<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 configuration for gotomeeting.com in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571010#M599402</link>
    <description>&lt;P&gt;How can I setup my asa 5510 to allow my users to be able to&lt;/P&gt;&lt;P&gt;get to gotomeeting.com&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:03:37 GMT</pubDate>
    <dc:creator>pingram</dc:creator>
    <dc:date>2019-03-11T19:03:37Z</dc:date>
    <item>
      <title>ASA 5510 configuration for gotomeeting.com</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571010#M599402</link>
      <description>&lt;P&gt;How can I setup my asa 5510 to allow my users to be able to&lt;/P&gt;&lt;P&gt;get to gotomeeting.com&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:03:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571010#M599402</guid>
      <dc:creator>pingram</dc:creator>
      <dc:date>2019-03-11T19:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 configuration for gotomeeting.com</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571011#M599403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ASA allows internet all websites are allowed.&lt;/P&gt;&lt;P&gt;If you're talking about using the MPF feature on the ASA to allow access to gotomeeting.com you can use a regular expression to match that string and permit the traffic.&lt;/P&gt;&lt;P&gt;Or do you have a CSC module that it's filtering HTTP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please explain what you want to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 16:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571011#M599403</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-02T16:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 configuration for gotomeeting.com</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571012#M599404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;We are having problems connecting to gotomeeting.com.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;It is allowed in the Astaro web filter but I think the Firewall is blocking it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;Can you tell me how to configure the firewall to allow gotomeeting to work.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;Here is the write up from Citrix.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;I think I would like to allow outbound through port 8200.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;1. Citrix Online products are configured to work outbound through ports 8200, or 80 or 443. In a restricted environment port 8200 can be set&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;up for outbound connections. Our products do not listen for, nor do they require, any inbound connections. Connections outbound via&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;port 8200 are optimal, although connections through ports 80 and 443 can also be used.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;2. If your firewall includes a content or application data scanning filter, this may cause blocking or latency, which would be indicated in the log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Calibri; "&gt;&lt;SPAN style="font-family: &amp;quot;HelveticaNeue-Light&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;files for the filter. To address this problem, verify the below IP ranges will &lt;/SPAN&gt;&lt;SPAN style="font-family: &amp;quot;HelveticaNeue-Medium&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;not &lt;/SPAN&gt;&lt;SPAN style="font-family: &amp;quot;HelveticaNeue-Light&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;be scanned or filtered by content or application data scanning&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;filters by specifying exception IP ranges that will not be filtered.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;3. If your security policy requires you to specify explicit IP ranges, then configure your firewall to limit port 8200 or 80 or 443 destination IP&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;addresses to only the Citrix Online ranges listed below.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Calibri; "&gt;&lt;SPAN style="font-family: &amp;quot;HelveticaNeue-Medium&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;Important Note: &lt;/SPAN&gt;&lt;SPAN style="font-family: &amp;quot;HelveticaNeue-Light&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;Steps 2 and 3 are &lt;/SPAN&gt;&lt;SPAN style="font-family: &amp;quot;HelveticaNeue-Medium&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;discouraged unless absolutely &lt;/SPAN&gt;&lt;SPAN style="font-family: &amp;quot;HelveticaNeue-Light&amp;quot;, &amp;quot;sans-serif&amp;quot;; font-size: 9pt;"&gt;necessary because such IP ranges need to be periodically audited&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;and modified, creating additional maintenance to your network. These changes are rare, but they may be necessary to continue to provide&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;the maximum performance for the Citrix Online family of applications. Maintenance and failover events may cause you to connect to servers&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;within any of the ranges.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;Citrix Online Server / Datacenter IP Addresses for Use in Firewall Configurations&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;Equivalent Specifications in 3 Common Formats&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Citrix Online&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Assigned Range&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;by Block*&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Numeric IP Address Range Netmask Notation CIDR Notation&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Block 1 216.115.208.0 - 216.115.223.255 216.115.208.0 255.255.240.0 216.115.208.0 / 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Block 2 216.219.112.0 - 216.219.127.255 216.219.112.0 255.255.240.0 216.219.112.0 / 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Block 3 66.151.158.0 - 66.151.158.255 66.151.158.0 255.255.255.0 66.151.158.0 / 24&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Block 4 66.151.150.160 - 66.151.150.191 66.151.150.160 255.255.255.224 66.151.150.160 / 27&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Block 5 66.151.115.128 - 66.151.115.191 66.151.115.128 255.255.255.192 66.151.115.128 / 26&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Block 6 64.74.80.0 - 64.74.80.255 