<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ask the Expert: Troubleshooting Adaptive Security Appliances (AS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112803#M392937</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried my best to attend the Webcast but i was not................I send mail regarding my problem but it was not solved???? dont know why i was not able to attend...????&lt;/P&gt;&lt;P&gt;Just i would like to know is about the IPS......support on through ASA.......&lt;/P&gt;&lt;P&gt;Do we have this option ??? or we need to go for other vendor.........If i am going for ASA as my firewall........Then why dont i have the option for IPS service????? &lt;/P&gt;&lt;P&gt;If i didn't knew that we do have those support please describe me on very simple words.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;P&gt;Milan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Jan 2013 05:44:24 GMT</pubDate>
    <dc:creator>Milan Rai</dc:creator>
    <dc:date>2013-01-16T05:44:24Z</dc:date>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (ASA), Private Internet Exchange (PIX) and Firewall Service Modules (FWSM)</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112796#M392930</link>
      <description>&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/8/9/9/5998-kusankar.jpg" align="left" alt="Kureli Sankar" border="0" hspace="10" style="padding-right: 10px; padding-bottom: 5px;" width="90" /&gt;&lt;STRONG&gt;With Kureli Sankar&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask any questions about adaptive security appliances (ASAs), Private Internet Exchange (PIX), and firewall services modules (FWSMs) with Cisco Expert Kureli Sankar. This is a continuation of the live Webcast.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left; margin-left: 0.5in;"&gt;Kureli Sankar is an engineer supporting Cisco's firewall team in Research Triangle Park, North Carolina. Her team supports the Cisco ASA, FWSM, Cisco Security Manager, the Content Security and Control module, and the zone-based firewall module in Cisco IOS Software. Prior to joining Cisco, Sankar worked for the John Morrell Co., where she was the network administrator in charge of the company's enterprise network covering 27 locations in the United States. She also was an adjunct professor at the University of Cincinnati, teaching undergraduate-level networking courses. Sankar holds a degree in electrical and electronic engineering from Regional Engineering College, Trichirappalli, India, and holds CCSP and CCIE Security (#35505) certification.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to use the rating system to let Kureli know if you have received an adequate response.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kureli might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Security sub-community &lt;A __default_attr="2024" __jive_macro_name="community" _modifiedtitle="Firewalling" class="jive_macro jive_macro_community" modifiedtitle="Firewalling" title="Firewalling" target="_blank"&gt;&lt;/A&gt; discussion forum shortly after the event.&amp;nbsp; &lt;STRONG&gt;This event lasts through January 25, 2013.&lt;/STRONG&gt; Visit this forum often to view responses to your questions and the questions of other community members. &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Webcast related links:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://community.cisco.com/document/123156/troubleshooting-adaptive-security-appliances-asa-private-internet-exchange-pix-and" target="_blank"&gt;Slides&lt;/A&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://community.cisco.com/document/124531/troubleshooting-adaptive-security-appliances-asa-private-internet-exchange-pix-and" target="_blank"&gt;FAQ&lt;/A&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/videos/5258" rel="nofollow" target="_blank"&gt;Video Recording&lt;/A&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt; &lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:46:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112796#M392930</guid>
      <dc:creator>ciscomoderator</dc:creator>
      <dc:date>2019-03-12T00:46:49Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112797#M392931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I posted this problem some time ago and though if you would have any additional ideas as to whats causing this problem then any advice would be welcome&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres my original post with a lot of information&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2158473"&gt;https://supportforums.cisco.com/thread/2158473&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To summarize the situation for this post&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ASA 5585-X Firewalls running Multiple Context Mode in several different 8.4(x) softwares&lt;/LI&gt;&lt;LI&gt;Enabling TCP Syslog with missmatched TCP port with the server stops all traffic through the Context without the use of "logging permit-hostdown"&amp;nbsp; beforehand (Expected now that I know about it)&lt;/LI&gt;&lt;LI&gt;To enable traffic to pass through the Context again there was no other solution other than to "reboot" the context by removing it and configuring it again.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This made me doubt the whole TCP Syslog setup even though naturally my first error was not to use the "logging permit-hostdown" configuration before I enabled TCP Syslog.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Surely though its not supposed to keep blocking the traffic even after the TCP Syslog server became reachable?