<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT Configuration on ASA 9.1(1) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113925#M392333</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would recomend the following format for NAT configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Default PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; network-object &lt;SOURCE network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/SOURCE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Static NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network WWW&lt;/P&gt;&lt;P&gt; host 192.168.207.15 &lt;/P&gt;&lt;P&gt; nat (inside,outside) static 71.x.x.51&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any4 object WWW eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see you have some "global" ACLs configured. I would recomend using 1 ACL per interface instead of global. OR only using global ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the above should handle your needs. "outside_access_in" ACL name can naturally be something else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you have an ACL permitting the "www" traffic from Internet to the server? Or was there some other problems?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 Jan 2013 00:46:08 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-01-23T00:46:08Z</dc:date>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113924#M392332</link>
      <description>&lt;P&gt;I recently installed an ASA firewall for one of our customer. I am trying to map the web server’s private address to the public address:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The private address is 192.168.207.15 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The public address is 71.x.x.51&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the NAT configuration. For some reason this configuration is not working. I am not sure what is wrong with this configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside-out&lt;/P&gt;&lt;P&gt; nat (any,outside) static interface&lt;/P&gt;&lt;P&gt;object network new-www&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 71.x.x.51&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE: Inside network users can access Internet just fine. But I just cannot get natting to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ds&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:51:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113924#M392332</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2019-03-12T00:51:00Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113925#M392333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would recomend the following format for NAT configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Default PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; network-object &lt;SOURCE network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/SOURCE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Static NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network WWW&lt;/P&gt;&lt;P&gt; host 192.168.207.15 &lt;/P&gt;&lt;P&gt; nat (inside,outside) static 71.x.x.51&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any4 object WWW eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see you have some "global" ACLs configured. I would recomend using 1 ACL per interface instead of global. OR only using global ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the above should handle your needs. "outside_access_in" ACL name can naturally be something else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you have an ACL permitting the "www" traffic from Internet to the server? Or was there some other problems?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 00:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113925#M392333</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-23T00:46:08Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113926#M392334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. I do have ACL permitting the www traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list global_access extended permit icmp any object new-www &lt;/P&gt;&lt;P&gt;access-list global_access extended permit tcp any object new-www eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 00:53:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113926#M392334</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2013-01-23T00:53:53Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113927#M392335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm just wondering why you seem to have an ACL attached to an interface but also a "global" attached ACL that controls traffic through all interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I havent used 9.x software myself yet so I'm wondering what the ACL format is regarding "any". I remember seeing "any4" and "any6". It would seem "any" still exists there still?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To test the actual firewall rules, could you use the "packet-tracer" command to simulate someone connecting to the Web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp &lt;RANDOM source="" ip=""&gt; &lt;RANDOM source="" port=""&gt; 71.x.x.51 80&lt;/RANDOM&gt;&lt;/RANDOM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then copy/paste the output here to see what would happen to connection with the above information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 01:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113927#M392335</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-23T01:39:45Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113928#M392336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni. I'll try the packet-tracer today and let you know the output. I am also going to remove the global ACL and try the other ACL you recommended. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My hunch is most likely removing the global ACL and putting the other ACL you recommended should resolve the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 15:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113928#M392336</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2013-01-23T15:20:03Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113929#M392337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe I have the correct ACLs and the NAT rule but still it is not working. