<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA DMZ no outside access basic config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042595#M398960</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Please perform the below steps and get the following output in log file&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Clear local-host 192.168.2.13&lt;/P&gt;&lt;P&gt;2- Clear interface e0/2&lt;/P&gt;&lt;P&gt;3- Clear asp drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apply Bidirectional captures on CISCOVPN and outside interface (both ingress and Egress interface)&lt;/P&gt;&lt;P&gt;Take ASP drop Captures, below is how you can get asp captures&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all packet-length 1518 buffer 200000&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Initiate the traffic and collect the below output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- sh local-host 192.168.2.13&lt;/P&gt;&lt;P&gt;2- sh interface e0/2&lt;/P&gt;&lt;P&gt;3- sh asp drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Capture output of both interfaces&lt;/P&gt;&lt;P&gt;sh capture asp | in icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh logging&lt;/P&gt;&lt;P&gt;sh ver &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 23 Sep 2012 08:52:28 GMT</pubDate>
    <dc:creator>Faisal Siddiqui</dc:creator>
    <dc:date>2012-09-23T08:52:28Z</dc:date>
    <item>
      <title>ASA DMZ no outside access basic config</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042590#M398955</link>
      <description>&lt;P&gt;Real basic config on a ASA 5505 with 8.4(4)1 code.&lt;/P&gt;&lt;P&gt;Ethernet 0/0 is the WAN outside Internet from a ISP with DHCP configured on the interface along with the default route from the ISP.&lt;/P&gt;&lt;P&gt;Ehternet 0/1 is the Inside LAN inside 192.168.1.2&lt;/P&gt;&lt;P&gt;Ethernet 0/2 is the DMZ ciscovpn which I want to be NATed to the outside 192.168.2.1&lt;/P&gt;&lt;P&gt;LAN works fine and I have full internet access&lt;/P&gt;&lt;P&gt;Ciscovpn interface I have no outside access. I could ping the ASA but I show no xlate for 192.168.2.0&lt;/P&gt;&lt;P&gt;What I'm a missing????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(4)1 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan12&lt;/P&gt;&lt;P&gt;nameif CISCOVPN&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa844-1-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name ROB.NET&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network CISCOVPN&lt;/P&gt;&lt;P&gt;subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;description Cisco VPN Access&lt;/P&gt;&lt;P&gt;object network INSIDE&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;description INSIDE Network&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging monitor debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging queue 0&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu CISCOVPN 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-649.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (CISCOVPN,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic INSIDE interface&lt;/P&gt;&lt;P&gt;nat (CISCOVPN,outside) after-auto source dynamic CISCOVPN interface&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 CISCOVPN&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5 &lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.100-192.168.1.150 inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside interface inside&lt;/P&gt;&lt;P&gt;dhcpd update dns interface inside&lt;/P&gt;&lt;P&gt;dhcpd option 3 ip 192.168.1.1 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.2.10-192.168.2.13 CISCOVPN&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside interface CISCOVPN&lt;/P&gt;&lt;P&gt;dhcpd update dns interface CISCOVPN&lt;/P&gt;&lt;P&gt;dhcpd enable CISCOVPN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username robert password Ye1VVaIKAE72Mhl5 encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum client auto&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect ip-options &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042590#M398955</guid>
      <dc:creator>Robert Rummel</dc:creator>
      <dc:date>2019-03-11T23:57:37Z</dc:date>
    </item>
    <item>
      <title>ASA DMZ no outside access basic config</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042591#M398956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network CISCOVPN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; nat (CISCOVPN,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (CISCOVPN,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;no nat (CISCOVPN,outside) after-auto source dynamic CISCOVPN interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate" after the above changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also assuming that you have dns configured on the host that is connected to the CISCOVPN subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Sep 2012 08:26:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042591#M398956</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-09-22T08:26:23Z</dc:date>
