<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 2 issues with ASA 8.4 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662574#M557779</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i upgraded the ASA from 8.2(5) to 8.3(2)... everything seems to be working fine except ICMP and PcAnywhere &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(i'm guessing PcAnywhere uses a ping sweep to detect available hosts).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i can see traffic through the tunnel, but no ping.&amp;nbsp; Any idea??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 17 May 2013 15:09:55 GMT</pubDate>
    <dc:creator>Kshakir80</dc:creator>
    <dc:date>2013-05-17T15:09:55Z</dc:date>
    <item>
      <title>2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662560#M557765</link>
      <description>&lt;P&gt;I think the problems are related to NAT and how it is implemented in 8.4. Any help THANKS!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) vpn client connects, but can't access the network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) I need to allow pcanywhere traffic to go through the ASA to host 192.168.200.99. The remote host is a DHCP client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2011.04.16 09:33:06 =~=~=~=~=~=~=~=~=~=~=~=&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname kasa&lt;/P&gt;&lt;P&gt;domain-name k.intra&lt;/P&gt;&lt;P&gt;enable password 123 encrypted&lt;/P&gt;&lt;P&gt;passwd 123 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.200.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa841-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name k.intra&lt;/P&gt;&lt;P&gt;object network obj_any &lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network MNKA &lt;/P&gt;&lt;P&gt; host 192.168.200.99&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network RDP_static &lt;/P&gt;&lt;P&gt; host 192.168.200.99&lt;/P&gt;&lt;P&gt;object network OBJ-INSIDE_HOSTS &lt;/P&gt;&lt;P&gt; subnet 192.168.200.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network OBJ-RAVPN &lt;/P&gt;&lt;P&gt; subnet 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit tcp any host 192.168.200.99 eq pcanywhere-data &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN remark ACL outside interface for PCanywhere&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit udp any host 192.168.200.99 eq pcanywhere-status &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-RDPIN extended permit tcp any host 192.168.200.99 eq 3389 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-RDPIN extended permit object-group TCPUDP any host 192.168.200.99 eq 3389 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool eng_pool 10.10.10.10-10.10.10.20 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-641.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static OBJ-INSIDE_HOSTS OBJ-RAVPN destination static OBJ-RAVPN OBJ-RAVPN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network MNKA&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp pcanywhere-data pcanywhere-data &lt;/P&gt;&lt;P&gt;object network RDP_static&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 3389 3389 &lt;/P&gt;&lt;P&gt;access-group OUTSIDE-RDPIN in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set set esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set eng_trans esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn1 1 set reverse-route&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn_map 1 set ikev1 transform-set eng_trans&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn_map 1 set reverse-route&lt;/P&gt;&lt;P&gt;crypto map mymap 1 ipsec-isakmp dynamic dyn1&lt;/P&gt;&lt;P&gt;crypto map stat_map 10000 ipsec-isakmp dynamic dyn_map&lt;/P&gt;&lt;P&gt;crypto map stat_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal 30&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 1&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 3600&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86499&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 20&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd dns 208.67.222.222 208.67.220.220&lt;/P&gt;&lt;P&gt;dhcpd domain k.intra&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.200.100-192.168.200.110 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy eng_policy internal&lt;/P&gt;&lt;P&gt;group-policy eng_policy attributes&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt; default-domain value k.intra&lt;/P&gt;&lt;P&gt;username xtu password 123lol encrypted privilege 15&lt;/P&gt;&lt;P&gt;username vpnuser password uGotit encrypted&lt;/P&gt;&lt;P&gt;tunnel-group eng type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group eng general-attributes&lt;/P&gt;&lt;P&gt; address-pool eng_pool&lt;/P&gt;&lt;P&gt; default-group-policy eng_policy&lt;/P&gt;&lt;P&gt;tunnel-group eng ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 30 retry 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:21:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662560#M557765</guid>
      <dc:creator>tanzeus129</dc:creator>
      <dc:date>2019-03-11T20:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662561#M557766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat exemption is missing in case of VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) 1 source static OBJ-INSIDE_HOSTS OBJ-INSIDE_HOSTS destination static OBJ-RAVPN OBJ-RAVPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For&lt;/P&gt;&lt;P&gt;2) I need to allow pcanywhere traffic to go through the ASA to host&amp;nbsp; 192.168.200.99. The remote host is a DHCP client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the traffic over VPN tunnel??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Anisha&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: please mark this thread as answered if you feel your query is resolved. Do rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Apr 2011 18:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662561#M557766</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-04-16T18:04:08Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662562#M557767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will try that NAT. Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pcanywhere traffic is not over VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What we want is to redirect the pcanywhere traffic comes to the external FW interface to a host inside 192.168.200.99&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Apr 2011 19:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662562#M557767</guid>