64.74.80.0 255.255.255.0 64.74.80.0 / 24&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Block 7 202.173.24.0 - 202.173.31.255 202.173.24.0 255.255.248.0 202.173.24.0 / 21&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Block 8 67.217.64.0 - 67.217.95.255 67.217.64.0 255.255.224.0 67.217.64.0 / 19&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Block 9 78.108.112.0 - 78.108.127.255 78.108.112.0 255.255.240.0 78.108.112.0 / 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-size: 9pt; font-family: Calibri; "&gt;Block 10 68.64.0.0 - 68.64.31.255 68.64.0.0 255.255.224.0 68.64.0.0 / 19&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="HelveticaNeue-Light&amp;quot;: ; : ; color: #000000; font-size: 9pt; sans-serif&amp;quot;: ; font-family: Calibri; , &amp;quot;: ; "&gt;Block 11 206.183.100.0 - 206.183.103.255 206.183.100.0 255.255.252.0 206.183.100.0 / 22&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 16:41:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571012#M599404</guid>
      <dc:creator>pingram</dc:creator>
      <dc:date>2010-11-02T16:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 configuration for gotomeeting.com</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571013#M599405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will need to check the configuration of the ASA to check if it's blocking the traffic then.&lt;/P&gt;&lt;P&gt;What you can check is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL applied to the inside interface should be allowing this traffic.&lt;/P&gt;&lt;P&gt;If you're filtering HTTP also check that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need assistance to check the configuration, you can post the ''sh run'' here and just remove the sensitive part of the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 16:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571013#M599405</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-02T16:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 configuration for gotomeeting.com</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571014#M599406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the config without the critical information.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 18:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571014#M599406</guid>
      <dc:creator>pingram</dc:creator>
      <dc:date>2010-11-02T18:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 configuration for gotomeeting.com</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571015#M599407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's inspection for HTTP but I think the problem might be with the ACL applied to the inside interface (acl_in).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do the following test just to confirm the above:&lt;/P&gt;&lt;P&gt;Pick up an internal host i.e. 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add a rule to permit that host to access any traffic on the internet:&lt;/P&gt;&lt;P&gt;access-list acl_in line 1 permit ip host 10.1.1.1 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, try accesing gotomeeting.com from that host and see if it works. If it works is because there's something on that ACL blocking the traffic and we can check it out to determine why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 20:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571015#M599407</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-02T20:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 configuration for gotomeeting.com</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571016#M599408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added the following&lt;/P&gt;&lt;P&gt;access-list acl_in extended permit ip host "users ip address" any&lt;/P&gt;&lt;P&gt;Now it is working.&amp;nbsp; This solution will not work because he takes his laptop out to other branches and will not always get the same IP address.&lt;/P&gt;&lt;P&gt;I need to create an ACL that will allow everyone to get out to gotomeeting.com.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Nov 2010 18:26:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571016#M599408</guid>
      <dc:creator>pingram</dc:creator>
      <dc:date>2010-11-03T18:26:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 configuration for gotomeeting.com</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571017#M599409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now we know that it's just a matter of permitting the traffic in the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you include a permit ip statement it works, so one solution could be the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead of:&lt;/P&gt;&lt;P&gt;access-list acl_in extended permit ip host "users ip address" any&lt;/P&gt;&lt;P&gt;Use:&lt;/P&gt;&lt;P&gt;access-list acl_in extended permit ip LOCAL_NETWORK any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will allow any IP in the LOCAL_NETWORK to get out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if you want to restrict the traffic instead of opening the entire IP stack, you should enable logs for the Citrix transactions and check which ports are being used so that you open only those.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Nov 2010 18:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571017#M599409</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-03T18:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 configuration for gotomeeting.com</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571018#M599410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay I believe we are almost there!.&lt;/P&gt;&lt;P&gt;Can you show me the configuration to allow traffice on port 8200.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Nov 2010 18:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571018#M599410</guid>
      <dc:creator>pingram</dc:creator>
      <dc:date>2010-11-03T18:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 configuration for gotomeeting.com</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571019#M599411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list NAME permit tcp LOCAL_LAN any eq 8200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If 8200 runs on top of UDP, just change TCP for UDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Nov 2010 19:00:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-configuration-for-gotomeeting-com/m-p/1571019#M599411</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-03T19:00:13Z</dc:date>
    </item>
  </channel>
</rss>

