<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port access to inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389856#M308611</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What kind of application is it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It could be an ACL on the inside interface. Maybe the "inside" subnet is not allowed or is blocked by the firewall .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have a ACL on the inside interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Nov 2013 20:29:16 GMT</pubDate>
    <dc:creator>stevechege</dc:creator>
    <dc:date>2013-11-19T20:29:16Z</dc:date>
    <item>
      <title>Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389855#M308609</link>
      <description>&lt;P&gt;I am trying to allow access to my inside users on port 5222 for a new phone system application on a ASA5505. All of my inside users are using DHCP from a Domain Controller.&amp;nbsp; If I connect to another network that does not have a ASA 5505 in place I am able to open the application that uses port 5222, but from the network behind the ASA I am not able to.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389855#M308609</guid>
      <dc:creator>Thomas Summers</dc:creator>
      <dc:date>2019-03-12T03:07:02Z</dc:date>
    </item>
    <item>
      <title>Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389856#M308611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What kind of application is it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It could be an ACL on the inside interface. Maybe the "inside" subnet is not allowed or is blocked by the firewall .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have a ACL on the inside interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 20:29:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389856#M308611</guid>
      <dc:creator>stevechege</dc:creator>
      <dc:date>2013-11-19T20:29:16Z</dc:date>
    </item>
    <item>
      <title>Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389857#M308613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Things taht we need to help you out and understand your problem:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source IP &lt;/P&gt;&lt;P&gt;destination IP &lt;/P&gt;&lt;P&gt;application &lt;/P&gt;&lt;P&gt;ASA configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How does the application work????&lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 20:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389857#M308613</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-19T20:41:18Z</dc:date>
    </item>
    <item>
      <title>Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389858#M308615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Source IP is 74.43.254.162&lt;/P&gt;&lt;P&gt;The Destination IP will be 10.10.10.0/24&amp;nbsp; Internal subnet&lt;/P&gt;&lt;P&gt;This applications allows the users to see how many calls are the in queue, if they have voice mail, who is in or away&lt;/P&gt;&lt;P&gt;ASA configuration;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 216.255.166.36 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;time-range Close_Portol&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa804-28-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name tvcconnect.net&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network FTPHosts&lt;BR /&gt; description Those that are allowed to use FTP&lt;BR /&gt; network-object 216.255.166.7 255.255.255.255&lt;BR /&gt; network-object 63.161.147.154 255.255.255.255&lt;BR /&gt; network-object 63.161.147.10 255.255.255.255&lt;BR /&gt; network-object host 216.255.162.47&lt;BR /&gt; network-object host 64.161.190.116&lt;BR /&gt; network-object host 208.85.128.5&lt;BR /&gt; network-object host 208.85.128.2&lt;BR /&gt; network-object host 75.13.65.241&lt;BR /&gt; network-object host 10.10.10.151&lt;BR /&gt; network-object host 10.10.10.8&lt;BR /&gt;object-group network PeakViewSolutions&lt;BR /&gt; network-object host 10.10.10.21&lt;BR /&gt;object-group network TVCBlackBerryIPs&lt;/P&gt;&lt;P&gt;*&lt;/P&gt;&lt;P&gt;*&lt;/P&gt;&lt;P&gt;*object-group network TVCDroidsIPs&lt;/P&gt;&lt;P&gt;*&lt;/P&gt;&lt;P&gt;*&lt;/P&gt;&lt;P&gt;*&lt;/P&gt;&lt;P&gt;object-group network TVC_GLDS_External_Hosts&lt;BR /&gt;*&lt;/P&gt;&lt;P&gt;*&lt;/P&gt;&lt;P&gt;*&lt;BR /&gt;object-group network BLUE_MOON&lt;BR /&gt; *&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 10.10.10.0 255.255.255.0 172.16.205.