<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with CSC in ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811777#M421943</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've tried with the nat exempt but without luck.&lt;/P&gt;&lt;P&gt;I can't even ping anything external such as &lt;A class="jive-link-custom" href="http://www.google.com" target="_blank"&gt;http://www.google.com&lt;/A&gt; nor our own external subnet. But yet I can access them with browser.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;multicast-routing&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 66.66.66.130 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description rock internal connection from firewall to switch&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name rock.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group service ExchangeOWA tcp&lt;/P&gt;&lt;P&gt; description Exchange Web and Mobile Access&lt;/P&gt;&lt;P&gt; port-object eq smtp&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.100.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 192.168.123.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.222.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.111.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dzm extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list dzm extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list ouside extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list cont_in extended permit ip host 66.66.66.135 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.134 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.132 eq 3103 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.133 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.133 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.133 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host 66.66.66.133 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit gre any host 66.66.66.137 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.137 eq pptp &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 extended permit ip 192.168.0.0 255.255.0.0 192.168.123.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Split_tunnel_ACL standard permit 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_80 extended permit ip 192.168.1.0 255.255.255.0 192.168.111.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_60 extended permit ip 192.168.1.0 255.255.255.0 192.168.222.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool rock-pool 192.168.100.1-192.168.100.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm512-k8.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 66.66.66.134 172.30.1.50 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 66.66.66.132 192.168.1.15 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 66.66.66.133 192.168.1.16 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 66.66.66.137 192.168.1.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 66.66.66.129 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 172.30.1.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 172.20.20.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.101.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.102.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.103.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.106.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 30 Jun 2007 10:27:39 GMT</pubDate>
    <dc:creator>kpoon</dc:creator>
    <dc:date>2007-06-30T10:27:39Z</dc:date>
    <item>
      <title>Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811775#M421940</link>
      <description>&lt;P&gt;We have installed an ASA5510 with the CSC module. CSC Module IP is set to 192.168.10.254. The inside IP of the ASA5510 is 192.168.10.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our LAN is on 192.168.1.0 subnet. Given that all the routes are setup properly, we are not able to ping the CSC interface 192.168.10.254. We can access 192.168.10.1 without any issue. The following is from the log of the ASA when we try to ping it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3|Jun 29 2007 17:40:06|305006: regular translation creation failed for icmp src inside:192.168.10.254 dst inside:192.168.1.181 (type 0, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this is the log when we try to access it within ASDM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3|Jun 29 2007 17:41:13|305006: portmap translation creation failed for tcp src inside:192.168.10.254/8443 dst inside:192.168.1.181/1677&lt;/P&gt;&lt;P&gt;6|Jun 29 2007 17:41:10|106015: Deny TCP (no connection) from 192.168.10.254/8443 to 192.168.1.181/1677 flags SYN ACK  on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I can connect to the ASA via VPN from home and everything works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:35:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811775#M421940</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2020-02-21T09:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811776#M421942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have nat exemppted on traffic from your local lan to the ASA/CSC network..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;posting your run config would help too .. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2007 03:32:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811776#M421942</guid>
      <dc:creator>a.shaukat</dc:creator>
      <dc:date>2007-06-30T03:32:46Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811777#M421943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've tried with the nat exempt but without luck.&lt;/P&gt;&lt;P&gt;I can't even ping anything external such as &lt;A class="jive-link-custom" href="http://www.google.com" target="_blank"&gt;http://www.google.com&lt;/A&gt; nor our own external subnet. But yet I can access them with browser.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;multicast-routing&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 66.66.66.130 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description rock internal connection from firewall to switch&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name rock.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group service ExchangeOWA tcp&lt;/P&gt;&lt;P&gt; description Exchange Web and Mobile Access&lt;/P&gt;&lt;P&gt; port-object eq smtp&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.100.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 192.168.123.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.222.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.111.