      <dc:creator>tanzeus129</dc:creator>
      <dc:date>2011-04-16T19:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662563#M557768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as NAT is concerned, it worked like a charm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But what was wrong with what I had in place? Is it the ordering?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside,outside) source static OBJ-INSIDE_HOSTS OBJ-RAVPN destination static OBJ-RAVPN OBJ-RAVPN&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only thing left is part 2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Apr 2011 19:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662563#M557768</guid>
      <dc:creator>tanzeus129</dc:creator>
      <dc:date>2011-04-16T19:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662564#M557769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You had placed the following:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside,outside) source static OBJ-INSIDE_HOSTS OBJ-RAVPN&amp;nbsp; destination static OBJ-RAVPN OBJ-RAVPN&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that the source &lt;EM&gt;OBJ-INSIDE_HOSTS &lt;EM&gt;is getting translated to&amp;nbsp; &lt;/EM&gt;&lt;/EM&gt;&lt;EM&gt;OBJ-RAVPN.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not self-translation. Hence it was not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat-exemption 8.3 onwards is self translation of the source and self-translation of destination as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the 2nd part, i see the following configured:&lt;/P&gt;&lt;P&gt;object network RDP_static&lt;BR /&gt;host 192.168.200.99&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network RDP_static&lt;BR /&gt;nat (inside,outside) static interface service tcp 3389 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-RDPIN in interface outside&lt;BR /&gt;access-list OUTSIDE-RDPIN extended permit tcp any host 192.168.200.99 eq 3389&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-RDPIN extended permit object-group TCPUDP any host 192.168.200.99 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config is correct. there is no problem in it.&lt;/P&gt;&lt;P&gt;You can try the RDP on the outside interface ip address and it should forward you to the host 192.168.200.99.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i see that the outside ip address is a dynamic address by DHCP. so everytime you try to access the host 192.168.200.99 you need to enter the current interface IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anisha&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: please mark this thread as answered if you feel query is resolved. Do rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Apr 2011 02:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662564#M557769</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-04-17T02:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662565#M557770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It does not work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Apr 2011 04:06:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662565#M557770</guid>
      <dc:creator>tanzeus129</dc:creator>
      <dc:date>2011-04-17T04:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662566#M557771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please explain what exactly are you trying to do and how are you trying to achieve it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anisha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Apr 2011 10:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662566#M557771</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-04-17T10:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662567#M557772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I want to achieve what is known as redirect in the UNIX world or port forwarding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.openbsd.org/faq/pf/rdr.html"&gt;http://www.openbsd.org/faq/pf/rdr.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just want to know how it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's take RDP for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want the traffic to come to the external interface ex. RDP 1.2.3.4 on port 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want the firewall to redirect this traffic to host 192.168.200.99 on port 3389.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Apr 2011 15:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662567#M557772</guid>
      <dc:creator>tanzeus129</dc:creator>
