<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Command Changes From 7.2 To 8.6 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191167#M360413</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're right, I don't see anything in my config for the&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Guess I don't need it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nonat acl:&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your examples make this a little easier to understand.&lt;/P&gt;&lt;P&gt;I'm certainly going to check out your document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One last question with your above post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm actually translating 3390 on the outside to 3389 on the inside.&lt;/P&gt;&lt;P&gt;So would I only need to change:&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 3390 3389&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;access-list outside_acl permit tcp any object STATIC-PAT-TCP3389 eq 3390&lt;/P&gt;&lt;P&gt;Correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seeing this makes me wonder if I'll need to change all of my acl's, but I'm going to try it with what I have first.&lt;/P&gt;&lt;P&gt;Thanks a bunch.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Mar 2013 21:23:02 GMT</pubDate>
    <dc:creator>andyoww</dc:creator>
    <dc:date>2013-03-11T21:23:02Z</dc:date>
    <item>
      <title>Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191165#M360409</link>
      <description>&lt;P&gt;I'm coming from a 5505/5510 ASA to a 5512x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see the following 7.2 commands are now set with the NAT command in 8.6:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------begin 7.2 commands---------------------&lt;/P&gt;&lt;P&gt;&lt;SPAN id="mce_marker"&gt;&lt;/SPAN&gt;global (outside) 1 interface&lt;BR /&gt;global (inside) 10 interface&lt;BR /&gt;global (wireless) 1 interface&lt;BR /&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 1 192.168.3.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp interface www 192.168.3.114 www netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) udp interface 5008 192.168.3.117 5008 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 3390 192.168.3.101 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface h323 192.168.3.118 h323 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;--------------end 7.2 commands----------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While I would love if somebody would change these into correct commands for 8.6, I actually want to learn what I need to do so I can better understand this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The documentation for the NAT command in 8.6 is very confusing.&lt;/P&gt;&lt;P&gt;Can somebody break this down for me step by step?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep in mind I still have the acl entries for the above commands as well:&lt;/P&gt;&lt;P&gt;-------------begin acl example-------------------&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host 192.168.3.114 eq www&lt;/P&gt;&lt;P&gt;--------------end acl example--------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will I need to change/delete these?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:12:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191165#M360409</guid>
      <dc:creator>andyoww</dc:creator>
      <dc:date>2019-03-12T01:12:52Z</dc:date>
    </item>
    <item>
      <title>Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191166#M360411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We dont have all the information we need or there are some unused NAT configurations above&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Unused or Partial Information&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (inside) 10 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Doesnt have matching ID 10 "nat" line&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list nonat&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;We dont know what the ACL "nonat" contains&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Used&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PAT CONFIGURATIONS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Old Format&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (wireless) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;New Format&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network INSIDE-PAT-SOURCE&lt;/P&gt;&lt;P&gt; network-object 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic INSIDE-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;nat (inside,wireless) after-auto source dynamic INSIDE-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PORT FORWARD / STATIC PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Old Format&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.3.114 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface 5008 192.168.3.117 5008 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3390 192.168.3.101 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface h323 192.168.3.118 h323 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;New Format&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network STATIC-PAT-TCP80&lt;/P&gt;&lt;P&gt; host 192.168.3.114&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 80 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network STATIC-PAT-UDP-5008&lt;/P&gt;&lt;P&gt; host 192.168.3.117&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service udp 5008 5008&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network STATIC-PAT-TCP3389&lt;/P&gt;&lt;P&gt; host 192.168.3.101&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 3389 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network STATIC-PAT-TCP1720&lt;/P&gt;&lt;P&gt; host 192.168.3.118&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 1720 1720&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_acl permit tcp any object STATIC-PAT-TCP80 eq 80&lt;/P&gt;&lt;P&gt;access-list outside_acl permit tcp any object STATIC-PAT-UDP5008 eq 5008&lt;/P&gt;&lt;P&gt;access-list outside_acl permit tcp any object STATIC-PAT-TCP3389 eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_acl permit tcp any object STATIC-PAT-TCP1720 eq 1720&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wont go into detail here. Be sure to check the Document section of the Firewall forum section in the coming week or two. I am writing a document about the new NAT format of 8.3 (and newer) which should contain basic information related to different common NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if the information was helpfull. Mark the question as answered if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 21:05:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191166#M360411</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-11T21:05:19Z</dc:date>
    </item>
    <item>
