<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Routing question with ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448551#M270268</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've added those commands and they don't seem to be making a difrerence.&amp;nbsp;&amp;nbsp; I've also tried adding in access rules to allow all traffic 192.168.1.0 to 192.168.2.0 and vice versa, using network objects that I created.&amp;nbsp; Still no luck.&amp;nbsp; here's my running config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(6) &lt;BR /&gt;!&lt;BR /&gt;hostname wavefc&lt;BR /&gt;domain-name center&lt;BR /&gt;enable password 8EBQPyIGHYB9jy6X encrypted&lt;BR /&gt;passwd 8EBQPyIGHYB9jy6X encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.1.28 MRMA description Wave MRMA IP&lt;BR /&gt;name 192.168.1.27 MRMB description Wave MRMB IP&lt;BR /&gt;name 192.168.1.26 vam description WAVE VAM IP&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.30 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; mac-address c0ea.e426.1e05&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 108.174.110.110 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa846-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name center&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network vam&lt;BR /&gt; host 192.168.1.26&lt;BR /&gt; description Created during name migration&lt;BR /&gt;object network MRMB_1&lt;BR /&gt; host 192.168.1.27&lt;BR /&gt; description Created during name migration&lt;BR /&gt;object network MRMA_1&lt;BR /&gt; host 192.168.1.28&lt;BR /&gt; description MRMB&lt;BR /&gt;object service VAM1&lt;BR /&gt; service udp destination range sip 5061 &lt;BR /&gt; description VAM ports&lt;BR /&gt;object service VAM2&lt;BR /&gt; service udp destination range 16384 17383 &lt;BR /&gt; description VAM SIP PORTS&lt;BR /&gt;object service MRMA&lt;BR /&gt; service udp destination range 17640 17895 &lt;BR /&gt; description MRM A PORTS&lt;BR /&gt;object service MRMB&lt;BR /&gt; service udp destination range 17640 17895 &lt;BR /&gt; description MRM B PORTS&lt;BR /&gt;object network Dynamic_NAT&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network vamIP&lt;BR /&gt; host 192.168.1.26&lt;BR /&gt;object network MRMAIP&lt;BR /&gt; host 192.168.1.27&lt;BR /&gt;object network MRMBIP&lt;BR /&gt; host 192.168.1.27&lt;BR /&gt;object service vamIP1&lt;BR /&gt; service udp source range 16384 17383 &lt;BR /&gt;object service SIP&lt;BR /&gt; service udp source range sip 5061 &lt;BR /&gt;object service mrmaUDP&lt;BR /&gt; service udp source range 17384 17639 &lt;BR /&gt;object service mrmbUDP&lt;BR /&gt; service udp source range 17640 17895 &lt;BR /&gt;object service vam5060&lt;BR /&gt; service udp source range sip 5061 &lt;BR /&gt;object network KnoxVPN&lt;BR /&gt; subnet 192.168.2.0 255.255.255.0&lt;BR /&gt; description Knox IP's&lt;BR /&gt;object network Untangle&lt;BR /&gt; host 192.168.1.254&lt;BR /&gt; description VPN To Knoxville&lt;BR /&gt;object-group service VAM_PORTS&lt;BR /&gt; service-object object VAM1 &lt;BR /&gt; service-object object VAM2 &lt;BR /&gt;object-group service SIPPORTS udp&lt;BR /&gt; description WAVE PORT RANGES&lt;BR /&gt; port-object range sip 19000&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp destination eq www &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt;access-list outside_access_in remark Allow ports for phone system&lt;BR /&gt;access-list outside_access_in extended permit object-group VAM_PORTS any object vamIP &lt;BR /&gt;access-list outside_access_in extended permit object MRMA any object MRMAIP &lt;BR /&gt;access-list outside_access_in extended permit object MRMB any object MRMBIP &lt;BR /&gt;access-list global_access extended permit ip any any inactive &lt;BR /&gt;access-list global_access extended permit udp any any object-group SIPPORTS &lt;BR /&gt;access-list global_access extended permit object-group DM_INLINE_SERVICE_1 any any &lt;BR /&gt;access-list global_access extended permit ip interface inside interface inside &lt;BR /&gt;access-list global_access extended permit ip 192.168.1.0 255.255.255.0 object KnoxVPN &lt;BR /&gt;access-list global_access extended permit ip object KnoxVPN 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_inside remark ALlow VPN Traffic&lt;BR /&gt;access-list TCP-STATE-BYPASS extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-715-100.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static vamIP interface service vamIP1 vamIP1&lt;BR /&gt;nat (inside,outside) source static MRMA_1 interface service mrmaUDP mrmaUDP&lt;BR /&gt;nat (inside,outside) source static MRMB_1 interface service mrmbUDP mrmbUDP&lt;BR /&gt;nat (inside,outside) source static vamIP interface service vam5060 vam5060&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 108.174.110.1 1&lt;BR /&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http authentication-certificate inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.99-192.168.1.100 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username wave password 7dzE8CxoLKj5NbvA encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map TCP-STATE-BYPASS&lt;BR /&gt; description TCP State Bypass for internal networks&lt;BR /&gt; match access-list TCP-STATE-BYPASS&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class TCP-STATE-BYPASS&lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:462a45045d80065752bd7e1dd499b66e&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-715-100.bin&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 05 Feb 2014 17:24:56 GMT</pubDate>
