<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco asa5510 Firewall Rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766420#M495972</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source IP 87.85.**.** Outside gateway to 192.168.1.13 Echo 0 8&lt;/P&gt;&lt;P&gt;I get to the bottom &lt;/P&gt;&lt;P&gt;ACL-flow is denied by conf rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if I use the other method I get a ping inside,&amp;nbsp; no ping from outside to inside so I guess the 87.85.**.** which is a talktalk router must block pings?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Oct 2011 18:56:00 GMT</pubDate>
    <dc:creator>jasoncaines</dc:creator>
    <dc:date>2011-10-12T18:56:00Z</dc:date>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766411#M495958</link>
      <description>&lt;P&gt;hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have start from begin on my asa5510, I given The et0 an inside of 192.168.1.1 and outside of 87.85.**.*** on a /28 network, I can't seem to get on the internet to ping or tracert &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have on ACl list Outside &lt;/P&gt;&lt;P&gt;1 source any - destinatiomn any IP Permit&lt;/P&gt;&lt;P&gt;2 Source Any - Destination Any IP Deny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should The destination any be the gateway of the ISP 87.85./28 network? I have a static route of 0.0.0.0&amp;nbsp; 0.0.0.0 gateway IP 87.85.**.*** Metic 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:36:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766411#M495958</guid>
      <dc:creator>jasoncaines</dc:creator>
      <dc:date>2019-03-11T21:36:30Z</dc:date>
    </item>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766412#M495959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try taking captures first and verify where the packets are dropping:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-17814"&gt;https://supportforums.cisco.com/docs/DOC-17814&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 15:45:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766412#M495959</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-11T15:45:20Z</dc:date>
    </item>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766413#M495960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post running-config : sh run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 18:43:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766413#M495960</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-10-11T18:43:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766414#M495961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its in a bit of mess now!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 09:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766414#M495961</guid>
      <dc:creator>jasoncaines</dc:creator>
      <dc:date>2011-10-12T09:20:15Z</dc:date>
    </item>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766415#M495962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't notice anything wrong at first look.&lt;/P&gt;&lt;P&gt;can you do&amp;nbsp; &lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;packet-tracer input inside icmp 192.168.1.20&amp;nbsp; 8.8.8.8 detailed&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;Regards.&lt;EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;Alain&lt;EM&gt;.&lt;/EM&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 14:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766415#M495962</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-10-12T14:10:06Z</dc:date>
    </item>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766416#M495964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry about this, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source IP 192.168.1.20 Dest IP 8.8.8.8 &lt;/P&gt;&lt;P&gt;Packet Type icmp&lt;/P&gt;&lt;P&gt;Type ?&lt;/P&gt;&lt;P&gt;Code?&lt;/P&gt;&lt;P&gt;ID ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 14:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766416#M495964</guid>
      <dc:creator>jasoncaines</dc:creator>
      <dc:date>2011-10-12T14:26:15Z</dc:date>
    </item>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766417#M495966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can't you do it via CLI instead of ASDM?&lt;/P&gt;&lt;P&gt;anyway for ASDM:&lt;/P&gt;&lt;P&gt;type=echo&lt;/P&gt;&lt;P&gt;code=0&lt;/P&gt;&lt;P&gt;id= 8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 14:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766417#M495966</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-10-12T14:33:38Z</dc:date>
    </item>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766418#M495969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I Like that &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Route-Lookup Actoin Allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Info 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Route-Liikup Action allow&lt;/P&gt;&lt;P&gt;in 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;Access-list action allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list_access_in extended permit IP any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NO IP Option&lt;/P&gt;&lt;P&gt;NO inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type Nat action allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;Nat-control&lt;/P&gt;&lt;P&gt;match ip inside any outside any&lt;/P&gt;&lt;P&gt;dynamic tranaltion to pool (87.85.237.64)&lt;/P&gt;&lt;P&gt;translate_hits = 10977, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Info&lt;/P&gt;&lt;P&gt;dymanic translate 192.168.1.13/8 to 87.85.237.65/54798 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type Nat subtype host-limits action allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config (inside) 2 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;match ip inside any outside any&lt;/P&gt;&lt;P&gt;dymanic translation to pool 2 (87.85.237.65)&lt;/P&gt;&lt;P&gt;translate_hits = 10977 untranslte_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Flow control action allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;new flow created with id 55908 packet dispalcted to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;routelookup&lt;/P&gt;&lt;P&gt;info&lt;/P&gt;&lt;P&gt;found next 87.85.237.65 using egress ifc outside&lt;/P&gt;&lt;P&gt;adjacency active&lt;/P&gt;&lt;P&gt;next hop mac address 30e4.db55.be55 hits 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WOW i better they an easy way that writing it all out&lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Input Interface : inside Line UP - Link UP&lt;/P&gt;&lt;P&gt;Output Interface Inside Inside Line Up Link Up&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 14:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766418#M495969</guid>
      <dc:creator>jasoncaines</dc:creator>
      <dc:date>2011-10-12T14:50:51Z</dc:date>
    </item>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766419#M495970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do the same for outside icmp echo-reply to inside address&lt;/P&gt;&lt;P&gt;or&amp;nbsp; do a packet capture for same traffic and capture on inside and outside&amp;nbsp; : &lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 15:52:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766419#M495970</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-10-12T15:52:03Z</dc:date>
    </item>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766420#M495972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source IP 87.85.**.** Outside gateway to 192.168.1.13 Echo 0 8&lt;/P&gt;&lt;P&gt;I get to the bottom &lt;/P&gt;&lt;P&gt;ACL-flow is denied by conf rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if I use the other method I get a ping inside,&amp;nbsp; no ping from outside to inside so I guess the 87.85.**.** which is a talktalk router must block pings?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 18:56:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766420#M495972</guid>
      <dc:creator>jasoncaines</dc:creator>
      <dc:date>2011-10-12T18:56:00Z</dc:date>
    </item>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766421#M495974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do a ping from inside to outside and do a capture both on inside ingress and on outside ingress then save as pcap and post here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 14:07:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766421#M495974</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-10-13T14:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766422#M495976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enclose a file, its defo The talk talk router blocking traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 15:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766422#M495976</guid>
      <dc:creator>jasoncaines</dc:creator>
      <dc:date>2011-10-13T15:08:21Z</dc:date>
    </item>
    <item>
      <title>Cisco asa5510 Firewall Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766423#M495978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You mean you found the issue? Then mark the post as resolved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 18:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-firewall-rules/m-p/1766423#M495978</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-10-13T18:04:30Z</dc:date>
    </item>
  </channel>
</rss>

