<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4012832#M23167</link>
    <description>&lt;P&gt;&lt;STRONG&gt;ssh 10.136.100.226 255.255.255.255 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;in above command it is saying &lt;STRONG&gt;let someone allow to SSH&lt;/STRONG&gt; when the source IP of that request is &lt;STRONG&gt;''10.136.100.226 255.255.255.255''&lt;/STRONG&gt; and is coming from &lt;STRONG&gt;''outside''&lt;/STRONG&gt; interface. If your outisde interface is connected to internet then there is no chance that such request will ever come true.&lt;/P&gt;&lt;P&gt;so possibly it's a miss configured or type error and i'm sure if you remove it then there will be no impact on operation/management of your firewall.&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jan 2020 17:07:55 GMT</pubDate>
    <dc:creator>salman abid</dc:creator>
    <dc:date>2020-01-16T17:07:55Z</dc:date>
    <item>
      <title>ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4012586#M23165</link>
      <description>&lt;P&gt;Hello experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please explain me the below couple of query?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;ssh 10.136.100.226 255.255.255.255 outside---- In my asa FW I could see this command. Whether the command is to take the ssh from outside? I tried to ssh into the device with the mentioned IP but failed. But any way I have another IP configured for the vty lines. My query is that what exactly the command do?&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;no-proxy-arp route-lookup--- I seen for the dynamic NO NAT at least they have given the proxy-arp command. Why this command is used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sathish&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2020 12:08:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4012586#M23165</guid>
      <dc:creator>SathishkumarSaravanan0348</dc:creator>
      <dc:date>2020-01-16T12:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4012605#M23166</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Yes, with that command you should be able to SSH to the ASA itself from 10.136.100.226.&lt;/P&gt;&lt;P&gt;Have you generated an rsa key, configured the aaa commands for SSH and obviously defined a username and password?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;crypto key generate rsa modulus 2048&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;aaa authentication ssh console LOCAL&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh version 2&lt;BR /&gt;username admin password YourPWord privilege 15&lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN class="ILfuVd"&gt;&lt;SPAN class="e24Kjd"&gt;If you add the keyword &lt;STRONG&gt;no&lt;/STRONG&gt;-&lt;STRONG&gt;proxy&lt;/STRONG&gt;-&lt;STRONG&gt;arp&lt;/STRONG&gt; to specific NAT commands, the ASA will not respond to ARP requests for the global IP subnet identified in those NAT statements. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ILfuVd"&gt;&lt;SPAN class="e24Kjd"&gt;HTH&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2020 12:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4012605#M23166</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-16T12:40:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4012832#M23167</link>
      <description>&lt;P&gt;&lt;STRONG&gt;ssh 10.136.100.226 255.255.255.255 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;in above command it is saying &lt;STRONG&gt;let someone allow to SSH&lt;/STRONG&gt; when the source IP of that request is &lt;STRONG&gt;''10.136.100.226 255.255.255.255''&lt;/STRONG&gt; and is coming from &lt;STRONG&gt;''outside''&lt;/STRONG&gt; interface. If your outisde interface is connected to internet then there is no chance that such request will ever come true.&lt;/P&gt;&lt;P&gt;so possibly it's a miss configured or type error and i'm sure if you remove it then there will be no impact on operation/management of your firewall.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2020 17:07:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4012832#M23167</guid>
      <dc:creator>salman abid</dc:creator>
      <dc:date>2020-01-16T17:07:55Z</dc:date>
    </item>
  </channel>
</rss>

