<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to allow all traffic from outside to inside on ASA 9.8(1) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3935431#M24274</link>
    <description>yeah those subnets are both private ...but thanks for yr support let me apply that and get back to you&lt;BR /&gt;</description>
    <pubDate>Fri, 04 Oct 2019 15:11:19 GMT</pubDate>
    <dc:creator>hiprecy123</dc:creator>
    <dc:date>2019-10-04T15:11:19Z</dc:date>
    <item>
      <title>how to allow all traffic from outside to inside on ASA 9.8(1)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3935283#M24237</link>
      <description>&lt;P&gt;hello everyone&amp;nbsp; i want to allow all the trafiic coming from the subnet(192.168.10.0/24) connected to outside interface&amp;nbsp; going to the subnet(10.30.30.0/24) connected&amp;nbsp; to ninside interface&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;please&amp;nbsp; help me&amp;nbsp; &amp;nbsp;i tried all the ways but still havent yet got the solution&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;currently am running ios version 9.8(1)&amp;nbsp; &amp;nbsp;and&amp;nbsp; the trafiic from inside to outside is working ok&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;awaiting guys&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2019 11:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3935283#M24237</guid>
      <dc:creator>hiprecy123</dc:creator>
      <dc:date>2019-10-04T11:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: how to allow all traffic from outside to inside on ASA 9.8(1)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3935299#M24239</link>
      <description>Normally you should create ACL and apply the ACL on Outside interface in "IN" direction.&lt;BR /&gt;&lt;BR /&gt;access-list OUTSIDE_IN extended permit ip 192.168.10.0 255.255.255.0 10.30.30.0 255.255.255.0&lt;BR /&gt;access-group OUTSIDE_IN in interface OUTSIDE&lt;BR /&gt;&lt;BR /&gt;If you are having issue, can you send the packet tracer output so that it will give us more idea about problem.&lt;BR /&gt;&lt;BR /&gt;packet-tracer input OUTSIDE tcp 192.168.10.10 80 10.30.30.10 80 detailed&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 04 Oct 2019 12:18:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3935299#M24239</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-10-04T12:18:32Z</dc:date>
    </item>
    <item>
      <title>Re: how to allow all traffic from outside to inside on ASA 9.8(1)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3935300#M24241</link>
      <description>&lt;P&gt;Would help if you told us exactly what you have tried and also provide us with a full running configuration of your ASA.&lt;/P&gt;
&lt;P&gt;Do you have any NAT configuration between the two interfaces you want to allow traffic on?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Normally, if this is just between two private IP address spaces, then you would just allow that traffic in an access list on the outside interface.&lt;/P&gt;
&lt;P&gt;access-list outside_access_in permit ip 192.168.10.0 255.255.255.0 10.30.30.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2019 12:19:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3935300#M24241</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-04T12:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: how to allow all traffic from outside to inside on ASA 9.8(1)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3935431#M24274</link>
      <description>yeah those subnets are both private ...but thanks for yr support let me apply that and get back to you&lt;BR /&gt;</description>
      <pubDate>Fri, 04 Oct 2019 15:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3935431#M24274</guid>
      <dc:creator>hiprecy123</dc:creator>
      <dc:date>2019-10-04T15:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: how to allow all traffic from outside to inside on ASA 9.8(1)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3936121#M24275</link>
      <description>&lt;P&gt;Guys i tried that but it didnt work&amp;nbsp; does the accesslist or the command allow all the traffic including&amp;nbsp; icmp also ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 03:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3936121#M24275</guid>
      <dc:creator>hiprecy123</dc:creator>
      <dc:date>2019-10-07T03:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: how to allow all traffic from outside to inside on ASA 9.8(1)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3936134#M24276</link>
      <description>You should have ICMP inspected along with the ACLs. You can do that with below mentioned command.&lt;BR /&gt;&lt;BR /&gt;"Fixup protocol icmp"&lt;BR /&gt;&lt;BR /&gt;If you still having issue. please post the Packet-tracer output for ICMP.&lt;BR /&gt;&lt;BR /&gt;packet-tracer input OUTSIDE icmp 192.168.10.10 8 0 10.30.30.10 detailed&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Mon, 07 Oct 2019 04:27:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3936134#M24276</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-10-07T04:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: how to allow all traffic from outside to inside on ASA 9.8(1)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3936142#M24277</link>
      <description>&lt;P&gt;To allow the return traffic for ping, you would need to either specifically allow this in the ACL on the outside interface or configure inspection of the ICMP protocol as mentioned by&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/79917"&gt;@bhargavdesai&lt;/a&gt;&amp;nbsp;.&lt;/P&gt;
&lt;P&gt;It would really be helpful to see your full running configuration (remove any public IPs, usernames and passwords) as right now we are just guessing at what might be wrong.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 05:16:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-traffic-from-outside-to-inside-on-asa-9-8-1/m-p/3936142#M24277</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-07T05:16:36Z</dc:date>
    </item>
  </channel>
</rss>

