07:04 UTC Tue Jan 21 2020 by .....&lt;BR /&gt;!&lt;BR /&gt;version 15.5&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname AMENITY_ROUTER&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging buffered 51200 warnings&lt;BR /&gt;enable secret 5 $1$.e89$Fr1KFh3/5uOkVQWmzMzIZ1&lt;BR /&gt;enable password 666666&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;bsd-client server url &lt;A href="https://cloudsso.cisco.com/as/token.oauth2" target="_blank"&gt;https://cloudsso.cisco.com/as/token.oauth2&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;ip dhcp excluded-address 192.168.1.0 192.168.1.5&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool INTERNAL_NETWORK&lt;BR /&gt;network 192.168.1.0 255.255.255.0&lt;BR /&gt;default-router 192.168.1.1&lt;BR /&gt;dns-server 8.8.8.8&lt;BR /&gt;lease 2&lt;BR /&gt;&lt;BR /&gt;ip domain name yourdomain.com&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;cts logging verbose&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-&lt;BR /&gt;enrollment selfsigned&lt;BR /&gt;subject-name cn=IOS-Self-Signed-Certificate-&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair TP-self-signed-549131248&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-5&lt;BR /&gt;certificate self-signed 01&lt;BR /&gt;3&lt;BR /&gt;license udi pid CISCO1941/&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username A privilege 15 secret 5 $1$Q2Gq$cvhgvoNDYAgTN6oTaW6fj0&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;&lt;BR /&gt;interface Embedded-Service-Engine0/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description INTERNAL LINK TO THE LAN&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description EXTERNAL LINK TO ISP&lt;BR /&gt;ip address m.x.y.z. 255.255.255.224&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway A.B.C.D&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;ip http access-class 23&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface GigabitEthernet0/1 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 A.B.C.D&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 1 permit 192.168.2.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;banner exec ^C&lt;BR /&gt;% Password expiration warning.&lt;BR /&gt;-----------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Cisco Configuration Professional (Cisco CP) is installed on this device&lt;BR /&gt;and it provides the default username "cisco" for one-time use. If you have&lt;BR /&gt;already used the username "cisco" to login to the router and your IOS image&lt;BR /&gt;supports the "one-time" user option, then this username has already expired.&lt;BR /&gt;You will not be able to login to the router with this username after you exit&lt;BR /&gt;this session.&lt;/P&gt;&lt;P&gt;It is strongly suggested that you create a new username with a privilege level&lt;BR /&gt;of 15 using the following command.&lt;/P&gt;&lt;P&gt;username &amp;lt;myuser&amp;gt; privilege 15 secret 0 &amp;lt;mypassword&amp;gt;&lt;/P&gt;&lt;P&gt;Replace &amp;lt;myuser&amp;gt; and &amp;lt;mypassword&amp;gt; with the username and password you want to&lt;BR /&gt;use.&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------&lt;BR /&gt;^C&lt;BR /&gt;banner login ^C&lt;BR /&gt;-----------------------------------------------------------------------&lt;BR /&gt;Cisco Configuration Professional (Cisco CP) is installed on this device.&lt;BR /&gt;This feature requires the one-time use of the username "cisco" with the&lt;BR /&gt;password "cisco". These default credentials have a privilege level of 15.&lt;/P&gt;&lt;P&gt;YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE PUBLICLY-KNOWN&lt;BR /&gt;CREDENTIALS&lt;/P&gt;&lt;P&gt;Here are the Cisco IOS commands.&lt;/P&gt;&lt;P&gt;username &amp;lt;myuser&amp;gt; privilege 15 secret 0 &amp;lt;mypassword&amp;gt;&lt;BR /&gt;no username cisco&lt;/P&gt;&lt;P&gt;Replace &amp;lt;myuser&amp;gt; and &amp;lt;mypassword&amp;gt; with the username and password you want&lt;BR /&gt;to use.&lt;/P&gt;&lt;P&gt;IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT BE ABLE&lt;BR /&gt;TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.