<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security plus licnense for ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951393#M440367</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally I fix it,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I run the command no managment-access inside and thats make the ping to the 13.1 stops and no ssh and 443, then I rerun the command again managment-access inside, and that did the trick. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have no clue what was that and why this happened on ISP2 only and after applying the new licnese. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you folks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Jul 2012 15:35:52 GMT</pubDate>
    <dc:creator>majedalanni</dc:creator>
    <dc:date>2012-07-03T15:35:52Z</dc:date>
    <item>
      <title>Security plus license for ASA5505 (SOLVED)</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951383#M440350</link>
      <description>&lt;P&gt;Hi Y'all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have Cisco ASA5505 8.2(5) connected with Cisco 5520 8.2(1) via IPSEC tunnel, I was able to SSH from the inside 5520 to inside IP of the asa5505. but I after I upgrade the license to security plus at 5505 I lost the SSH and ASDM to inside IP of 5505 from the inside network of the 5520. however I still can use SSH and ASDM on outside IP of 5505.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a lot of testing to make it work but I couldn't I added SSH 0.0.0.0/0 inside and outside also I added acl on both interfaces. when I did a trace on the outside interface from the private network of 5520 to 5505 inside IP I got IPSEC spoofed&lt;/P&gt;&lt;P&gt;by the way that trace only works with security plus because I try to test on all my other firewalls 8.2(5) it shows nothing&lt;/P&gt;&lt;P&gt;and all my firewalls can accessed from the private network 5520 except the one with the security plus!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any one face like a such problem.? any idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:24:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951383#M440350</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2019-03-11T23:24:16Z</dc:date>
    </item>
    <item>
      <title>Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951384#M440351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pls share the config&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 03:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951384#M440351</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-29T03:00:00Z</dc:date>
    </item>
    <item>
      <title>Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951385#M440352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here You go, I'm usign ISP2 as a outside because ISP1 we disconnect it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here u go&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;name X.X.X.X ISP1subnet&lt;BR /&gt;name 192.168.13.0 ISP1VPN&lt;BR /&gt;name 192.168.14.0 ISP2VPN&lt;BR /&gt;name 172.25.13.4 File-Server&lt;BR /&gt;name 172.25.3.0 Fibertown_Private&lt;BR /&gt;name 208.85.40.0 pandora-subnet&lt;BR /&gt;name 208.80.52.0 streamtheworld-subnet&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif ISP1&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address X.X.X.X 255.255.255.192 &lt;BR /&gt; no pim&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp; nameif ISP2&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address Y.Y.Y.Y 255.255.255.240 &lt;BR /&gt; no pim&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no forward interface Vlan5&lt;BR /&gt; nameif wguest&lt;BR /&gt; security-level 90&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;&amp;nbsp; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.25.13.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa825-k8.bin&lt;BR /&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server File-Server&lt;BR /&gt; domain-name ZZZZZZZZZ&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_2&lt;BR /&gt; icmp-object echo&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object time-exceeded&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;BR /&gt; icmp-object echo&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object time-exceeded&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_3&lt;BR /&gt; icmp-object echo&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object time-exceeded&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt;access-list DDDDDDDD-vpn-isp1_splitTunnelAcl standard permit 172.25.13.