<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5520 Update &amp; Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645786#M594816</link>
    <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have an ASA 5520 at a remote location. It was set up and configured by a contractor. Up until a few days ago it was working fine. The AnyConnect quit working. I thought I would just reload the .svc file Then I couldn't use ASDM, so I went to the remote location and did a console connection and realized I was on incompatable versions of ASA, ASDM &amp;amp; anyconnect (thank you contractor). The ASA has an outside interface configured and an inside interface that the clients connect to. I updated the ASA from 7.0(6) to 8.2(2). The ASDM from 5 ? to 6.3(1) and the anyconnect to 2.3.01. I didn't export my config or firewall rules and now my clients can't get out my inside interface to the internet or ping anything. The ASA says the packets are being blocked from getting to the outside by a implict rule on the inside interface to block all outgoing ip traffic. Right above that rule on the same interface I have a rule to allow all outgoing ip traffic. I din't understand why it's being blocked when I have set up a rule as an execption.&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:32:23 GMT</pubDate>
    <dc:creator>hfth</dc:creator>
    <dc:date>2019-03-11T19:32:23Z</dc:date>
    <item>
      <title>ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645786#M594816</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have an ASA 5520 at a remote location. It was set up and configured by a contractor. Up until a few days ago it was working fine. The AnyConnect quit working. I thought I would just reload the .svc file Then I couldn't use ASDM, so I went to the remote location and did a console connection and realized I was on incompatable versions of ASA, ASDM &amp;amp; anyconnect (thank you contractor). The ASA has an outside interface configured and an inside interface that the clients connect to. I updated the ASA from 7.0(6) to 8.2(2). The ASDM from 5 ? to 6.3(1) and the anyconnect to 2.3.01. I didn't export my config or firewall rules and now my clients can't get out my inside interface to the internet or ping anything. The ASA says the packets are being blocked from getting to the outside by a implict rule on the inside interface to block all outgoing ip traffic. Right above that rule on the same interface I have a rule to allow all outgoing ip traffic. I din't understand why it's being blocked when I have set up a rule as an execption.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645786#M594816</guid>
      <dc:creator>hfth</dc:creator>
      <dc:date>2019-03-11T19:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645787#M594818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wow.... besides all the trouble, let's see why traffic is not getting out.&lt;/P&gt;&lt;P&gt;Do you have access to the CLI, to copy/paste the output of the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run access-list NAME&amp;nbsp; --&amp;gt; change NAME for the name of the ACL applied to the inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 19:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645787#M594818</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-08T19:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645788#M594819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's what I get when I show run access-list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any eq 3389 any &lt;BR /&gt;access-list outside_access_in_1 extended deny ip 81.129.179.0 255.255.255.0 any &lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 66.128.51.78 eq https &lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 66.128.51.78 eq www &lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 66.128.51.78 eq 3389 &lt;BR /&gt;access-list Block extended deny ip 81.129.179.0 255.255.255.0 any &lt;BR /&gt;access-list Block extended deny tcp host 81.129.179.245 any eq ssh &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.200.0 255.255.255.0 &lt;BR /&gt;access-list Split_tunnel remark Local Lan COLO&lt;BR /&gt;access-list Split_tunnel standard permit 192.168.200.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.200.1 is the ip of my internal interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA can ping ip's from the outside interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 19:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645788#M594819</guid>
      <dc:creator>hfth</dc:creator>
      <dc:date>2011-01-08T19:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645789#M594822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For traffic to go to the internet through the ASA besides being permitted on the inside interface, it should have a NAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example.&lt;/P&gt;&lt;P&gt;I want to allow network 10.0.0.0/24 to get out to the Internet through the ASA, this is what I need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. An ACL permitting this traffic applied to the inside interface in the inbound direction: &lt;/P&gt;&lt;P&gt;access-list inside permit ip 10.0.0.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. The ACL must be applied correctly:&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. There should be a NAT rule:&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the packet tracer utility to emulate the connection and see what is reported by the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input tcp 10.0.0.1 1024 4.2.2.2 80 det&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above command, will allow the ASA to report if a connection from 10.0.0.1 to 4.2.2.2 (Internet) on TCP port 80 would be permitted to flow through it or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 19:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645789#M594822</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-08T19:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645790#M594823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, now the test shows the packets go through to the outside, but before these last few config changes I could do the AnyConnect and remote on to one of the clients, even though they couldn't get on the internet. Now I'm going in through the AnyConnect to do an RDP and it's telling me it can't connect to the remote computer. Is there something else I need to to in the acces rule or NAT to make the remote desktop work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 20:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645790#M594823</guid>
      <dc:creator>hfth</dc:creator>