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit object-group DM_INLINE_PROTOCOL_1 object inside-network object-group DM_INLINE_NETWORK_3 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list XXXX-Systems-Subnet standard permit 192.168.207.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any4 object www-out eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static inside-network inside-network&amp;nbsp; destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp&amp;nbsp; route-lookup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside-out&lt;/P&gt;&lt;P&gt; nat (any,outside) static interface&lt;/P&gt;&lt;P&gt;object network www-out&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 71.x.x.51&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output of packet-tracker:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 157.166.249.10 4444 71.x.x.51 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 21:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113929#M392337</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2013-01-24T21:09:36Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113930#M392338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you show your "inside" and "outside" interface configurations?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 22:23:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113930#M392338</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-24T22:23:45Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113931#M392339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA Version 9.1(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname as-ciscoasa-5515&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; description Outside Interface of new firewall&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 71.x.x.50 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; description inside interface of new firewall&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.207.254 255.255.255.0 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 22:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113931#M392339</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2013-01-24T22:26:38Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113932#M392340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just changed my own ASA to software 9.1(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured a simply Static NAT and made the ACL and then did the packet-tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And everything seems to be working ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know why its showing the above result in the packet-tracer for you. I imagine there must be some configuration preventing this from working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case I see "UN-NAT" phase at the start.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 22:42:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113932#M392340</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-24T22:42:40Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113933#M392341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We do have a site to site vpn with our business partner. But that is working fine.Here is configuration for your review. Let me know if I am missing anything:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as-ciscoasa-5515# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.1(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname as-ciscoasa-5515&lt;/P&gt;&lt;P&gt;domain-name *****************.com&lt;/P&gt;&lt;P&gt;enable password IwcadQrUfCKovNfC encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;ip local pool VPN-DHCP-Pool 192.168.206.10-192.168.206.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; description Outside Interface of new firewall&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 71.x.x.50 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; description inside interface of new firewall&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.207.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; description DMZ interface for Web &amp;amp; Ftp server&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description Out of Band Management Interface&lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;time-range 24x7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner login *********************************************************&lt;/P&gt;&lt;P&gt;banner login&amp;nbsp; THIS SYSTEM IS FOR ***************** SYSTEMS INC. USE ONLY !!!!! &lt;/P&gt;&lt;P&gt;banner login&amp;nbsp; Unauthorized access to and/or use of this computer system&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;banner login&amp;nbsp; is violation of law and is punishable under provisions of&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;banner login&amp;nbsp; applicable statutes.&amp;nbsp; Use of this system constitutes consent&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;banner login to security testing and monitoring.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;banner login *********************************************************&lt;/P&gt;&lt;P&gt;banner asdm *********************************************************&lt;/P&gt;&lt;P&gt;banner asdm&amp;nbsp; THIS SYSTEM IS FOR ***************** SYSTEMS INC. USE ONLY !!!!! &lt;/P&gt;&lt;P&gt;banner asdm&amp;nbsp; Unauthorized access to and/or use of this computer system&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;banner asdm&amp;nbsp; is violation of law and is punishable under provisions of&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;banner asdm&amp;nbsp; applicable statutes.&amp;nbsp; Use of this system constitutes consent&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;banner asdm to security testing and monitoring.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;banner asdm *********************************************************&lt;/P&gt;&lt;P&gt;boot system disk0:/asa911-smp-k8.bin&lt;/P&gt;&lt;P&gt;boot system disk0:/asa861-smp-k8.