<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASDM access through s2s tunnel group on ASA5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838011#M459806</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, that is right. ASDM's management interface is set to Inside1, and I can access it fine from inside 1, but not Inside2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Feb 2012 23:38:40 GMT</pubDate>
    <dc:creator>danewoodall</dc:creator>
    <dc:date>2012-02-08T23:38:40Z</dc:date>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838005#M459795</link>
      <description>&lt;P&gt;For years now we've had an ASA5510 running an old version of ASA/ASDM (7.0/5.0) and couldn't access ASDM through a modern system with a recent JRE, so we didn't bother with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, we've recently upgraded ASA/ASDM for purposes of adding failover and want to be able to access ASDM through our site to site tunnel. The site to site tunnel gives us access to the VLAN that the firewall is the gateway for, but not access to the firewall itself. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This side of the network is the 10.1.55.0 subnet, and that side of the network is the 192.168.1.0 subnet. I can ping devices on the 192.168.1.0 subnet, but not the firewall, (not that I really need to) and devices can ping me back. I can access ASDM through RDP or ssh into a server on the 192.168.1.0 subnet, but not directly from the 10.1.55.0 subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the current config relative to the 10.1.55.0 subnet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list trust_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 10.1.55.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list untrust_cryptomap_600 extended permit ip 192.168.0.0 255.255.0.0 10.1.55.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list prod_nat0_outbound extended permit ip 192.168.5.0 255.255.255.0 10.1.55.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;asdm location 10.1.55.0 255.255.255.0 untrust&lt;/P&gt;&lt;P&gt;nat (prod,untrust) source static obj-192.168.5.0 obj-192.168.5.0 destination static obj-10.1.55.0 obj-10.1.55.0 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (prod,prod) source static obj-192.168.5.0 obj-192.168.5.0 destination static obj-10.1.55.0 obj-10.1.55.0 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (prod,dmz) source static obj-192.168.5.0 obj-192.168.5.0 destination static obj-10.1.55.0 obj-10.1.55.0 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (trust,any) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-10.1.55.0 obj-10.1.55.0 no-proxy-arp&lt;/P&gt;&lt;P&gt;http 10.1.55.0 255.255.255.0 untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;trust is the name of the "inside" interface that has an IP of 192.168.1.1&lt;/P&gt;&lt;P&gt;untrust is the name of the "outside" interface&lt;/P&gt;&lt;P&gt;prod is the name of the production environment interface&lt;/P&gt;&lt;P&gt;and dmz of course is the name of the dmz interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I'm aware, the tunnel comes into the firewall through the untrust (public) interface, because that is the destination of the tunnel on the 10.1.55.0 subnet side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I missing here that would allow asdm access through the untrust interface for the 10.1.55.0 subnet?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838005#M459795</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2019-03-11T22:26:12Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838006#M459797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dane,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So all you want to do is to be able to access ASDM, to accomplish this you need to be able to access the trust interface on the other side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;managment-access trust.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then give it a try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 22:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838006#M459797</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-08T22:06:22Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838007#M459800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is already set. I can access ASDM from the trust side, it's accessing it from the untrust side (where the VPN tunnel comes across) that does not currently work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the problem that since only 1 interface can be specified as having management access, that since the VPN tunnel comes across the untrust interface, that there is no way to give it access?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 22:11:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838007#M459800</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2012-02-08T22:11:07Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838008#M459801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dane,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also remember than on an ASA you cannot connect to a distant interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in this case the remote site will connect to the vpn and then they will be part of the inside interface so he will not be able to access the untrusted interface, just the trusted one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 22:15:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838008#M459801</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-08T22:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838009#M459803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is a given though that in order to make the tunnel work, that it goes across the public (untrust) interface, so all my traffic from the 10.1.55.0 side is coming through the untrust interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA in this case is the vpn. The problem I have is accessing the trust interface.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no way to route the traffic from untrust to trust, in order to give these VPN connections that originate outside of the network and come across the untrust interface, to access ASDM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess that is the impression I'm getitng, I just want to confirm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: It just seems counter intuitive, since I can grant ASDM/HTTP access to a subnet over a non-management interface (outside), but not actually be able to access it except on a single interface that is defined as the management interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 22:20:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838009#M459803</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2012-02-08T22:20:26Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838010#M459804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dane,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I am not quite understanding your request in here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please correct me if I am wrong:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1inside----ASA-----1Outside2--------ASA-----Inside2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are on Inside2 and you want to access ASDM from interface inside1 via the VPN tunell right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 22:32:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838010#M459804</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-08T22:32:52Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838011#M459806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, that is right. ASDM's management interface is set to