    </item>
    <item>
      <title>ASA DMZ no outside access basic config</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042592#M398957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Applied the config but still same thing.&lt;/P&gt;&lt;P&gt;on the CISCOVPN I get DHCP address but cant ping anyting from the outside such as 64.65.64.65&lt;/P&gt;&lt;P&gt;Inside lan works fine.&lt;/P&gt;&lt;P&gt;I included IP permit any any for the trace below just to aid in troubleshooting. Below is the trace with the modified configs. &lt;/P&gt;&lt;P&gt;notice the "Drop-reason: (acl-drop) Flow is denied by configured rule"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OB-ASA# packet-tracer input CISCOVPN icmp 192.168.2.13 1 1 1 64.65.64.65 deta$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group CISCOVPN_access_in in interface CISCOVPN&lt;BR /&gt;access-list CISCOVPN_access_in extended permit ip any any &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xacdb7590, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xa9a35e90, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=CISCOVPN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac5b96c0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=479, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=CISCOVPN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac5b9298, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=18, user_data=0xac5b88b0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=CISCOVPN, output_ifc=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network CISCOVPN&lt;BR /&gt; nat (CISCOVPN,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xacdb9920, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4, user_data=0xa86c6688, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.2.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=CISCOVPN, output_ifc=outside&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: CISCOVPN&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;ROB-ASA# wr t&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(4)1 &lt;BR /&gt;!&lt;BR /&gt;hostname ROB-ASA&lt;BR /&gt;domain-name ROB.NET&lt;BR /&gt;enable password 3scBzwPl3/UG7Td6 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif CISCOVPN&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa844-1-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name ROB.NET&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network CISCOVPN&lt;BR /&gt; subnet 192.168.2.0 255.255.255.0&lt;BR /&gt; description Cisco VPN Access&lt;BR /&gt;object network INSIDE&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt; description INSIDE Network&lt;BR /&gt;object network CISCOCPN&lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo-reply &lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;access-list CISCOVPN_access_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging queue 0&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu CISCOVPN 1500&lt;BR /&gt;no failover&amp;nbsp;&amp;nbsp; &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-649.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network CISCOVPN&lt;BR /&gt; nat (CISCOVPN,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic INSIDE interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group CISCOVPN_access_in in interface CISCOVPN&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.2.0 255.255.255.0 CISCOVPN&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.100-192.168.1.150 inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;dhcpd update dns interface inside&lt;BR /&gt;dhcpd option 3 ip 192.168.1.1 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.2.10-192.168.2.13 CISCOVPN&lt;BR /&gt;dhcpd auto_config outside interface CISCOVPN&lt;BR /&gt;dhcpd update dns interface CISCOVPN&lt;BR /&gt;dhcpd enable CISCOVPN&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username robert password Ye1VVaIKAE72Mhl5 encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Sep 2012 14:50:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042592#M398957</guid>
      <dc:creator>Robert Rummel</dc:creator>
      <dc:date>2012-09-22T14:50:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ no outside access basic config</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042593#M398958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a mistake in your packet-tracer command. In packet-tracer for ICMP you enter ‘&lt;TYPE&gt; &lt;CODE&gt;’. As per your packet-tracer command, the inputs are:&lt;/CODE&gt;&lt;/TYPE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type = 1&lt;/P&gt;&lt;P&gt;Code = 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not equivalent to ICMP echo-request. Hence, will be dropped. You should be entering values such that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type = 8&lt;/P&gt;&lt;P&gt;Code = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is equivalent to ICMP echo-request and should pass. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please try to ping 64.65.64.65 from the firewall itself, Since you are doing a PAT with the Firewall outside interface address ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2012 04:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042593#M398958</guid>