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.25.13.0 255.255.255.0 ISP1VPN 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.25.13.0 255.255.255.0 Fibertown_Private 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.25.13.0 255.255.255.0 ISP2VPN 255.255.255.128 &lt;BR /&gt;access-list DDDDDDDD-vpn-isp2_splitTunnelAcl standard permit 172.25.13.0 255.255.255.0 &lt;BR /&gt;access-list ISP1_access_in remark permit ping over ISP1 network&lt;BR /&gt;access-list ISP1_access_in extended permit icmp any ISP1subnet 255.255.255.192 object-group DM_INLINE_ICMP_1 &lt;BR /&gt;access-list ISP1_access_in remark permit ping over ISP1 network&lt;BR /&gt;access-list ISP2_access_in remark permit ping over ISP2 network&lt;BR /&gt;access-list ISP2_access_in extended permit icmp any Y.Y.Y.Y 255.255.255.248 object-group DM_INLINE_ICMP_2 &lt;BR /&gt;access-list ISP2_access_in remark permit ping over ISP2 network&lt;BR /&gt;access-list wguest_nat_outbound extended permit ip 192.168.1.0 255.255.255.0 any &lt;BR /&gt;access-list DDDDDDDDD-vpn-isp2_splitTunnelAcl_1 standard permit 172.25.13.0 255.255.255.0 &lt;BR /&gt;access-list wguest_mpc extended permit ip any any &lt;BR /&gt;access-list wguest_access_in extended deny ip any pandora-subnet 255.255.248.0 &lt;BR /&gt;access-list wguest_access_in extended deny ip any streamtheworld-subnet 255.255.252.0 &lt;BR /&gt;access-list wguest_access_in extended permit ip 192.168.1.0 255.255.255.0 any &lt;BR /&gt;access-list ISP2_access_in_1 remark permit ping over ISP1 network&lt;BR /&gt;access-list ISP2_access_in_1 extended permit icmp any Y.Y.Y.Y 255.255.255.240 object-group DM_INLINE_ICMP_3 &lt;BR /&gt;access-list ISP2_1_cryptomap extended permit ip 172.25.13.0 255.255.255.0 Fibertown_Private 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging monitor warnings&lt;BR /&gt;logging trap notifications&lt;BR /&gt;logging asdm notifications&lt;BR /&gt;no logging message 106015&lt;BR /&gt;no logging message 313001&lt;BR /&gt;no logging message 313008&lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 305006&lt;BR /&gt;no logging message 710003&lt;BR /&gt;no logging message 106100&lt;BR /&gt;no logging message 302015&lt;BR /&gt;no logging message 302014&lt;BR /&gt;no logging message 302013&lt;BR /&gt;no logging message 302018&lt;BR /&gt;no logging message 302017&lt;BR /&gt;no logging message 302016&lt;BR /&gt;no logging message 302021&lt;BR /&gt;no logging message 302020&lt;BR /&gt;flow-export destination inside 172.25.3.53 9996&lt;BR /&gt;flow-export template timeout-rate 1&lt;BR /&gt;flow-export delay flow-create 60&lt;BR /&gt;mtu ISP1 1500&lt;BR /&gt;mtu wguest 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu ISP2 1500&lt;BR /&gt;ip local pool DDDDDDDDDD-vpn-isp1 192.168.13.10-192.168.13.90 mask 255.255.255.0&lt;BR /&gt;ip local pool DDDDDDDDDD-vpn-isp2 192.168.14.10-192.168.14.100 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-647.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (ISP1) 1 interface (EVEN I removed this but no success)&lt;BR /&gt;global (ISP2) 1 interface&lt;BR /&gt;nat (wguest) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 172.25.13.0 255.255.255.0&lt;BR /&gt;access-group ISP1_access_in in interface ISP1&lt;BR /&gt;access-group wguest_access_in in interface wguest&lt;BR /&gt;access-group ISP2_access_in_1 in interface ISP2&lt;BR /&gt;route ISP2 0.0.0.0 0.0.0.0 Y.Y.Y.Y 128 track 102&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server vpn protocol radius&lt;BR /&gt;aaa-server vpn (inside) host File-Server&lt;BR /&gt; key *****&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 ISP1&lt;BR /&gt;http 0.0.0.0 0.0.0.0 ISP2&lt;BR /&gt;snmp-server host inside 172.25.3.52 community ***** version 2c&lt;BR /&gt;snmp-server host inside 172.25.3.53 poll community ***** version 2c&lt;BR /&gt;snmp-server location DDDDDDDD&lt;BR /&gt;snmp-server contact MR.Uknown&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp linkup linkdown coldstart&lt;BR /&gt;snmp-server enable traps entity config-change&lt;BR /&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;BR /&gt;sla monitor 102&lt;BR /&gt; type echo protocol ipIcmpEcho 8.8.8.8 interface ISP2&lt;BR /&gt;sla monitor schedule 102 life forever start-time now&lt;BR /&gt;service resetoutside&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map ISP2_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map ISP2_map0 1 match address ISP2_1_cryptomap&lt;BR /&gt;crypto map ISP2_map0 1 set pfs group1&lt;BR /&gt;crypto map ISP2_map0 1 set peer S.S.S.S &lt;BR /&gt;crypto map ISP2_map0 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map ISP2_map0 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map ISP2_map0 interface ISP2&lt;BR /&gt;crypto isakmp enable ISP1 (Disabled this too)&lt;BR /&gt;crypto isakmp enable ISP2&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;!