&lt;/P&gt;&lt;P&gt;For more information about Cisco CP please follow the instructions in the&lt;BR /&gt;QUICK START GUIDE for your router or go to &lt;A href="http://www.cisco.com/go/ciscocp" target="_blank"&gt;http://www.cisco.com/go/ciscocp&lt;/A&gt;&lt;BR /&gt;-----------------------------------------------------------------------&lt;BR /&gt;^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;login local&lt;BR /&gt;line aux 0&lt;BR /&gt;line 2&lt;BR /&gt;no activation-character&lt;BR /&gt;no exec&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport output pad telnet rlogin lapb-ta mop udptn v120 ssh&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class 23 in&lt;BR /&gt;privilege level 15&lt;BR /&gt;login local&lt;BR /&gt;transport input telnet ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;access-class 23 in&lt;BR /&gt;privilege level 15&lt;BR /&gt;login local&lt;BR /&gt;transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;AMENITY_ROUTER#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FIREWALL CONFIG:&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password W.AKqMdQEbiC07IP encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description to LAN_INSIDE&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp 192.168.2.0 255.255.255.0 any eq www&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;access-group OUTSIDE_IN in interface INSIDE&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 OUTSIDE&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:aa64576aef38f9593a31c31ebcb0e5b8&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please Help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 15:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015432#M23159</guid>
      <dc:creator>IsiakaBayonle27219</dc:creator>
      <dc:date>2020-01-21T15:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Cisco ASA 5510 behind a Router</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015488#M23160</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have notice 2 things;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) when you connect Router LAN to ASA outside, u changed the IP on the router from 192.168.1.0 to 192.168.2.0 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) if u did above then u need to also add the Route of 192.168.1.0 pointing to the Asa interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i would suggest below changes on the Router and Firewall:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description INTERNAL LINK TO THE LAN&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool INTERNAL_NETWORK&lt;BR /&gt;network 192.168.1.0 255.255.255.0&lt;BR /&gt;default-router 192.168.1.1&lt;BR /&gt;dns-server 8.8.8.8&lt;BR /&gt;lease 2&lt;BR /&gt;!&lt;BR /&gt;ip route 192.168.1.0 255.255.255.0 192.168.2.2&lt;/P&gt;&lt;P&gt;At FW&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;description to LAN_INSIDE&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;no access-list OUTSIDE_IN extended permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;BR /&gt;no access-list OUTSIDE_IN extended permit tcp 192.168.2.0 255.255.255.0 any eq www&lt;/P&gt;&lt;P&gt;!no need to put above as traffic from inside network to outside will be allowed&lt;/P&gt;&lt;P&gt;Test it using below:&lt;/P&gt;&lt;P&gt;From ASA: Ping 192.168.2.1 ?&lt;BR /&gt;Inside your network , ping ASA Inside interface, Router LAN Interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 17:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015488#M23160</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-01-21T17:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Cisco ASA 5510 behind a Router</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015959#M23161</link>
      <description>&lt;P&gt;What i could deduce from your recommendation is:&lt;/P&gt;&lt;P&gt;**Router interface to Firewall External interface to be on 192.168.2.1 and 192.168.2.2 - same network.&lt;/P&gt;&lt;P&gt;**Firewall interface to switch to be on 192.168.1.1 - DHCP pool network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the router:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ip route 192.168.1.0 255.255.255.0 192.168.2.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What about adding this default route to the router to forward traffic to ISP gateway (A.B.C.D):&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ip route 0.0.0.0 0.0.0.0 A.B.C.D&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2020 07:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015959#M23161</guid>
      <dc:creator>IsiakaBayonle27219</dc:creator>
      <dc:date>2020-01-22T07:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Cisco ASA 5510 behind a Router</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015977#M23163</link>
      <description>&lt;P&gt;yes thats correct and default route should be there on the Router pointing to ISP to make your traffic reachable to Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Further, you need to also have default Route on the FW pointing to Router LAN Side interface ( 192.168.2.0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Command at FW:&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.2.x ( where x is Router IP )&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2020 08:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-cisco-asa-5510-behind-a-router/m-p/4015977#M23163</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-01-22T08:29:22Z</dc:date>
    </item>
  </channel>
</rss>

