<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Plex Help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3773807#M7996</link>
    <description>&lt;P&gt;Hello;&lt;/P&gt;&lt;P&gt;I have that already define on both interfaces OUT and IN to allow IP, udp, and TCp to pass thru; please see my screen shot on what i have enable on my FW right now&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 06 Jan 2019 23:08:41 GMT</pubDate>
    <dc:creator>jjizzle1985</dc:creator>
    <dc:date>2019-01-06T23:08:41Z</dc:date>
    <item>
      <title>Plex Help</title>
      <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3773773#M7984</link>
      <description>&lt;P&gt;Hey Guys;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My friend and i wanna get our plex up and running; but seems to be having an issue with me connecting to my friends plex. Even with all services allows on all interfaces; I'm constantly keep getting this error "Inbound tcp connection denied from ISP/xxxxx to my FriendsWan/23097 flags SYN on interface OUT; and i really don't know why this connection is not allowed on the outside interface when i have all services allowed to just test.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any idea&lt;/P&gt;&lt;PRE&gt;&lt;SPAN class="pEM_ErrMsg"&gt;%ASA-2-106001: Inbound TCP connection denied from&lt;EM&gt; IP_address/port&lt;/EM&gt; to 
&lt;EM&gt;IP_address/port&lt;/EM&gt; flags &lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="Black"&gt;tcp_flags&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN class="pEM_ErrMsg"&gt; on interface &lt;/SPAN&gt;&lt;SPAN&gt;&lt;FONT color="Black"&gt;interface_name"&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/plex-help/m-p/3773773#M7984</guid>
      <dc:creator>jjizzle1985</dc:creator>
      <dc:date>2020-02-21T16:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: Plex Help</title>
      <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3773775#M7985</link>
      <description>&lt;P&gt;what is plex?&lt;/P&gt;&lt;P&gt;what is setup look like. you try to set up a vpn between friend and you? give us more information in order to help you.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 20:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/plex-help/m-p/3773775#M7985</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-06T20:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: Plex Help</title>
      <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3773785#M7986</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Plex is a client-server media player system and software suite comprising two main components. The Plex Media Server desktop application runs on Windows, macOS and Linux-compatibles including some types of NAS devices.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please see my attachment on my setup and yes tried vpn setup and getting the same issue; figure i would try plex to see if im getting the same response which i am and i don't know why.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here is my Cisco 1900 router setup&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;version 15.1&lt;BR /&gt;service telnet-zeroidle&lt;BR /&gt;service timestamps debug uptime&lt;BR /&gt;service timestamps log uptime&lt;BR /&gt;no service password-encryption&lt;BR /&gt;service udp-small-servers&lt;BR /&gt;service tcp-small-servers&lt;BR /&gt;service sequence-numbers&lt;BR /&gt;service counters max age 15&lt;BR /&gt;no service dhcp&lt;BR /&gt;!&lt;BR /&gt;hostname R21&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;errdisable recovery cause udld&lt;BR /&gt;errdisable recovery cause bpduguard&lt;BR /&gt;errdisable recovery cause rootguard&lt;BR /&gt;errdisable recovery cause pagp-flap&lt;BR /&gt;errdisable recovery cause dtp-flap&lt;BR /&gt;errdisable recovery cause link-flap&lt;BR /&gt;!