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 10.10.10.0 255.255.255.0 host 172.16.205.15&lt;BR /&gt;access-list nonat extended permit ip any 192.168.250.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip any 10.7.7.0 255.255.255.248&lt;BR /&gt;access-list nonat extended permit ip 172.16.208.0 255.255.255.0 host 172.16.205.10&lt;BR /&gt;access-list nonat extended permit ip 172.16.208.0 255.255.255.0 host 172.16.205.20&lt;BR /&gt;access-list nonat extended permit ip host 10.10.10.101 172.16.205.0 255.255.255.0&lt;BR /&gt;access-list TVC_In extended permit tcp object-group FTPHosts host 216.255.166.41 eq ftp&lt;BR /&gt;access-list TVC_In extended permit ip 74.62.190.0 255.255.255.0 host 216.255.166.40&lt;BR /&gt;access-list TVC_In extended permit icmp host 216.255.162.36 host 216.255.166.37&lt;BR /&gt;access-list TVC_In extended permit ip host 216.255.162.37 host 216.255.166.37&lt;BR /&gt;access-list TVC_In extended permit tcp host 216.255.162.36 host 216.255.166.37 eq 15802&lt;BR /&gt;access-list TVC_In extended permit udp host 216.255.162.36 host 216.255.166.37 eq 15802&lt;BR /&gt;access-list TVC_In extended permit tcp host 216.255.162.36 host 216.255.166.37 eq 15803&lt;BR /&gt;access-list TVC_In extended permit udp host 216.255.162.36 host 216.255.166.37 eq 15803&lt;BR /&gt;access-list TVC_In extended permit tcp host 216.255.162.36 host 216.255.166.40 eq 15802&lt;BR /&gt;access-list TVC_In extended permit udp host 216.255.162.36 host 216.255.166.40 eq 15802&lt;BR /&gt;access-list TVC_In extended permit tcp host 216.255.162.36 host 216.255.166.40 eq 15803&lt;BR /&gt;access-list TVC_In extended permit udp host 216.255.162.36 host 216.255.166.40 eq 15803&lt;BR /&gt;access-list TVC_In extended permit tcp host 216.255.162.37 host 216.255.166.40 eq 15802&lt;BR /&gt;access-list TVC_In extended permit udp host 216.255.162.37 host 216.255.166.40 eq 15802&lt;BR /&gt;access-list TVC_In extended permit tcp host 216.255.162.37 host 216.255.166.40 eq 15803&lt;BR /&gt;access-list TVC_In extended permit udp host 216.255.162.37 host 216.255.166.40 eq 15803&lt;BR /&gt;access-list TVC_In extended permit tcp object-group TVCBlackBerryIPs host 216.255.166.42 eq www log&lt;BR /&gt;access-list TVC_In extended permit tcp object-group TVCBlackBerryIPs host 216.255.166.42 eq https log&lt;BR /&gt;access-list TVC_In extended permit tcp object-group TVCDroidsIPs host 216.255.166.42 eq www log&lt;BR /&gt;access-list TVC_In extended permit tcp object-group TVCDroidsIPs host 216.255.166.42 eq https log&lt;BR /&gt;access-list TVC_In extended permit ip object-group TVC_GLDS_External_Hosts host 216.255.166.40&lt;BR /&gt;access-list TVC_In extended permit udp any any eq sip&lt;BR /&gt;access-list TVC_In extended permit udp any any range 10000 20000&lt;BR /&gt;access-list TVC_In extended permit udp any any eq 5061&lt;BR /&gt;access-list TVC_In permit tcp any any eq 5222&lt;/P&gt;&lt;P&gt;access-list TVC_In extended permit tcp any any range 10000 20000&lt;BR /&gt;access-list Split_Tunnel standard permit 10.10.10.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;!Lines removed&lt;BR /&gt;!&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap errors&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host inside 10.10.10.9&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool VPN_Pool 192.168.250.1-192.168.250.50 mask 255.255.255.0&lt;BR /&gt;ip local pool TVC&amp;amp;GU_VPN_Pool 192.168.250.51&lt;BR /&gt;ip local pool MIR_VPN_Pool 10.7.7.1-10.7.7.2 mask 255.255.255.248&lt;BR /&gt;ip local pool TVC_3Cs_VPN_Pool 192.168.250.60-192.168.250.62 mask 255.255.255.0&lt;BR /&gt;ip local pool BLUE_MOON_VPN_Pool 192.168.250.55-192.168.250.58 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit host 216.255.162.36 outside&lt;BR /&gt;icmp permit host 216.255.166.7 outside&lt;BR /&gt;icmp permit host 216.255.166.37 outside&lt;BR /&gt;icmp deny any outside&lt;BR /&gt;asdm image disk0:/asdm-611.