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 68.115.71.53&lt;/P&gt;&lt;P&gt; name-server 24.196.64.53&lt;/P&gt;&lt;P&gt; domain-name *****************.com&lt;/P&gt;&lt;P&gt;object network dotsubnet218&lt;/P&gt;&lt;P&gt; subnet 10.147.218.0 255.255.254.0&lt;/P&gt;&lt;P&gt;object network dotsubnet4&lt;/P&gt;&lt;P&gt; subnet 10.147.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network dotsubnet50&lt;/P&gt;&lt;P&gt; subnet 10.147.50.0 255.255.254.0&lt;/P&gt;&lt;P&gt;object network dotsubnet7&lt;/P&gt;&lt;P&gt; subnet 10.147.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network dotsubnet90&lt;/P&gt;&lt;P&gt; subnet 10.147.90.0 255.255.254.0&lt;/P&gt;&lt;P&gt;object network inside-network&lt;/P&gt;&lt;P&gt; subnet 192.168.207.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description inside network&lt;/P&gt;&lt;P&gt;object network inside-out&lt;/P&gt;&lt;P&gt; subnet 192.168.207.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network oraop01&lt;/P&gt;&lt;P&gt; host 10.147.90.56&lt;/P&gt;&lt;P&gt;object service www&lt;/P&gt;&lt;P&gt; service tcp source eq www destination eq www &lt;/P&gt;&lt;P&gt;object network webserver&lt;/P&gt;&lt;P&gt; host 71.13.8.51&lt;/P&gt;&lt;P&gt; description Web Server IP Address (Inside)&lt;/P&gt;&lt;P&gt;object network new-www&lt;/P&gt;&lt;P&gt; host 192.168.207.235&lt;/P&gt;&lt;P&gt;object network www1&lt;/P&gt;&lt;P&gt; host 192.168.207.92&lt;/P&gt;&lt;P&gt; description www Server&lt;/P&gt;&lt;P&gt;object network www11&lt;/P&gt;&lt;P&gt; host 192.168.207.92&lt;/P&gt;&lt;P&gt;object network 192.168.207.15&lt;/P&gt;&lt;P&gt; host 192.168.207.15&lt;/P&gt;&lt;P&gt;object network www2&lt;/P&gt;&lt;P&gt; host 192.168.207.15&lt;/P&gt;&lt;P&gt;object network 192.168.207.16&lt;/P&gt;&lt;P&gt; host 192.168.207.16&lt;/P&gt;&lt;P&gt;object network 192.168.207.15-new&lt;/P&gt;&lt;P&gt; host 192.168.207.15&lt;/P&gt;&lt;P&gt;object network 5515-new-web&lt;/P&gt;&lt;P&gt; host 192.168.207.15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network www-out&lt;/P&gt;&lt;P&gt; host 192.168.207.15&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object object dotsubnet7&lt;/P&gt;&lt;P&gt; network-object object dotsubnet90&lt;/P&gt;&lt;P&gt; network-object object dotsubnet4&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object object dotsubnet4&lt;/P&gt;&lt;P&gt; network-object object dotsubnet7&lt;/P&gt;&lt;P&gt; network-object object dotsubnet90&lt;/P&gt;&lt;P&gt; network-object object oraop01&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_3&lt;/P&gt;&lt;P&gt; network-object object dotsubnet4&lt;/P&gt;&lt;P&gt; network-object object dotsubnet7&lt;/P&gt;&lt;P&gt; network-object object dotsubnet90&lt;/P&gt;&lt;P&gt; network-object object oraop01&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit object-group DM_INLINE_PROTOCOL_1 object inside-network object-group DM_INLINE_NETWORK_3 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list *****************-Systems-Subnet remark Allow Access to ***************** Network&lt;/P&gt;&lt;P&gt;access-list *****************-Systems-Subnet standard permit 192.168.207.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any4 object www-out eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1400&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit 10.147.0.0 255.255.0.0 outside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-711-52.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static inside-network inside-network destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network inside-out&lt;/P&gt;&lt;P&gt; nat (any,outside) static interface&lt;/P&gt;&lt;P&gt;object network www-out&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 71.13.8.51&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 71.13.8.49 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:12:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http server idle-timeout 60&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.207.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 69.130.253.199 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;sysopt connection tcpmss 1350&lt;/P&gt;&lt;P&gt;sysopt connection preserve-vpn-flows&lt;/P&gt;&lt;P&gt;sysopt noproxyarp outside&lt;/P&gt;&lt;P&gt;sysopt noproxyarp inside&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ipsec df-bit clear-df outside&lt;/P&gt;&lt;P&gt;crypto ipsec df-bit clear-df inside&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer 10.147.34.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set ikev1 transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set security-association lifetime seconds 43200&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set nat-t-disable&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime none&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 69.130.253.199 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh 192.168.207.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.207.21-192.168.207.200 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.207.18 68.115.71.53 interface inside&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750 interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd domain *****************.com interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ssl encryption rc4-md5&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; csd image disk0:/csd_3.5.2008-k9.pkg&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-linux-2.5.2014-k9.pkg 2&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 3&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_10.147.34.2 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_10.147.34.2 attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt;group-policy GroupPolicy1 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy1 attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt;group-policy RemoteAccessVPN-*****************-Inc-Group-Policy internal&lt;/P&gt;&lt;P&gt;group-policy RemoteAccessVPN-*****************-Inc-Group-Policy attributes&lt;/P&gt;&lt;P&gt; banner value *********************************************************&lt;/P&gt;&lt;P&gt; banner value THIS SYSTEM IS FOR ***************** SYSTEMS INC. USE ONLY !!!!!&lt;/P&gt;&lt;P&gt; banner value Unauthorized access to and/or use of this computer system&lt;/P&gt;&lt;P&gt; banner value is violation of law and is punishable under provisions of&lt;/P&gt;&lt;P&gt;banner value applicable statutes.&amp;nbsp; Use of this system constitutes consent&lt;/P&gt;&lt;P&gt; banner value to security testing and monitoring.