Inside1, and I can access it fine from inside 1, but not Inside2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 23:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838011#M459806</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2012-02-08T23:38:40Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838012#M459807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dane,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok good I understand the scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you need this&lt;/P&gt;&lt;P&gt;http 10.1.55.0 255.255.255.0 trust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Set that up and let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 23:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838012#M459807</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-08T23:42:48Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838013#M459808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Done, but still am not able to access it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried both both the outside1 IP and inside1 IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 00:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838013#M459808</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2012-02-09T00:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838014#M459812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmm, that is estrange.Can you change this please:&lt;/P&gt;&lt;P&gt;no nat (trust,any) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-10.1.55.0 obj-10.1.55.0 no-proxy-arp&lt;/P&gt;&lt;P&gt; nat (trust,untrust) source static obj-192.168.0.0 obj-192.168.0.0 destination static obj-10.1.55.0 obj-10.1.55.0 no-proxy-arp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to ping that interface now?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 00:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838014#M459812</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-09T00:17:36Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838015#M459815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Done, no change.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 00:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838015#M459815</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2012-02-09T00:27:18Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838016#M459818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you able to ping that interface now?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 00:42:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838016#M459818</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-09T00:42:45Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838017#M459822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can ping the outside1 interface but not the inside1 interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 00:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838017#M459822</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2012-02-09T00:45:32Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838018#M459825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dane,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the inspection for the ICMP protocol:&lt;/P&gt;&lt;P&gt;If not just add: &lt;STRONG&gt;-fixup protocol ICMP.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Site A do a capture on the inside interface like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capin permit tcp host x.x.x.x (Remote_host_Ip)&amp;nbsp; y.y.y.y(ASA_inside_interface) eq 443&lt;/P&gt;&lt;P&gt;access-list capin permit tcp host .yy.y.y(ASA_inside_interface) eq 443 host x.x.x.x (Remote_host_Ip)&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list capin interface trust.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to access ASDM again and finally:&lt;/P&gt;&lt;P&gt;Do&amp;nbsp; a : - &lt;STRONG&gt;sh cap capin&lt;/STRONG&gt; and provide the output you get!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 00:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838018#M459825</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-09T00:49:46Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838019#M459827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Site A being where Inside1 is?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 00:53:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838019#M459827</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2012-02-09T00:53:35Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838020#M459829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 00:54:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838020#M459829</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-09T00:54:03Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838021#M459833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, assuming inside1 IP = 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And my computer's IP = 10.1.55.150&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list capin permit tcp host 10.1.55.150 192.168.1.1 eq 443&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list capin permit tcp host 192.168.1.1 eq 443 host 10.1.55.150&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture capin access-list capin interface trust&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to ping 192.168.1.1 and then&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;sh cap capin&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and provide results?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 00:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838021#M459833</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2012-02-09T00:58:42Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838022#M459834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is not ping, as I said before is ASDM:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to access &lt;EM&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;ASDM&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;/EM&gt;again and finally:&lt;/P&gt;&lt;P&gt;Do&amp;nbsp; a : - &lt;STRONG&gt;sh cap capin&lt;/STRONG&gt; and provide the output you get!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 01:02:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838022#M459834</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-09T01:02:28Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838023#M459836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "access-list capin permit tcp host 10.1.55.150 192.168.1.1 eq 443"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capin permit tcp host 10.1.55.150 192.168.1.1 eq 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/P&gt;&lt;P&gt;ERROR: % Invalid Hostname&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arrow is pointing to 'eq'&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 01:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838023#M459836</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2012-02-09T01:08:18Z</dc:date>
    </item>
    <item>
      <title>ASDM access through s2s tunnel group on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838024#M459838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Should...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capin permit tcp host 10.1.55.150 192.168.1.1 eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capin permit tcp host 10.1.55.150 eq 192.168.1.1 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 01:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-through-s2s-tunnel-group-on-asa5510/m-p/1838024#M459838</guid>
      <dc:creator>danewoodall</dc:creator>
      <dc:date>2012-02-09T01:10:26Z</dc:date>
    </item>
  </channel>
</rss>