      <dc:creator>Faisal Siddiqui</dc:creator>
      <dc:date>2012-09-23T04:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ no outside access basic config</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042594#M398959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks used Type 8 and Code 0 and packet trace was a succes but still when I connect a client PC to the CISCOVPN port unable to reach outside.&lt;/P&gt;&lt;P&gt;I am able to ping 64.65.64.65 from the ASA and also from the same client when sitting on the inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2012 06:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042594#M398959</guid>
      <dc:creator>Robert Rummel</dc:creator>
      <dc:date>2012-09-23T06:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ no outside access basic config</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042595#M398960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Please perform the below steps and get the following output in log file&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Clear local-host 192.168.2.13&lt;/P&gt;&lt;P&gt;2- Clear interface e0/2&lt;/P&gt;&lt;P&gt;3- Clear asp drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apply Bidirectional captures on CISCOVPN and outside interface (both ingress and Egress interface)&lt;/P&gt;&lt;P&gt;Take ASP drop Captures, below is how you can get asp captures&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all packet-length 1518 buffer 200000&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Initiate the traffic and collect the below output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- sh local-host 192.168.2.13&lt;/P&gt;&lt;P&gt;2- sh interface e0/2&lt;/P&gt;&lt;P&gt;3- sh asp drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Capture output of both interfaces&lt;/P&gt;&lt;P&gt;sh capture asp | in icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh logging&lt;/P&gt;&lt;P&gt;sh ver &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2012 08:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042595#M398960</guid>
      <dc:creator>Faisal Siddiqui</dc:creator>
      <dc:date>2012-09-23T08:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ no outside access basic config</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042596#M398961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Been traveling and finally got a chance to sit down and take a look. Here are the outputs requested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ROB-ASA# sh local-host 192.168.2.13&lt;BR /&gt;Licensed host limit: Unlimited.&lt;/P&gt;&lt;P&gt;Interface CISCOVPN: 3 active, 4 maximum active, 0 denied&lt;BR /&gt;Interface outside: 56 active, 1649 maximum active, 0 denied&lt;BR /&gt;Interface inside: 7 active, 15 maximum active, 0 denied&lt;BR /&gt;Interface _internal_loopback: 0 active, 0 maximum active, 0 denied&lt;BR /&gt;ROB-ASA# sh inter&lt;BR /&gt;ROB-ASA# sh interface e0/2&lt;BR /&gt;Interface Ethernet0/2 "", is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is 88E6095, BW 100 Mbps, DLY 100 usec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Input flow control is unsupported, output flow control is unsupported&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Available but not configured via nameif&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address 0019.0724.b4f3, MTU not set&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address unassigned&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 165 packets input, 26608 bytes, 0 no buffer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 64 broadcasts, 0 runts, 0 giants&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause input, 0 resume input&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 L2 decode drops&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 106 switch ingress policy drops&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7 packets output, 1288 bytes, 0 underruns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause output, 0 resume output&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 late collisions, 0 deferred&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 rate limit drops&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 switch egress policy drops&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input