&lt;BR /&gt;track 102 rtr 102 reachability&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh scopy enable&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 ISP1&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 ISP2&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config inside&lt;BR /&gt;dhcpd option 3 ip 172.25.13.1&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.10-192.168.1.200 wguest&lt;BR /&gt;dhcpd dns S.S.S.S 8.8.8.8 interface wguest&lt;BR /&gt;dhcpd option 3 ip 192.168.1.1 interface wguest&lt;BR /&gt;dhcpd enable wguest&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.25.13.20-172.25.13.240 inside&lt;BR /&gt;dhcpd dns S.S.S.S S.S.S.S interface inside&lt;BR /&gt;dhcpd domain ZZZZZZZZZ interface inside&lt;BR /&gt;dhcpd option 3 ip 172.25.13.1 interface inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;BR /&gt;group-policy DDDDDDDDDD-vpn-isp2 internal&lt;BR /&gt;group-policy DDDDDDDDDD-vpn-isp2 attributes&lt;BR /&gt; dns-server value 172.25.13.4 8.8.8.8&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value DDDDDDDDDD-vpn-isp2_splitTunnelAcl_1&lt;BR /&gt; default-domain value ZZZZZZZZZZZZZ&lt;BR /&gt;group-policy DDDDDDD-vpn-isp1 internal&lt;BR /&gt;group-policy DDDDDDD-vpn-isp1 attributes&lt;BR /&gt; dns-server value 172.25.13.4 S.S.S.S&lt;BR /&gt; vpn-simultaneous-logins 20&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value DDDDDDDDD-vpn-isp1_splitTunnelAcl&lt;BR /&gt; default-domain value ZZZZZZZZZZZZZ&lt;BR /&gt;tunnel-group DDDDDDD-vpn-isp1 type remote-access&lt;BR /&gt;tunnel-group DDDDDDD-vpn-isp1 general-attributes&lt;BR /&gt; address-pool DDDDDDD-vpn-isp1&lt;BR /&gt; authentication-server-group vpn LOCAL&lt;BR /&gt; default-group-policy DDDDDDD-vpn-isp1&lt;BR /&gt; password-management&lt;BR /&gt;tunnel-group DDDDDDD-vpn-isp1 ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group DDDDDDD-vpn-isp2 type remote-access&lt;BR /&gt;tunnel-group DDDDDDD-vpn-isp2 general-attributes&lt;BR /&gt; address-pool DDDDDDD-vpn-isp2&lt;BR /&gt; authentication-server-group vpn&lt;BR /&gt; default-group-policy DDDDDDD-vpn-isp2&lt;BR /&gt;tunnel-group DDDDDDD-vpn-isp2 ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group S.S.S.S type ipsec-l2l&lt;BR /&gt;tunnel-group S.S.S.S ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map wguest-class&lt;BR /&gt; description bandwidth limit for Wguest&lt;BR /&gt; match access-list wguest_mpc&lt;BR /&gt;class-map global-class&lt;BR /&gt; match any&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map type inspect http match-all htp&lt;BR /&gt;class-map qos&lt;BR /&gt; match port tcp eq https&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 4096&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt; class global-class&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination 172.25.3.53&lt;BR /&gt;policy-map wguest-policy&lt;BR /&gt; class wguest-class&lt;BR /&gt;&amp;nbsp; police input 307000 1500&lt;BR /&gt;&amp;nbsp; police output 307000 1500&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy wguest-policy interface wguest&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 14:19:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951385#M440352</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2012-06-29T14:19:46Z</dc:date>
    </item>
    <item>
      <title>Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951386#M440354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; any Idea?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 20:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951386#M440354</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2012-07-02T20:46:08Z</dc:date>
    </item>
    <item>
      <title>Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951387#M440356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can't see why you are not able to SSH to the inside interface if the VPN tunnel is UP.&lt;/P&gt;&lt;P&gt;Can you ping 172.25.13.1 from the remote LAN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the VPN tunnel up?&lt;/P&gt;&lt;P&gt;Can you share the output of:&lt;/P&gt;&lt;P&gt;show cry isa sa&lt;/P&gt;&lt;P&gt;show cry ipsec sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And can you share the config from the remote ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 02:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951387#M440356</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-03T02:30:58Z</dc:date>
    </item>
    <item>
      <title>Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951388#M440358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tunnel up and all my tunnels up and running, I can ping 13.1 and everything working as expected except I cant access my firewall via 172.25.13.1. Will share the sh crypt commands when I back to office&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 03:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951388#M440358</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2012-07-03T03:09:55Z</dc:date>
    </item>
    <item>
      <title>Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951389#M440360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls share config on the other end too, and ensure there is no ACL that might be blocking the SSH/HTTP access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 03:25:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951389#M440360</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-03T03:25:07Z</dc:date>