      <title>Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191167#M360413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're right, I don't see anything in my config for the&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Guess I don't need it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nonat acl:&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your examples make this a little easier to understand.&lt;/P&gt;&lt;P&gt;I'm certainly going to check out your document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One last question with your above post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm actually translating 3390 on the outside to 3389 on the inside.&lt;/P&gt;&lt;P&gt;So would I only need to change:&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 3390 3389&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;access-list outside_acl permit tcp any object STATIC-PAT-TCP3389 eq 3390&lt;/P&gt;&lt;P&gt;Correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seeing this makes me wonder if I'll need to change all of my acl's, but I'm going to try it with what I have first.&lt;/P&gt;&lt;P&gt;Thanks a bunch.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 21:23:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191167#M360413</guid>
      <dc:creator>andyoww</dc:creator>
      <dc:date>2013-03-11T21:23:02Z</dc:date>
    </item>
    <item>
      <title>Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191168#M360415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the NAT configuration line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network &lt;NAME&gt;&lt;/NAME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host &lt;REAL ip=""&gt;&lt;/REAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; nat (inside,outside) static interface service tcp/udp &lt;REAL port=""&gt; &lt;MAPPED port=""&gt;&lt;/MAPPED&gt;&lt;/REAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the ACL you use the &lt;STRONG&gt;&lt;REAL port=""&gt;&lt;/REAL&gt;&lt;/STRONG&gt; value in the same way that you know use the &lt;STRONG&gt;&lt;REAL ip=""&gt;&lt;/REAL&gt;&lt;/STRONG&gt; of the host also and NOT the NAT IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 21:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191168#M360415</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-11T21:30:25Z</dc:date>
    </item>
    <item>
      <title>Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191169#M360417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh and the NAT0 configuration,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Old Format&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;New Format&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LOCAL-LAN&lt;/P&gt;&lt;P&gt; subnet 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group REMOTE-NETWORKS&lt;/P&gt;&lt;P&gt; network-object 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LOCAL-LAN LOCAL-LAN destination static REMOTE-NETWORKS REMOTE-NETWORKS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you actually have some more networks on the "inside"&amp;nbsp; (other than 192.168.3.0/24) which warrant the use of "any" on the one ACL line above then you would probably need other configuration line for the NAT and/or tweaking to the above rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 21:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191169#M360417</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-11T21:37:24Z</dc:date>
    </item>
    <item>
      <title>Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191170#M360418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network &lt;NAME&gt;&lt;/NAME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group &lt;NAME&gt;&lt;/NAME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;&lt;NAME&gt;&lt;/NAME&gt;&lt;/STRONG&gt; section is anything I want to choose?&lt;/P&gt;&lt;P&gt;Of course, I would always make sure this is half-way descriptive for easier troubleshooting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 21:41:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191170#M360418</guid>
      <dc:creator>andyoww</dc:creator>
      <dc:date>2013-03-11T21:41:55Z</dc:date>
    </item>
    <item>
      <title>Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191171#M360419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, the name can be what you choose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you can use a command later to rename the object "on the fly" so to speak. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"object network OBJECT rename NEW-OBJECT"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate the replys/posts if you have found the information helpfull. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 21:46:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191171#M360419</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-11T21:46:14Z</dc:date>
    </item>
    <item>
      <title>Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191172#M360420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One correction from above.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network STATIC-PAT-UDP-5008&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I took out the dash between UDP and 5008 for standardization. (It caused an error when trying to call it later in the ACL.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great stuff.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I put these changes in my config &amp;amp; the ASA went in with one little problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.3.0 is the LAN behind this ASA.&lt;/P&gt;&lt;P&gt;192.168.10.0 is the LAN behind a remote ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the 192.168.3.0 LAN and ASA, I am able to ping anything on the 192.168.10.0 network.&amp;nbsp; That's GOOD.&lt;/P&gt;&lt;P&gt;From the 192.168.10.0 LAN and ASA, I am UNABLE to ping anything on the 192.168.3.0 network.&amp;nbsp; That's BAD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I realize I left a ton of my configuration off of here, but any ideas what might be causing this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only applied ACL's I see in my old config are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside) 0 access-list nonat&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group outside_acl in interface outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yet I have quite a few lines for four other ACL's:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list Local_LAN_Access remark VPN Client Local LAN Access&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list Local_LAN_Access standard permit host 0.0.0.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list vpn_split_tunnel standard permit 192.168.3.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside_nat0_outbound extended permit ip interface inside 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 192.168.60.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_1_cryptomap extended permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_1_cryptomap extended permit ip 192.168.3.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Not realizing they were not being applied, I copy &amp;amp; pasted them to the new ASA.&lt;/P&gt;&lt;P&gt;If they are not being applied, it wouldn't really matter how many lines are actually there though, right?&lt;/P&gt;&lt;P&gt;The ASA isn't actually using them, correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 22:29:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191172#M360420</guid>
      <dc:creator>andyoww</dc:creator>
      <dc:date>2013-03-13T22:29:44Z</dc:date>
    </item>
    <item>