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to get TCP Syslog enabled in all our environments but to be honest am a bit paranoid if I might run into more problems which would cause problematic situations for our more critical environments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 22:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112797#M392931</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-14T22:05:59Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112798#M392932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;Glad that you attended the webcast.&amp;nbsp; I hope it was educational for many of our forum readers and customers.&lt;/P&gt;&lt;P&gt;The request to stop processing if the firewall cannot log requirement was put in by our DoD. Hard set requirement, I know. If we CANNOT LOG who is doing what through the firewall, then, we simply DO NOT want to build those connections.&amp;nbsp; I know, we get burned by this problem off and on. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, if your enterprise is extremely strict then, you do not want to add the "logging permit-hostdown" command.&amp;nbsp; Wait for the help desk to receive the calls and fix the syslog server to get traffic flowing again. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once the syslog server becomes available the firewall should automatically start building connections through it without the need for "logging permit-hostdown".&amp;nbsp; Allow me some time and I shall test this out in our lab and get back to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2013 18:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112798#M392932</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-15T18:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Troubleshooting Adaptive Security Appliances</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112799#M392933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tested on ASA running 9.0.1(2) image&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:00 14.36.109.35 : %ASA-5-111008: User 'cisco' executed the 'logging host inside 192.168.2.2 6/1469' command.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 15 2013 03:15:00 14.36.109.35 : %ASA-5-111010: User 'cisco', running 'CLI' from IP 192.168.2.2, executed 'logging host inside 192.168.2.2 6/1469'&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:00 14.36.109.35 : %ASA-3-302013: Built outbound TCP connection 2766400 for inside:192.168.2.2/1469 (192.168.2.2/1469) to identity:192.168.2.1/41310 (192.168.2.1/41310)&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:00 14.36.109.35 : %ASA-3-414003: TCP Syslog Server inside:192.168.2.2/1469 not responding, New connections are denied based on logging permit-hostdown policy&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:00 14.36.109.35 : %ASA-3-302014: Teardown TCP connection 2766400 for inside:192.168.2.2/1469 to identity:192.168.2.1/41310 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:00 14.36.109.35 : %ASA-3-302014: Teardown TCP connection 2766073 for inside:192.168.2.2/1468 to identity:192.168.2.1/60777 duration 0:09:28 bytes 242437 TCP FINs&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:03 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:04 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:04 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Jan 15 2013 03:15:09 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:10 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:10 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:10 14.36.109.35 : %ASA-6-302016: Teardown UDP connection 2766335 for Corp_NET_12345:76.14.0.98/514 to inside:192.168.2.2/1105 duration 0:02:01 bytes 1200&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:10 14.36.109.35 : %ASA-7-609002: Teardown local-host Corp_NET_12345:76.14.0.98 duration 0:02:01&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:10 14.36.109.35 : %ASA-3-302013: Built outbound TCP connection 2766401 for inside:192.168.2.2/1469 (192.168.2.2/1469) to identity:192.168.2.1/31690 (192.168.2.1/31690)&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:10 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Jan 15 2013 03:15:25 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;logging host inside 192.168.2.2 6/1468&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:25 14.36.109.35 : %ASA-6-414008: New connections are now allowed due to change of logging permit-hostdown policy.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:25 14.36.109.35 : %ASA-5-111008: User 'cisco' executed the 'logging host inside 192.168.2.2 6/1468' command.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 15 2013 03:15:25 14.36.109.35 : %ASA-5-111010: User 'cisco', running 'CLI' from IP 192.168.2.2, executed 'logging host inside 192.168.2.2 6/1468'&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:25 14.36.109.35 : %ASA-3-302013: Built outbound TCP connection 2766406 for inside:192.168.2.2/1468 (192.168.2.2/1468) to identity:192.168.2.1/42911 (192.168.2.1/42911)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 15 2013 03:15:25 14.36.109.35&lt;/STRONG&gt; :&lt;STRONG&gt; %ASA-3-414003: TCP Syslog Server inside:192.168.2.2/1468 not responding, New connections are denied based on logging permit-hostdown policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:26 14.36.109.35 : %ASA-3-302014: Teardown TCP connection 2766406 for inside:192.168.2.2/1468 to identity:192.168.2.1/42911 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:26 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:26 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Jan 15 2013 03:15:29 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:29 14.36.109.35 : %ASA-3-302014: Teardown TCP connection 2766230 for Corp_NET_12345:172.18.109.166/8014 to inside:192.168.2.2/3720 duration 0:05:19 bytes 624 TCP Reset-I&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:29 14.36.109.35 : %ASA-7-609002: Teardown local-host Corp_NET_12345:172.18.109.166 duration 0:05:19&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:30 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:31 