<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing traffic from inside to outside ASA5505 7.2(3) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948893#M436746</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought if i add the requirements from the manufacterer it would help. This is from CapTel's customer service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="text-decoration: underline; "&gt;Setting up the &lt;EM&gt;CapTel 800i&lt;/EM&gt; in an Office Environment&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;/P&gt;&lt;P&gt;Office Internet connections can be more complex than home connections. The essential setup is still the same, but more detailed information may be needed in order to connect to an office network successfully.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following information is a list of requirements that can be shared when IT personnel request extra detail to ensure that the &lt;EM&gt;CapTel&lt;/EM&gt; &lt;EM&gt;800i&lt;/EM&gt; is able to access the network successfully:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL style="margin-top: 0in;"&gt;&lt;LI&gt;The &lt;EM&gt;CapTel&lt;/EM&gt; &lt;EM&gt;800i&lt;/EM&gt; obtains its IP address via DHCP only.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;If you require a static IP for the &lt;EM&gt;CapTel&lt;/EM&gt; &lt;EM&gt;800i&lt;/EM&gt;, we suggest you configure your DHCP server to map the phone’s MAC address to a specific IP. To obtain the MAC address of the phone and other information, with the handset hung up press 0474636 (0IPINFO).&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;The &lt;EM&gt;CapTel 800i&lt;/EM&gt; uses DNS to resolve the IP Address for the Captioning Service Center. The domains resolved through DNS are hybridcaptel.com and hybridcaptel-otw.com.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;hybridcaptel.com is used for captions and currently resolves to the following IP ranges:&lt;BR /&gt;&lt;UL style="margin-top: 0in;"&gt;&lt;LI&gt;69.8.140.208 - 69.8.140.223&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;69.11.243.160 - 69.11.243.191&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;71.87.12.177 - 71.87.12.190&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;The phone will use outbound TCP ports 5007-7000 to connect to captions on these IP addresses.&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;hybridcaptel-otw.com is used to perform software updates and currently resolves to:&lt;BR /&gt;&lt;UL style="margin-top: 0in;"&gt;&lt;LI&gt;68.117.127.134&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;The phone will use outbound TCP ports 5004, 5100-5130 to this IP.&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;These IP address ranges and ports are subject to change without notice.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;If the phone is being used in a locked down environment, the network’s security settings may require adjustments to permit the necessary communication from the &lt;EM&gt;CapTel&lt;/EM&gt; &lt;EM&gt;800i&lt;/EM&gt; to the Captioning Service.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;The &lt;EM&gt;CapTel&lt;/EM&gt; &lt;EM&gt;800i&lt;/EM&gt; uses only outbound connections over the public Internet. No incoming ports are required.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Our caption service is a proprietary protocol that runs over TCP.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Proxy servers are not supported.&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 18 May 2012 19:13:14 GMT</pubDate>
    <dc:creator>scott.maron</dc:creator>
    <dc:date>2012-05-18T19:13:14Z</dc:date>
    <item>
      <title>Allowing traffic from inside to outside ASA5505 7.2(3)</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948888#M436741</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me start by saying that I'm just starting to study for CCNA, so the ASA seems to be a bit above me yet.&amp;nbsp; The ASA's we are using is for VPN to our corporate office and only allowing access to our Citrix environment, so no direct internet allowed.&amp;nbsp; We have a person who works in the remote office who has need for a caption telephone that requires direct access to the internet.&amp;nbsp; The phone only supports DHCP, and getting the ASA to do an ARP reservations is proving difficult.&amp;nbsp; For now I wrote an access list to allow it's DHCP address out but it still isn't working.&amp;nbsp; The access list I wrote is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip host xxx.xxx.xxx.124 any log&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group 101 out interface outside&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I do a show access-list I'm seeing that traffic is hitting the access list as the hit counter has increased.&amp;nbsp; When I do a show conn I'm seeing one of the IP's that the phone should have access to, however the flags are: saA, so I'm assuming they are not getting a response.&amp;nbsp; According to the manufacturer, only outbound connections are needed, no incoming ports required.&amp;nbsp; All traffic is TCP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated. Thank you.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948888#M436741</guid>