      <title>Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191173#M360421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without seing complete configurations I could only guess.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the names of the ACLs the 2 first would be related to VPN Client configurations which are usually attached under "group-policy" configurations. Third ACL seems to be a NAT0 ACL but is nothing like the one discussed above. The last ACL seems to be a ACL to define traffic/networks for a L2L VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess unused ACLs in this case dont really matter but I prefer to remove unused ACLs so they dont cause unnecesary confusion and clutter up the configuration otherwise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; - Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 08:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191173#M360421</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-14T08:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191174#M360422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;UPDATED (I posted the wrong one earlier)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll post the entire config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Makes me so angry when I go through these &amp;amp; find commands &amp;amp; such that should not be there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;hostname ASANAME&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;domain-name DOMAINNAME&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;enable password PASSWORD encrypted&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;passwd PASSWORD encrypted&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;names&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dns-guard&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet0/0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address IPADDRESS 255.255.255.252&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet0/1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif inside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 100&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address 192.168.3.1 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet0/2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif wireless&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 100&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address 192.168.60.1 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet0/3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no nameif&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no security-level&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet0/4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no nameif&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no security-level&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface GigabitEthernet0/5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no nameif&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no security-level&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Management0/0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif management&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 100&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address 192.168.1.1 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;management-only&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;boot system disk0:/asa861-2-smp-k8.bin&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ftp mode passive&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;clock timezone cst -6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;clock summer-time cst recurring&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dns domain-lookup inside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dns server-group DefaultDNS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;name-server 192.168.3.115&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;domain-name DOMAINNAME&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;same-security-traffic permit inter-interface&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network STATIC-PAT-TCP80&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;host 192.168.3.114&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network STATIC-PAT-UDP5008&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;host 192.168.3.117&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network STATIC-PAT-TCP3389&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;host 192.168.3.101&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network STATIC-PAT-TCP1720&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;host 192.168.3.118&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network LOCAL-LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;subnet 192.168.3.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object-group network INSIDE-PAT-SOURCE&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;network-object 192.168.3.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object-group network REMOTE-NETWORKS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;network-object 192.168.5.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;network-object 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;network-object 192.168.50.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit tcp any object STATIC-PAT-TCP80 eq www&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit tcp any object STATIC-PAT-UDP5008 eq 5008&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit tcp any object STATIC-PAT-TCP3389 eq 3389&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit tcp any object STATIC-PAT-TCP1720 eq h323&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit udp any host 192.168.3.117 eq 5008&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit tcp any host 192.168.3.114 eq www&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit udp any host 192.168.3.115 eq ntp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended deny ip host DENIEDIP any&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended deny tcp any any eq 161&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended deny udp any any eq snmp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended deny tcp any any eq telnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit ip any any&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit tcp any interface outside eq 3390&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit tcp any interface outside eq h323&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit udp any host 192.168.3.118 eq 1718&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit udp any host 192.168.3.118 eq 1719&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit udp any host 192.168.3.118 eq 1720&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit icmp host 192.168.3.118 any&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_acl extended permit ip host 192.168.3.118 any&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list Local_LAN_Access remark VPN Client Local LAN Access&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list Local_LAN_Access standard permit host 0.0.0.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.50.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list nonat extended permit ip any 192.168.50.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list nonat extended permit ip 192.168.3.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list vpn_split_tunnel standard permit 192.168.3.