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:31 14.36.109.35 : %ASA-7-609001: Built local-host identity:172.16.1.6&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:31 14.36.109.35 : %ASA-7-609001: Built local-host Corp_NET_12345:70.39.176.3&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:31 14.36.109.35 : %ASA-3-302013: Built outbound TCP connection 2766407 for Corp_NET_12345:70.39.176.3/8080 (70.39.176.3/8080) to identity:172.16.1.6/20244 (172.16.1.6/20244)&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:31 14.36.109.35 : %ASA-6-775005: Scansafe: Primary server Corp_NET_12345:70.39.176.3 is now reachable&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:31 14.36.109.35 : %ASA-3-302014: Teardown TCP connection 2766407 for Corp_NET_12345:70.39.176.3/8080 to identity:172.16.1.6/20244 duration 0:00:00 bytes 0 TCP FINs&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:31 14.36.109.35 : %ASA-7-609002: Teardown local-host identity:172.16.1.6 duration 0:00:00&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:31 14.36.109.35 : %ASA-7-609002: Teardown local-host Corp_NET_12345:70.39.176.3 duration 0:00:00&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:31 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:32 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:34 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:34 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:34 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:35 14.36.109.35 : %ASA-3-201008: Disallowing new connections.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:35 14.36.109.35 : %ASA-3-302013: Built outbound TCP connection 2766408 for inside:192.168.2.2/1468 (192.168.2.2/1468) to identity:192.168.2.1/60034 (192.168.2.1/60034)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 15 2013 03:15:35 14.36.109.35 : &lt;/STRONG&gt;%ASA-6-414007: TCP syslog server connection restored.&amp;nbsp; New connections allowed.&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:36 14.36.109.35 : %ASA-7-609001: Built local-host Corp_NET_12345:172.18.109.166&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:36 14.36.109.35 : %ASA-3-302013: Built outbound TCP connection 2766409 for Corp_NET_12345:172.18.109.166/8014 (172.18.109.166/8014) to inside:192.168.2.2/3816 (172.16.1.5/3816)&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:36 14.36.109.35 : %ASA-3-302014: Teardown TCP connection 2766409 for Corp_NET_12345:172.18.109.166/8014 to inside:192.168.2.2/3816 duration 0:00:00 bytes 2729 TCP FINs&lt;/P&gt;&lt;P&gt;Jan 15 2013 03:15:36 14.36.109.35 : %ASA-7-609002: Teardown local-host Corp_NET_12345:172.18.109.166 duration 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, without the "logging permit-hostdown" command in the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed the syslog tcp port to some incorrect port at &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 15 2013 03:15:00 14.36.109.35 : &lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;'logging host inside 192.168.2.2 6/1469'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;conns were denied and I fixed the port at &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 15 2013 03:15:25 14.36.109.35 : &lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;logging host inside 192.168.2.2 6/1468&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jan 15 2013 03:15:35 14.36.109.35 : &lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;and the TCP syslog server connection restored log at&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, it took about 10 seconds for connections to start automatically building.&amp;nbsp; As you can see during this time TO the box connections were built without any problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2013 19:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112799#M392933</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-15T19:37:32Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112800#M392934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To completely test this situation I guess you would have to try it either in 8.4(1)9 or 8.4(2) for ASA 5585-X where I witnessed it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ran into the problem in a device with 8.4(1)9 (Software that corrected a bug in Active FTP for 5585-X SSP-20 and other multicore platforms) and I tested the situation in another ASA 5585-X with 8.4(2) and ran into the same problem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I simply wasnt able to get the connections working again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is your test ASA in single or multiple mode? If in single, could it have something to do with this? I have only tested this in a multiple mode ASA 5585-X SSP20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2013 19:49:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112800#M392934</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-15T19:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Troubleshooting Adaptive Security Appliances</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112801#M392935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Agree.&amp;nbsp; 5585 platform and multiple context testing will take a bit longer to accomplish.&lt;/P&gt;&lt;P&gt;The point I was trying to make is the fact though not documented in the command reference, as soon the the syslog server becomes available, we SHOULD start building new "THROUGH" the box connections without the need for any additional command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will let you know on the 5585 multiple context 8.2.x code a bit later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jan 2013 19:56:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112801#M392935</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-15T19:56:25Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112802#M392936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; How about load balance script of asa - x series ? Could be advices ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 04:02:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112802#M392936</guid>
