<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/1432578#M634699</link>
    <description>&lt;P&gt;I am trying to telnet between two locations and&amp;nbsp; i am unable to inbound telnet to the ASA&lt;/P&gt;&lt;P&gt;router. I can outbound to the other location.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created access rules in the ACL on the ASA for the source and destination. But I still see the IP being denied in the log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there another place I need to input those IPs to allow access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should I clear the ASDM cache?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help,&lt;BR /&gt;Jackie&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:00:25 GMT</pubDate>
    <dc:creator>siclines1234</dc:creator>
    <dc:date>2019-03-11T18:00:25Z</dc:date>
    <item>
      <title>ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/1432578#M634699</link>
      <description>&lt;P&gt;I am trying to telnet between two locations and&amp;nbsp; i am unable to inbound telnet to the ASA&lt;/P&gt;&lt;P&gt;router. I can outbound to the other location.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created access rules in the ACL on the ASA for the source and destination. But I still see the IP being denied in the log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there another place I need to input those IPs to allow access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should I clear the ASDM cache?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help,&lt;BR /&gt;Jackie&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510/m-p/1432578#M634699</guid>
      <dc:creator>siclines1234</dc:creator>
      <dc:date>2019-03-11T18:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/1432579#M634700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you create the appropiate rules to allow telnet traffic through the ASA, it should work.&lt;/P&gt;&lt;P&gt;Make sure that the rule that permits telnet is above any deny rule (blocking telnet), remember the ACLs are read in sequential order.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post the output of:&lt;/P&gt;&lt;P&gt;sh run access-group&lt;/P&gt;&lt;P&gt;sh run access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 17:56:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510/m-p/1432579#M634700</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-16T17:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/1432580#M634701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sh run access-group&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group Phone_access_in in interface Phone&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run access-list&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 70.33.178.167 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.166 object-group DM_INLINE_TCP_4 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.165 object-group DM_INLINE_TCP_0 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.166 object-group DM_INLINE_TCP_3 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.170 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.171 object-group DM_INLINE_TCP_2 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.173 object-group DM_INLINE_TCP_5 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.168 eq pptp &lt;BR /&gt;access-list outside_access_in extended permit gre any host 70.33.178.168 &lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host 70.33.178.174 eq sip &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.174 object-group HUD &lt;BR /&gt;access-list outside_access_in extended permit udp any host 70.33.178.174 object-group IAX2 &lt;BR /&gt;access-list outside_access_in extended permit udp any host 70.33.178.174 object-group RTP &lt;BR /&gt;access-list outside_access_in extended permit udp any host 70.33.178.174 eq tftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.172 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.169 object-group RDP &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 70.33.178.179 object-group RDP &lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_4 any host 66.160.11.132 &lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 host 66.160.11.132 any &lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_2 any host 66.160.11.132 &lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_3 host 66.160.11.132 host 70.33.178.164 &lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_5 host 66.160.11.129 any &lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_6 any host 66.160.11.129 &lt;BR /&gt;access-list outside_cryptomap extended permit object-group DM_INLINE_PROTOCOL_1 192.168.10.0 255.255.255.0 192.168.30.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit gre host 192.168.10.23 any &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.30.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.20.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.11.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.21.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.31.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip object-group DM_INLINE_NETWORK_1 192.168.20.0 255.255.255.0 &lt;BR /&gt;access-list Phone_access_in extended permit ip any any &lt;BR /&gt;access-list Phone_access_in extended permit icmp any any &lt;BR /&gt;access-list Phone_access_in extended permit tcp any any eq https &lt;BR /&gt;access-list Phone_nat0_outbound extended permit ip 192.168.11.0 255.255.255.0 192.168.20.0 255.255.255.0 &lt;BR /&gt;access-list Phone_nat0_outbound extended permit ip 192.168.11.0 255.255.255.0 192.168.30.0 255.255.255.0 &lt;BR /&gt;access-list Phone_nat0_outbound extended permit ip 192.168.11.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list Phone_nat0_outbound extended permit ip any 192.168.10.128 255.255.255.128 &lt;BR /&gt;access-list Phone_nat0_outbound extended permit ip any 192.168.30.0 255.255.255.0 &lt;BR /&gt;access-list Phone_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.30.0 255.255.255.0 &lt;BR /&gt;access-list outside_1_cryptomap_1 extended permit object-group DM_INLINE_PROTOCOL_5 192.168.10.0 255.255.255.0 192.168.30.0 255.255.255.0 &lt;BR /&gt;access-list outside_1_cryptomap extended permit object-group DM_INLINE_PROTOCOL_4 192.168.10.0 255.255.255.0 192.168.30.0 255.255.255.0 &lt;BR /&gt;access-list outside_1_cryptomap_2 extended permit ip 192.168.10.0 255.255.255.0 192.168.30.0 255.255.255.0 &lt;BR /&gt;access-list outside_3_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.21.0 255.255.255.0 &lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.20.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap_2 extended permit ip 192.168.10.0 255.255.255.0 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 18:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510/m-p/1432580#M634701</guid>
      <dc:creator>siclines1234</dc:creator>
      <dc:date>2010-06-16T18:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/1432581#M634702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What code are you using?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please include the source and destination for the telnet that is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please include which translation(nat/static) you are expecting to be used by the traffic, I believe you are saying it is from internet to the inside of firewall right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since your access-list has object groups, please include the details of the objects so that we can see if there may be issue there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please include any log you get for the source or destination when you try to do the traffic flow that does not work .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe you can also use packet tracer (available on code 7.2 and later) to simulate the traffic, and see where it fails :&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/p_72.html#wp1724426"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/p_72.html#wp1724426&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jun 2010 03:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510/m-p/1432581#M634702</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-06-17T03:55:23Z</dc:date>
    </item>
  </channel>
</rss>