      <dc:creator>scott.maron</dc:creator>
      <dc:date>2019-03-11T23:08:05Z</dc:date>
    </item>
    <item>
      <title>Allowing traffic from inside to outside ASA5505 7.2(3)</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948889#M436742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you set up NAT for this outbound traffic? A quick setup that should resolve your issue is below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your code is PRE 8.3....&lt;/P&gt;&lt;P&gt;&lt;EM&gt;global (outside) 1 interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your code is 8.3 or later....&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network ANY&lt;BR /&gt;subnet 0.0.0.0&amp;nbsp; 0.0.0.0&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please reply back on whether this resolves your issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards, &lt;BR /&gt; &lt;BR /&gt;Kevin &lt;BR /&gt; &lt;BR /&gt;**Please remember to rate helpful posts as well as mark the question as 'answered' once your issue is resolved. This will help others to find your solution faster.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 May 2012 19:12:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948889#M436742</guid>
      <dc:creator>Kevin P Sheahan</dc:creator>
      <dc:date>2012-05-16T19:12:30Z</dc:date>
    </item>
    <item>
      <title>Allowing traffic from inside to outside ASA5505 7.2(3)</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948890#M436743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply, I just heard from our staff person, and he has informed me it still doesn't work.&amp;nbsp; I have looked at the requirements once more and I may have missed one thing.&amp;nbsp; They are using DNS to resolve IP's.&amp;nbsp; Currently we only have internal DNS servers listed.&amp;nbsp; How can I add an external DNS without interfering with our internal?&amp;nbsp; This is what I currently have for DNS:&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server xxx.xxx.xxx.34&lt;/P&gt;&lt;P&gt; name-server xxx.xxx.xxx.5&lt;/P&gt;&lt;P&gt; domain-name &lt;DOMAIN&gt;.org&lt;/DOMAIN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2012 20:27:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948890#M436743</guid>
      <dc:creator>scott.maron</dc:creator>
      <dc:date>2012-05-17T20:27:27Z</dc:date>
    </item>
    <item>
      <title>Allowing traffic from inside to outside ASA5505 7.2(3)</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948891#M436744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That DNS configuration is for DNS lookups that originate from the ASA itself. The configuration on the ASA does not force hosts to use those DNS addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping the outside world with the NAT statements executed? Ping 8.8.8.8?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, you can use 8.8.8.8 for public DNS just configure it manually on the host. If you cannot ping the outside world at all please post back the entire sanitized (potentially sensitive information masked) configuration and I will be able to further assist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards, &lt;BR /&gt; &lt;BR /&gt;Kevin &lt;BR /&gt; &lt;BR /&gt;**Please remember to rate helpful posts as well as mark the question as 'answered' once your issue is resolved. This will help others to find your solution faster.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2012 23:21:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948891#M436744</guid>
      <dc:creator>Kevin P Sheahan</dc:creator>
      <dc:date>2012-05-17T23:21:05Z</dc:date>
    </item>
    <item>
      <title>Allowing traffic from inside to outside ASA5505 7.2(3)</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948892#M436745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the outside world from the ASA itself.&amp;nbsp; Unfortunately, I cannot assign DNS manually, it only accepts DHCP.&amp;nbsp; I have set up a PC there with the same access list for testing purposes.&amp;nbsp; I assigned public DNS to the test PC and that is unable to get out.&amp;nbsp; When i do a show conn, this is what i get:&lt;/P&gt;&lt;P&gt;UDP out 8.8.8.8:53 in x.x.x.113:64918 idle 0:00:14 flags -&lt;/P&gt;&lt;P&gt;UDP out 8.8.4.4:53 in x.x.x.113:64458 idle 0:00:29 flags -&lt;/P&gt;&lt;P&gt;UDP out 8.8.8.8:53 in x.x.x.113:64458 idle 0:00:29 flags -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my scrubbed config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(3)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname &lt;HOSTNAME&gt;&lt;/HOSTNAME&gt;&lt;/P&gt;&lt;P&gt;domain-name &lt;DOMAIN&gt;.org&lt;/DOMAIN&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address x.x.x.