      <dc:creator>SIRIPHAN SONMANEE</dc:creator>
      <dc:date>2013-01-16T04:02:19Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112803#M392937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried my best to attend the Webcast but i was not................I send mail regarding my problem but it was not solved???? dont know why i was not able to attend...????&lt;/P&gt;&lt;P&gt;Just i would like to know is about the IPS......support on through ASA.......&lt;/P&gt;&lt;P&gt;Do we have this option ??? or we need to go for other vendor.........If i am going for ASA as my firewall........Then why dont i have the option for IPS service????? &lt;/P&gt;&lt;P&gt;If i didn't knew that we do have those support please describe me on very simple words.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;P&gt;Milan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 05:44:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112803#M392937</guid>
      <dc:creator>Milan Rai</dc:creator>
      <dc:date>2013-01-16T05:44:24Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112804#M392938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Does the New ASA module for the 6500 support ture active-active cluster operation (same VLAN active on both ASA modules in the two chassis in VSS configuration) on SUP 720?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 08:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112804#M392938</guid>
      <dc:creator>melepruma</dc:creator>
      <dc:date>2013-01-16T08:16:33Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112805#M392939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;active/active failover setup is certainly possible.&amp;nbsp; Is this what you mean? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration85/guide/ha_active_active.html#wp1074591"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration85/guide/ha_active_active.html#wp1074591&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The requirement for act/act failover is multiple context mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 00:54:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112805#M392939</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-17T00:54:45Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112806#M392940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Milan,&lt;/P&gt;&lt;P&gt;So sorry that you couldn't attend.&amp;nbsp; The audio recording along with the slide deck will be made available soon. You can watch/listen at your own time.&amp;nbsp; I will let our forum admins know about the trouble that you had.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IPS module is supported in the ASA platform. What model are you thinking about?&lt;/P&gt;&lt;P&gt;Check this data sheet: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_data_sheet0900aecd802930c5.html"&gt;http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_data_sheet0900aecd802930c5.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. see under.&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #000000; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 12px; text-indent: -60px; background-color: #ffffff;"&gt;Table 10.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; Characteristics of Cisco ASA 5500 Series AIP SSM and SSC Models&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 01:00:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112806#M392940</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-17T01:00:20Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112807#M392941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Siriphan,&lt;/P&gt;&lt;P&gt;Could you please elaborate a little? What scripts are these? What is the purpose?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 02:19:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112807#M392941</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-17T02:19:04Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112808#M392942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Day,&lt;/P&gt;&lt;P&gt;An issue we seem to be facing with our ASA 5520 8.4(2) is with previously working site2site VPNs no longer working properly.&lt;/P&gt;&lt;P&gt;The tunnels seem to have remained up but to get full data traveling in both directions we have had to &lt;/P&gt;&lt;P&gt;add an outside interface Access Rule.&lt;/P&gt;&lt;P&gt;The only change known is we created a new s2s vpn and it wouldn't work until the Outside Access rule was created.&lt;/P&gt;&lt;P&gt;Not sure if it is a cause or a product of the issue. &lt;/P&gt;&lt;P&gt;Is this something anyone has seen.&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;Eric&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2013 14:15:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112808#M392942</guid>
      <dc:creator>erichild2</dc:creator>