      <dc:date>2011-04-17T15:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662568#M557773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you please paste your current configuration? As far as NAT concerns, the remote access clients were missing the excemption, and regarding the pcanywhere, the access group was not applied, please try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 4.2.2.2 1025 &lt;OUTSIDE_IP&gt; &lt;PCANYWHEREPORT&gt;&lt;/PCANYWHEREPORT&gt;&lt;/OUTSIDE_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will give you a trace and where the packet is being dropped. Please attach the latest configuration along with that output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Apr 2011 17:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662568#M557773</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-04-17T17:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662569#M557774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Running config is right above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa# packet-tracer input outside tcp 4.2.2.2 1025 1234 pcanywhere-d$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 1.2.3.4&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Same goes for RDP&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;asa# packet-tracer input outside tcp 4.2.2.2 1025 1.2.3.4 3389&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: ROUTE-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype: input&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;in&amp;nbsp;&amp;nbsp; 1.2.3.4&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&lt;/DIV&gt;&lt;DIV&gt;Result: DROP&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: outside&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: NP Identity Ifc&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: drop&lt;/DIV&gt;&lt;DIV&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Apr 2011 23:43:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662569#M557774</guid>
      <dc:creator>tanzeus129</dc:creator>
      <dc:date>2011-04-17T23:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662570#M557775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I do have a side question regarding NAT exemption in 8.4, as far as I understand, since nat-control is not requried in 8.4, then why do we need NAT exemption at all for VPN access? I have anyconnect VPN configured on 8.4 and I have ZERO NAT related configuration as far as SSLVPN is concerned and it worked like a charm, any experts care to explain why NAT exemption is required in 8.4 for VPN access?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Apr 2011 06:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662570#M557775</guid>
      <dc:creator>oldcreek12</dc:creator>
      <dc:date>2011-04-29T06:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662571#M557776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat exemption ensures that the data is pasisng over the VPN tunnel . hence it works like a charm for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Fw the natting will happen to protect the identity of the private network and to access the internet. Internet will work only for routable ip addresses i.e. public ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anisha&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: please mark this thread as answered if you feel your query is resolved. Do rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 May 2011 14:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662571#M557776</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-05-02T14:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662572#M557777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NAT is not necessarily "required" for Anyconnect to function. The reason why you add nat exemption rules is because you don't want the traffic to hit any of your other configured NAT rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, if you NAT your inside communication outbound for internet traffic, then you will also be NATing outbound communication destined to your anyconnect users. Since you don't want to NAT your inside hosts when they communicate with your Anyconnect VPN hosts, you create a NAT rule to exempt this traffic from being NATed.This is the same theory as NAT prior to 8.3 with nat-control disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For most ASA configurations, this means that a manual NAT rule is configured with both the source &amp;amp; destination. This ensures that the other PAT rules and NAT rules you may have configured will not affect traffic tp/from your VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course if you have no NAT rules which conflict, then there is no need to configure NAT exemption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Brendan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 May 2011 18:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662572#M557777</guid>
      <dc:creator>brquinn</dc:creator>
      <dc:date>2011-05-02T18:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: 2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662573#M557778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P id="[object]"&gt;HI, Brendan,&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;That was an excellent explanation that cleared my doubts, for the AnyConnect VPN I did not have NAT exemption and it worked was because I did not have any other NAT rules because the ASA was dedicated for VPN access. Thanks a lot!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 May 2011 19:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662573#M557778</guid>
      <dc:creator>oldcreek12</dc:creator>
      <dc:date>2011-05-02T19:06:28Z</dc:date>
    </item>
    <item>
      <title>2 issues with ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662574#M557779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i upgraded the ASA from 8.2(5) to 8.3(2)... everything seems to be working fine except ICMP and PcAnywhere &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(i'm guessing PcAnywhere uses a ping sweep to detect available hosts).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i can see traffic through the tunnel, but no ping.&amp;nbsp; Any idea??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 May 2013 15:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-issues-with-asa-8-4/m-p/1662574#M557779</guid>
      <dc:creator>Kshakir80</dc:creator>
      <dc:date>2013-05-17T15:09:55Z</dc:date>
    </item>
  </channel>
</rss>