    </item>
    <item>
      <title>Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951390#M440362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please share the following commands:&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp; show asp table socket&lt;/P&gt;&lt;P&gt;- capture asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to connect to the ASA on the inside interface across the VPN tunnel and:&lt;/P&gt;&lt;P&gt;share the following output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -show cap asp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 03:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951390#M440362</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-03T03:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951391#M440364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, I can ssh and 443 172.25.13.6 its an AP and I can do anything with the subnet 172.25.13.0 except the .1&lt;/P&gt;&lt;P&gt;here some info below and about the main ASA it has alot of conf and private I can't paste here and I checked it 5 times nothing wrong and the configuration same as other working tunnels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Protocol&amp;nbsp; Socket&amp;nbsp;&amp;nbsp;&amp;nbsp; Local Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Foreign Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State&lt;/P&gt;&lt;P&gt;SSL&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0002837f&amp;nbsp; 172.25.13.1:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 000dcb4f&amp;nbsp; 172.25.13.1:22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;SSL&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05e6b4af&amp;nbsp; Y.Y.48.163:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05ec59cf&amp;nbsp; Y.Y.48.163:22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0:*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LISTEN&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 39f86018&amp;nbsp; Y.Y.48.163:22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X.X.106.6:53166&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ESTAB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attached two txt files&amp;nbsp; 5520.txt captured the 172.25.3.52 putty client and 172.25.13.1 as you will see there are some packets for netflow and ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5505.txt is for droped packet and nothing there. I configured to capture 13.1 and 3.52 on 5505 it return no data either weird or I did somthing wrong &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 15:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951391#M440364</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2012-07-03T15:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951392#M440365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, because I have another ISP and this went away today, I did another test. I use the ISP1 on vlan 1 and everything works normally I just creat the tunnel on that ISP and default route on it. but when I switch back to ISP2 with vlan 2 the problem happened, any limitation on vlan with accessing the fw for managment ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 15:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951392#M440365</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2012-07-03T15:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951393#M440367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally I fix it,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I run the command no managment-access inside and thats make the ping to the 13.1 stops and no ssh and 443, then I rerun the command again managment-access inside, and that did the trick. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have no clue what was that and why this happened on ISP2 only and after applying the new licnese. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you folks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 15:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951393#M440367</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2012-07-03T15:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: Security plus licnense for ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951394#M440368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for let us know the resolution,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah a weird behave of the ASA on this scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark the question as answered so future users having the same issue can learn from your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 17:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-plus-license-for-asa5505-solved/m-p/1951394#M440368</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-03T17:57:09Z</dc:date>
    </item>
  </channel>
</rss>