      <dc:date>2013-01-18T14:15:56Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112809#M392943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eric,&lt;/P&gt;&lt;P&gt;I have not seen this problem.&amp;nbsp; Do you have "&lt;STRONG style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-indent: -0.25in;"&gt;sysopt connection permit-vpn" command in the config?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/s8.html#wp1517364"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/s8.html#wp1517364&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. add that and let me know if the outside acl is still required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-indent: -0.25in;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1517370" style="color: #000000; font-family: Arial, Helvetica, sans-serif; background-color: #ffffff;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 05:30:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112809#M392943</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-19T05:30:17Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112810#M392944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kureli &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subject: FWSM 3.2(20) SIP traffic being dropped by FW. Inspection SIP enabled.&lt;/P&gt;&lt;P&gt;Source: 192.168.5.101 Destination:192.168.254.26&lt;/P&gt;&lt;P&gt;Cap SIP1= Receiving interface Cap SIP2=Exiting interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are experiencing a problem passing SIP packets through our FWSM on a new service but have SIP already working successfully. We can see the packets arriving at the firewall but not leaving and have not been unable to determine why this is, we have captured on the ASP but did not see anything. We have tried both UDP and TCP. Interestingly, if we telnet using port 5060, the packets pass fine, however when actual SIP packets are sent, they do not arrive. Below is a packet capture from the FWSM on both interfaces. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW01# sh cap SIP1 detail&lt;/P&gt;&lt;P&gt;26 packets seen, 26 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 15:03:48.2232889848 00d0.0143.b400 0008.7cbb.2040 0x8100 78: 802.1Q vlan#810 P0 192.168.5.101 &amp;gt; 192.168.254.26: icmp: echo request (ttl 127, id6762)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 15:03:48.2232889848 0008.7cbb.2040 0000.0c07.ac62 0x8100 78: 802.1Q vlan#810 P0 192.168.254.26 &amp;gt; 192.168.5.101: icmp: echo reply (ttl 252, id 6762)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 15:03:49.2232890848 00d0.0143.b400 0008.7cbb.2040 0x8100 78: 802.1Q vlan#810 P0 192.168.5.101 &amp;gt; 192.168.254.26: icmp: echo request (ttl 127, id 6767)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 15:03:49.2232890848 0008.7cbb.2040 0000.0c07.ac62 0x8100 78: 802.1Q vlan#810 P0 192.168.254.26 &amp;gt; 192.168.5.101: icmp: echo reply (ttl 252, id 6767)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 15:03:50.2232891848 00d0.0143.b400 0008.7cbb.2040 0x8100 78: 802.1Q vlan#810 P0 192.168.5.101 &amp;gt; 192.168.254.26: icmp: echo request (ttl 127, id 6771)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 15:03:50.2232891848 0008.7cbb.2040 0000.0c07.ac62 0x8100 78: 802.1Q vlan#810 P0 192.168.254.26 &amp;gt; 192.168.5.101: icmp: echo reply (ttl 252, id 6771)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 15:03:51.2232892858 00d0.0143.b400 0008.7cbb.2040 0x8100 78: 802.1Q vlan#810 P0 192.168.5.101 &amp;gt; 192.168.254.26: icmp: echo request (ttl 127, id 6775)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 15:03:51.2232892858 0008.7cbb.2040 0000.0c07.ac62 0x8100 78: 802.1Q vlan#810 P0 192.168.254.26 &amp;gt; 192.168.5.101: icmp: echo reply (ttl 252, id 6775)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 15:04:57.2232958948 00d0.0143.b400 0008.7cbb.2040 0x8100 70: 802.1Q vlan#810 P0 192.168.5.101.50505 &amp;gt; 192.168.254.26.5060: S &lt;/P&gt;&lt;P&gt;2621387575:2621387575(0) win 8192 &lt;MSS 1460=""&gt; (DF) (ttl 127, id 6935)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 15:04:57.2232958948 0008.7cbb.2040 0000.0c07.ac62 0x8100 64: 802.1Q vlan#810 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50505: S [tcp sum ok] &lt;/P&gt;&lt;P&gt;3750378220:3750378220(0) ack 2621387576 win 4128 &lt;MSS 536=""&gt; (ttl 252, id 26637)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 15:04:57.2232958948 00d0.0143.b400 0008.7cbb.2040 0x8100 64: 802.1Q vlan#810 P0 192.168.5.101.50505 &amp;gt; 192.168.254.26.5060: . [tcp sum ok] &lt;/P&gt;&lt;P&gt;2621387576:2621387576(0) ack 3750378221 win 65392 (DF) (ttl 127, id 6936)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 15:04:57.2232958948 00d0.0143.b400 0008.7cbb.2040 0x8100 353: 802.1Q vlan#810 P3 192.168.5.101.50505 &amp;gt; 192.168.254.26.5060: P &lt;/P&gt;&lt;P&gt;2621388112:2621388407(295) ack 3750378221 win 65392 (DF) [tos 0x60]&amp;nbsp; (ttl 127, id 6938)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 15:04:57.2232958948 00d0.0143.b400 0008.7cbb.2040 0x8100 594: 802.1Q vlan#810 P3 192.168.5.101.50505 &amp;gt; 192.168.254.26.5060: . &lt;/P&gt;&lt;P&gt;2621387576:2621388112(536) ack 3750378221 win 65392 (DF) [tos 0x60]&amp;nbsp; (ttl 127, id 6937)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 15:04:57.2232958958 0008.7cbb.2040 00aa.0c07.ac62 0x8100 64: 802.1Q vlan#810 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50505: P [tcp sum ok] &lt;/P&gt;&lt;P&gt;3750378221:3750378221(0) ack 2621387576 win 4128 (DF) (ttl 255, id 8467)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15: 15:04:57.2232958958 0008.7cbb.2040 0000.0c07.ac62 0x8100 64: 802.1Q vlan#810 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50505: . [tcp sum ok] &lt;/P&gt;&lt;P&gt;3750378221:3750378221(0) ack 2621388112 win 8192 (DF) (ttl 255, id 8468)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 16: 15:04:57.2232958958 0008.7cbb.2040 0000.0c07.ac62 0x8100 64: 802.1Q vlan#810 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50505: . [tcp sum ok] &lt;/P&gt;&lt;P&gt;3750378221:3750378221(0) ack 2621388407 win 8192 (DF) (ttl 255, id 8469)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 17: 15:04:57.2232958958 0008.7cbb.2040 0000.0c07.ac62 0x8100 64: 802.1Q vlan#810 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50505: R [tcp sum ok] &lt;/P&gt;&lt;P&gt;3750378221:3750378221(0) win 8192 (DF) (ttl 255, id 8470)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 18: 15:05:10.2232972138 00d0.0143.b400 0008.7cbb.2040 0x8100 70: 802.1Q vlan#810 P0 192.168.5.101.50508 &amp;gt; 192.168.254.26.5060: S &lt;/P&gt;&lt;P&gt;3408136717:3408136717(0) win 8192 &lt;MSS 