<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5510 Port Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766680#M534012</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Jerry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still a bit unclear, behind which interface do u have 10.30.xx.xx and behind which interafce do you have the three subnets???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version of ASA are you using??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Aug 2011 16:55:50 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-08-08T16:55:50Z</dc:date>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766674#M534006</link>
      <description>&lt;P&gt;Hey guys, I am using an ASA5510 for internal firewalling in my QA environment. How do I allow RDP from one subnet to those protected by the firewall? Preferably using the ASDM. Thanks!!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766674#M534006</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2019-03-11T21:08:56Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766675#M534007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry I don't use the ASDM, but referencing the CLI below you can probably figure it out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_dmz permit tcp host 192.168.1.1 host 10.10.10.5 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside_dmz is the acl applied to the specifi interface. You will need to add the line above to permit access. &lt;/P&gt;&lt;P&gt;192.168.1.1 is the source, your PC, the destination is 10.10.10.5, your server. 3389 is the tcp port number for RDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 16:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766675#M534007</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2011-08-08T16:22:02Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766676#M534008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jerry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you elaborate a bit more, can you tell me what is going to be your source interface and the destination interface??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are both te source and the destination behind the same interface??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 16:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766676#M534008</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-08T16:50:16Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766677#M534009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. Is there a way to do this for a network rather than a host?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 16:50:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766677#M534009</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2011-08-08T16:50:34Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766678#M534010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My main subnet is 10.30.x.x and I have a qa environment with 3 vlans and those subnets are to be locked down from one another via rule sets. The networks are 10.16.48, 10.16.100 and 10.16.101 respectively. I'm using the 4th interface as inside and to manage the ASA. I need to be able to rdp from 10.30.x.x into those machines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did I explain that properly? Thanks for all the help so far!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 16:53:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766678#M534010</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2011-08-08T16:53:07Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766679#M534011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And in case it isn't obvious this is all internal no vpns etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 16:53:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766679#M534011</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2011-08-08T16:53:56Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766680#M534012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Jerry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still a bit unclear, behind which interface do u have 10.30.xx.xx and behind which interafce do you have the three subnets???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version of ASA are you using??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 16:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766680#M534012</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-08T16:55:50Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766681#M534013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The 10.30.x.x is coming in thru E0/0 which I have labeled inside. This is all internal no outside interfaces. The other 3 subnets are on e0/1 2 and 3. ASDM is 6.4 and I don't recall asa but it's 8.x&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 16:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766681#M534013</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2011-08-08T16:59:38Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766682#M534014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jerry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If all the subnets are behind the inside interface, then what you are trying to do is called hairpinnning the traffic, and you would need the following config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 10.16.48.0 10.16.48.0 norand nailed&lt;/P&gt;&lt;P&gt;static (inside,inside) 10.16.100.0 10.16.100.0 norand nailed&lt;/P&gt;&lt;P&gt;static (inside,inside) 10.16.101.0 10.16.101.0 norand nailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hoep this is what you were looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 17:01:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766682#M534014</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-08T17:01:13Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766683#M534015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then you migth need this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (&lt;NAME of="" e0=""&gt;,inside) 10.16.48.0 10.16.48.0&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;static (&lt;NAME of="" e0=""&gt;,inside) 10.16.100.0 10.16.100.0&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;static (&lt;NAME of="" e0=""&gt;,inside) 10.16.101.0 10.16.101.0&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;apart from that not sure if you have any interafce ACL's on inside interface, so you may need to allow the traffic there as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats the reason why I needed the interface names, moreover if you have "no nat-control" enabled then you would not even need this static statements, just the ACL would do. This is what I could gather from the information provided.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover, if you are using any ASA version greater than 8.3, then this whole static statement would change, since there is a syntax change in it. So opening up the ASDM would help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 17:09:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766683#M534015</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-08T17:09:11Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766684#M534016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's my config: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.0.199 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif 48&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.16.48.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif 100&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.16.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif 101&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.16.101.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa805-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name daxko&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 100_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 100_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 100_access_in extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 100_access_in extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 48_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 48_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 48_access_in extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 48_access_in extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 101_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 48_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 48_access_out extended permit ip any any inactive &lt;/P&gt;&lt;P&gt;access-list 48_access_out extended permit tcp any any inactive &lt;/P&gt;&lt;P&gt;access-list 48_access_out extended permit udp any any inactive &lt;/P&gt;&lt;P&gt;access-list 100_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 100_access_out extended permit tcp any any inactive &lt;/P&gt;&lt;P&gt;access-list 100_access_out extended permit udp any any inactive &lt;/P&gt;&lt;P&gt;access-list 100_access_out extended permit ip any any inactive &lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu 48 1500&lt;/P&gt;&lt;P&gt;mtu 100 1500&lt;/P&gt;&lt;P&gt;mtu 101 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-641.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (48) 101 interface&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;P&gt;access-group 48_access_in in interface 48&lt;/P&gt;&lt;P&gt;access-group 48_access_out out interface 48&lt;/P&gt;&lt;P&gt;access-group 100_access_in in interface 100&lt;/P&gt;&lt;P&gt;access-group 100_access_out out interface 100&lt;/P&gt;&lt;P&gt;access-group 101_access_in in interface 101&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 10.0.0.199 1&lt;/P&gt;&lt;P&gt;route inside 10.2.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.10.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.30.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.31.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.32.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.33.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.34.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.252.252.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.32.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 10.30.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;client-update enable&lt;/P&gt;&lt;P&gt;telnet 10.30.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.32.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:70805219682c54ff5366e7de8d98fef9&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 17:38:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766684#M534016</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2011-08-08T17:38:21Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766685#M534017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;then you would need just these:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (48,inside) 10.16.48.0 10.16.48.0&lt;/P&gt;&lt;P&gt;static (100,inside) 10.16.100.0 10.16.100.0&lt;/P&gt;&lt;P&gt;static (101,inside) 10.16.101.0 10.16.101.