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dzm extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list dzm extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list ouside extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list cont_in extended permit ip host 66.66.66.135 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.134 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.132 eq 3103 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.133 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.133 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.133 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host 66.66.66.133 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit gre any host 66.66.66.137 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.137 eq pptp &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20 extended permit ip 192.168.0.0 255.255.0.0 192.168.123.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Split_tunnel_ACL standard permit 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_80 extended permit ip 192.168.1.0 255.255.255.0 192.168.111.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_60 extended permit ip 192.168.1.0 255.255.255.0 192.168.222.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool rock-pool 192.168.100.1-192.168.100.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm512-k8.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 66.66.66.134 172.30.1.50 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 66.66.66.132 192.168.1.15 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 66.66.66.133 192.168.1.16 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 66.66.66.137 192.168.1.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 66.66.66.129 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 172.30.1.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 172.20.20.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.101.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.102.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.103.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.106.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2007 10:27:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811777#M421943</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2007-06-30T10:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811778#M421944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;route inside 192.168.6.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;port-forward sf 1222 192.168.1.1 243 &lt;/P&gt;&lt;P&gt;group-policy rock-ra internal&lt;/P&gt;&lt;P&gt;group-policy rock-ra attributes&lt;/P&gt;&lt;P&gt; dns-server none&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Split_tunnel_ACL&lt;/P&gt;&lt;P&gt; default-domain value rocktelecom.com&lt;/P&gt;&lt;P&gt; split-dns none&lt;/P&gt;&lt;P&gt; client-firewall none&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;http redirect outside 80&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address outside_cryptomap_20&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set peer 69.69.82.44 &lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 match address outside_cryptomap_60&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 set peer 69.69.17.66 &lt;/P&gt;&lt;P&gt;crypto map outside_map 60 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 60 set phase1-mode aggressive &lt;/P&gt;&lt;P&gt;crypto map outside_map 80 match address outside_cryptomap_80&lt;/P&gt;&lt;P&gt;crypto map outside_map 80 set peer 77.77.77.220 &lt;/P&gt;&lt;P&gt;crypto map outside_map 80 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 80 set phase1-mode aggressive &lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group rock-ra type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group rock-ra general-attributes&lt;/P&gt;&lt;P&gt; address-pool rock-pool&lt;/P&gt;&lt;P&gt; default-group-policy rock-ra&lt;/P&gt;&lt;P&gt;tunnel-group rock-ra ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 69.69.82.44 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 69.69.82.44 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 77.77.77.220 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 77.77.77.220 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 69.69.17.66 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 69.69.17.66 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 10&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;  csc fail-close&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global-policy global&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; csd image disk0:/securedesktop-asa-3.1.1.29-k9.pkg&lt;/P&gt;&lt;P&gt; csd enable&lt;/P&gt;&lt;P&gt; svc image disk0:/sslclient-win-1.1.0.154.pkg 1&lt;/P&gt;&lt;P&gt; url-list webserver "cicsoc" &lt;A class="jive-link-custom" href="http://www.cisco.com" target="_blank"&gt;http://www.cisco.com&lt;/A&gt; 1&lt;/P&gt;&lt;P&gt; cache&lt;/P&gt;&lt;P&gt;  disable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the config. Another issue we have is that we can't do &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.66.66.133 pptp 192.168.1.10 pptp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it gives error about overlapping NAT&lt;/P&gt;&lt;P&gt;and that's why we are forced to do at the meantime.&lt;/P&gt;&lt;P&gt;access-list outside extended permit gre any host 66.66.66.137 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 66.66.66.137 eq pptp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2007 10:28:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811778#M421944</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2007-06-30T10:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811779#M421948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. To solve the issue of not being able to ping any websites you must allow the ping reply in your outside access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any any echo-reply&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2007 00:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811779#M421948</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-01T00:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811780#M421949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing left is to access the CSC module at 192.168.10.254 from our LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It works with VPN connect from home or site-site VPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2007 00:38:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811780#M421949</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2007-07-01T00:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811781#M421950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;2. The other issue is more confusing. I guess 1.181 above is the client that is attempting to ping the csc module? Does the csc module have a physical interface and is it plugged onto the same network as the inside interface of the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like the ping for 10.254 is hitting the inside of the ASA. The ASA is attempting to hairpin the traffic back out it's same interface(inside). The ASA will not do this by default. You need to allow hairpinning. Pay close attention to where is says souce:inside destination:inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if everything else was set up properly, the request for 10.254 would not be hitting the inside interface of the ASA anyhow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2007 00:38:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811781#M421950</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-01T00:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811782#M421951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1.181 was a client trying to ping the csc.