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address y.y.y.y &lt;SUBNETMASK&gt;&lt;/SUBNETMASK&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;***Banner Removed***&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server x.x.x.34&lt;/P&gt;&lt;P&gt; name-server x.x.x.5&lt;/P&gt;&lt;P&gt; domain-name &lt;DOMAIN&gt;.org&lt;/DOMAIN&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group icmp-type ALLOWED_ICMP&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt; icmp-object traceroute&lt;/P&gt;&lt;P&gt; icmp-object echo&lt;/P&gt;&lt;P&gt; icmp-object timestamp-reply&lt;/P&gt;&lt;P&gt;object-group icmp-type ALLOWED_ICMP_RESTRICTED&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt;access-list tempacl extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_out extended permit icmp any any object-group ALLOWED_ICMP&lt;/P&gt;&lt;P&gt;access-list inside_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any any object-group ALLOWED_ICMP_RESTRICTED&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any any eq ssh&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip host x.x.x.124 any log&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip host x.x.x.113 any log&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 40&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffer-size 256000&lt;/P&gt;&lt;P&gt;logging asdm-buffer-size 512&lt;/P&gt;&lt;P&gt;logging buffered notifications&lt;/P&gt;&lt;P&gt;logging trap errors&lt;/P&gt;&lt;P&gt;logging history informational&lt;/P&gt;&lt;P&gt;logging asdm errors&lt;/P&gt;&lt;P&gt;no logging message 400014&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip audit name &lt;POLICY&gt; attack action alarm&lt;/POLICY&gt;&lt;/P&gt;&lt;P&gt;ip audit name &lt;POLICY&gt; info action alarm&lt;/POLICY&gt;&lt;/P&gt;&lt;P&gt;ip audit interface inside &lt;POLICY&gt;&lt;/POLICY&gt;&lt;/P&gt;&lt;P&gt;ip audit interface outside &lt;POLICY&gt;&lt;/POLICY&gt;&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group inside_out in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;access-group 101 out interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 y.y.y.x 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;***http, SNMP, SSH info removed***&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns x.x.x.5 x.x.x.34&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd domain &lt;DOMAIN&gt;.org&lt;/DOMAIN&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd update dns&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address x.x.x.100-x.x.x.227 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vpnclient server xy.xy.xy.xy xy.xy.xy.xy&lt;/P&gt;&lt;P&gt;vpnclient mode network-extension-mode&lt;/P&gt;&lt;P&gt;vpnclient nem-st-autoconnect&lt;/P&gt;&lt;P&gt;vpnclient vpngroup &lt;GROUPNAME&gt; password &lt;PASSWORD&gt;&lt;/PASSWORD&gt;&lt;/GROUPNAME&gt;&lt;/P&gt;&lt;P&gt;vpnclient username &lt;USERNAME&gt; password &lt;PASSWORD&gt;&lt;/PASSWORD&gt;&lt;/USERNAME&gt;&lt;/P&gt;&lt;P&gt;vpnclient management clear&lt;/P&gt;&lt;P&gt;vpnclient enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2012 14:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948892#M436745</guid>
      <dc:creator>scott.maron</dc:creator>
      <dc:date>2012-05-18T14:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing traffic from inside to outside ASA5505 7.2(3)</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948893#M436746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought if i add the requirements from the manufacterer it would help. This is from CapTel's customer service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="text-decoration: underline; "&gt;Setting up the &lt;EM&gt;CapTel 800i&lt;/EM&gt; in an Office Environment&lt;/STRONG&gt;&lt;/P&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;/P&gt;&lt;P&gt;Office Internet connections can be more complex than home connections. The essential setup is still the same, but more detailed information may be needed in order to connect to an office network successfully.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following information is a list of requirements that can be shared when IT personnel request extra detail to ensure that the &lt;EM&gt;CapTel&lt;/EM&gt; &lt;EM&gt;800i&lt;/EM&gt; is able to access the network successfully:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL style="margin-top: 0in;"&gt;&lt;LI&gt;The &lt;EM&gt;CapTel&lt;/EM&gt; &lt;EM&gt;800i&lt;/EM&gt; obtains its IP address via DHCP only.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;If you require a static IP for the &lt;EM&gt;CapTel&lt;/EM&gt; &lt;EM&gt;800i&lt;/EM&gt;, we suggest you configure your DHCP server to map the phone’s MAC address to a specific IP. To obtain the MAC address of the phone and other information, with the handset hung up press 0474636 (0IPINFO).