1460=""&gt; (DF) (ttl 127, id 6990)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 19: 15:05:10.2232972138 0008.7cbb.2040 0000.0c07.ac62 0x8100 64: 802.1Q vlan#810 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50508: S [tcp sum ok] &lt;/P&gt;&lt;P&gt;455106242:455106242(0) ack 3408136718 win 4128 &lt;MSS 536=""&gt; (ttl 252, id 39032)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20: 15:05:10.2232972138 00d0.0143.b400 0008.7cbb.2040 0x8100 64: 802.1Q vlan#810 P0 192.168.5.101.50508 &amp;gt; 192.168.254.26.5060: . [tcp sum ok] &lt;/P&gt;&lt;P&gt;3408136718:3408136718(0) ack 455106243 win 65392 (DF) (ttl 127, id 6991)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 21: 15:05:10.2232972138 00d0.0143.b400 0008.7cbb.2040 0x8100 352: 802.1Q vlan#810 P3 192.168.5.101.50508 &amp;gt; 192.168.254.26.5060: P &lt;/P&gt;&lt;P&gt;3408137254:3408137548(294) ack 455106243 win 65392 (DF) [tos 0x60]&amp;nbsp; (ttl 127, id 6993)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22: 15:05:10.2232972138 00d0.0143.b400 0008.7cbb.2040 0x8100 594: 802.1Q vlan#810 P3 192.168.5.101.50508 &amp;gt; 192.168.254.26.5060: . &lt;/P&gt;&lt;P&gt;3408136718:3408137254(536) ack 455106243 win 65392 (DF) [tos 0x60]&amp;nbsp; (ttl 127, id 6992)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 23: 15:05:10.2232972138 0008.7cbb.2040 0000.0c07.ac62 0x8100 64: 802.1Q vlan#810 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50508: P [tcp sum ok] &lt;/P&gt;&lt;P&gt;455106243:455106243(0) ack 3408136718 win 4128 (DF) (ttl 255, id 23984)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 24: 15:05:10.2232972138 0008.7cbb.2040 0000.0c07.ac62 0x8100 64: 802.1Q vlan#810 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50508: . [tcp sum ok] &lt;/P&gt;&lt;P&gt;455106243:455106243(0) ack 3408137254 win 8192 (DF) (ttl 255, id 23985)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 25: 15:05:10.2232972138 0008.7cbb.2040 0000.0c07.ac62 0x8100 64: 802.1Q vlan#810 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50508: . [tcp sum ok] &lt;/P&gt;&lt;P&gt;455106243:455106243(0) ack 3408137548 win 8192 (DF) (ttl 255, id 23986)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 26: 15:05:10.2232972138 0008.7cbb.2040 0000.0c07.ac62 0x8100 64: 802.1Q vlan#810 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50508: R [tcp sum ok] &lt;/P&gt;&lt;P&gt;455106243:455106243(0) win 8192 (DF) (ttl 255, id 23987)&lt;/P&gt;&lt;P&gt;26 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW01# sh cap SIP2 detail&lt;/P&gt;&lt;P&gt;16 packets seen, 16 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 15:03:48.2232889848 0008.7cbb.2040 0000.0c07.acff 0x8100 78: 802.1Q vlan#800 P0 192.168.5.101 &amp;gt; 192.168.254.26: icmp: echo request (ttl 127, id 6762)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 15:03:48.2232889848 00d0.0143.b400 0008.7cbb.2040 0x8100 78: 802.1Q vlan#800 P0 192.168.254.26 &amp;gt; 192.168.5.101: icmp: echo reply (ttl 252, id 6762)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 15:03:49.2232890848 0008.7cbb.2040 0000.0c07.acff 0x8100 78: 802.1Q vlan#800 P0 192.168.5.101 &amp;gt; 192.168.254.26: icmp: echo request (ttl 127, id 6767)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 15:03:49.2232890848 00d0.0143.b400 0008.7cbb.2040 0x8100 78: 802.1Q vlan#800 P0 192.168.254.26 &amp;gt; 192.168.5.101: icmp: echo reply (ttl 252, id 6767)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 15:03:50.2232891848 0008.7cbb.2040 0000.0c07.acff 0x8100 78: 802.1Q vlan#800 P0 192.168.5.101 &amp;gt; 192.168.254.26: icmp: echo request (ttl 127, id 6771)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 15:03:50.2232891848 00d0.0143.b400 0008.7cbb.2040 0x8100 78: 802.1Q vlan#800 P0 192.168.254.26 &amp;gt; 192.168.5.101: icmp: echo reply (ttl 252, id 6771)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 15:03:51.2232892858 0008.7cbb.2040 0000.0c07.acff 0x8100 78: 802.1Q vlan#800 P0 192.168.5.101 &amp;gt; 192.168.254.26: icmp: echo request (ttl 127, id 6775)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 15:03:51.2232892858 00d0.0143.b400 0008.7cbb.2040 0x8100 78: 802.1Q vlan#800 P0 192.168.254.26 &amp;gt; 192.168.5.101: icmp: echo reply (ttl 252, id 6775)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 15:04:57.2232958948 0008.7cbb.2040 0000.0c07.acff 0x8100 70: 802.1Q vlan#800 P0 192.168.5.101.50505 &amp;gt; 192.168.254.26.5060: S &lt;/P&gt;&lt;P&gt;153485530:153485530(0) win 8192 &lt;MSS 1380=""&gt; (DF) (ttl 127, id 6935)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 15:04:57.2232958948 00d0.0143.b400 0008.7cbb.2040 0x8100 64: 802.1Q vlan#800 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50505: S [tcp sum ok] &lt;/P&gt;&lt;P&gt;3750378220:3750378220(0) ack 153485531 win 4128 &lt;MSS 536=""&gt; (ttl 252, id 26637)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 15:04:57.2232958948 0008.7cbb.2040 0000.0c07.acff 0x8100 64: 802.1Q vlan#800 P0 192.168.5.101.50505 &amp;gt; 192.168.254.26.5060: . [tcp sum ok] &lt;/P&gt;&lt;P&gt;153485531:153485531(0) ack 3750378221 win 65392 (DF) (ttl 255, id 8466)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 15:05:10.2232972138 0008.7cbb.2040 0000.0c07.acff 0x8100 70: 802.1Q vlan#800 P0 192.168.5.101.50508 &amp;gt; 192.168.254.26.5060: S &lt;/P&gt;&lt;P&gt;3150694522:3150694522(0) win 8192 &lt;MSS 1380=""&gt; (DF) (ttl 127, id 6990)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 15:05:10.2232972138 00d0.0143.b400 0008.7cbb.2040 0x8100 64: 802.1Q vlan#800 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50508: S [tcp sum ok] &lt;/P&gt;&lt;P&gt;455106242:455106242(0) ack 3150694523 win 4128 &lt;MSS 536=""&gt; (ttl 252, id 39032)&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 15:05:10.2232972138 0008.7cbb.2040 0000.0c07.acff 0x8100 64: 802.1Q vlan#800 P0 192.168.5.101.50508 &amp;gt; 192.168.254.26.5060: . [tcp sum ok] &lt;/P&gt;&lt;P&gt;3150694523:3150694523(0) ack 455106243 win 65392 (DF) (ttl 255, id 23983)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15: 15:05:57.2233018958 00d0.0143.b400 0008.7cbb.2040 0x8100 64: 802.1Q vlan#800 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50505: . [tcp sum ok] &lt;/P&gt;&lt;P&gt;3750378220:3750378220(0) ack 153485531 win 4128 (ttl 252, id 26638)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 16: 15:06:10.2233032148 00d0.0143.b400 0008.7cbb.2040 0x8100 64: 802.1Q vlan#800 P0 192.168.254.26.5060 &amp;gt; 192.168.5.101.50508: . [tcp sum ok] &lt;/P&gt;&lt;P&gt;455106242:455106242(0) ack 3150694523 win 4128 (ttl 252, id 39033)&lt;/P&gt;&lt;P&gt;16 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regrads MJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 19:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112810#M392944</guid>
