<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa 8.6 static command in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988527#M401856</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Here is the running-config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;ciscoasa# show running-config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.6(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password ibqCJZNHhOXYLjS3 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 165.234.128.203 255.255.248.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.25.0.1 255.255.240.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa861-smp-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone MST -7&lt;/P&gt;&lt;P&gt;clock summer-time MDT recurring&lt;/P&gt;&lt;P&gt;object-group network wireless&lt;/P&gt;&lt;P&gt; network-object 10.25.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outbound extended permit icmp any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-66114.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group outbound in interface outside&lt;/P&gt;&lt;P&gt;access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;access-group outbound out interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 165.234.128.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay server 165.234.128.9 outside&lt;/P&gt;&lt;P&gt;dhcprelay enable inside&lt;/P&gt;&lt;P&gt;dhcprelay setroute inside&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; csd image disk0:/csd_3.5.2008-k9.pkg&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-linux-2.5.2014-k9.pkg 2&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 3&lt;/P&gt;&lt;P&gt;username admin password RSRFwwciBS8x/1/M encrypted&lt;/P&gt;&lt;P&gt;username dsu password RSRFwwciBS8x/1/M encrypted privilege 15&lt;/P&gt;&lt;P&gt;username pix password n5jkqOP4vOe/4pzS encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 10&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 10&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:49ca48250c21eec0abd300facb57c935&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Jul 2012 16:22:14 GMT</pubDate>
    <dc:creator>todd.hauf</dc:creator>
    <dc:date>2012-07-25T16:22:14Z</dc:date>
    <item>
      <title>asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988506#M401834</link>
      <description>&lt;P&gt;Am trying the following command on ASA 8.61, however it appears the static command no longer works.&amp;nbsp; Would appreciate any insights.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.25.0.1 10.25.0.1 netmask 255.255.240.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988506#M401834</guid>
      <dc:creator>todd.hauf</dc:creator>
      <dc:date>2019-03-11T23:32:54Z</dc:date>
    </item>
    <item>
      <title>asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988507#M401836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the NAT-configuration completely changed beginning with v8.3. Here are some examples:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-9129"&gt;https://supportforums.cisco.com/docs/DOC-9129&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 20:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988507#M401836</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-19T20:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988508#M401837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry i am lost&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are trying to get our dhcp server (public.x.x.x) on vlan 1 with 10.25.0.1 scope to service the asa on vlan 3.&lt;/P&gt;&lt;P&gt;We input the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcprelay server public.x.x.x outside&lt;/P&gt;&lt;P&gt;dhcprelay enable inside&lt;/P&gt;&lt;P&gt;dhcprelay setroute inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought the next step was to create a static from the inside to outside for the IP address of the inside interface. I thought this would allow the inside interface to relay the dhcp broadcast to your dhcp server with its private address. The command on pre8.3 was something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.25.0.1 10.25.0.1 netmask 255.255.240.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 21:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988508#M401837</guid>
      <dc:creator>todd.hauf</dc:creator>
      <dc:date>2012-07-19T21:32:33Z</dc:date>
    </item>
    <item>
      <title>asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988509#M401838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm pretty sure you don't need NAT for the dhcprelay to work. NAT is for traffic passing through the ASA, but with dhcprelay the ASA receives the packets and generates a new request based on the received packet. There shouldn't be any NAT be involved.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jul 2012 14:38:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988509#M401838</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-20T14:38:20Z</dc:date>
    </item>
    <item>
      <title>asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988510#M401839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Since your LAN users are on the INSIDE and your DHCP Server is on the OUTSIDE, you'll need to enable DHCP RELAY in your Cisco ASA FW. Here a guide &lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008075fcfb.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008075fcfb.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 10:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988510#M401839</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-22T10:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988511#M401840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Ramraj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the options set as the gui suggests my external dhcp server is at 165.234.128.9 and i have a scope setup on it for 10.25.0.0:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcprelay server 165.234.128.9 outside&lt;/P&gt;&lt;P&gt;dhcprelay server 10.25.0.1 outside&lt;/P&gt;&lt;P&gt;dhcprelay enable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Within that link you mention above i am having trouble with the ip route statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;!--- This command creates a static route in order to &lt;BR /&gt;!--- route the reply packets to the DHCP relay interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 10.1.1.0 255.255.255.0 10.2.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;the command ip route is not available apparantly on ver 8.6, below is what happens:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# ip route&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;BR /&gt;ciscoasa(config)# ip ?&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;&amp;nbsp; audit&amp;nbsp;&amp;nbsp; Configure the Intrusion Detection System&lt;BR /&gt;&amp;nbsp; local&amp;nbsp;&amp;nbsp; Define a local pool of IP addresses&lt;BR /&gt;&amp;nbsp; verify&amp;nbsp; Configure Unicast Reverse Path Filtering on an interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 17:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988511#M401840</guid>
      <dc:creator>todd.hauf</dc:creator>
      <dc:date>2012-07-23T17:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988512#M401841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the "ip route" is no command that you have to enter on the ASA. The config you posted on &lt;/P&gt;&lt;P&gt;19.07.2012, 23:34 is exactly what you need to enable a DHCP relay. Nothing more is needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it still doesn't work, the reason will probably be somewhere else. You could try to capture the packets to see how far they get. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 17:54:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988512#M401841</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-23T17:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988513#M401842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And just to make sure we're talking about the same scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your clients are directly connected to the inside interface on the ASA without a L3-instance between them?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 18:18:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988513#M401842</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-23T18:18:01Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988514#M401843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The ASA outside interface is connected to cisco 4507 gig 2/45, the inside interface is connected to same cisco 4507 gig 2/46.&amp;nbsp; The client is connected to the same 4507 in gig 1/20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gig 2/46 and gig 1/20 have the following config line:&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 18:29:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988514#M401843</guid>