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_nat0_outbound extended permit ip interface inside 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 192.168.60.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_nat0_outbound extended permit ip 192.168.12.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_1_cryptomap extended permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_1_cryptomap extended permit ip 192.168.3.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;pager lines 24&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging console emergencies&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging trap notifications&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging asdm informational&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging host inside 192.168.3.116&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu outside 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu inside 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu wireless 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu management 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;asdm image disk0:/asdm-507.bin&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no asdm history enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;arp timeout 14400&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (inside,outside) source static LOCAL-LAN LOCAL-LAN destination static REMOTE-NETWORKS REMOTE-NETWORKS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network STATIC-PAT-TCP80&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (inside,outside) static interface service tcp www www&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network STATIC-PAT-UDP5008&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (inside,outside) static interface service udp 5008 5008&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network STATIC-PAT-TCP3389&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (inside,outside) static interface service tcp 3389 3390&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network STATIC-PAT-TCP1720&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (inside,outside) static interface service tcp h323 h323&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (inside,outside) after-auto source dynamic INSIDE-PAT-SOURCE interface&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (inside,wireless) after-auto source dynamic INSIDE-PAT-SOURCE interface&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group outside_acl in interface outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route wireless 192.168.10.0 255.255.255.0 192.168.60.6 1 track 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route wireless 192.168.5.0 255.255.255.0 192.168.60.6 1 track 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route outside 0.0.0.0 0.0.0.0 NEXTHOPIP 254&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route inside 10.113.255.210 255.255.255.255 192.168.3.200 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route inside 10.113.255.212 255.255.255.255 192.168.3.200 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route inside 10.113.255.231 255.255.255.255 192.168.3.200 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route inside 10.113.255.250 255.255.255.255 192.168.3.200 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route outside 192.168.10.0 255.255.255.0 NEXTHOPIP 10&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout xlate 3:00:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout sunrpc 0:10:00 h323 2:35:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout floating-conn 0:00:30&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;user-identity default-domain LOCAL&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nac-policy DfltGrpPolicy-nac-framework-create nac-framework&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;reval-period 36000&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sq-period 300&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http server enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http 192.168.1.0 255.255.255.0 management&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http 192.168.3.0 255.255.255.0 inside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http 192.168.10.105 255.255.255.255 wireless&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http 192.168.10.106 255.255.255.255 wireless&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http 192.168.10.109 255.255.255.255 wireless&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no snmp-server location&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no snmp-server contact&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sla monitor 123&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;type echo protocol ipIcmpEcho 192.168.60.6 interface wireless&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;num-packets 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;frequency 10&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sla monitor schedule 123 life forever start-time now&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto ipsec ikev1 transform-set MYSET esp-3des esp-md5-hmac&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto dynamic-map MYMAP 10 set ikev1 transform-set MYSET&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto dynamic-map MYMAP 10 set reverse-route&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto map outside_map 1 set peer VPNPEERIP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto map outside_map 1 set ikev1 transform-set ESP-3DES-MD5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto map outside_map 65535 ipsec-isakmp dynamic MYMAP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto map outside_map interface outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto isakmp identity hostname&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto isakmp nat-traversal 30&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto ikev1 enable outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto ikev1 policy 10&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;authentication pre-share&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;encryption 3des&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;hash md5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;group 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;lifetime 86400&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto ikev1 policy 65535&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;authentication pre-share&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;encryption 3des&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;hash sha&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;group 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;lifetime 86400&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;track 1 rtr 123 reachability&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;telnet timeout 5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh scopy enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh SOMEBODY'SIP 255.255.255.255 outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh SOMEBODY'SIP 255.255.255.240 outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh 192.168.3.0 255.255.255.0 inside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh timeout 50&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;console timeout 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;management-access