&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;ip source-route&lt;BR /&gt;ip arp gratuitous local&lt;BR /&gt;ip arp incomplete retry 1&lt;BR /&gt;ip arp incomplete entries 1&lt;BR /&gt;ip options drop&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip bootp server&lt;BR /&gt;ip domain lookup source-interface GigabitEthernet0/0&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid CISCO1921/K9 sn FTX153581PG&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;spanning-tree portfast bpduguard&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip tcp ecn&lt;BR /&gt;ip tcp selective-ack&lt;BR /&gt;ip tcp timestamp&lt;BR /&gt;ip tcp synwait-time 5&lt;BR /&gt;ip tcp path-mtu-discovery&lt;BR /&gt;ip telnet hidden addresses&lt;BR /&gt;ip ssh logging events&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;crypto logging session&lt;BR /&gt;crypto logging ikev2&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt;encr aes 256&lt;BR /&gt;hash sha256&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 15000&lt;BR /&gt;crypto isakmp key test123 address 24.211.211.241&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set D@Link esp-aes esp-sha-hmac&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map ZebJJ 20 ipsec-isakmp&lt;BR /&gt;description Zeb 2 In-VPN&lt;BR /&gt;set peer 24.211.211.241&lt;BR /&gt;set security-association lifetime seconds 3644&lt;BR /&gt;set transform-set D@Link&lt;BR /&gt;match address 100&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Embedded-Service-Engine0/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description ISP/WAN&lt;BR /&gt;ip address dhcp&lt;BR /&gt;ip access-group Inbound in&lt;BR /&gt;ip helper-address x.x.x.1&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip nat enable&lt;BR /&gt;no ip virtual-reassembly in&lt;BR /&gt;ip virtual-reassembly out&lt;BR /&gt;duplex full&lt;BR /&gt;speed auto&lt;BR /&gt;crypto map ZebJJ&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description OUT&lt;BR /&gt;ip address x.x.x.5 255.255.255.252&lt;BR /&gt;ip access-group Inbound in&lt;BR /&gt;ip helper-address 1.1.8.6&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip nat enable&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex full&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip nat log translations syslog&lt;BR /&gt;ip nat source list 50 interface GigabitEthernet0/0 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 x.x.x.x 254&lt;BR /&gt;ip route 24.211.211.241 255.255.255.255 x.x.x.6&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;ip access-list extended filiter-Inbound&lt;BR /&gt;permit icmp any any&lt;BR /&gt;permit ip any any&lt;BR /&gt;permit udp any any&lt;BR /&gt;permit tcp any any&lt;BR /&gt;!&lt;BR /&gt;access-list 40 permit x.x.x.6&lt;BR /&gt;access-list 50 permit x.x.x.6&lt;BR /&gt;access-list 100 permit ip any host x.x.x.6&lt;BR /&gt;access-list 100 remark VPN&lt;BR /&gt;!&lt;BR /&gt;no cdp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;alias exec sa show aliases&lt;BR /&gt;alias exec sir show ip route&lt;BR /&gt;alias exec s show running-config&lt;BR /&gt;alias exec sarp show arp&lt;BR /&gt;alias exec stcp show tcp&lt;BR /&gt;alias exec sinnt show ip nat nvi translations&lt;BR /&gt;alias exec sinns show ip nat nvi statistics&lt;BR /&gt;alias exec ssh show ssh&lt;BR /&gt;alias exec scisa show crypto isakmp sa&lt;BR /&gt;alias exec sl show logging&lt;BR /&gt;alias exec sdc show data-corruption&lt;BR /&gt;alias exec si show interfaces&lt;BR /&gt;alias exec sc show clock&lt;BR /&gt;alias exec sp show protocols&lt;BR /&gt;alias exec sivr show ip virtual-reassembly&lt;BR /&gt;alias exec sii show ip interface&lt;BR /&gt;alias exec scm show crypto map&lt;BR /&gt;alias exec scipsec show crypto ipsec sa&lt;BR /&gt;alias exec scrule show crypto ruleset&lt;BR /&gt;alias exec scs show crypto session&lt;BR /&gt;alias exec sit show ip traffic&lt;BR /&gt;alias exec sis show interfaces summary&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line 2&lt;BR /&gt;no activation-character&lt;BR /&gt;no exec&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input all&lt;BR /&gt;transport output pad telnet rlogin lapb-ta mop udptn v120 ssh&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;session-timeout 30&lt;BR /&gt;access-class 40 in&lt;BR /&gt;exec-timeout 15 0&lt;BR /&gt;session-limit 3&lt;BR /&gt;login local&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 14&lt;BR /&gt;session-timeout 30&lt;BR /&gt;access-class 40 in&lt;BR /&gt;exec-timeout 15 0&lt;BR /&gt;session-limit 3&lt;BR /&gt;login local&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is also my Cisco Asa 5510 setup&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)58&lt;BR /&gt;!