<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Still Learning ASA and need help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088983#M392565</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni,&lt;/P&gt;&lt;P&gt;That worked great! and I was able to do the VPN as well. I will post the config in a while for others to compare. Thanks for you help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 20 Jan 2013 15:59:26 GMT</pubDate>
    <dc:creator>burleyman</dc:creator>
    <dc:date>2013-01-20T15:59:26Z</dc:date>
    <item>
      <title>Still Learning ASA and need help</title>
      <link>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088979#M392546</link>
      <description>&lt;P&gt;&amp;nbsp; I am working on an ASA upgrade and am spinning my wheels. I need to convert a config that was running asa825-k8.bin and is now running&amp;nbsp; asa911-k8.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config that needs to be converted. Most everything comes over fine I am having issues with the NAT, VPN and ACL's and it does not help I have not done a lot with them and I did not do the original config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Treat the 172.30.1.0 and 200.200.0.0 addresses as Public&amp;nbsp; and the 10.160.0.0 as private.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;BR /&gt;hostname MYD-asa5505&lt;BR /&gt;domain-name MYDomain.dom&lt;BR /&gt;enable password xxxxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxxxxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.160.0.16 MYD-fs02&lt;BR /&gt;name 172.30.1.98 remote.MYDomain.com&lt;BR /&gt;name 172.30.1.99 mail.MYDomain.com&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;switchport trunk native vlan 1&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.160.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address remote.MYDomain.com 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.160.10.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa825-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 10.160.0.10&lt;BR /&gt;domain-name MYD.dom&lt;BR /&gt;access-list outside_access_in extended permit tcp 200.200.0.0 255.255.240.0 host mail.MYDomain.com eq smtp &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.160.0.0 255.255.255.0 192.168.44.0 255.255.255.0 &lt;BR /&gt;access-list MYD-internal standard permit 10.160.0.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool VPNPOOL 192.168.44.1-192.168.44.100 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-647.bin&lt;BR /&gt;asdm location 10.160.0.10 255.255.255.255 inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) mail.MYDomain.com MYD-fs02 netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 172.30.1.97 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 10.160.0.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.44.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca xxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;&amp;lt;Output Omitted&amp;gt;&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;no vpn-addr-assign dhcp&lt;BR /&gt;telnet timeout 45&lt;BR /&gt;ssh 10.160.0.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.44.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;svc image disk0:/anyconnect-win-2.5.3055-k9.pkg 2&lt;BR /&gt;svc image disk0:/anyconnect-macosx-i386-2.5.3055-k9.pkg 3 regex "Intel Mac OS X"&lt;BR /&gt;svc image disk0:/anyconnect-macosx-powerpc-2.5.3055-k9.pkg 4 regex "PPC Mac OS X"&lt;BR /&gt;svc enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;dns-server value 10.160.0.16&lt;BR /&gt;vpn-tunnel-protocol IPSec svc webvpn&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value MYD-internal&lt;BR /&gt;default-domain value MYD.dom&lt;BR /&gt;address-pools value MYD-ssl-ip-pool&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 10.160.0.16&lt;BR /&gt;vpn-tunnel-protocol svc &lt;BR /&gt;default-domain value MYD.dom&lt;BR /&gt;username xxxxxxx password xxxxxxxxxxxxxx encrypted&lt;BR /&gt;username xxxxxxx password xxxxxxxxxxxxxx encrypted&lt;BR /&gt;username xxxxxxx password xxxxxxxxxxxxxx encrypted&lt;BR /&gt;username xxxxxxx password xxxxxxxxxxxxxx encrypted&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt;address-pool VPNPOOL&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup webvpn-attributes&lt;BR /&gt;group-alias REMOTE enable&lt;BR /&gt;group-alias remote_local disable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:49:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088979#M392546</guid>
      <dc:creator>burleyman</dc:creator>
      <dc:date>2019-03-12T00:49:06Z</dc:date>
    </item>
    <item>
      <title>Still Learning ASA and need help</title>
      <link>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088980#M392552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT config is change in 8.3 or above version..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please use the change the configuration of Object NAT as per 9.1 surely it will work for you..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Saurabh Goel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 07:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088980#M392552</guid>
      <dc:creator>saurabhgoel169</dc:creator>
      <dc:date>2013-01-19T07:33:15Z</dc:date>
    </item>
    <item>
      <title>Re: Still Learning ASA and need help</title>
      <link>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088981#M392557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your NAT configuration would be something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Basic PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; network-object 10.160.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Single Static + ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network STATIC&lt;/P&gt;&lt;P&gt; host 10.160.0.16&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 172.30.1.99 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 200.200.0.0 255.255.240.0 object STATIC eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT0 / NAT Exempt&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LAN&lt;/P&gt;&lt;P&gt; subnet 10.160.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network VPN-POOL&lt;/P&gt;&lt;P&gt; subnet 192.168.44.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN LAN destination static VPN-POOL VPN-POOL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the VPN. It seems you only probably use AnyConnect SSL VPN so you might not need to change that much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The setting that defines which type of VPN is used has changed in the newer versions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no more &lt;STRONG&gt;vpn-tunnel-protocol svc &lt;/STRONG&gt;or&lt;STRONG&gt; webvpn&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is now&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ssl-client&lt;/LI&gt;&lt;LI&gt;ssl-clientless&lt;/LI&gt;&lt;LI&gt;ikev1&lt;/LI&gt;&lt;LI&gt;ikve2&lt;/LI&gt;&lt;LI&gt;l2tp-ipsec&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let us know specifically what else is not working&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully the above was helpfull &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 09:24:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088981#M392557</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-19T09:24:27Z</dc:date>
    </item>
    <item>
      <title>Still Learning ASA and need help</title>
      <link>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088982#M392563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wow thank you very much. I am working on this now and will let you know how this works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 14:06:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088982#M392563</guid>
      <dc:creator>burleyman</dc:creator>
      <dc:date>2013-01-19T14:06:47Z</dc:date>
    </item>
    <item>
      <title>Still Learning ASA and need help</title>
      <link>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088983#M392565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni,&lt;/P&gt;&lt;P&gt;That worked great! and I was able to do the VPN as well. I will post the config in a while for others to compare. Thanks for you help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 15:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/still-learning-asa-and-need-help/m-p/2088983#M392565</guid>
      <dc:creator>burleyman</dc:creator>
      <dc:date>2013-01-20T15:59:26Z</dc:date>
    </item>
  </channel>
</rss>