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 2 216.255.166.37 netmask 255.255.255.255&lt;BR /&gt;global (outside) 3 216.255.166.38 netmask 255.255.255.255&lt;BR /&gt;global (outside) 4 216.255.166.40 netmask 255.255.255.255&lt;BR /&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 3 10.10.10.11 255.255.255.255&lt;BR /&gt;nat (inside) 2 10.10.10.12 255.255.255.255&lt;BR /&gt;nat (inside) 4 10.10.10.15 255.255.255.255&lt;BR /&gt;nat (inside) 1 10.10.10.0 255.255.255.0&lt;BR /&gt;static (inside,outside) 216.255.166.37 10.10.10.12 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 216.255.166.39 10.10.10.50 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 216.255.166.40 10.10.10.15 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 216.255.166.41 10.10.10.11 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 216.255.166.42 10.10.10.21 netmask 255.255.255.255&lt;BR /&gt;access-group TVC_In in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 216.255.166.33 1&lt;BR /&gt;route outside 172.16.205.0 255.255.255.0 216.255.166.9 1&lt;BR /&gt;route inside 172.16.208.0 255.255.255.0 10.10.10.4 1&lt;BR /&gt;route outside 192.168.0.0 255.255.255.0 216.255.166.9 1&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 10.10.10.2 tunneled&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record TVC_VPN_DAP&lt;BR /&gt; description "Non TVC 3Cs access"&lt;BR /&gt; priority 1&lt;BR /&gt;dynamic-access-policy-record TVC_3Cs_DAP&lt;BR /&gt; description "TVC 3Cs DAP"&lt;BR /&gt; priority 10&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server TVC-DC-01 protocol ldap&lt;BR /&gt;aaa-server TVC-DC-01 (inside) host 10.10.10.30&lt;BR /&gt; ldap-base-dn dc=tvcconnect, dc=net&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password *&lt;BR /&gt; ldap-login-dn CN=ASA ASA,CN=Users,DC=tvcconnect,DC=net&lt;BR /&gt; server-type microsoft&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.10.10.8 255.255.255.255 inside&lt;BR /&gt;http 10.10.10.9 255.255.255.255 inside&lt;BR /&gt;http 10.10.10.7 255.255.255.255 inside&lt;BR /&gt;http 10.10.10.6 255.255.255.255 inside&lt;BR /&gt;http 10.10.10.163 255.255.255.255 inside&lt;BR /&gt;http 10.10.10.151 255.255.255.255 inside&lt;BR /&gt;http 10.10.10.38 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set myset esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-3DES-SHA ESP-3DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 match address GU&lt;BR /&gt;crypto map outside_map 1 set peer 216.255.166.9&lt;BR /&gt;crypto map outside_map 1 set transform-set myset&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 20 match address 100&lt;BR /&gt;crypto map outside_map 20 set peer 216.255.166.7&lt;BR /&gt;crypto map outside_map 20 set transform-set myset&lt;BR /&gt;crypto map outside_map 20 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 20 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;*&lt;/P&gt;&lt;P&gt;*&lt;/P&gt;&lt;P&gt;*&lt;/P&gt;&lt;P&gt;*&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;priority-queue inside&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy TVC_GLDS internal&lt;BR /&gt;group-policy TVC_GLDS attributes&lt;BR /&gt; dns-server value 10.10.10.30 10.10.10.31&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; default-domain value tvcconnect.net&lt;BR /&gt;group-policy TVC_ACCESS internal&lt;BR /&gt;group-policy TVC_ACCESS attributes&lt;BR /&gt; dns-server value 10.10.10.30 10.10.10.31&lt;BR /&gt; vpn-access-hours none&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; default-domain value tvcconnect.net&lt;BR /&gt;group-policy TVC_3Cs_GP internal&lt;BR /&gt;group-policy TVC_3Cs_GP attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec webvpn&lt;BR /&gt;group-policy TVC&amp;amp;GU_VPN internal&lt;BR /&gt;group-policy TVC&amp;amp;GU_VPN attributes&lt;BR /&gt; dns-server value 10.10.10.30 10.10.10.31&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; default-domain value tvcconnect.net&lt;BR /&gt;group-policy TVC_BLUE_MOON internal&lt;BR /&gt;group-policy TVC_BLUE_MOON attributes&lt;BR /&gt; dns-server value 10.10.10.30 10.10.10.31&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; default-domain value tvcconnect.net&lt;BR /&gt;group-policy PeakView_Solutions internal&lt;BR /&gt;group-policy PeakView_Solutions attributes&lt;BR /&gt; dns-server value 10.10.10.30 10.10.10.31&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; default-domain value tvcconnect.net&lt;BR /&gt;username raufm password ******************* encrypted privilege 15&lt;BR /&gt;username koschmiederv password ********************** encrypted&lt;BR /&gt;username koschmiederv attributes&lt;BR /&gt; vpn-group-policy TVC_ACCESS&lt;BR /&gt;username PeakViewSolutions password ******************* encrypted privilege 0&lt;BR /&gt;username PeakViewSolutions attributes&lt;BR /&gt; vpn-group-policy PeakView_Solutions&lt;BR /&gt;username danielles password ************************* encrypted privilege 0&lt;BR /&gt;username danielles attributes&lt;BR /&gt; vpn-group-policy TVC_ACCESS&lt;BR /&gt;username summerst password ************************** encrypted privilege 15&lt;BR /&gt;username summerst attributes&lt;BR /&gt; vpn-group-policy TVC_ACCESS&lt;BR /&gt;username GLDS password ********************* encrypted privilege 0&lt;BR /&gt;username GLDS attributes&lt;BR /&gt; vpn-group-policy TVC_GLDS&lt;BR /&gt;username zawackij password ********************* encrypted privilege 0&lt;BR /&gt;username zawackij attributes&lt;BR /&gt; vpn-group-policy TVC_ACCESS&lt;BR /&gt;username kennistonh password ***************** encrypted privilege 0&lt;BR /&gt;username bluemoon password ******************* encrypted&lt;BR /&gt;username bluemoon attributes&lt;BR /&gt; vpn-group-policy TVC_BLUE_MOON&lt;BR /&gt;tunnel-group TVC&amp;amp;GU_VPN type remote-access&lt;BR /&gt;tunnel-group TVC&amp;amp;GU_VPN general-attributes&lt;BR /&gt; address-pool TVC&amp;amp;GU_VPN_Pool&lt;BR /&gt;tunnel-group TVC&amp;amp;GU_VPN ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group TVC_GLDS type remote-access&lt;BR /&gt;tunnel-group TVC_GLDS general-attributes&lt;BR /&gt; address-pool VPN_Pool&lt;BR /&gt; default-group-policy TVC_GLDS&lt;BR /&gt;tunnel-group TVC_GLDS ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group TVC_ACCESS type remote-access&lt;BR /&gt;tunnel-group TVC_ACCESS general-attributes&lt;BR /&gt; address-pool VPN_Pool&lt;BR /&gt; default-group-policy TVC_ACCESS&lt;BR /&gt;tunnel-group TVC_ACCESS ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 216.255.166.9 type ipsec-l2l&lt;BR /&gt;tunnel-group 216.255.166.9 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; isakmp keepalive threshold 15 retry 10&lt;BR /&gt;tunnel-group GU_Information_Technology type remote-access&lt;BR /&gt;tunnel-group GU_Information_Technology general-attributes&lt;BR /&gt; address-pool MIR_VPN_Pool&lt;BR /&gt;tunnel-group GU_Information_Technology ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; isakmp keepalive threshold 15 retry 10&lt;BR /&gt;tunnel-group PeakView_Solutions type remote-access&lt;BR /&gt;tunnel-group PeakView_Solutions general-attributes&lt;BR /&gt; address-pool VPN_Pool&lt;BR /&gt; default-group-policy TVC_GLDS&lt;BR /&gt;tunnel-group PeakView_Solutions ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group TVC_BLUE_MOON type remote-access&lt;BR /&gt;tunnel-group TVC_BLUE_MOON general-attributes&lt;BR /&gt; address-pool BLUE_MOON_VPN_Pool&lt;BR /&gt;tunnel-group TVC_BLUE_MOON ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:3667be2845ce3329b1bf61a9e260d350&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 11:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389858#M308615</guid>
      <dc:creator>Thomas Summers</dc:creator>
      <dc:date>2013-11-20T11:59:56Z</dc:date>
    </item>
    <item>
      <title>Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389859#M308619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this an outbound or inbound connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the traffic is generated from Inside to Outside, the traffic should be permitted with the current configuration that you have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the traffic is initiated from the IP address: 74.43.254.162 to the Inside, it will be a good idea to determine if the connection is destined to the ASA Public Interface IP, if this is the case, it will be complicated because since the traffic is coming from a low to a high security level, there needs to be a NAT for passing the traffic and if the destination is one IP there is no way to perform a redirection for the whole Inside Subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if the packet gets to the Outside Interface with the destination that you mentioned:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.10.10.0/24 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can apply the following commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 105 74.43.254.162 255.255.255.255&lt;/P&gt;&lt;P&gt;global (inside) 105 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Eddy Duran&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 14:16:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389859#M308619</guid>