&lt;BR /&gt;hostname JFW&lt;BR /&gt;names&lt;BR /&gt;name 69.69.69.0 VpnNet description VpnNet&lt;BR /&gt;name 69.69.69.2 VpnRouter description VpnRouter&lt;BR /&gt;name 69.69.69.3 VpnSw description VpnSw&lt;BR /&gt;name 69.69.69.1 VpnGW description VpnGW&lt;BR /&gt;name 24.211.211.241 Zebulon description Zebulon&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description OUT&lt;BR /&gt;duplex full&lt;BR /&gt;nameif OUT&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address OutFW 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;description IN&lt;BR /&gt;duplex full&lt;BR /&gt;nameif IN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address InFw 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;description Vpn&lt;BR /&gt;duplex full&lt;BR /&gt;nameif Vpn&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address VpnGW 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;banner exec Welcome 2 Da Wall !!!!!!&lt;BR /&gt;banner login Welcome 2 Da Wall !!!!!!&lt;BR /&gt;banner motd Knowledge Is Power ND Power Is Money !!!!!&lt;BR /&gt;banner asdm Welcome 2 Da Wall !!!!!!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup OUT&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server InWin&lt;BR /&gt;object-group service Domain udp&lt;BR /&gt;port-object eq domain&lt;BR /&gt;object-group service Mail tcp&lt;BR /&gt;port-object eq 993&lt;BR /&gt;port-object eq pop2&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;port-object eq 465&lt;BR /&gt;port-object eq imap4&lt;BR /&gt;object-group service Net tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object eq 8080&lt;BR /&gt;port-object eq 8008&lt;BR /&gt;object-group service Time udp&lt;BR /&gt;port-object eq ntp&lt;BR /&gt;port-object eq time&lt;BR /&gt;object-group service Domain2 tcp&lt;BR /&gt;port-object eq domain&lt;BR /&gt;object-group service Kerberos tcp&lt;BR /&gt;port-object eq kerberos&lt;BR /&gt;object-group service Addme tcp&lt;BR /&gt;port-object eq 8888&lt;BR /&gt;object-group service VPN tcp&lt;BR /&gt;port-object eq 1194&lt;BR /&gt;port-object eq 1701&lt;BR /&gt;port-object eq pptp&lt;BR /&gt;port-object eq 88&lt;BR /&gt;port-object eq 500&lt;BR /&gt;object-group service VPN2 udp&lt;BR /&gt;port-object eq isakmp&lt;BR /&gt;port-object eq 1194&lt;BR /&gt;port-object eq 4500&lt;BR /&gt;object-group service Mail2 udp&lt;BR /&gt;port-object eq 465&lt;BR /&gt;port-object eq 587&lt;BR /&gt;port-object eq 995&lt;BR /&gt;object-group service Phone tcp&lt;BR /&gt;port-object eq 5223&lt;BR /&gt;port-object eq 5222&lt;BR /&gt;port-object eq 5228&lt;BR /&gt;object-group service Phone2 udp&lt;BR /&gt;port-object eq 16384&lt;BR /&gt;port-object eq 16385&lt;BR /&gt;port-object eq 16386&lt;BR /&gt;object-group service Plex tcp&lt;BR /&gt;port-object eq 32400&lt;BR /&gt;port-object eq 23097&lt;BR /&gt;object-group service FireStick tcp&lt;BR /&gt;port-object eq 60000&lt;BR /&gt;object-group service PS4 udp&lt;BR /&gt;port-object eq 3478&lt;BR /&gt;port-object eq 3479&lt;BR /&gt;port-object eq 3074&lt;BR /&gt;port-object eq 2053&lt;BR /&gt;port-object eq 6015&lt;BR /&gt;port-object eq 12000&lt;BR /&gt;port-object eq 11020&lt;BR /&gt;port-object eq 11025&lt;BR /&gt;port-object eq 11021&lt;BR /&gt;port-object eq 9307&lt;BR /&gt;port-object eq 3658&lt;BR /&gt;port-object eq 9308&lt;BR /&gt;object-group service Playstation tcp&lt;BR /&gt;port-object eq 3074&lt;BR /&gt;object-group service Tagged tcp&lt;BR /&gt;port-object eq 8000&lt;BR /&gt;object-group service Tagged2 udp&lt;BR /&gt;port-object eq 4001&lt;BR /&gt;port-object eq 4002&lt;BR /&gt;port-object eq 4004&lt;BR /&gt;port-object eq 4007&lt;BR /&gt;port-object eq 4009&lt;BR /&gt;port-object eq 4010&lt;BR /&gt;port-object eq 4003&lt;BR /&gt;port-object eq 4005&lt;BR /&gt;port-object eq 4006&lt;BR /&gt;port-object eq 4008&lt;BR /&gt;port-object eq 8000&lt;BR /&gt;port-object eq 9700&lt;BR /&gt;port-object eq 8913&lt;BR /&gt;object-group service Net2 udp&lt;BR /&gt;port-object eq 443&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq 8008&lt;BR /&gt;port-object eq 8080&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group service Micro udp&lt;BR /&gt;port-object eq 3544&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network Internal&lt;BR /&gt;description Internal&lt;BR /&gt;network-object InNet 255.255.255.0&lt;BR /&gt;network-object host InMedia&lt;BR /&gt;network-object host InSuSe&lt;BR /&gt;network-object host InLinux&lt;BR /&gt;network-object host InWin&lt;BR /&gt;network-object host InPS4&lt;BR /&gt;network-object host InLGTV&lt;BR /&gt;network-object host InFw&lt;BR /&gt;network-object host InAP&lt;BR /&gt;network-object host InSW&lt;BR /&gt;network-object host InViso&lt;BR /&gt;object-group network Vpn_In&lt;BR /&gt;network-object VpnNet 