<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Verify Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/verify-configuration/m-p/2128258#M394401</link>
    <description>&lt;P&gt;I am taking my exam next week in my security class. We have to make a configuartion at home and then insert this config into the ASA5510 in class. I just need someone who has more experience than me to verify that my config is correct, any help or suggestions would be helpful. The config is kind of long, but I broke it up into pices for easy troubleshooting. If you see "(ipremoved)" I did that because we have public IP address assigned to the ASA outside interface. Thank you &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What the ASA needs to do:&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;Dynamic NAT hosts can browse the Internet, and the server has static NAT&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;DHCP&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;The instructor workstation ONLY can (www, ftp, ssh, rdp, ping) into an inside static nat server&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;VPN into the network using the Cisco VPN client software&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Use SSH to authenticate through an AAA (Radius)&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*****initial:&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;no shut&lt;BR /&gt;ip address dhcp setroute&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;no shut&lt;BR /&gt;ip address 192.168.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 (ipremoved) 1&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.30.10 255.255.255.255 inside&lt;BR /&gt;username cisco password cisco&lt;BR /&gt;hostname CSSFINAL&lt;BR /&gt;enable password cisco&lt;BR /&gt;domain-name css210.edu&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*****DHCP:&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.30.200-192.168.30.250 inside&lt;BR /&gt;dhcpd lease 86400 interface inside&lt;BR /&gt;dhcpd domain css210.edu interface inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*****NAT (static, PAT):&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (outside,inside) (OUTSIDE ADDRESS) 192.168.30.N netmask 255.255.255.255&lt;BR /&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*****ACL:&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside_access_in extended permit tcp host (IP of INST) host (ipremoved) eq 3389&lt;BR /&gt;access-list outside_access_in extended permit tcp host (IP OF INST) host (ipremoved) eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp host (IP OF INST) host (ipremoved) eq ftp&lt;BR /&gt;access-list outside_access_in extended permit tcp host (IP OF INST) host (ipremoved) eq ftp-data&lt;BR /&gt;access-list outside_access_in extended permit icmp host (IP OF INST) host (ipremoved) echo&lt;BR /&gt;access-list outside_access_in extended permit tcp host (IP OF INSTRUCTOR) any eq 22&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*****SSH:&lt;/P&gt;&lt;P&gt;key generate rsa modulus 1024&lt;BR /&gt;ssh 192.168.30.0 255.255.255.0 inside&lt;BR /&gt;ssh (ipremoved) 255.255.255.0 outside&lt;BR /&gt;ssh version 2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*****AAA:&lt;/P&gt;&lt;P&gt;aaa-server MSNPS protocol radius&lt;BR /&gt;aaa-server MSNPS (INSIDE) host 192.168.30.N key cisco&lt;BR /&gt;aaa authentication telnet console MSNPS LOCAL&lt;BR /&gt;aaa authentication ssh console MSNPS LOCAL&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*****Logging:&lt;/P&gt;&lt;P&gt;logging host inside 192.168.30.10&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*****IPsec VPN:&lt;/P&gt;&lt;P&gt;ip local pool MYVPNPOOL 192.168.30.100-192.168.30.150&lt;BR /&gt;nat (inside) 0 access-list VPN-NAT0&lt;BR /&gt;access-list VPN-NAT0 extended permit ip 192.168.30.0 255.255.255.0 192.168.30.0 255.255.255.0&lt;BR /&gt;access-list SPLIT-TUNNEL standard permit 192.168.30.0 255.255.255.0&lt;BR /&gt;crypto ipsec transform-set MYSET esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map MYDYNMAP 1 set transform-set MYSET&lt;BR /&gt;crypto dynamic-map MYDYNMAP 1 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map MYDYNMAP 1 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map MYMAP 1 ipsec-isakmp dynamic MYDYNMAP&lt;BR /&gt;crypto map MYMAP interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 84600&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;group-policy MYPOLICY internal&lt;BR /&gt;group-policy MYPOLICY attributes&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value SPLIT-TUNNEL&lt;BR /&gt;tunnel-group MYTGROUP type remote-access&lt;BR /&gt;tunnel-group MYTGROUP general-attributes&lt;BR /&gt;address-pool MYVPNPOOL&lt;BR /&gt;default-group-policy MYPOLICY&lt;BR /&gt;tunnel-group MYTGROUP ipsec-attributes&lt;BR /&gt;pre-shared-key cisco&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:35:08 GMT</pubDate>
    <dc:creator>martinoj2009</dc:creator>
    <dc:date>2019-03-12T00:35:08Z</dc:date>
    <item>
      <title>Verify Configuration</title>
      <link>https://community.cisco.com/t5/network-security/verify-configuration/m-p/2128258#M394401</link>
