<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: www server behind ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876413#M421144</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, great. I am getting closer! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I can do that via ASDM in the Security Policy settings? or can I do via command line in some way?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Nov 2007 23:53:51 GMT</pubDate>
    <dc:creator>altziebler</dc:creator>
    <dc:date>2007-11-06T23:53:51Z</dc:date>
    <item>
      <title>www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876400#M421119</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ASA 5505 with default setup, 2 VLANs. On the inside I have a DNS, IIS, SQL server. I am desperate for some help to get the www server accessible from the public. I am not using a DMZ. Got tips for me? Many thanks in advance. - Jurgen&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:46:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876400#M421119</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2020-02-21T09:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876401#M421120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Without any other details, this is one way to do it, if webserver is 192.168.1.10...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 80 192.168.1.10 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 80&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 17:52:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876401#M421120</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-11-06T17:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876402#M421121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, thanks for your help.&lt;/P&gt;&lt;P&gt;Outside I have a static IP. Inside www server is at 192.168.1.35 (your guess was close).&lt;/P&gt;&lt;P&gt;I set DHCP server starting at 192.168.1.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To make it work I would changes settings in NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 18:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876402#M421121</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-06T18:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876403#M421123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that case if your static ip is 1.1.1.1 and server is 192.168.1.35 then...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.1 80 192.168.1.35 80 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 1.1.1.1 eq 80 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 192.168.1.35 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 1.1.1.1 eq 80 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that what you were asking?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 18:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876403#M421123</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-11-06T18:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876404#M421126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;one more, first I wasn't able to get online behind the firewall. I had to go into 'Routing' and add a new entry in 'static routing' &lt;/P&gt;&lt;P&gt;Interface: outside&lt;/P&gt;&lt;P&gt;IP 0.0.0.0&lt;/P&gt;&lt;P&gt;Mask 0.0.0.0&lt;/P&gt;&lt;P&gt;Gateway IP - ISP Gateway IP&lt;/P&gt;&lt;P&gt;Metric 1 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 18:08:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876404#M421126</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-06T18:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876405#M421131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that defines your defaut gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 isp.gateway.ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 18:11:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876405#M421131</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-11-06T18:11:37Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876406#M421133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a document somwhere that describes the steps a bit more in detail? Like what to do in NAT and Security Policy. The manual that came with the ASA describes setting up a DMZ, etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 18:25:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876406#M421133</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-06T18:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876407#M421136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html" target="_blank"&gt;http://cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 18:28:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876407#M421136</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-11-06T18:28:57Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876408#M421138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094ea2.shtml" target="_blank"&gt;http://cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094ea2.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this one looks promising but its command line stuff. Uff. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 18:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876408#M421138</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-06T18:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876409#M421140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added a new access rule in "Security Policy" under Outside. source: any, destination 192.168.1.35, services: http, action: permit.  Under NAT a new Outside. type: static,  Source: ISP IP http, Destination: any, interface: inside, address: 192.168.1.35 http, DNS rewrite NO. &lt;/P&gt;&lt;P&gt;no luck so far. oje&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 21:14:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876409#M421140</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-06T21:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876410#M421141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Destination would not be 192.168.1.35. It would be the public ip address you are using. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can post the config, I'll be able to show you what it should look like.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 21:16:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876410#M421141</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-11-06T21:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876411#M421142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my pleasure!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password PASSWORDXYZ encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.1.20 SERVER1 description DNS&lt;/P&gt;&lt;P&gt;name 192.168.1.35 SERVER2 description IIS&lt;/P&gt;&lt;P&gt;name 192.168.1.40 SERVER3 description SQL&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 70.x.x.246 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (outside,inside) tcp SERVER2 www 70.164.46.224 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 70.164.46.225 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.100-192.168.1.130 inside&lt;/P&gt;&lt;P&gt;dhcpd dns SERVER1 192.168.1.22 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain alt74.local interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd dns 68.x.x.30 68.10.16.30 interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 21:27:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876411#M421142</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-06T21:27:22Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876412#M421143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, you're missing the access list. It should be...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 70.164.46.224 eq www&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 22:38:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876412#M421143</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-11-06T22:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876413#M421144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, great. I am getting closer! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I can do that via ASDM in the Security Policy settings? or can I do via command line in some way?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 23:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876413#M421144</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-06T23:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876414#M421145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry, but I have a hard time adding &lt;/P&gt;&lt;P&gt;the access list in Security Policy settings. &lt;/P&gt;&lt;P&gt;Can you give me a hint? Thanks!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2007 18:18:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876414#M421145</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-07T18:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876415#M421146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so I went into Security Settings added a new Access Rule. interface: outside, direction: incoming, type: any, destination IP 70.164.46.224, protocol TCP, source: any, destination port: http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;still cant access my ISS server, ASDM syslog says TCP access denied by ACL from 192.168.1.107&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2007 20:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876415#M421146</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-07T20:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876416#M421147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So you're trying &lt;A class="jive-link-custom" href="http://70.164.46.224" target="_blank"&gt;http://70.164.46.224&lt;/A&gt; from the inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you post the new config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2007 20:39:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876416#M421147</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-11-07T20:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876417#M421148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks so much for your help!&lt;/P&gt;&lt;P&gt;I can't access from the outside (real outside) or inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.1.20 SERVER1 description DNS&lt;/P&gt;&lt;P&gt;name 192.168.1.35 SERVER2 description IIS&lt;/P&gt;&lt;P&gt;name 192.168.1.40 SERVER3 description SQL&lt;/P&gt;&lt;P&gt;name 192.168.1.10 AppleAirport description WiFi&lt;/P&gt;&lt;P&gt;name 192.1.168.30 SERVER2-2 description IIS Ethernet 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description ALT74 LAN&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description COX&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 70.x.x.246 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any 70.x.x.224 255.255.255.224 eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (outside,inside) tcp SERVER2 www 70.164.46.224 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 70.164.46.225 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.100-192.168.1.130 inside&lt;/P&gt;&lt;P&gt;dhcpd dns SERVER1 192.168.1.22 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain alt74.local interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd dns 68.100.16.30 68.10.16.30 interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2007 20:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876417#M421148</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-07T20:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876418#M421149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any 70.164.46.224 255.255.255.224 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;should be......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any 70.164.46.224 255.255.255.255 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 70.164.46.224 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2007 20:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876418#M421149</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-11-07T20:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: www server behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876419#M421150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;just did that &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 70.164.46.224 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;uff! for some reason it doesn't work&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2007 21:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/www-server-behind-asa-5505/m-p/876419#M421150</guid>
      <dc:creator>altziebler</dc:creator>
      <dc:date>2007-11-07T21:25:19Z</dc:date>
    </item>
  </channel>
</rss>

