<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5510 setup issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509627#M601824</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heather,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post a running config for us to review? That will help determine the areas of the config that need to be focused on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Oct 2010 14:44:57 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2010-10-05T14:44:57Z</dc:date>
    <item>
      <title>ASA5510 setup issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509624#M601821</link>
      <description>&lt;P&gt;We are configuring an ASA5510 for the first time.&amp;nbsp; However, we seem to have hit a wall.&amp;nbsp; There seems to be no communication between the interfaces at all.&amp;nbsp; We have played with the static routes and access rules to no avail, it just seems like nothing can get in or out.&amp;nbsp;&amp;nbsp; At the moment, we have it opened up to pretty much anything, to try to get anything to work, but still nothing. (read:&amp;nbsp; Any interface, any source any destination) Does anyone have any idea of what crucial step we might be missing?&amp;nbsp;&amp;nbsp; We are mostly using the ASDM, but have had to do a little with the CLI since that seems to be what everyone knows in any help docs.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509624#M601821</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2019-03-11T18:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 setup issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509625#M601822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Heather,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will assume the interfaces are set for different security levels.&amp;nbsp; If that is true, then you will most likely need to have a static or nat statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see here:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/cfgnat.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/cfgnat.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It sounds like you have the acls and the routing in place.&amp;nbsp; Let me know what you have set up for the natting/static side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 22:20:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509625#M601822</guid>
      <dc:creator>Scott Nishimura</dc:creator>
      <dc:date>2010-10-04T22:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 setup issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509626#M601823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well we've tried several different options.&amp;nbsp; Right now just to try to get ANYTHING to work, we've created really open rules that would essentially allow anything in either direction.&amp;nbsp; We've tried with and without NAT rules in place, but it doesn't seem to make a difference one way or another.&amp;nbsp; I'm not sure if the "any interface, any source, any destination" type of NAT would do anything anyway.&amp;nbsp;&amp;nbsp; NAT control is no longer available in 8.3, so it seems that NAT is less likly to be holding us up, but we're so new to this that we couldn't be sure of that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've done the global ACL allows to open it up, and with our staic routes we've tried a myriad of ideas on how to communicate it's direction.&amp;nbsp; It seems that the interfaces are just not passing information to one another.&amp;nbsp; We have routes from 0.0.0.0 to the external interface, we've tried from the internal to external interfaces, and pretty much any combination you can think of, and to no effect. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas what to look at?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 14:40:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509626#M601823</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-05T14:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 setup issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509627#M601824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heather,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post a running config for us to review? That will help determine the areas of the config that need to be focused on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 14:44:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509627#M601824</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-10-05T14:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 setup issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509628#M601825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Heather,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a route back for internal ip addresses when they are hitting the outside since you are not natting?&lt;/P&gt;&lt;P&gt;Does your inside interface have higher security level than your outside?&lt;/P&gt;&lt;P&gt;If you are testing with pings, make sure you have icmp inspection enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know&amp;nbsp; if they helped. And like mirober2 suggested, if not please provide your config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 15:08:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509628#M601825</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-05T15:08:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 setup issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509629#M601826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is our config file.&amp;nbsp; It's a bit of a mess now because we've been trying so many different things (&lt;/P&gt;&lt;P&gt;none of which have worked)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.3(2)&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; description EXTERNAL&lt;BR /&gt; nameif OUTSIDE&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.0.204.65 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description INTERNAL INTERFACE&lt;BR /&gt; nameif INSIDE&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description DMZ INTERFACE&lt;BR /&gt; shutdown&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address STORAGECONTROLLERA 255.255.255.192&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; description LAN/STATE Failover Interface&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 99&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa823-k8.bin&lt;BR /&gt;boot system disk0:/asa832-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone MST -7&lt;BR /&gt;dns domain-lookup OUTSIDE&lt;BR /&gt;dns domain-lookup INSIDE&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE_access_in extended permit tcp any any eq www&lt;BR /&gt;access-list OUTSIDE_access_in remark ALLOW SLO TESTERS TO COMMUNICATE WITH XWD.&lt;BR /&gt;access-list OUTSIDE_access_in extended permit object-group HTTPHTTPS 10.0.204.64 255.255.255.192 host 10.2.204.55&lt;BR /&gt;access-list INSIDE_nat0_outbound extended permit ip any 192.168.204.240 255.255.255.240&lt;BR /&gt;access-list global_access extended permit tcp any any eq www log errors&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging console emergencies&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging class auth console errors&lt;BR /&gt;logging class sys console errors&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool VPBNIPPOOL 192.168.204.240-192.168.204.250 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;asdm image disk0:/asdm-634.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (INSIDE,OUTSIDE) source static X_LAN X_LAN destination static mapped_public_pool mapped_public_pool&lt;BR /&gt;access-group INSIDE_access_in in interface INSIDE&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 10.0.204.65 1&lt;BR /&gt;route INSIDE 192.168.2.137 255.255.255.255 192.168.2.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.1.2 255.255.255.255 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no sysopt connection permit-vpn&lt;BR /&gt;service resetoutside&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-&lt;/P&gt;&lt;P&gt;SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map OUTSIDE_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map OUTSIDE_map interface INSIDE&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 INSIDE&lt;BR /&gt;ssh 192.168.1.2 255.255.255.255 INSIDE&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:bab91fe79432cd34bd138842c26c47c4&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 15:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509629#M601826</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-05T15:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 setup issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509630#M601827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Whoops I hadn't noticed that my co-worker deletedmost of the NAT and Route rules that were in place yesterday. &lt;/P&gt;&lt;P&gt;There would hve been a few "any, any, any" commands for the NAT and allow all services in the ACL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 16:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509630#M601827</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-05T16:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 setup issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509631#M601828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heather,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest taking on one issue at a time to make it easier to troubleshoot. Try removing your NAT rules and then configuring this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-192.168.2.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may also need this if your DNS server is not in the 192.168.2.0 subnet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE_access_in extended permit udp any any eq 53&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;access-list global_access extended permit udp any any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once those commands are configured, try to access the Internet from a host in the 192.168.2.0 subnet. If that works, let us know what other traffic is failing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 16:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509631#M601828</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-10-05T16:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 setup issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509632#M601829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!&amp;nbsp; Your dynamic NAT statement is the key that we were looking for!&amp;nbsp; As I understand it, it is the statement that allows the internal and external interfaces to communicate with one another, and that is the piece we were missing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now we need to start redoing our actual ACLs and see if they work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 17:38:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509632#M601829</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-05T17:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 setup issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509633#M601830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Heather,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad that worked for you. Keep in mind that in 8.3 you need to use the real IP (i.e. before NAT takes place) when you setup your access-lists. This is a significant change from the way it was done in pre-8.3 configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 17:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-setup-issues/m-p/1509633#M601830</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-10-05T17:42:48Z</dc:date>
    </item>
  </channel>
</rss>