      <dc:creator>Eddy Duran</dc:creator>
      <dc:date>2013-11-20T14:16:42Z</dc:date>
    </item>
    <item>
      <title>Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389860#M308621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;My thoughts are that this is an outgoing connection from local PC to that destination server. There is no possible way that an application establishes connections to local PC without these initiating a connection to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 14:33:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389860#M308621</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-20T14:33:03Z</dc:date>
    </item>
    <item>
      <title>Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389861#M308623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Each PC will have the application installed on it and they will each then communicate with the server at 74.43.254.162.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 15:06:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389861#M308623</guid>
      <dc:creator>Thomas Summers</dc:creator>
      <dc:date>2013-11-20T15:06:36Z</dc:date>
    </item>
    <item>
      <title>Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389862#M308625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please run a packet tracer on the ASA and send us the output, in most cases from higher to lower security interfaces you don't place an ACE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 10.10.10.100 1025 74.43.254.162 5122&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that was the destination port I just can't find the post that you defined it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 17:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389862#M308625</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-20T17:05:01Z</dc:date>
    </item>
    <item>
      <title>Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389863#M308626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; This traffic is coming from the inside network of 10.10.10.0/24 to the host IP of 74.43.254.162.&amp;nbsp;&amp;nbsp;&amp;nbsp; below are the results of a packet-tracer;&lt;/P&gt;&lt;P&gt;TVCASA# packet-tracer input inside tcp 10.10.10.38 1025 74.43.254.162 5222&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 10.10.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip inside 10.10.10.0 255.255.255.0 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (216.255.166.36 [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 8640664, untranslate_hits = 618131&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.10.10.38/1025 to 216.255.166.36/60543 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 10.10.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip inside 10.10.10.0 255.255.255.0 inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 10756988, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: output and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 216.255.166.33 using egress ifc outside&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 000a.f330.5000 hits 9850&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Nov 2013 16:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389863#M308626</guid>
      <dc:creator>Thomas Summers</dc:creator>
      <dc:date>2013-11-25T16:56:17Z</dc:date>
    </item>
    <item>
      <title>Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389864#M308628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's allowed so it is not a configuration issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Nov 2013 17:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389864#M308628</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-25T17:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: Port access to inside</title>
      <link>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389865#M308630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It appears to be stopped in the inbound side. Please take a look at the attachment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Nov 2013 17:37:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-access-to-inside/m-p/2389865#M308630</guid>
      <dc:creator>Thomas Summers</dc:creator>
      <dc:date>2013-11-25T17:37:18Z</dc:date>
    </item>
  </channel>
</rss>