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try it and let me know if this works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 17:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766685#M534017</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-08T17:49:32Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766686#M534018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added those and I still cannot reach any of the subnets. (Thanks so much for your help so far) Any other ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 18:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766686#M534018</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2011-08-08T18:03:00Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766687#M534019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jerry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We then might to go the troubleshooting way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp &lt;IP of="" source="" machine=""&gt; 2345 &lt;IP of="" destination="" machine=""&gt; 3389 detailed&lt;/IP&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you provide one output of this command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 18:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766687#M534019</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-08T18:10:33Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766688#M534020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "packet-tracer input inside tcp 10.30.0.23 2345 10.16.48.170 3389"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.16.48.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; 48&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any 48 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 101 (10.16.48.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 10.30.0.23/2345 to 10.16.48.1/46119 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 101 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: 48&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 18:16:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766688#M534020</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2011-08-08T18:16:23Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766689#M534021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess we might have nailed it, you would need to add this acl:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 48_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in your config, it is inactive at the moment and that is why the traffic is dropping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if we are going in right direction, otherwise another output of packet-tracer &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 18:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766689#M534021</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-08T18:26:22Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766690#M534022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's another output. So far no worky. Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input inside tcp 10.30.0.23 2345 10.16.48.170 3389 detailed"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.16.48.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; 48&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd66fe6c8, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2, user_data=0xd66f6f48, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd6bbd568, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3053, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any 48 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 101 (10.16.48.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 3, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 10.30.0.23/2345 to 10.16.48.1/48931 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd6c179c0, priority=1, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0xd67b8f60, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 101 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd6b5b340, priority=1, domain=host, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1639, user_data=0xd6b5b020, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group 48_access_out out interface 48&lt;/P&gt;&lt;P&gt;access-list 48_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xd6b93850, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xd6b93810, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd6c0fe10, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4974, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 11525, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Module information for forward flow ...&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 10.16.48.170 using egress ifc 48&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address 0050.569d.2bfd hits 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: 48&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Aug 2011 19:02:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766690#M534022</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2011-08-08T19:02:06Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766691#M534023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello. Success on part of it! I can now remote into a 10.16.48.x machine. Now can someone assist me in adding 10.16.100 and 10.16.101?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's my config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.0.199 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif 48&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.16.48.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif 100&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.16.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif 101&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.16.101.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa805-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name daxko&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 100_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 100_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 100_access_in extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 100_access_in extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 48_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 48_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 48_access_in extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 48_access_in extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 101_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 48_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 48_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 48_access_out extended permit tcp any any inactive &lt;/P&gt;&lt;P&gt;access-list 48_access_out extended permit udp any any inactive &lt;/P&gt;&lt;P&gt;access-list 100_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 100_access_out extended permit tcp any any inactive &lt;/P&gt;&lt;P&gt;access-list 100_access_out extended permit udp any any inactive &lt;/P&gt;&lt;P&gt;access-list 100_access_out extended permit ip any any inactive &lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu 48 1500&lt;/P&gt;&lt;P&gt;mtu 100 1500&lt;/P&gt;&lt;P&gt;mtu 101 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-641.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (48) 101 interface&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (48,inside) 10.16.48.0 10.16.48.0 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (100,inside) 10.16.100.0 10.16.100.0 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (101,inside) 10.16.101.0 10.16.101.0 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;P&gt;access-group 48_access_in in interface 48&lt;/P&gt;&lt;P&gt;access-group 48_access_out out interface 48&lt;/P&gt;&lt;P&gt;access-group 100_access_in in interface 100&lt;/P&gt;&lt;P&gt;access-group 100_access_out out interface 100&lt;/P&gt;&lt;P&gt;access-group 101_access_in in interface 101&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 10.0.0.199 1&lt;/P&gt;&lt;P&gt;route inside 10.2.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.10.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.30.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.31.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.32.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.33.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.34.0.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;route inside 10.252.252.0 255.255.255.0 Gateway 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.32.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 10.30.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;client-update enable&lt;/P&gt;&lt;P&gt;telnet 10.30.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.32.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:d08113f8d49b927b3a0777acae8c1f45&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Aug 2011 15:11:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766691#M534023</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2011-08-09T15:11:26Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766692#M534024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I do a packet trace, this is what I get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input inside tcp 10.30.0.23 2345 10.16.100.167 3389 detailed"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.16.100.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd66fe6c8, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=31, user_data=0xd66f6f48, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd6bbd568, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4070, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any 100 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 101 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 4, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd6b5cbd0, priority=1, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4, user_data=0xd68b28c8, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: 100&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Aug 2011 15:19:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766692#M534024</guid>
      <dc:creator>smitty0375</dc:creator>
      <dc:date>2011-08-09T15:19:24Z</dc:date>
    </item>
    <item>
      <title>ASA5510 Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766693#M534025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jerry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Really happy, its worked, you now just need to asdd these:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (100) 101 interface&lt;/P&gt;&lt;P&gt;global (101) 101 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and add these well:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and we should be good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Aug 2011 16:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-port-question/m-p/1766693#M534025</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-09T16:33:18Z</dc:date>
    </item>
  </channel>
</rss>