reset drops, 0 output reset drops&lt;BR /&gt;ROB-ASA# sh asp dro&lt;BR /&gt;ROB-ASA# sh asp drop &lt;/P&gt;&lt;P&gt;Frame drop:&lt;BR /&gt;&amp;nbsp; Invalid encapsulation (invalid-encap)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;BR /&gt;&amp;nbsp; Flow is denied by configured rule (acl-drop)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 19&lt;BR /&gt;&amp;nbsp; TCP RST/FIN out of order (tcp-rstfin-ooo)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&lt;BR /&gt;&amp;nbsp; Slowpath security checks failed (sp-security-failed)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50&lt;/P&gt;&lt;P&gt;Last clearing: 20:52:53 UTC Oct 8 2012 by enable_15&lt;/P&gt;&lt;P&gt;Flow drop:&lt;/P&gt;&lt;P&gt;Last clearing: 20:52:53 UTC Oct 8 2012 by enable_15&lt;BR /&gt;ROB-ASA# sh cap&lt;BR /&gt;ROB-ASA# sh capture as&lt;BR /&gt;ROB-ASA# sh capture asp | in icmp&lt;BR /&gt;ROB-ASA# sh capture asp | in icmp&lt;BR /&gt;ROB-ASA# sh log&lt;BR /&gt;ROB-ASA# sh logging &lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Facility: 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timestamp logging: enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Standby logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug-trace logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Console logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Monitor logging: level debugging, 4413383 messages logged&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Buffer logging: level debugging, 4217511 messages logged&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Trap logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit-hostdown logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; History logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device ID: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mail logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASDM logging: level informational, 3227433 messages logged&lt;BR /&gt;nside:192.168.1.165/64626 (70.181.146.81/64626)&lt;BR /&gt;Oct 08 2012 21:00:48: %ASA-6-302016: Teardown UDP connection 900289 for outside:68.105.29.12/53 to inside:192.168.1.165/51436 duration 0:00:00 bytes 191&lt;BR /&gt;Oct 08 2012 21:00:48: %ASA-6-302016: Teardown UDP connection 900290 for outside:68.105.29.12/53 to inside:192.168.1.165/53667 duration 0:00:00 bytes 193&lt;BR /&gt;Oct 08 2012 21:00:48: %ASA-6-302016: Teardown UDP connection 900294 for outside:68.105.29.12/53 to inside:192.168.1.165/55396 duration 0:00:00 bytes 132&lt;BR /&gt;Oct 08 2012 21:00:48: %ASA-6-302016: Teardown UDP connection 900292 for outside:68.105.29.12/53 to inside:192.168.1.165/64971 duration 0:00:00 bytes 193&lt;BR /&gt;Oct 08 2012 21:00:48: %ASA-6-302016: Teardown UDP connection 900291 for outside:68.105.29.12/53 to inside:192.168.1.165/65038 duration 0:00:00 bytes 191&lt;BR /&gt;Oct 08 2012 21:00:48: %ASA-6-302016: Teardown UDP connection 900293 for outside:68.105.29.12/53 to inside:192.168.1.165/59363 duration 0:00:00 bytes 193&lt;BR /&gt;Oct 08 2012 21:00:48: %ASA-6-302016: Teardown UDP connection 900298 for outside:68.105.29.12/53 to inside:192.168.1.165/64626 duration 0:00:00 bytes 134&lt;BR /&gt;Oct 08 2012 21:00:48: %ASA-6-302016: Teardown UDP connection 900297 for outside:68.105.29.12/53 to inside:192.168.1.165/49453 duration 0:00:00 bytes 134&lt;BR /&gt;Oct 08 2012 21:00:48: %ASA-6-302016: Teardown UDP connection 900296 for outside:68.105.29.12/53 to inside:192.168.1.165/59131 duration 0:00:00 bytes 132&lt;BR /&gt;Oct 08 2012 21:00:48: %ASA-6-302016: Teardown UDP connection 900295 for outside:68.105.29.12/53 to inside:192.168.1.165/51618 duration 0:00:00 bytes 134&lt;BR /&gt;Oct 08 2012 21:00:57: %ASA-7-111009: User 'enable_15' executed cmd: show local-host 192.168.2.13&lt;BR /&gt;Oct 08 2012 21:01:10: %ASA-7-111009: User 'enable_15' executed cmd: show interface Ethernet 0/2&lt;BR /&gt;Oct 08 2012 21:01:15: %ASA-7-111009: User 'enable_15' executed cmd: show asp drop&lt;BR /&gt;Oct 08 2012 21:01:18: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.165/51436 to outside:70.181.146.81/51436 duration 0:00:30&lt;BR /&gt;Oct 08 2012 21:01:18: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.165/53667 to outside:70.181.146.81/53667 duration 0:00:30&lt;BR /&gt;Oct 08 2012 21:01:18: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.165/55396 to outside:70.181.146.81/55396 duration 0:00:30&lt;BR /&gt;Oct 08 2012 21:01:18: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.165/65038 to outside:70.181.146.81/65038 duration 0:00:30&lt;BR /&gt;Oct 08 2012 21:01:18: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.165/64971 to outside:70.181.146.81/64971 duration 0:00:30&lt;BR /&gt;Oct 08 2012 21:01:18: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.165/59363 to outside:70.181.146.81/59363 duration 0:00:30&lt;BR /&gt;Oct 08 2012 21:01:18: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.165/49453 