<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 Config review in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072242#M402484</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear that &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great weekend&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 21 Oct 2012 07:32:48 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-10-21T07:32:48Z</dc:date>
    <item>
      <title>ASA 5510 Config review</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072239#M402471</link>
      <description>&lt;P&gt;Hi all, I'm getting ready to replace an existing firewall with a new ASA 5510.&amp;nbsp; The environment is pretty straight forward, just an outside and inside interface.&amp;nbsp; I've matched the configs as closely as possible, but I'd like to see if there are any glaring issues.&amp;nbsp; I'm mainly concerned with my NAT statements.&amp;nbsp; Does anything in the following (sanitized) config look out of place?&amp;nbsp; Thanks!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ASA Version 8.4(4)5 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 40.100.2.2 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.30.0.100 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa844-5-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object network 10.10.0.78&lt;/P&gt;&lt;P&gt;host 10.10.0.78&lt;/P&gt;&lt;P&gt;description nospam&lt;/P&gt;&lt;P&gt;object network 10.10.0.39&lt;/P&gt;&lt;P&gt;host 10.10.0.39&lt;/P&gt;&lt;P&gt;description exch&lt;/P&gt;&lt;P&gt;object network 55.100.20.109&lt;/P&gt;&lt;P&gt;host 55.100.20.109&lt;/P&gt;&lt;P&gt;description mail.oursite.com&lt;/P&gt;&lt;P&gt;object network 10.10.0.156&lt;/P&gt;&lt;P&gt;host 10.10.0.156&lt;/P&gt;&lt;P&gt;description &lt;/P&gt;&lt;P&gt;&lt;A href="http://www.oursite.com-Internal" target="_blank"&gt;www.oursite.com-Internal&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network 55.100.20.101&lt;/P&gt;&lt;P&gt;host 55.100.20.101&lt;/P&gt;&lt;P&gt;description &lt;/P&gt;&lt;P&gt;&lt;A href="http://www.oursite.com-External" target="_blank"&gt;www.oursite.com-External&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network 10.10.0.155&lt;/P&gt;&lt;P&gt;host 10.10.0.155&lt;/P&gt;&lt;P&gt;description ftp&lt;/P&gt;&lt;P&gt;object network 10.10.0.190&lt;/P&gt;&lt;P&gt;host 10.10.0.190&lt;/P&gt;&lt;P&gt;description www farm&lt;/P&gt;&lt;P&gt;object network 10.10.0.191&lt;/P&gt;&lt;P&gt;host 10.10.0.191&lt;/P&gt;&lt;P&gt;description svc farm&lt;/P&gt;&lt;P&gt;object network 10.10.0.28&lt;/P&gt;&lt;P&gt;host 10.10.0.28&lt;/P&gt;&lt;P&gt;description vpn&lt;/P&gt;&lt;P&gt;object network 10.10.0.57&lt;/P&gt;&lt;P&gt;host 10.10.0.57&lt;/P&gt;&lt;P&gt;description cust.oursite.com&lt;/P&gt;&lt;P&gt;object network 10.10.0.66&lt;/P&gt;&lt;P&gt;host 10.10.0.66&lt;/P&gt;&lt;P&gt;description spoint.oursite.com&lt;/P&gt;&lt;P&gt;object network 55.100.20.102&lt;/P&gt;&lt;P&gt;host 55.100.20.102&lt;/P&gt;&lt;P&gt;description cust.oursite.com&lt;/P&gt;&lt;P&gt;object network 55.100.20.103&lt;/P&gt;&lt;P&gt;host 55.100.20.103&lt;/P&gt;&lt;P&gt;description ftp&lt;/P&gt;&lt;P&gt;object network 55.100.20.104&lt;/P&gt;&lt;P&gt;host 55.100.20.104&lt;/P&gt;&lt;P&gt;description vpn&lt;/P&gt;&lt;P&gt;object network 55.100.20.105&lt;/P&gt;&lt;P&gt;host 55.100.20.105&lt;/P&gt;&lt;P&gt;description app www&lt;/P&gt;&lt;P&gt;object network 55.100.20.106&lt;/P&gt;&lt;P&gt;host 55.100.20.106&lt;/P&gt;&lt;P&gt;description app svc&lt;/P&gt;&lt;P&gt;object network 55.100.20.107&lt;/P&gt;&lt;P&gt;host 55.100.20.107&lt;/P&gt;&lt;P&gt;description spoint.oursite.com&lt;/P&gt;&lt;P&gt;object network 55.100.20.108&lt;/P&gt;&lt;P&gt;host 55.100.20.108&lt;/P&gt;&lt;P&gt;description exchange.oursite.com&lt;/P&gt;&lt;P&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;/P&gt;&lt;P&gt;icmp-object echo-reply&lt;/P&gt;&lt;P&gt;icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;icmp-object unreachable&lt;/P&gt;&lt;P&gt;object-group service Exchange_Inbound tcp&lt;/P&gt;&lt;P&gt;port-object eq 587&lt;/P&gt;&lt;P&gt;port-object eq 993&lt;/P&gt;&lt;P&gt;port-object eq www&lt;/P&gt;&lt;P&gt;port-object eq https&lt;/P&gt;&lt;P&gt;port-object eq imap4&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt;port-object eq www&lt;/P&gt;&lt;P&gt;port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt;service-object gre &lt;/P&gt;&lt;P&gt;service-object tcp destination eq pptp &lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt;network-object object 10.10.0.190&lt;/P&gt;&lt;P&gt;network-object object 10.10.0.191&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt;network-object object 10.10.0.156&lt;/P&gt;&lt;P&gt;network-object object 10.10.0.57&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt;port-object eq www&lt;/P&gt;&lt;P&gt;port-object eq https&lt;/P&gt;&lt;P&gt;object-group service sharepoint tcp&lt;/P&gt;&lt;P&gt;port-object eq 9255&lt;/P&gt;&lt;P&gt;port-object eq www&lt;/P&gt;&lt;P&gt;port-object eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object 10.10.0.78 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object 10.10.0.39 object-group Exchange_Inbound &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_2 object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object 10.10.0.155 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any object 10.10.0.28 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_TCP_2 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object 10.10.0.66 object-group Sharepoint &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-649-103.