      <description>&lt;P&gt;I am taking my exam next week in my security class. We have to make a configuartion at home and then insert this config into the ASA5510 in class. I just need someone who has more experience than me to verify that my config is correct, any help or suggestions would be helpful. The config is kind of long, but I broke it up into pices for easy troubleshooting. If you see "(ipremoved)" I did that because we have public IP address assigned to the ASA outside interface. Thank you &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What the ASA needs to do:&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;Dynamic NAT hosts can browse the Internet, and the server has static NAT&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;DHCP&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;The instructor workstation ONLY can (www, ftp, ssh, rdp, ping) into an inside static nat server&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;VPN into the network using the Cisco VPN client software&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Use SSH to authenticate through an AAA (Radius)&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*****initial:&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;no shut&lt;BR /&gt;ip address dhcp setroute&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;no shut&lt;BR /&gt;ip address 192.168.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 (ipremoved) 1&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.30.10 255.255.255.255 inside&lt;BR /&gt;username cisco password cisco&lt;BR /&gt;hostname CSSFINAL&lt;BR /&gt;enable password cisco&lt;BR /&gt;domain-name css210.edu&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*****DHCP:&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.30.200-192.168.30.250 inside&lt;BR /&gt;dhcpd lease 86400 interface inside&lt;BR /&gt;dhcpd domain css210.edu interface inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*****NAT (static, PAT):&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (outside,inside) (OUTSIDE ADDRESS) 192.168.30.N netmask 255.255.255.255&lt;BR /&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*****ACL:&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside_access_in extended permit tcp host (IP of INST) host (ipremoved) eq 3389&lt;BR /&gt;access-list outside_access_in extended permit tcp host (IP OF INST) host (ipremoved) eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp host (IP OF INST) host (ipremoved) eq ftp&lt;BR /&gt;access-list outside_access_in extended permit tcp host (IP OF INST) host (ipremoved) eq ftp-data&lt;BR /&gt;access-list outside_access_in extended permit icmp host (IP OF INST) host (ipremoved) echo&lt;BR /&gt;access-list outside_access_in extended permit tcp host (IP OF INSTRUCTOR) any eq 22&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*****SSH:&lt;/P&gt;&lt;P&gt;key generate rsa modulus 1024&lt;BR /&gt;ssh 192.168.30.0 255.255.255.0 inside&lt;BR /&gt;ssh (ipremoved) 255.255.255.0 outside&lt;BR /&gt;ssh version 2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*****AAA:&lt;/P&gt;&lt;P&gt;aaa-server MSNPS protocol radius&lt;BR /&gt;aaa-server MSNPS (INSIDE) host 192.168.30.N key cisco&lt;BR /&gt;aaa authentication telnet console MSNPS LOCAL&lt;BR /&gt;aaa authentication ssh console MSNPS LOCAL&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*****Logging:&lt;/P&gt;&lt;P&gt;logging host inside 192.168.30.10&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*****IPsec VPN:&lt;/P&gt;&lt;P&gt;ip local pool MYVPNPOOL 192.168.30.100-192.168.30.150&lt;BR /&gt;nat (inside) 0 access-list VPN-NAT0&lt;BR /&gt;access-list VPN-NAT0 extended permit ip 192.168.30.0 255.255.255.0 192.168.30.0 255.255.255.0&lt;BR /&gt;access-list SPLIT-TUNNEL standard permit 192.168.30.0 255.255.255.0&lt;BR /&gt;crypto ipsec transform-set MYSET esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map MYDYNMAP 1 set transform-set MYSET&lt;BR /&gt;crypto dynamic-map MYDYNMAP 1 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map MYDYNMAP 1 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map MYMAP 1 ipsec-isakmp dynamic MYDYNMAP&lt;BR /&gt;crypto map MYMAP interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 84600&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;group-policy MYPOLICY internal&lt;BR /&gt;group-policy MYPOLICY attributes&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value SPLIT-TUNNEL&lt;BR /&gt;tunnel-group MYTGROUP type remote-access&lt;BR /&gt;tunnel-group MYTGROUP general-attributes&lt;BR /&gt;address-pool MYVPNPOOL&lt;BR /&gt;default-group-policy MYPOLICY&lt;BR /&gt;tunnel-group MYTGROUP ipsec-attributes&lt;BR /&gt;pre-shared-key cisco&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/verify-configuration/m-p/2128258#M394401</guid>
      <dc:creator>martinoj2009</dc:creator>
      <dc:date>2019-03-12T00:35:08Z</dc:date>
    </item>
    <item>
      <title>Verify Configuration</title>
      <link>https://community.cisco.com/t5/network-security/verify-configuration/m-p/2128259#M394402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Martino,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went through configuration quite quckly, so I could miss something, but couple of things which I found:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To publish Server from Inside you have this command:&lt;/P&gt;&lt;P&gt;static (outside,inside) (OUTSIDE ADDRESS) 192.168.30.N netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should look like:&lt;/P&gt;&lt;P&gt;static (inside,outside) (OUTSIDE ADDRESS) 192.168.30.N netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command:&lt;/P&gt;&lt;P&gt;key generate rsa modulus 1024&lt;/P&gt;&lt;P&gt;Is:&lt;/P&gt;&lt;P&gt;crypto key generate rsa modulus 1024&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I will recomend to use separate network for RA Clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Eugene&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Dec 2012 22:20:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/verify-configuration/m-p/2128259#M394402</guid>
      <dc:creator>Eugene Korneychuk</dc:creator>
      <dc:date>2012-12-08T22:20:12Z</dc:date>
    </item>
    <item>
      <title>Verify Configuration</title>
      <link>https://community.cisco.com/t5/network-security/verify-configuration/m-p/2128260#M394403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you very much Eugene.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have changed my static NAT, RSA line, and moved my RA Clients to a 172.16.x.x network. I completly missed this, thank you that was very helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Dec 2012 22:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/verify-configuration/m-p/2128260#M394403</guid>
      <dc:creator>martinoj2009</dc:creator>
      <dc:date>2012-12-08T22:29:36Z</dc:date>
    </item>
  </channel>
</rss>