&lt;/P&gt;&lt;P&gt;The csc has a physical interface and is setup as 192.168.10.254/24 gateway 192.168.10.1. and it's plugged onto the same network as the inside (ip is 192.168.10.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the traceroute from a client&lt;/P&gt;&lt;P&gt;C:\&amp;gt;tracert 192.168.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tracing route to 192.168.10.1 over a maximum of 30 hops&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  1    &amp;lt;1 ms    &amp;lt;1 ms    &amp;lt;1 ms  192.168.1.1&lt;/P&gt;&lt;P&gt;  2     3 ms     3 ms     3 ms  172.20.20.5&lt;/P&gt;&lt;P&gt;  3     4 ms     4 ms     4 ms  172.20.20.22&lt;/P&gt;&lt;P&gt;  4     4 ms     4 ms     4 ms  172.20.20.130&lt;/P&gt;&lt;P&gt;  5     4 ms     4 ms     4 ms  192.168.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trace complete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;tracert 192.168.10.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tracing route to 192.168.10.254 over a maximum of 30 hops&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  1    &amp;lt;1 ms    &amp;lt;1 ms    &amp;lt;1 ms  192.168.1.1&lt;/P&gt;&lt;P&gt;  2     3 ms     3 ms     3 ms  172.20.20.5&lt;/P&gt;&lt;P&gt;  3     4 ms     4 ms     4 ms  172.20.20.22&lt;/P&gt;&lt;P&gt;  4     4 ms     4 ms     4 ms  172.20.20.130&lt;/P&gt;&lt;P&gt;  5     *        *        *     Request timed out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should I enable hairpinning? Could you provide an example?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not, where else could the problem be?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2007 00:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811782#M421951</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2007-07-01T00:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811783#M421952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so the ping is making it to the CSC, but the CSC gateway is the inside of the pix. Therefore the reply is hitting the inside of the pix and the pix won't route that back out the inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solutions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Set the default gateway for the CSC to your inside router(192.168.10.2), not the inside of the ASA. This will allow the ping reply from the CSC to be routed towards 192.168.1.181 via the inside router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Enable hairpinning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would choose option 1 as it is less complicated and less involved.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2007 01:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811783#M421952</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-01T01:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811784#M421953</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've changed the gateway on the CSC module to 192.168.10.2 (where the switch interface is) instead of ASA and it's fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just want to make sure that it will work as the way it should.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, thanks for your pointer!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2007 01:13:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811784#M421953</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2007-07-01T01:13:56Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811785#M421954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;could you show me an example n how to enable hairpining please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2007 01:16:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811785#M421954</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2007-07-01T01:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811786#M421955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Just want to make sure that it will work as the way it should.?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that a question to me? I would check to make sure you can still access it via vpn, then you know it is still routing properly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you add specific routes to the CSC module? If so another option would be to leave the default gateway as the inside ASA and add specific routes towards 10.2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2007 01:19:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811786#M421955</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-01T01:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811787#M421956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I can access it via LAN, VPN.&lt;/P&gt;&lt;P&gt;I will investigate the 3rd option later.&lt;/P&gt;&lt;P&gt;It's good enough for now.&lt;/P&gt;&lt;P&gt;Thank you for your great help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2007 01:34:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811787#M421956</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2007-07-01T01:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: Help with CSC in ASA</title>
      <link>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811788#M421957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hairpinning-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. add "same-security-traffic permit intra-interface" to allow traffic out same interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. create translation for host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.1.181 192.168.1.181 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2007 01:42:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-csc-in-asa/m-p/811788#M421957</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-01T01:42:03Z</dc:date>
    </item>
  </channel>
</rss>