      <dc:date>2011-01-08T20:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645791#M594826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mean there's internet access now working from inside the ASA?&lt;/P&gt;&lt;P&gt;To be able to connect via AnyConnect to an external client you are required to allow TCP 443 on the same ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Include:&lt;/P&gt;&lt;P&gt;access-list inside permit tcp 10.0.0.0 255.255.255.0 any eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above line should allow any computer on the local LAN (10.0.0.0/24) to connect to any remote AnyConnect server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 20:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645791#M594826</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-08T20:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645792#M594828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe I didn't make it completely clear. Before I made the changes you suggested to get the internet working on the client computers, I hade updated the ASA, ASDM &amp;amp; anyconnect. I can connect via ASDM, any the anyconnect has been working. Prior to the changes I just made, I could connect via the anyconnect and remote onto a client machine via name or ip. Now after these changes, I can still connect via the anyconnect, but when I try the remote desktop connection, it tells me I can't connect. I was going to remote onto one to check the internet via the browser.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 20:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645792#M594828</guid>
      <dc:creator>hfth</dc:creator>
      <dc:date>2011-01-08T20:45:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645793#M594829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see how trying to give the internal users internet access will break the AnyConnect access in.&lt;/P&gt;&lt;P&gt;Obviously it was something we did while trying to fix this with the commands I gave you, so... why don't you share the running-config and we'll take a look at it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine that if you revert the changes I gave you, then you're able to access via RD the machine using AnyConnect, correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 20:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645793#M594829</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-08T20:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645794#M594831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is my running config attached. I'm going revert and test the remote onto one of the desktops.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 21:05:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645794#M594831</guid>
      <dc:creator>hfth</dc:creator>
      <dc:date>2011-01-08T21:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645795#M594833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While doing this let me know the IP address of the internal machine you're trying to RD to and if you can PING it while connected via AnyConnect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not, add this line:&lt;/P&gt;&lt;P&gt;access-list inside permit ip any any&lt;/P&gt;&lt;P&gt;And try again.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 21:14:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645795#M594833</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-08T21:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645796#M594835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the attached running config I can anyconnect and rd onto a client but the client cannot access the internet. I can ping the client when I'm connected via anyconnect as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 21:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645796#M594835</guid>
      <dc:creator>hfth</dc:creator>
      <dc:date>2011-01-08T21:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645797#M594839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To give Internet access to the 192.168.200.0/24 network you need to add this line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.200.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 21:27:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645797#M594839</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-08T21:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645798#M594841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that looks like it got it!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 21:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645798#M594841</guid>
      <dc:creator>hfth</dc:creator>
      <dc:date>2011-01-08T21:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645799#M594842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm glad that it worked &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 21:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645799#M594842</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-08T21:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645800#M594845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I spoke too soon. Yes, I was already RD on to a client and when I added the NAT rule it let me on the internet. But, when I closed out of everything and tried to anyconnect and then the rd, the rd didn't work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 21:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645800#M594845</guid>
      <dc:creator>hfth</dc:creator>
      <dc:date>2011-01-08T21:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645801#M594847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, the LAN has internet access now correct?&lt;/P&gt;&lt;P&gt;Also, you can connect via AnyConnect but not RD into the machine... so...&lt;/P&gt;&lt;P&gt;What's the IP of this computer and can you PING it from the AnyConnect client?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 21:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645801#M594847</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-08T21:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645802#M594849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok got it.&lt;/P&gt;&lt;P&gt;From the last config you post, this are the changes you need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.200.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.200.0 255.255.255.0 192.168.200.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those three commands should take care of the internet access and still allowing connectivity to the internal machines via AnyConnect.&lt;/P&gt;&lt;P&gt;However, the VPN pool is recommended to have it as a separate non-overlapping range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 21:49:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645802#M594849</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-08T21:49:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645803#M594850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The exempt NAT rule allowed the RD, I'll have to seperate the ip ranges in the rules for the internal &amp;amp; VPN later. Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 22:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645803#M594850</guid>
      <dc:creator>hfth</dc:creator>
      <dc:date>2011-01-08T22:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Update &amp; Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645804#M594851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad I could help and thanks for the ratings &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 22:10:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-update-configuration/m-p/1645804#M594851</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-08T22:10:13Z</dc:date>
    </item>
  </channel>
</rss>

