<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pix 501 configuration to ASA 5515-x... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369109#M307509</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for getting back to you only now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you already solve the problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not, can you get the configuration from the PIX with some &lt;STRONG&gt;"show"&lt;/STRONG&gt; command like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can get the whole configuration of the PIX (remove sensitive information) then I could tell you the corresponding configurations you would need on the new ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Dec 2013 08:35:28 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-12-09T08:35:28Z</dc:date>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369105#M307505</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I'm an Administrator and have a client that is running a T1 (point to point) with a 501 Pix box as the firewall between the Dsl and internal network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; We are switching over to Fiber Optic (Client has 3 locations all tap into a central database) at the hub office and eventually will change over to a&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; VPN network. I have purchased an ASA 5515-x, current pix box is giving me trouble, which also lies the problem. When I took over my client's &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Administration for his network, I found out that although I have access to all the Cisco routers on the network ( (1)17XX, (2) 2600's), I or anyone &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; that&amp;nbsp; I talked to has access to the Pix box? I would like, for the time being, put the ASA inplace of the Pix as the firewall for the T1. Until we decide if &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; we are going to do IPSEC W/client or L2TP... I have searched and found other articles on migrating from Pix to ASA, but also learned the Pix we &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; have is too old. My questions are: Is there any way to retrieve the configuration file from the Pix manually even though I don't know the passwd? or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; do I have to build the firewall from the ground up? (i did hit the reset button a couple of times before as well as pulling the power, reason was, it just &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; started only allowing certain people internet access from inside, anybody with remote access outside can remote in no problem. Just randomly &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; drops people on the inside). Reboot the Pix and everyone is happy for about an hour, then previous senario comes back. I can work my way around &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; the CLI no problem, but I'm new to Cisco's ASDM as well as the new commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369105#M307505</guid>
      <dc:creator>Joseph Green</dc:creator>
      <dc:date>2019-03-12T03:14:17Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369106#M307506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me that your first step should be trying to get access to the PIX itself to determine the current configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is one guide how you can reset the passwords on the PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_password_recovery09186a008009478b.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_password_recovery09186a008009478b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have used it a couple of times in the past (long time ago) and it worked well then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though for this you need to know the software version the PIX is running on. I am wondering if you would be able to see the booting software when booting the PIX while connected to it trough console.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might also want to try the some usual login username/passwords while attempting to connect to the PIX through the console. I guess if its on default settings it might not ask you for a username at all and you might be able to just use &lt;STRONG&gt;"enable"&lt;/STRONG&gt; and not enter any password at all and press enter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest, I can't remember anymore &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Dec 2013 12:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369106#M307506</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-07T12:50:40Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369107#M307507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; First off, let me thank you for the article. It was EXACTLY what I was looking for. I have run into another issue though. The PIX 501 is running ver 6.2, I was able to get to "config" ability and I saw the outside and inside ip's that were being used. I didn't see a command to "show" the WHOLE configuration of the device, it's so old I don't even know if one ever exsited. Now the "inside" interface had a non-routable static ip for the "inside" network. The T1 router is running DHCP for the network. Would the PIX be running NAT? I don't know if NAT was setup on the 2600 T1 router along side the DHCP server. How would I find out?. I'm trying to "mirror" the configuration from the 501 PIX box to a ASA 5515-x box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again for all your help,&lt;/P&gt;&lt;P&gt; Much appreciated,&lt;/P&gt;&lt;P&gt;&amp;nbsp; OrthoAdmin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Dec 2013 22:28:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369107#M307507</guid>
      <dc:creator>orthostlgrp1</dc:creator>
      <dc:date>2013-12-07T22:28:02Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369108#M307508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I found my problem... ACL's... I need an access-list setup for the ASA that mirrors the PIX..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 00:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369108#M307508</guid>
      <dc:creator>Joseph Green</dc:creator>
