<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA CLI in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623447#M593436</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat(inside) 1 192.168.76.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global(outside) 1 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please post the output of commands "sh run nat" and "sh run global".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anisha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Jan 2011 14:13:07 GMT</pubDate>
    <dc:creator>andamani</dc:creator>
    <dc:date>2011-01-25T14:13:07Z</dc:date>
    <item>
      <title>Cisco ASA CLI</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623445#M593434</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please help, I have servers sitting on the internal LAN inside 1( 192.168.76.0 /24 ) I would like all the hosts on this network to browse the internet by using the external address of the firewall (outside), I need to do a NAT to hide the private IPs and an Access rule ..Can you please help with the commands ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I try to Nat I get error overlaps with outside interface address !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rabih&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:39:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623445#M593434</guid>
      <dc:creator>r.arzouni</dc:creator>
      <dc:date>2019-03-11T19:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA CLI</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623446#M593435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rabih,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version of ASA code are you running? It would help if you could post a sanitized copy of your current NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, this is what the syntax will look like on 8.0 or 8.2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;nat (inside) 1 192.168.76.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the syntax for 8.3:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;object network obj-192.168.76.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subnet 192.168.76.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jan 2011 14:06:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623446#M593435</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-01-25T14:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA CLI</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623447#M593436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat(inside) 1 192.168.76.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global(outside) 1 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please post the output of commands "sh run nat" and "sh run global".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anisha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jan 2011 14:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623447#M593436</guid>
      <dc:creator>andamani</dc:creator>
      <dc:date>2011-01-25T14:13:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA CLI</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623448#M593437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sh run nat posted as requested:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasanode1newbury(config)# sh run nat&lt;BR /&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (inside1SYHA) 1 192.168.76.0 255.255.255.0&lt;BR /&gt;ciscoasanode1newbury(config)# sh run global&lt;BR /&gt;global (outside) 101 interface&lt;BR /&gt;ciscoasanode1newbury(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried your command and this is what I get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;CR&gt;&lt;BR /&gt;ciscoasanode1newbury(config)# global (outside) 1 interface&lt;BR /&gt;global for this range already exists&lt;BR /&gt;ciscoasanode1newbury(config)#&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;not sure what I am doing wrong&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jan 2011 16:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623448#M593437</guid>
      <dc:creator>r.arzouni</dc:creator>
      <dc:date>2011-01-25T16:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA CLI</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623449#M593438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rabih,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case, you'll need to change your NAT statement. Just use this instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside1SYHA) 1 192.168.76.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside1SYHA) 101 192.168.76.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jan 2011 16:31:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623449#M593438</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-01-25T16:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA CLI</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623450#M593439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike / All thanks for that,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did add the nat rule as he said :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasanode1newbury(config)# sh run nat&lt;BR /&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (inside1SYHA) 101 192.168.76.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the firewall but still can not browse the internet do I need to add a rule or something ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rabih&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jan 2011 17:02:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623450#M593439</guid>
      <dc:creator>r.arzouni</dc:creator>
      <dc:date>2011-01-25T17:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA CLI</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623451#M593440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rabih,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That depends on what the rest of the configuration looks like. Try checking your rules with the packet-tracer to make sure everything looks correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer in inside1SYHA udp 192.168.76.10 12345 4.2.2.2 53&lt;/P&gt;&lt;P&gt;packet-tracer in inside1SYHA tcp 192.168.76.10 12345 4.2.2.2 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jan 2011 17:04:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623451#M593440</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-01-25T17:04:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA CLI</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623452#M593441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outcome of the packet trace:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside1SYHA&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2nd trace:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside1SYHA&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cant you please help ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rabih&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jan 2011 17:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623452#M593441</guid>
      <dc:creator>r.arzouni</dc:creator>
      <dc:date>2011-01-25T17:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA CLI</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623453#M593442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rabih,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the security levels of the inside1SYHA and outside interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can permit traffic via an ACL like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside1SYHA_access_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group inside1SYHA_access_in in interface inside1SYHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would allow all outbound IP traffic to go through the inside1SYHA interface. You can make that more restrictive if you'd like.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that still doesn't work, please post a sanitized copy of your config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jan 2011 17:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-cli/m-p/1623453#M593442</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-01-25T17:22:21Z</dc:date>
    </item>
  </channel>
</rss>