      <dc:creator>mj11</dc:creator>
      <dc:date>2013-01-20T19:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Troubleshooting Adaptive Security Appliances</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112811#M392945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;MJ,&lt;/P&gt;&lt;P&gt;This does look like SIP inspection problem. I am not aware of any sip related defects in the code that you are running. The SYN and SYN ACK packets are the same inside to outside but, the ACK packet isn't the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 15:04:57.2232958948 00d0.0143.b400 0008.7cbb.2040 0x8100 64: 802.1Q vlan#810 P0 192.168.5.101.50505 &amp;gt; 192.168.254.26.5060: . [tcp sum ok] 2621387576:2621387576(0) ack 3750378221 win 65392 (DF) (ttl 127, id 6936)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 15:04:57.2232958948 0008.7cbb.2040 0000.0c07.acff 0x8100 64: 802.1Q vlan#800 P0 192.168.5.101.50505 &amp;gt; 192.168.254.26.5060: . [tcp sum ok] 153485531:153485531(0) ack 3750378221 win 65392 (DF) (ttl 255, id 8466)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet ID doesn't match inside to outside for the ACK packet. It would be better to see the captures in the form of a .pcap files instead of text based output. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd suggest opening a TAC case and working with an engineer. Let me know the case no. once you open it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2013 14:39:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112811#M392945</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-21T14:39:01Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112812#M392947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kureli&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response, we have disabled SIP for this flow via a class-map and now this working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks MJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 11:41:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112812#M392947</guid>
      <dc:creator>mj11</dc:creator>
      <dc:date>2013-01-22T11:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Troubleshooting Adaptive Security Appliances</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112813#M392949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kureli,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for doing this Q&amp;amp;A! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, on a ASA 5510 running 8.2.x code. How do I properly implement Group Based authentication for anyconnect Remote VPN. It will be used in this context. Users from X organization will browse to the public IP address of the ASA from home bringing up the Remote VPN Login page. The user logs in with their Active Directory credentials and based on what group they are in they will be given certain access based on that group, obviously refering to certain ACLs applied to each group. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer has windows 2008 R2 so the ASA is pulling from LDAP, they have no radius server. I've made an attempt at the config myself and am hoping you can check my work to see if this will work or not? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config:&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list ADMIN-VPN-SPLIT extended permit ip 192.168.254.0 255.255.255.0 10.0.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list ADMIN-VPN-SPLIT extended permit ip 10.0.0.0 255.255.0.0 192.168.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool VPN-POOL 192.168.254.1-192.168.254.254&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ldap attribute-map CISCOMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf Group-Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf "CN=VPN.Admin.User,OU=VPN,OU=Security Groups,OU=TEST,DC=TEST,DC=local" ADMIN&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-value memberOf "CN=VPN.Default.Users,OU=VPN,OU=Security Groups,OU=TEST,DC=TEST,DC=local" "Standard Users"&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server LDAP protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server LDAP (inside) host 10.0.2.1&lt;/P&gt;&lt;P&gt; ldap-base-dn DC=TEST,DC=local&lt;/P&gt;&lt;P&gt; ldap-group-base-dn DC=TEST,DC=local&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password Test123!