<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This should do it, if you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-configure-access-for-remote-pci-scan/m-p/2462085#M267634</link>
    <description>&lt;P&gt;This should do it, if you want to allow full IP access from the pci scanning machines to your entire vlan15 subnet:&lt;/P&gt;&lt;P&gt;access-list out-to-in extended permit ip host [ip of pci scanner #1] 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list out-to-in extended permit ip host [ip of pci scanner #2] 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also wanted to take the liberty of pointing out that your access lists appear to be allowing *all* internet traffic to all computers on your network on the ports specified in the ACL.&amp;nbsp; Not sure if that was your intention?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 11 Apr 2014 18:02:56 GMT</pubDate>
    <dc:creator>ippolito</dc:creator>
    <dc:date>2014-04-11T18:02:56Z</dc:date>
    <item>
      <title>How to configure access for remote PCI scan -</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-access-for-remote-pci-scan/m-p/2462084#M267632</link>
      <description>&lt;P&gt;I have an ASA5505-UL-DMZ-BUN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to add two outside IP address to allow them to do a remote PCI scan on my Vlan15 "Micros"&lt;/P&gt;&lt;P&gt;I really am not a CLI guy - is this something easy with WebUI or should I ask TAC to do it for me?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(6)5&lt;BR /&gt;!&lt;BR /&gt;hostname GiodineASA&lt;BR /&gt;domain-name Gio.local&lt;BR /&gt;enable password NC9T03Fud.TTEt.R encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;no names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;switchport access vlan 15&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;switchport access vlan 5&lt;BR /&gt;&amp;nbsp;speed 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;&amp;nbsp;nameif DVR&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.154.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 172.16.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan15&lt;BR /&gt;&amp;nbsp;nameif Micros&lt;BR /&gt;&amp;nbsp;security-level 15&lt;BR /&gt;&amp;nbsp;ip address 192.168.11.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa846-5-k8.bin&lt;BR /&gt;boot system disk0:/asa831-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name Gio.local&lt;BR /&gt;object network obj-192.168.0.0&lt;BR /&gt;&amp;nbsp;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;object network obj-10.0.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.0.0.0 255.255.255.240&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network any-micros&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network dmz-any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Micros_1&lt;BR /&gt;&amp;nbsp;subnet 192.168.11.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.0.0.0_28&lt;BR /&gt;&amp;nbsp;subnet 10.0.0.0 255.255.255.240&lt;BR /&gt;object network NETWORK_OBJ_192.168.0.0_24&lt;BR /&gt;&amp;nbsp;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;access-list out-to-in extended permit tcp any any eq www&lt;BR /&gt;access-list out-to-in extended permit tcp any any eq https&lt;BR /&gt;access-list out-to-in extended permit tcp any any eq 1194&lt;BR /&gt;access-list out-to-in extended permit tcp any any range 5120 5129&lt;BR /&gt;access-list out-to-in extended permit icmp any any&lt;BR /&gt;access-list out-to-in extended permit udp any any eq 1194&lt;BR /&gt;access-list out-to-in extended permit udp any any range 5120 5129&lt;BR /&gt;access-list out-to-in extended permit udp any any eq 443&lt;BR /&gt;access-list out-to-in extended permit udp any any eq www&lt;BR /&gt;access-list Remote_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 10.0.0.0 255.255.255.240&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu DVR 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu Micros 1500&lt;BR /&gt;ip local pool RemotePool 10.0.0.1-10.0.0.10 mask 255.255.0.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,any) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-10.0.0.0 obj-10.0.0.0 no-proxy-arp&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_192.168.0.0_24 NETWORK_OBJ_192.168.0.0_24 destination static NETWORK_OBJ_10.0.0.0_28 NETWORK_OBJ_10.0.0.0_28 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network any-micros&lt;BR /&gt;&amp;nbsp;nat (DVR,outside) dynamic interface&lt;BR /&gt;object network dmz-any&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) dynamic interface&lt;BR /&gt;object network Micros_1&lt;BR /&gt;&amp;nbsp;nat (Micros,outside) dynamic interface&lt;BR /&gt;access-group out-to-in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no user-identity enable&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption 3des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-192&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map inside_map interface inside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=GiodineASA&lt;BR /&gt;&amp;nbsp;proxy-ldc-issuer&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt;&amp;nbsp;certificate 4548bf52&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30820250 308201b9 a0030201 02020445 48bf5230 0d06092a 864886f7 0d010105&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0500303a 31133011 06035504 03130a47 696f6469 6e654153 41312330 2106092a&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 864886f7 0d010902 16144769 6f64696e 65415341 2e47696f 2e6c6f63 616c301e&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 170d3134 30343036 31383032 34365a17 0d323430 34303331 38303234 