      <dc:date>2013-12-09T00:12:13Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369109#M307509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for getting back to you only now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you already solve the problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not, can you get the configuration from the PIX with some &lt;STRONG&gt;"show"&lt;/STRONG&gt; command like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can get the whole configuration of the PIX (remove sensitive information) then I could tell you the corresponding configurations you would need on the new ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 08:35:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369109#M307509</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-09T08:35:28Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369110#M307511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; No I haven't solved it yet. Here is the show run for the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;OrthoPIX(config)# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.2(2)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password NDa1RppHr2jz7Cnk encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;hostname OrthoPIX&lt;/P&gt;&lt;P&gt;domain-name sbcglobal.net&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host 66.136.xxx.xxx eq 3389&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.10.10.0 255.255.255.0 10.10.15.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.10.10.0 255.255.255.0 10.10.15.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 10full&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 66.136.xxx.xxx 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 10.10.10.251 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.136.xxx.xxx 3389 10.10.10.253 3389 netmask 255.25&lt;/P&gt;&lt;P&gt;5.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 66.136.xxx.xxx 15&lt;/P&gt;&lt;P&gt;route inside 10.10.11.0 255.255.255.0 10.10.10.254 1&lt;/P&gt;&lt;P&gt;route inside 10.10.12.0 255.255.255.0 10.10.10.254 1&lt;/P&gt;&lt;P&gt;route inside 10.10.20.4 255.255.255.252 10.10.10.254 1&lt;/P&gt;&lt;P&gt;route inside 10.10.30.4 255.255.255.252 10.10.10.254 1&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si&lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:01:00 absolute&lt;/P&gt;&lt;P&gt;timeout xlate 0:01:00&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map transam 1 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map transam 1 match address 101&lt;/P&gt;&lt;P&gt;crypto map transam 1 set peer 65.69.93.98&lt;/P&gt;&lt;P&gt;crypto map transam 1 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map transam interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 65.69.93.98 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 1000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 167.1.162.167 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:4e26e0b8ee57c83fdbcd71fbadf5ef8e&lt;/P&gt;&lt;P&gt;: end&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;OrthoPIX(config)# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.2(2)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password NDa1RppHr2jz7Cnk encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;hostname OrthoPIX&lt;/P&gt;&lt;P&gt;domain-name sbcglobal.net&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host 66.136.xxx.xxx eq 3389&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.10.10.0 255.255.255.0 10.10.15.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.10.10.0 255.255.255.0 10.10.15.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 10full&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 66.136.xxx.xxx 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 10.10.10.251 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.136.xxx.xxx 3389 10.10.10.253 3389 netmask 255.25&lt;/P&gt;&lt;P&gt;5.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 66.136.xxx.xxx 15&lt;/P&gt;&lt;P&gt;route inside 10.10.11.0 255.255.255.0 10.10.10.254 1&lt;/P&gt;&lt;P&gt;route inside 10.10.12.0 255.255.255.0 10.10.10.254 1&lt;/P&gt;&lt;P&gt;route inside 10.10.20.4 255.255.255.252 10.10.10.254 1&lt;/P&gt;&lt;P&gt;route inside 10.10.30.4 255.255.255.252 10.10.10.254 1&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si&lt;/P&gt;&lt;P&gt;p 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:01:00 absolute&lt;/P&gt;&lt;P&gt;timeout xlate 0:01:00&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map transam 1 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map transam 1 match address 101&lt;/P&gt;&lt;P&gt;crypto map transam 1 set peer 65.69.93.98&lt;/P&gt;&lt;P&gt;crypto map transam 1 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map transam interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 65.69.93.98 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 1 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 1 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 1 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 1 group 1&lt;/P&gt;&lt;P&gt;isakmp policy 1 lifetime 1000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 167.1.162.167 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:4e26e0b8ee57c83fdbcd71fbadf5ef8e&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 13:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369110#M307511</guid>
      <dc:creator>orthostlgrp1</dc:creator>
      <dc:date>2013-12-09T13:10:48Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369111#M307512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Here is the show run for ASA 5515-x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.6(1)2 &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password NDa1RppHr2jz7Cnk encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif Port0/0&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu Port0/0 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcp-client client-id interface Port0/0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home reporting anonymous prompt 2&lt;BR /&gt;Cryptochecksum:c5af97904bf21e317a1006e9b3901aa1&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 13:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369111#M307512</guid>
      <dc:creator>orthostlgrp1</dc:creator>
      <dc:date>2013-12-09T13:17:12Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369112#M307515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what your situation with the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface is. The PIX has staticly configured IP address and default route while the ASA at the moment has DHCP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will consider that the ASA should use the same configuration as the PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;PHYSICAL INTERFACES&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nameif outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip address 66.136.x.x 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; no shutdown&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 10.10.10.251 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;STATIC ROUTES&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 66.136.xxx.xxx 15&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 10.10.11.0 255.255.255.0 10.10.10.254 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 10.10.12.0 255.255.255.0 10.10.10.254 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 10.10.20.4 255.255.255.252 10.10.10.254 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 10.10.30.4 255.255.255.252 10.10.10.254 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;STATIC PAT (PORT FORWARD)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-PAT-RDP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.10.10.253&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static 66.136.x.x service tcp 3389 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;EXTERNAL ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside permit tcp any object STATIC-PAT-RDP eq 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;DYNAMIC PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;NAT0 / NAT EXEMPT FOR L2L VPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network REMOTE-LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.15.