inside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dhcpd enable management&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;threat-detection basic-threat&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;threat-detection statistics access-list&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no threat-detection statistics tcp-intercept&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ntp server 129.6.15.29 source outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ntp server 129.6.15.28 source outside prefer&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssl encryption des-sha1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;webvpn&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;group-policy DfltGrpPolicy attributes&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dns-server value 192.168.3.115&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vpn-simultaneous-logins 18&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vpn-idle-timeout 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vpn-tunnel-protocol ikev1 ssl-clientless&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;password-storage enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip-comp enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ipsec-udp enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;default-domain value DOMAINNAME&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;user-authentication enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nac-settings value DfltGrpPolicy-nac-framework-create&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;webvpn&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; anyconnect ssl keepalive none&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; anyconnect dpd-interval client none&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; anyconnect dpd-interval gateway none&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; anyconnect ssl compression deflate&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; customization value DfltCustomization&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;group-policy MYPOLICY internal&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;group-policy MYPOLICY attributes&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vpn-idle-timeout none&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vpn-session-timeout none&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;split-tunnel-policy tunnelspecified&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;split-tunnel-network-list value vpn_split_tunnel&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;default-domain value DOMAINNAME&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;username USER1 password PASSWORD encrypted&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;username USER1 attributes&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vpn-group-policy MYPOLICY&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vpn-framed-ip-address 192.168.50.2 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;--------------SNIP FOR USER ACCOUNTS----------------&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;----------------------UNSNIP------------------------&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;tunnel-group MYVPN type remote-access&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;tunnel-group MYVPN ipsec-attributes&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ikev1 pre-shared-key MYKEY&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;tunnel-group SOMEBODY'SIP type ipsec-l2l&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;tunnel-group SOMEBODY'SIP ipsec-attributes&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ikev1 pre-shared-key MYKEY&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class-map class_ftp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;match port tcp eq ftp-data&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class-map inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;match default-inspection-traffic&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class-map TELNET-PORT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;match port tcp eq telnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map type inspect dns preset_dns_map&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;parameters&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; message-length maximum client auto&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; message-length maximum 512&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map type inspect dns migrated_dns_map_1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;parameters&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; message-length maximum 512&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect ftp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect h323 h225&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect h323 ras&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect rsh&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect rtsp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect esmtp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect sqlnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect skinny&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect sunrpc&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect xdmcp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect sip&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect netbios&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect tftp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect ip-options&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect pptp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect icmp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class class_ftp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect ftp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class TELNET-PORT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; set connection timeout idle 10:00:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;service-policy global_policy global&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;prompt hostname context&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no call-home reporting anonymous&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 15:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191174#M360422</guid>
      <dc:creator>andyoww</dc:creator>
      <dc:date>2013-03-14T15:03:07Z</dc:date>
    </item>
    <item>
      <title>Command Changes From 7.2 To 8.6</title>
      <link>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191175#M360423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was able to get TAC to help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what we (he) changed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside,wireless) after-auto source dynamic INSIDE-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,wireless) source static LOCAL-LAN LOCAL-LAN destination static REMOTE-NETWORKS REMOTE-NETWORKS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is working fine now!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Mar 2013 18:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/command-changes-from-7-2-to-8-6/m-p/2191175#M360423</guid>
      <dc:creator>andyoww</dc:creator>
      <dc:date>2013-03-18T18:40:13Z</dc:date>
    </item>
  </channel>
</rss>