365a303a&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31133011 06035504 03130a47 696f6469 6e654153 41312330 2106092a 864886f7&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0d010902 16144769 6f64696e 65415341 2e47696f 2e6c6f63 616c3081 9f300d06&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 092a8648 86f70d01 01010500 03818d00 30818902 818100b1 ceb952e3 84820e07&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 82ede102 7089223d 109b2faf 541695f1 4519eb61 381e56db 33e184e0 416faa68&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 96677299 d65b8a82 f502bf7d 13c2c1d3 9ddb0910 80379d1e 375a0b2c fa0209b8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 95d47b5e a62bb5b9 593b699d 429cdd0c 440a5b68 2de34d88 d5897f28 a72c4141&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7499909d a93e6cfb 5e42538f 0a0e7194 5058858c 25f6cd02 03010001 a3633061&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 300f0603 551d1301 01ff0405 30030101 ff300e06 03551d0f 0101ff04 04030201&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 86301f06 03551d23 04183016 80149ccd 02852286 1e71e494 33cdd59d 2fa50de1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4b6c301d 0603551d 0e041604 149ccd02 8522861e 71e49433 cdd59d2f a50de14b&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6c300d06 092a8648 86f70d01 01050500 03818100 9f0bb024 702926fa 58c8dab6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dc44c1fb 5b6fc8c5 9f1e66f4 1d81f550 adf3c89a b02d486d 404cebfd 8d68b944&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9aa2cf28 021a3457 7d623bb2 3d354f0b 1f1efd3c e42ebe64 c5c7aa38 3b9acd7a&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c1b339e0 20ddbd88 bfa49e66 0bfc54c9 3a8eaa3a 13d1e4cc 6703954b 67d67af4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2b7acdf5 aed08a04 91d93112 18c7c99c 97f2e5d0&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable inside client-services port 443&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint0&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 75.75.75.75 75.75.76.76&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.16.0.2-172.16.0.254 dmz&lt;BR /&gt;dhcpd enable dmz&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.11.5-192.168.11.15 Micros&lt;BR /&gt;dhcpd auto_config outside interface Micros&lt;BR /&gt;dhcpd enable Micros&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 216.171.120.36 source outside prefer&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 inside&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable inside&lt;BR /&gt;&amp;nbsp;enable outside&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1&lt;BR /&gt;&amp;nbsp;anyconnect profiles SupportGio_client_profile disk0:/SupportGio_client_profile.xml&lt;BR /&gt;&amp;nbsp;anyconnect enable&lt;BR /&gt;&amp;nbsp;tunnel-group-list enable&lt;BR /&gt;group-policy GroupPolicy_SupportGio internal&lt;BR /&gt;group-policy GroupPolicy_SupportGio attributes&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dns-server value 8.8.8.8&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;&amp;nbsp;default-domain value Gio.local&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect profiles value SupportGio_client_profile type user&lt;BR /&gt;group-policy Remote internal&lt;BR /&gt;group-policy Remote attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value Remote_splitTunnelAcl&lt;BR /&gt;&amp;nbsp;default-domain value Gio.local&lt;BR /&gt;username admin password ZPXNZtJ1PEkx9Ak4 encrypted privilege 15&lt;BR /&gt;username ********** password jNXc0Jrn2ojo8QSg encrypted&lt;BR /&gt;username ******** password 1yRqnC1yOLTRtVh8 encrypted privilege 0&lt;BR /&gt;username ******** attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy Remote&lt;BR /&gt;tunnel-group Remote type remote-access&lt;BR /&gt;tunnel-group Remote general-attributes&lt;BR /&gt;&amp;nbsp;address-pool RemotePool&lt;BR /&gt;&amp;nbsp;default-group-policy Remote&lt;BR /&gt;tunnel-group Remote ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group SupportGio type remote-access&lt;BR /&gt;tunnel-group SupportGio general-attributes&lt;BR /&gt;&amp;nbsp;address-pool RemotePool&lt;BR /&gt;&amp;nbsp;default-group-policy GroupPolicy_SupportGio&lt;BR /&gt;tunnel-group SupportGio webvpn-attributes&lt;BR /&gt;&amp;nbsp;group-alias SupportGio enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:60086ca76c7e620cd12156ca7ea44e4d&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-access-for-remote-pci-scan/m-p/2462084#M267632</guid>
      <dc:creator>ChipGriffen</dc:creator>
      <dc:date>2019-03-12T04:03:36Z</dc:date>
    </item>
    <item>
      <title>This should do it, if you</title>
      <link>https://community.cisco.com/t5/network-security/how-to-configure-access-for-remote-pci-scan/m-p/2462085#M267634</link>
      <description>&lt;P&gt;This should do it, if you want to allow full IP access from the pci scanning machines to your entire vlan15 subnet:&lt;/P&gt;&lt;P&gt;access-list out-to-in extended permit ip host [ip of pci scanner #1] 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list out-to-in extended permit ip host [ip of pci scanner #2] 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also wanted to take the liberty of pointing out that your access lists appear to be allowing *all* internet traffic to all computers on your network on the ports specified in the ACL.&amp;nbsp; Not sure if that was your intention?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 18:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-configure-access-for-remote-pci-scan/m-p/2462085#M267634</guid>
      <dc:creator>ippolito</dc:creator>
      <dc:date>2014-04-11T18:02:56Z</dc:date>
    </item>
  </channel>
</rss>