&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;The &lt;EM&gt;CapTel 800i&lt;/EM&gt; uses DNS to resolve the IP Address for the Captioning Service Center. The domains resolved through DNS are hybridcaptel.com and hybridcaptel-otw.com.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;hybridcaptel.com is used for captions and currently resolves to the following IP ranges:&lt;BR /&gt;&lt;UL style="margin-top: 0in;"&gt;&lt;LI&gt;69.8.140.208 - 69.8.140.223&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;69.11.243.160 - 69.11.243.191&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;71.87.12.177 - 71.87.12.190&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;The phone will use outbound TCP ports 5007-7000 to connect to captions on these IP addresses.&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;hybridcaptel-otw.com is used to perform software updates and currently resolves to:&lt;BR /&gt;&lt;UL style="margin-top: 0in;"&gt;&lt;LI&gt;68.117.127.134&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;The phone will use outbound TCP ports 5004, 5100-5130 to this IP.&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;These IP address ranges and ports are subject to change without notice.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;If the phone is being used in a locked down environment, the network’s security settings may require adjustments to permit the necessary communication from the &lt;EM&gt;CapTel&lt;/EM&gt; &lt;EM&gt;800i&lt;/EM&gt; to the Captioning Service.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;The &lt;EM&gt;CapTel&lt;/EM&gt; &lt;EM&gt;800i&lt;/EM&gt; uses only outbound connections over the public Internet. No incoming ports are required.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Our caption service is a proprietary protocol that runs over TCP.&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;Proxy servers are not supported.&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2012 19:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948893#M436746</guid>
      <dc:creator>scott.maron</dc:creator>
      <dc:date>2012-05-18T19:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing traffic from inside to outside ASA5505 7.2(3)</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948894#M436747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;The problem seems to be a special unit, the CapTel 800i am I right ? &lt;/P&gt;&lt;P&gt;are all the other units working ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried to capture the traffic with fx wireshark ?&lt;/P&gt;&lt;P&gt;that will tell you alot.&lt;/P&gt;&lt;P&gt;What does the packet-tracer tell you ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it NAT aware ? Is it even possible to use the unit behind a nat device ? does it need its own external ip address ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as usual when it comes down to live production environment I would like to recomend that you go and talk to a cisco rep about a good tech who can help you out. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2012 19:45:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948894#M436747</guid>
      <dc:creator>hobbe</dc:creator>
      <dc:date>2012-05-18T19:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing traffic from inside to outside ASA5505 7.2(3)</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948895#M436748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; It's supposed to work with NAT from what I have been told, I have not been able to run wireshark, as this is across the country from me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 May 2012 18:40:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948895#M436748</guid>
      <dc:creator>scott.maron</dc:creator>
      <dc:date>2012-05-21T18:40:11Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing traffic from inside to outside ASA5505 7.2(3)</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948896#M436749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seeing that my ACL's hit counter increases and I can see the traffic when doing a 'sh conn' but by looking at the flags in the output I'm seeing that it's waiting for responses.&amp;nbsp; Is it possible that there is an issue with NAT yet?&amp;nbsp; Also I'm assuming possibly DNS?&amp;nbsp; I cannot assign anything to the phone as it gets everything from DHCP, not able to statically set any of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 May 2012 20:03:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-from-inside-to-outside-asa5505-7-2-3/m-p/1948896#M436749</guid>
      <dc:creator>scott.maron</dc:creator>
      <dc:date>2012-05-22T20:03:05Z</dc:date>
    </item>
  </channel>
</rss>