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static 55.100.20.109 10.10.0.78&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static 55.100.20.108 10.10.0.39 unidirectional&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static 10.10.0.39 55.100.20.109 unidirectional&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static 55.100.20.101 10.10.0.156&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static 55.100.20.102 10.10.0.57&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static 55.100.20.103 10.10.0.155&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static 55.100.20.104 10.10.0.28&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static 55.100.20.105 10.10.0.190&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static 55.100.20.106 10.10.0.191&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static 55.100.20.107 10.10.0.66&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 40.100.2.1 1&lt;/P&gt;&lt;P&gt;route inside 10.10.0.0 255.255.255.0 10.30.0.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.10.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.10.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server xxxxxxxxxx source outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:40cee3a773d380834b10195ffc63a02f&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:11:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072239#M402471</guid>
      <dc:creator>dkraut</dc:creator>
      <dc:date>2019-03-12T00:11:22Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Config review</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072240#M402473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are doing the nat (outside,inside) I will rather to do it inside,outside but the configuration is still good,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL setup is fine, Nat is fine so you should have any issues,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Oct 2012 17:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072240#M402473</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-18T17:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Config review</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072241#M402481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Made the switch last night and it worked perfectly, thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also added the following &amp;gt; nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Oct 2012 01:28:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072241#M402481</guid>
      <dc:creator>dkraut</dc:creator>
      <dc:date>2012-10-21T01:28:44Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Config review</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072242#M402484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear that &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great weekend&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Oct 2012 07:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072242#M402484</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-21T07:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Config review</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072243#M402486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are some things I would change:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list outside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are allowing statically ICMPs into your network which opens the possibility for DOS. You'd better change to ICMP-inspection:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; class inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you have an PPTP-inspection. PPTP is considered broken and shouldn't be used any more. You should migrate your VPN-clients and -servers away from PPTP and remove that line afterwards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;class inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; no inspect pptp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and last your SSH-config. You should enable ver2 only and DH-group1 is also not state of the art any more. To change that you can use the following config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ssh version 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ssh key-exchange group dh-group14-sha1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using an older terminal-program it could be that DH14 with 2048bit is not supported. So better test it with a second session before you logout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Oct 2012 09:46:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072243#M402486</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-10-21T09:46:44Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Config review</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072244#M402489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Karsten! good catch on the pptp.&amp;nbsp; Yes, that's on my list.&amp;nbsp; We're still using a Windows VPN Server at this location, but I plan to migrate to Cisco VPN soon.&amp;nbsp; I'll also make the ICMP and ssh changes tonight.&amp;nbsp; Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2012 14:16:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-config-review/m-p/2072244#M402489</guid>
      <dc:creator>dkraut</dc:creator>
      <dc:date>2012-10-24T14:16:25Z</dc:date>
    </item>
  </channel>
</rss>