&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=LDAP,OU=Users,OU=_Applications,OU=TEST,DC=TEST,DC=local&lt;/P&gt;&lt;P&gt; ldap-over-ssl enable&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt; ldap-attribute-map CISCOMAP&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; character-encoding windows-1252&lt;/P&gt;&lt;P&gt; anyconnect-essentials&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-wince-ARMv4I-2.3.0254-k9.pkg 4 regex "Windows CE"&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-win-2.3.0254-k9.pkg 5 regex "Windows NT"&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-macosx-i386-2.3.0254-k9.pkg 6 regex "Intel Mac OS X"&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy NoAccess internal&lt;/P&gt;&lt;P&gt;group-policy NoAccess attributes&lt;/P&gt;&lt;P&gt; banner value You have no access&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 10.0.2.1 10.0.2.2&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt; default-domain value TEST.local&lt;/P&gt;&lt;P&gt; address-pools none&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-filter value 150&lt;/P&gt;&lt;P&gt;group-policy ADMIN internal&lt;/P&gt;&lt;P&gt;group-policy ADMIN attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 10.0.2.1 10.0.2.2&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value ADMIN-VPN-SPLIT&lt;/P&gt;&lt;P&gt; default-domain value TEST.local&lt;/P&gt;&lt;P&gt; address-pools value VPN-POOL&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc keep-installer installed&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc dpd-interval gateway 60&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc ask enable default webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; hidden-shares visible&lt;/P&gt;&lt;P&gt;&amp;nbsp; activex-relay enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; file-entry enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; file-browsing enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-entry enable&lt;/P&gt;&lt;P&gt;group-policy "Standard Users" internal&lt;/P&gt;&lt;P&gt;group-policy "Standard Users" attributes&lt;/P&gt;&lt;P&gt; banner value You have full access to the TEST network.&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 10.0.2.1 10.0.2.2&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value ADMIN-VPN-SPLIT&lt;/P&gt;&lt;P&gt; default-domain value TEST.local&lt;/P&gt;&lt;P&gt;group-policy LDAP-ALLOWACCESS internal&lt;/P&gt;&lt;P&gt;group-policy LDAP-ALLOWACCESS attributes&lt;/P&gt;&lt;P&gt; banner value You have logged in with the LDAP-ALLOWACCESS group Policy&lt;/P&gt;&lt;P&gt; dns-server value 10.0.2.1 10.0.2.2&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value ADMIN-VPN-SPLIT&lt;/P&gt;&lt;P&gt; default-domain value isi.local&lt;/P&gt;&lt;P&gt; address-pools value VPN-POOL&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc keep-installer installed&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc dpd-interval gateway 60&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc ask enable default webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; hidden-shares visible&lt;/P&gt;&lt;P&gt;&amp;nbsp; activex-relay enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; file-entry enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; file-browsing enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-entry enable&lt;/P&gt;&lt;P&gt;group-policy LDAP-NOACCESS internal&lt;/P&gt;&lt;P&gt;group-policy LDAP-NOACCESS attributes&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec svc &lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc ask none default svc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group ADMIN-VPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-POOL&lt;/P&gt;&lt;P&gt; authentication-server-group LDAP&lt;/P&gt;&lt;P&gt; default-group-policy ADMIN&lt;/P&gt;&lt;P&gt; authorization-required&lt;/P&gt;&lt;P&gt;tunnel-group ADMIN-VPN webvpn-attributes&lt;/P&gt;&lt;P&gt; nbns-server 10.0.2.1 timeout 2 retry 2&lt;/P&gt;&lt;P&gt; group-alias ADMIN-VPN disable&lt;/P&gt;&lt;P&gt; group-alias Admin enable&lt;/P&gt;&lt;P&gt; group-alias DEFAULT disable&lt;/P&gt;&lt;P&gt; group-alias Default disable&lt;/P&gt;&lt;P&gt; group-alias Defaults disable&lt;/P&gt;&lt;P&gt; group-alias User disable&lt;/P&gt;&lt;P&gt;tunnel-group "Standard Users" general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-POOL&lt;/P&gt;&lt;P&gt; authentication-server-group LDAP&lt;/P&gt;&lt;P&gt; default-group-policy "Standard Users"&lt;/P&gt;&lt;P&gt;tunnel-group "Standard Users" webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias Users enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;oh and also - how can I verify that if they dont authenticate to any particular group that they will be denied access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Nick Ehlers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2013 17:40:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112813#M392949</guid>
      <dc:creator>nick.ehlers</dc:creator>
      <dc:date>2013-01-22T17:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Expert: Troubleshooting Adaptive Security Appliances</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112814#M392950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nick,&lt;/P&gt;&lt;P&gt;Let me review your config and get back to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 17:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112814#M392950</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-23T17:59:30Z</dc:date>
    </item>
    <item>
      <title>Ask the Expert: Troubleshooting Adaptive Security Appliances (AS</title>
      <link>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112815#M392952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Is it recommended/possible to attach a 5510 running code version 8.2(5) in transparent mode to a Nexus 2248?&amp;nbsp; We have 2&amp;nbsp; contexts but are only connecting one (2 ports) now and the other at a later date.&amp;nbsp; We had an older 5510 connected to these same ports running code version 7.0(7) with no problems.&amp;nbsp; However, when we connect up the new 5510, one port or the other sends a BPDU causing the port to errdisable.&amp;nbsp; Is this a configuration, version, or compatibility problem?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 18:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ask-the-expert-troubleshooting-adaptive-security-appliances-asa/m-p/2112815#M392952</guid>
      <dc:creator>sestonenppd</dc:creator>
      <dc:date>2013-01-23T18:13:04Z</dc:date>
    </item>
  </channel>
</rss>