    <dc:creator>AaronCase3</dc:creator>
    <dc:date>2014-02-05T17:24:56Z</dc:date>
    <item>
      <title>Routing question with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448546#M270263</link>
      <description>&lt;P&gt;Here is my setup.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside network on my ASA is 192.168.1.0, VLAN1 is 192.168.1.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also an OpenVPN server on the 192.168.1.0 network that brings in traffic from theh 192.168.2.0 network&lt;/P&gt;&lt;P&gt;The openVPN server is 192.168.1.254,&amp;nbsp; it is an untangle box, which is also the default gateway for all but one host on the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one host that uses the ASA 192.168.1.30 as the gateway address -for SIP trunking-.&lt;/P&gt;&lt;P&gt;There are SIP phones on the 192.168.2.0 netowork that send traffic to 192.168.1.26 which has the gateway of 192.168.1.30.&amp;nbsp; This traffic needs to be routed back to the 192.168.1.254 gateway&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've put in a route that I thought should work but it hasn't&lt;/P&gt;&lt;P&gt;I want any traffic that hits the inside interface on the ASA with a destination of 192.168.2.0 to be routed to 192.168.1.254 so it can traverse the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is the command I entered, but even with this in I am unable to communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for a temporary fix I added the route in windows on the host, but I would like to get it all done through the ASA.&amp;nbsp;&amp;nbsp; what am I missing?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448546#M270263</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2019-03-12T03:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: Routing question with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448547#M270264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you asked this in the previous discussion but I forgot to answer in that discussion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Part of the problem with the current setup might be if you are missing this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But to my understanding it still might not work. If you have VPN users from another subnet connecting through this server and they are connecting to an internal host which uses ASA as the default gateway then ASA would not see the initial packet from the host 192.168.2.x to the host 192.168.1.26 but would see that hosts reply through the gateway. This would cause problem that the ASA would not allow the connections. This applies to TCP connections and would require configuring TCP State Bypass on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the perspective of the ASA the ideal situation for it would be if the VPN server was on its own DMZ on the ASA so that all traffic HAS to go through the ASA always. Is such setup possible or would it cause other problems? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally your ASAs license might be a slight problem also (if its Base License) though there might be a way around it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Gah, head doesn't function after workday. Corrected some typos &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 16:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448547#M270264</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-05T16:13:02Z</dc:date>
    </item>
    <item>
      <title>Routing question with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448548#M270265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It isn't possible to have the VPN behind the ASA.&amp;nbsp; I just implemented the same-security-traffic command and I am not able to ping hosts on the 192.168.2.0 network.&amp;nbsp;&amp;nbsp; I'll test and see if this has remedied if for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 16:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448548#M270265</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-05T16:26:39Z</dc:date>
    </item>
    <item>