&lt;/P&gt;&lt;P&gt; banner value *********************************************************&lt;/P&gt;&lt;P&gt; dns-server value 192.168.207.235&lt;/P&gt;&lt;P&gt; vpn-access-hours value 24x7&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-idle-timeout none&lt;/P&gt;&lt;P&gt; vpn-session-timeout none&lt;/P&gt;&lt;P&gt; vpn-filter value *****************-Systems-Subnet&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; password-storage enable&lt;/P&gt;&lt;P&gt; ip-comp enable&lt;/P&gt;&lt;P&gt; re-xauth enable&lt;/P&gt;&lt;P&gt; group-lock value RemoteAccessVPN-*****************-Inc&lt;/P&gt;&lt;P&gt; pfs enable&lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; default-domain value *****************.com&lt;/P&gt;&lt;P&gt;username milind password ASZJyNjPKDhBt550 encrypted&lt;/P&gt;&lt;P&gt;username milind attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccessVPN-*****************-Inc-Group-Policy&lt;/P&gt;&lt;P&gt; group-lock value RemoteAccessVPN-*****************-Inc&lt;/P&gt;&lt;P&gt;username admin password xybduiDZ39uOf5jx encrypted privilege 15&lt;/P&gt;&lt;P&gt;username garyl password iS0J9AX.XdOV.UtO encrypted&lt;/P&gt;&lt;P&gt;username garyl attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccessVPN-*****************-Inc-Group-Policy&lt;/P&gt;&lt;P&gt; group-lock value RemoteAccessVPN-*****************-Inc&lt;/P&gt;&lt;P&gt;username dshah password QFCzXoiTw/uLllIy encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group 10.147.34.2 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 10.147.34.2 general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_10.147.34.2&lt;/P&gt;&lt;P&gt;tunnel-group 10.147.34.2 ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccessVPN-*****************-Inc type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccessVPN-*****************-Inc general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-DHCP-Pool&lt;/P&gt;&lt;P&gt; default-group-policy RemoteAccessVPN-*****************-Inc-Group-Policy&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccessVPN-*****************-Inc ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 13&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 13&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:aeb9b9074cc624acdb9f2b996ae1198c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as-ciscoasa-5515#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as-ciscoasa-5515# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as-ciscoasa-5515# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as-ciscoasa-5515# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as-ciscoasa-5515# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as-ciscoasa-5515# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as-ciscoasa-5515# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Logoff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 23:07:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113933#M392341</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2013-01-24T23:07:32Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113934#M392342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing that caught my eye on a fast scroll through the configuration was this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sysopt noproxyarp outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the above command might prevent the ASA from responding to ARP requests related to the configuration Static NAT public IP address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This NAT configuration also seems wierd to me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network inside-out&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (any,outside) static interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the above is meant to be the Default NAT rule for Internet traffic I would change it to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 23:14:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113934#M392342</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-24T23:14:56Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113935#M392343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it might be : &lt;/P&gt;&lt;P&gt;sysopt noproxyarp outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was troublshooting application performance for site to site VPN. I might have enabled that command. Things did not break until we rebooted the ISP modem. It all makes sense now because the ISP was also saying that the arp is incomplete for the web server IP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try disabling the command and see if that fixes the problem. This time I am quite positive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 23:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113935#M392343</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2013-01-24T23:31:29Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113936#M392344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you get this working? Did the changing of the "proxyarp" setting help at all?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 15:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113936#M392344</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-25T15:27:36Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113937#M392345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not tried yet. I will try that later in the afternoon. I will let you know right away. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 16:56:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113937#M392345</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2013-01-25T16:56:01Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration on ASA 9.1(1)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113938#M392346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That was it Jouni. As soon as I added "no sysopt noproxyarp outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The web site started working from outside world.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 19:15:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-1/m-p/2113938#M392346</guid>
      <dc:creator>dharmendra2shah</dc:creator>
      <dc:date>2013-01-25T19:15:23Z</dc:date>
    </item>
  </channel>
</rss>