      <dc:creator>todd.hauf</dc:creator>
      <dc:date>2012-07-23T18:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988515#M401844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;didn't see your earlier post.&amp;nbsp; Was on tech support with ciso and they did setup a packet trace.&amp;nbsp; They found the packets are getting to the dhcp server but when the server replies they are being discarded. Cisco thought it was configuration of the external dhcp server but we have not found a solution that works yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 18:36:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988515#M401844</guid>
      <dc:creator>todd.hauf</dc:creator>
      <dc:date>2012-07-23T18:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988516#M401845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what is the log message when the packets are discarded?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 18:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988516#M401845</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-23T18:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988517#M401846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; example of what we see in the log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-7-710005: UDP request discarded from 165.234.128.9/67 to outside:255.255.255.255/68&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 18:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988517#M401846</guid>
      <dc:creator>todd.hauf</dc:creator>
      <dc:date>2012-07-23T18:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988518#M401847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Attached are the packet trace files.&lt;/P&gt;&lt;P&gt;Filtering with ip.addr==165.234.128.9&amp;nbsp; should show what is happening.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 18:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988518#M401847</guid>
      <dc:creator>todd.hauf</dc:creator>
      <dc:date>2012-07-23T18:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988519#M401848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the asp.pcap, there are only DHCP-offers with client-addresses in the 165.234.128.0-network. Are these captures really related to the problem? The DHCP-server should offer an IP in the 10.25.0.0/20 network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 21:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988519#M401848</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-23T21:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988520#M401849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; That is a question we have been asking ourselves too.&lt;/P&gt;&lt;P&gt;When filtering asp.pcap with ip.addr==165.234.128.9 on row No. 103 we find the mac address of the client we are trying to get an ip address on (64:31:50:95:43:2c).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have 2 scopes on our dhcp server.&amp;nbsp; How does a client on the inside of the ASA know which scope to pick from and for the matter how does one on the outside know which scope to pick from?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 21:24:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988520#M401849</guid>
      <dc:creator>todd.hauf</dc:creator>
      <dc:date>2012-07-23T21:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988521#M401850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The relay-agent includes his own ip address from that interface that received the DHCP-request. The DHCP-server then searches for a matching scope. You have a DHCP-Pool starting at 10.25.0.0?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 21:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988521#M401850</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-23T21:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988522#M401851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The scope is 10.25.0.0&lt;/P&gt;&lt;P&gt;starting ip is 10.25.0.1 ending ip is 10.25.15.254&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 22:17:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988522#M401851</guid>
      <dc:creator>todd.hauf</dc:creator>
      <dc:date>2012-07-23T22:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988523#M401852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To get more information where the problem is, I would set up an additional DHCP-Server (an IOS-router or -switch) with the same scope and add this server to the ASA ("dhcprelay server 165.234.128.X outside"). When there are two DHCP-servers specified, both should get the request and we can see if the second server answers in a way that the ASA accepts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2012 06:51:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988523#M401852</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-24T06:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988524#M401853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Your DHCPRELAY configuration is wrong. You are currently having this, which is wrong;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcprelay server 165.234.128.9 outside&lt;/P&gt;&lt;P&gt;dhcprelay server 10.25.0.1 outside &amp;lt;--- This is your DHCP Scope not your DHCP Server&lt;/P&gt;&lt;P&gt;dhcprelay enable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead, you should have this; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcprelay server 165.234.128.9 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcprelay enable inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcprelay setroute inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2012 09:32:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988524#M401853</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-25T09:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: asa 8.6 static command</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988525#M401854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for your continued attention.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration you suggest was our original configuration:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcprelay server 165.234.128.9 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcprelay enable inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcprelay setroute inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;However we are unable to get an ip address on the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We did setup another dhcp server and put it on the inside, changed the config&amp;nbsp; to no dhcprelay.... .&amp;nbsp; And the client was able to get an ip and had internet access. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we have been successful in using the ASA's dhcp server, also successful in using an stand-alone dhcp server located on the inside of the ASA (with the ASA's dhcp server disabled).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when we try to get the dhcp server on the outside as you have stated in the above commands we have not had success.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2012 15:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-6-static-command/m-p/1988525#M401854</guid>
      <dc:creator>todd.hauf</dc:creator>
      <dc:date>2012-07-25T15:55:09Z</dc:date>
    </item>
  </channel>
</rss>