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static LAN LAN destination static REMOTE-LAN REMOTE-LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;L2L VPN CONFIGURATION&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list L2L-VPN remark L2L VPN Encryption Domain&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list L2L-VPN permit ip 10.10.10.0 255.255.255.0 10.10.15.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ipsec ikev1 transform-set DES esp-des esp-md5-hmac&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map transam 1 match address L2L-VPN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map transam 1 set peer 65.69.93.98&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map transam 1 set ikev1 transform-set DES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map transam interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto isakmp identity address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ikev1 policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; authentication pre-share&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; encryption des&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; hash md5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; group 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; lifetime 1000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ikev1 enable outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group 65.69.93.98 type ipsec-l2l&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group 65.69.93.98 ipsec-attributes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ikev1 pre-shared-key &lt;PRESHAREDKEY&gt;&lt;/PRESHAREDKEY&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above should be most of the configurations from PIX to the new ASA format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We cant see the PSK of the L2L VPN connection and I am not sure if software that old has the command that would show the PSK in clear text.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration presumes that you use the staticly configured IP addresses of the interfaces and the static routes and not DHCP like its now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the ASA should also be connected to the same devices on same ports from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"outside"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should also set the management related commands &lt;STRONG&gt;"ssh" , "http" or "telnet"&lt;/STRONG&gt; as you wish.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 14:23:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369112#M307515</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-09T14:23:09Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369113#M307517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; First off thank you for the info! I'm learning alot!. The "outside" is AT&amp;amp;T, which was setup YEARS ago, before I came around. I noticed as well the L2L VPN configuration and was wondering WHY it would be configured? Is it nessasary for the "WAN" cards?. Also, I was reading some Cisco documents and it stated that even though I can configure the ASA 5515, the ISP has the MAC address of the PIX and until THEY change their side it's really not going to get a ping from them. My question is: Is there a way to MAC address clone the MAC address they already have?.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks again,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Joseph&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 17:02:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369113#M307517</guid>
      <dc:creator>Joseph Green</dc:creator>
      <dc:date>2013-12-09T17:02:00Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369114#M307519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Sorry, I forgot to ask this as well. I don't understand the PSK fundamentals, is there a Cisco document explaining it in more detail?.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp; Joseph&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 17:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369114#M307519</guid>
      <dc:creator>Joseph Green</dc:creator>
      <dc:date>2013-12-09T17:05:00Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369115#M307521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The L2L VPN configurations seems to be configured so a local network 10.10.10.0/24 can connect to a remote network 10.10.15.0/24 security/encrypted through the public Internet. The L2L VPN is usually used to connect remote sites of a company or perhaps provide a secure connection to third party site to access some services/resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that the PIX is still in use in the network and the ASA is waiting to get placed to the network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so then I would try these commands to see if the VPN is active. Naturally it might not be all the time unless its actively used&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show crypto isakmp sa&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show crypto ipsec sa&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The L2L VPN configuration is in no way mandatory for the normal operation of the firewall. As I said its there to provide connection between to sites securely through the Internet. Naturally the another big thing related to it is the fact that these 2 private network ranges can communicate directly through this L2L VPN connection which would not be possible directly through the Internet since the private ranges are not routable through Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the MAC address situation you can indeed configure the PIX MAC address on the ASAs external interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First check the output of this command on the PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Find the correct interface and its output and check for the MAC address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then go to the ASA under the interface configuration mode of the correct interface and enter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;mac-address aaaa.bbbb.ccc&lt;/STRONG&gt;c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where the &lt;STRONG&gt;aaaa.bbbb.cccc&lt;/STRONG&gt; is naturally the MAC address that you checked from the current PIX firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark replys as the correct answer if they answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed though &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 17:11:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369115#M307521</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-09T17:11:20Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369116#M307524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PSK / Pre-shared-key is essentially a password that is configured on both ends of the L2L VPN connection. (On both of the VPN devices)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully you have documented the current PSK so it can be inserted to the configuration on the ASA. Or perhaps you have the contact information of the remote site so you can change it? Or perhaps the remote site is under your management also and you can simply change the PSK on both ends to something new when replacing the firewall at this site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a very very quick glance I found this that gives a basic desciption of PSK (its part of an old Cisco Press book)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.ciscopress.com/articles/article.asp?p=24833&amp;amp;seqNum=5"&gt;http://www.ciscopress.com/articles/article.asp?p=24833&amp;amp;seqNum=5&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 17:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369116#M307524</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-09T17:16:02Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369117#M307526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Sorry again, forgot to tell you the ASA wasn't configured yet, I just turned on one of the ports for DHCP through the ASDM, because I was going to input the Activation Key that I received from registering the ASA. Also, the owner told me that the "previous Administrator" was running some "illegal activities" through is connection. Could that "L2L VPN" configuration be connected to it? and just never shutdown/closed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Joseph&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 17:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369117#M307526</guid>
      <dc:creator>Joseph Green</dc:creator>
      <dc:date>2013-12-09T17:20:14Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369118#M307527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; How would I shutdown the L2L VPN services on the PIX?. I also recieved the info for the fiber optic that is being installed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN IP: 12.XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Host Router Name: &lt;HOSTNAME&gt;&lt;/HOSTNAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New IP Block: 12.XXX.XXX.XXX/28&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default Gateway GE-0/0: 12.XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your 1st Network Device: 12.XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subnet Mask: 255.255.255.XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS Resolvers: 12.XXX.XXX.XXX&amp;nbsp;&amp;nbsp;&amp;nbsp; 12.XXX.XXX.XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usable IP's: 12.XXX.XXX.XXX thru XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; what would be the configuration for the ASA? replacing the 66.xxx.xxx.xxx with 12.xxx.xxx.xxx? in the commands?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks again for all your help!,&lt;/P&gt;&lt;P&gt;&amp;nbsp; Joseph&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 17:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369118#M307527</guid>
      <dc:creator>Joseph Green</dc:creator>
      <dc:date>2013-12-09T17:56:10Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369119#M307528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thanks again for your help! from what info you supplied and further reading through Cisco's knowledge base, I was able to "deny" the access-list and remove the lines that "permited". I was also able to stop "crypto isakmp" service from running as well. Just wanted to thank you so much for all your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp; Joseph&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2013 19:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369119#M307528</guid>
      <dc:creator>Joseph Green</dc:creator>
      <dc:date>2013-12-09T19:55:51Z</dc:date>
    </item>
    <item>
      <title>Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369120#M307529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have inputed the configuration from above that you provided. I will post the "sh run" output after the post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I WASN'T however able to input the line: nat (inside,outside) static 66.136.x.x service tcp 3389 3389. It kept telling me &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; it had a problem with "static", I WAS however able to enter everything else. I could see the "outside" port and "inside" &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; port blinking as if they were communicating. I was able to ping "inside", but not "outside" ip address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.6(1)2&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name sbcglobal.net&lt;BR /&gt;enable password NDa1RppHr2jz7Cnk encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; mac-address 0009.e8bf.6edc&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 6x.xxx.xxx.xxx 255.255.255.xxx&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.10.10.251 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 1xx.xxx.xx.xx&lt;BR /&gt; name-server 1xx.xxx.xx.xxx&lt;BR /&gt; domain-name sbcglobal.net&lt;BR /&gt;object network STATIC-PAT-RDP&lt;BR /&gt; host 10.10.10.253&lt;BR /&gt;access-list outside extended permit tcp any object STATIC-PAT-RDP&lt;BR /&gt;access-list outside extended permit tcp any object STATIC-PAT-RDP eq 3389&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 6x.xxx.xxx.xxx 15&lt;BR /&gt;route inside 10.10.11.0 255.255.255.0 10.10.10.254 1&lt;BR /&gt;route inside 10.10.12.0 255.255.255.0 10.10.10.254 1&lt;BR /&gt;route inside 10.10.20.0 255.255.255.0 10.10.10.254 1&lt;BR /&gt;route inside 10.10.30.0 255.255.255.0 10.10.10.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcp-client client-id interface outside&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous prompt 2&lt;BR /&gt;Cryptochecksum:201bf8315b82ffb0f158046489b5f512&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks again,&lt;/P&gt;&lt;P&gt;&amp;nbsp; Joseph&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2013 03:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369120#M307529</guid>
      <dc:creator>orthostlgrp1</dc:creator>
      <dc:date>2013-12-10T03:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 configuration to ASA 5515-x...</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369121#M307530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt; I was also wondering if I needed to change my "host name" to the PIX box?&lt;BR /&gt;&lt;BR /&gt; Thanks again,&lt;BR /&gt;&lt;BR /&gt; Joseph&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Dec 2013 12:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-configuration-to-asa-5515-x/m-p/2369121#M307530</guid>
      <dc:creator>orthostlgrp1</dc:creator>
      <dc:date>2013-12-10T12:51:58Z</dc:date>
    </item>
  </channel>
</rss>

