<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 preventing external SNMP response in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474966#M690336</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also have a similar problem. I have gone through the Cisco Documentation, It says that ASA Firewall by default have NAT and PAT Limitations for SNMP traffic. That means the the NAT traffic for routers SNMP can not be passed through ASA by default. Please check table 40-1 on &lt;A class="active_link" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_overview.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_overview.html&lt;/A&gt; &lt;/P&gt;&lt;P&gt;I am also looking for the solution by which the defaullt can be twiked and the SNMP traffic is allowed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 25 Nov 2012 09:30:31 GMT</pubDate>
    <dc:creator>Mandar Deorukhkar</dc:creator>
    <dc:date>2012-11-25T09:30:31Z</dc:date>
    <item>
      <title>ASA 5510 preventing external SNMP response</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474962#M690296</link>
      <description>&lt;P&gt;I have the following setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R--H1&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;F&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;H2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R: 3840&lt;/P&gt;&lt;P&gt;F: ASA 5510&lt;/P&gt;&lt;P&gt;H: Hosts 1 and 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to get SNMP info from the router to H2 but snmpwalk errors with no response from router. I can get info from H1 and neither interface on router is preventing SNMP traffic from coming or going.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Is there something that needs to be configured to allow SNMP traffic (orginating from INSIDE) to reply? (Also note that there is no Inspect Maps blocking and SNMP versions).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474962#M690296</guid>
      <dc:creator>Steve Gunter</dc:creator>
      <dc:date>2019-03-11T17:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 preventing external SNMP response</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474963#M690304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA you would need a STATIC NAT (if nat-control is enabled) and an ACL permitting the traffic. --&amp;gt; This is if the connection originates from the outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the connection originates from the inside, then you need NAT (if nat-control is enabled) and if there's an ACLapplied to the inside interface, you need to make sure the traffic is permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 19:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474963#M690304</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-14T19:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 preventing external SNMP response</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474964#M690312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, there is NAT where H2 is on the INSIDE, and the router is on the OUTSIDE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have allowed all IP inbound on the INSIDE interface and I do not have this issue with other UDP protocols (such as ntp).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 19:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474964#M690312</guid>
      <dc:creator>Steve Gunter</dc:creator>
      <dc:date>2010-05-14T19:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 preventing external SNMP response</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474965#M690321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So you mentioned that the SNMP traffic will be originated from the inside (from H2)?&lt;BR /&gt;If there's NAT and ACL permission, then it should work. &lt;BR /&gt;You can do a Packet Tracer test from ASDM or from CLI to see if the traffic is passing through fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 19:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474965#M690321</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-14T19:52:55Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 preventing external SNMP response</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474966#M690336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also have a similar problem. I have gone through the Cisco Documentation, It says that ASA Firewall by default have NAT and PAT Limitations for SNMP traffic. That means the the NAT traffic for routers SNMP can not be passed through ASA by default. Please check table 40-1 on &lt;A class="active_link" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_overview.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_overview.html&lt;/A&gt; &lt;/P&gt;&lt;P&gt;I am also looking for the solution by which the defaullt can be twiked and the SNMP traffic is allowed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Nov 2012 09:30:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-preventing-external-snmp-response/m-p/1474966#M690336</guid>
      <dc:creator>Mandar Deorukhkar</dc:creator>
      <dc:date>2012-11-25T09:30:31Z</dc:date>
    </item>
  </channel>
</rss>