      <title>Routing question with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448549#M270266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; OK, I'm able to ping to the 192.168.2.0 network.&amp;nbsp; but I'm not getting SIP registration to work,&amp;nbsp; is there something I need to do to allow all traffic between 192.168.1.0 and 192.168.2.0?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 16:39:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448549#M270266</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-05T16:39:15Z</dc:date>
    </item>
    <item>
      <title>Routing question with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448550#M270267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine that there is some TCP traffic involved even though I guess SIP is UDP? Or is it TCP also? Sorry a bit clueless related to everything related to Voice/Video.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try TCP State Bypass even though its not a clean solution but if the network setup can't be configured better for the firewall then it must be used I think.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this configuration. It presumes that you have the default &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TCP-STATE-BYPASS permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map TCP-STATE-BYPASS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description TCP State Bypass for internal networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; match access-list TCP-STATE-BYPASS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; class TCP-STATE-BYPASS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Atleast to my understanding this should work unless I remember wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice again that I am using this configuration under the default ASA &lt;STRONG&gt;"policy-map global_policy"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 16:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448550#M270267</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-05T16:46:33Z</dc:date>
    </item>
    <item>
      <title>Routing question with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448551#M270268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've added those commands and they don't seem to be making a difrerence.&amp;nbsp;&amp;nbsp; I've also tried adding in access rules to allow all traffic 192.168.1.0 to 192.168.2.0 and vice versa, using network objects that I created.&amp;nbsp; Still no luck.&amp;nbsp; here's my running config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(6) &lt;BR /&gt;!&lt;BR /&gt;hostname wavefc&lt;BR /&gt;domain-name center&lt;BR /&gt;enable password 8EBQPyIGHYB9jy6X encrypted&lt;BR /&gt;passwd 8EBQPyIGHYB9jy6X encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.1.28 MRMA description Wave MRMA IP&lt;BR /&gt;name 192.168.1.27 MRMB description Wave MRMB IP&lt;BR /&gt;name 192.168.1.26 vam description WAVE VAM IP&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.30 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; mac-address c0ea.e426.1e05&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 108.174.110.110 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa846-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name center&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network vam&lt;BR /&gt; host 192.168.1.26&lt;BR /&gt; description Created during name migration&lt;BR /&gt;object network MRMB_1&lt;BR /&gt; host 192.168.1.27&lt;BR /&gt; description Created during name migration&lt;BR /&gt;object network MRMA_1&lt;BR /&gt; host 192.168.1.28&lt;BR /&gt; description MRMB&lt;BR /&gt;object service VAM1&lt;BR /&gt; service udp destination range sip 5061 &lt;BR /&gt; description VAM ports&lt;BR /&gt;object service VAM2&lt;BR /&gt; service udp destination range 16384 17383 &lt;BR /&gt; description VAM SIP PORTS&lt;BR /&gt;object service MRMA&lt;BR /&gt; service udp destination range 17640 17895 &lt;BR /&gt; description MRM A PORTS&lt;BR /&gt;object service MRMB&lt;BR /&gt; service udp destination range 17640 17895 &lt;BR /&gt; description MRM B PORTS&lt;BR /&gt;object network Dynamic_NAT&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network vamIP&lt;BR /&gt; host 192.168.1.26&lt;BR /&gt;object network MRMAIP&lt;BR /&gt; host 192.168.1.27&lt;BR /&gt;object network MRMBIP&lt;BR /&gt; host 192.168.1.27&lt;BR /&gt;object service vamIP1&lt;BR /&gt; service udp source range 16384 17383 &lt;BR /&gt;object service SIP&lt;BR /&gt; service udp source range sip 5061 &lt;BR /&gt;object service mrmaUDP&lt;BR /&gt; service udp source range 17384 17639 &lt;BR /&gt;object service mrmbUDP&lt;BR /&gt; service udp source range 17640 17895 &lt;BR /&gt;object service vam5060&lt;BR /&gt; service udp source range sip 5061 &lt;BR /&gt;object network KnoxVPN&lt;BR /&gt; subnet 192.168.2.0 255.255.255.0&lt;BR /&gt; description Knox IP's&lt;BR /&gt;object network Untangle&lt;BR /&gt; host 192.168.1.254&lt;BR /&gt; description VPN To Knoxville&lt;BR /&gt;object-group service VAM_PORTS&lt;BR /&gt; service-object object VAM1 &lt;BR /&gt; service-object object VAM2 &lt;BR /&gt;object-group service SIPPORTS udp&lt;BR /&gt; description WAVE PORT RANGES&lt;BR /&gt; port-object range sip 19000&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp destination eq www &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt;access-list outside_access_in remark Allow ports for phone system&lt;BR /&gt;access-list outside_access_in extended permit object-group VAM_PORTS any object vamIP &lt;BR /&gt;access-list outside_access_in extended permit object MRMA any object MRMAIP &lt;BR /&gt;access-list outside_access_in extended permit object MRMB any object MRMBIP &lt;BR /&gt;access-list global_access extended permit ip any any inactive &lt;BR /&gt;access-list global_access extended permit udp any any object-group SIPPORTS &lt;BR /&gt;access-list global_access extended permit object-group DM_INLINE_SERVICE_1 any any &lt;BR /&gt;access-list global_access extended permit ip interface inside interface inside &lt;BR /&gt;access-list global_access extended permit ip 192.168.1.0 255.255.255.0 object KnoxVPN &lt;BR /&gt;access-list global_access extended permit ip object KnoxVPN 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_inside remark ALlow VPN Traffic&lt;BR /&gt;access-list TCP-STATE-BYPASS extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-715-100.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static vamIP interface service vamIP1 vamIP1&lt;BR /&gt;nat (inside,outside) source static MRMA_1 interface service mrmaUDP mrmaUDP&lt;BR /&gt;nat (inside,outside) source static MRMB_1 interface service mrmbUDP mrmbUDP&lt;BR /&gt;nat (inside,outside) source static vamIP interface service vam5060 vam5060&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 108.174.110.1 1&lt;BR /&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http authentication-certificate inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.99-192.168.1.100 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username wave password 7dzE8CxoLKj5NbvA encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map TCP-STATE-BYPASS&lt;BR /&gt; description TCP State Bypass for internal networks&lt;BR /&gt; match access-list TCP-STATE-BYPASS&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class TCP-STATE-BYPASS&lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:462a45045d80065752bd7e1dd499b66e&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-715-100.bin&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 17:24:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448551#M270268</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-05T17:24:56Z</dc:date>
    </item>
    <item>
      <title>Routing question with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448552#M270269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems you did not have the default configuration on the ASA with regards to this &lt;STRONG&gt;"policy-map". &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will probably need to add this also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service-policy global_policy global&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 17:28:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448552#M270269</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-05T17:28:22Z</dc:date>
    </item>
    <item>
      <title>Routing question with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448553#M270270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; OK,&amp;nbsp; I don't recall making any changes to the policy map, but I'll add that command in and let you know what happens.&amp;nbsp; Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 17:29:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448553#M270270</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-05T17:29:55Z</dc:date>
    </item>
    <item>
      <title>Routing question with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448554#M270271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think this may have done the trick.&amp;nbsp; I'll keep you posted.&amp;nbsp; Thanks again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 17:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448554#M270271</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-05T17:36:34Z</dc:date>
    </item>
    <item>
      <title>Routing question with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448555#M270272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; That got it working.&amp;nbsp; Thanks!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 21:49:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-question-with-asa-5505/m-p/2448555#M270272</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-05T21:49:56Z</dc:date>
    </item>
  </channel>
</rss>