to outside:70.181.146.81/49453 duration 0:00:30&lt;BR /&gt;Oct 08 2012 21:01:18: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.165/64626 to outside:70.181.146.81/64626 duration 0:00:30&lt;BR /&gt;Oct 08 2012 21:01:18: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.165/51618 to outside:70.181.146.81/51618 duration 0:00:30&lt;BR /&gt;Oct 08 2012 21:01:18: %ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.165/59131 to outside:70.181.146.81/59131 duration 0:00:30&lt;BR /&gt;Oct 08 2012 21:01:27: %ASA-6-302016: Teardown UDP connection 900271 for CISCOVPN:0.0.0.0/68 to identity:255.255.255.255/67 duration 0:02:01 bytes 910&lt;BR /&gt;Oct 08 2012 21:01:27: %ASA-6-302016: Teardown UDP connection 900272 for CISCOVPN:255.255.255.255/68 to identity:192.168.2.1/67 duration 0:02:01 bytes 866&lt;BR /&gt;Oct 08 2012 21:01:31: %ASA-7-609002: Teardown local-host outside:68.105.29.12 duration 0:10:26&lt;BR /&gt;Oct 08 2012 21:01:46: %ASA-7-609002: Teardown local-host outside:174.76.228.8 duration 0:10:26&lt;BR /&gt;Oct 08 2012 21:01:48: %ASA-7-609002: Teardown local-host outside:174.76.228.35 duration 0:10:26&lt;BR /&gt;Oct 08 2012 21:01:49: %ASA-6-302016: Teardown UDP connection 900288 for outside:216.218.192.202/123 to inside:192.168.1.77/123 duration 0:02:01 bytes 96&lt;BR /&gt;ROB-ASA# sh ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.4(4)1 &lt;BR /&gt;Device Manager Version 6.4(9)&lt;/P&gt;&lt;P&gt;Compiled on Thu 14-Jun-12 11:20 by builders&lt;BR /&gt;System image file is "disk0:/asa844-1-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;ROB-ASA up 16 days 4 hours&lt;/P&gt;&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5505, 1024 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;Internal ATA Compact Flash, 512MB&lt;BR /&gt;BIOS Flash M50FW080 @ 0xfff00000, 1024KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Boot microcode&amp;nbsp;&amp;nbsp; : CN1000-MC-BOOT-2.00 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPSec microcode&amp;nbsp; : CNlite-MC-IPSECm-MAIN-2.06&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of accelerators: 1&lt;/P&gt;&lt;P&gt; 0: Int: Internal-Data0/0&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0724.b4f9, irq 11&lt;BR /&gt; 1: Ext: Ethernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0724.b4f1, irq 255&lt;BR /&gt; 2: Ext: Ethernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0724.b4f2, irq 255&lt;BR /&gt; 3: Ext: Ethernet0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0724.b4f3, irq 255&lt;BR /&gt; 4: Ext: Ethernet0/3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0724.b4f4, irq 255&lt;BR /&gt; 5: Ext: Ethernet0/4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0724.b4f5, irq 255&lt;BR /&gt; 6: Ext: Ethernet0/5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0724.b4f6, irq 255&lt;BR /&gt; 7: Ext: Ethernet0/6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0724.b4f7, irq 255&lt;BR /&gt; 8: Ext: Ethernet0/7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0019.0724.b4f8, irq 255&lt;BR /&gt; 9: Int: Internal-Data0/1&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0000.0003.0002, irq 255&lt;BR /&gt;10: Int: Not used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 255&lt;BR /&gt;11: Int: Not used&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : irq 255&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ Unrestricted&lt;BR /&gt;Dual ISPs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;VLAN Trunk Ports&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Active/Standby perpetual&lt;BR /&gt;VPN-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;VPN-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Premium Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Other VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Total VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Shared License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Advanced Endpoint Assessment&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;UC Phone Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Total UC Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Botnet Traffic Filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Intercompany Media Engine&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA 5505 Security Plus license.&lt;/P&gt;&lt;P&gt;Serial Number: JMX1047K3AN&lt;BR /&gt;Running Permanent Activation Key: 0x651eef6c 0x307def3d 0x2c33297c 0xa65060d0 0x813304a1 &lt;BR /&gt;Configuration register is 0x1&lt;BR /&gt;Configuration last modified by enable_15 at 16:50:28.708 UTC Sun Sep 23 2012&lt;BR /&gt;ROB-ASA# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Oct 2012 21:07:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-no-outside-access-basic-config/m-p/2042596#M398961</guid>
      <dc:creator>Robert Rummel</dc:creator>
      <dc:date>2012-10-08T21:07:55Z</dc:date>
    </item>
  </channel>
</rss>