255.255.255.248&lt;BR /&gt;network-object host VpnRouter&lt;BR /&gt;network-object host VpnSw&lt;BR /&gt;network-object host VpnGW&lt;BR /&gt;object-group network PplWan&lt;BR /&gt;network-object host Zebulon&lt;BR /&gt;network-object host CiahWan&lt;BR /&gt;network-object host JasonWan&lt;BR /&gt;network-object host ReeWan&lt;BR /&gt;network-object host MarquitaWan&lt;BR /&gt;network-object host DomMaWan&lt;BR /&gt;network-object host ParentsWan&lt;BR /&gt;network-object host GabrielleWan&lt;BR /&gt;network-object host DreWan&lt;BR /&gt;object-group service Viso tcp&lt;BR /&gt;port-object eq 8883&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object host InLGTV&lt;BR /&gt;network-object host InViso&lt;BR /&gt;object-group network In-Servers&lt;BR /&gt;network-object host InSuSe&lt;BR /&gt;network-object host InLinux&lt;BR /&gt;network-object host InWin&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;network-object host OUTR21&lt;BR /&gt;network-object host OutFW&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;network-object OutNet 255.255.255.252&lt;BR /&gt;network-object host OUTR21&lt;BR /&gt;network-object host OutFW&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt;network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;network-object InNet 255.255.255.0&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_4&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt;network-object OutNet 255.255.255.252&lt;BR /&gt;network-object host OutFW&lt;BR /&gt;object-group network OUT&lt;BR /&gt;network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;network-object OutNet 255.255.255.252&lt;BR /&gt;network-object host OUTR21&lt;BR /&gt;network-object host OutFW&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_5&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_6&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network DNSServers&lt;BR /&gt;network-object host Level3.Resolve2&lt;BR /&gt;network-object host Level3.Resolve&lt;BR /&gt;network-object host Google2&lt;BR /&gt;network-object host Google&lt;BR /&gt;object-group service Time2 tcp&lt;BR /&gt;port-object eq daytime&lt;BR /&gt;access-list IN_access_in extended permit tcp InNet 255.255.255.0 object-group DM_INLINE_NETWORK_3 eq ssh&lt;BR /&gt;access-list IN_access_in extended permit object-group DM_INLINE_PROTOCOL_5 any any&lt;BR /&gt;access-list Out_access_in extended permit icmp any any&lt;BR /&gt;access-list Out_access_in extended permit object-group TCPUDP any any&lt;BR /&gt;access-list Out_access_in extended permit ip any any&lt;BR /&gt;access-list VPN_Internal standard permit VpnNet 255.255.255.248&lt;BR /&gt;access-list Vpn_access_in extended deny object-group DM_INLINE_PROTOCOL_4 VpnNet 255.255.255.248 object-group DM_INLINE_NETWORK_6&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list IN_nat0_outbound_1 extended permit ip host ISP host Zebulon&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 8192&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging console debugging&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging facility 23&lt;BR /&gt;logging message 106015 level alerts&lt;BR /&gt;logging message 106023 level emergencies&lt;BR /&gt;logging message 305006 level informational&lt;BR /&gt;logging message 305013 level errors&lt;BR /&gt;logging message 305012 level warnings&lt;BR /&gt;logging message 305011 level notifications&lt;BR /&gt;logging message 400010 level notifications&lt;BR /&gt;logging message 400014 level notifications&lt;BR /&gt;logging message 302015 level notifications&lt;BR /&gt;logging message 302014 level warnings&lt;BR /&gt;logging message 302013 level notifications&lt;BR /&gt;logging message 304001 level errors&lt;BR /&gt;logging message 302016 level warnings&lt;BR /&gt;logging message 302021 level warnings&lt;BR /&gt;logging message 302020 level notifications&lt;BR /&gt;mtu OUT 1500&lt;BR /&gt;mtu IN 1500&lt;BR /&gt;mtu Vpn 1500&lt;BR /&gt;ip local pool Vpn_Internal 69.69.69.4-69.69.69.6 mask 255.255.255.248&lt;BR /&gt;ip verify reverse-path interface OUT&lt;BR /&gt;ip verify reverse-path interface IN&lt;BR /&gt;ip verify reverse-path interface Vpn&lt;BR /&gt;ip audit name Info info action alarm&lt;BR /&gt;ip audit name Drop attack action drop&lt;BR /&gt;ip audit interface OUT Info&lt;BR /&gt;ip audit interface OUT Drop&lt;BR /&gt;ip audit interface IN Info&lt;BR /&gt;ip audit interface IN Drop&lt;BR /&gt;ip audit interface Vpn Info&lt;BR /&gt;ip audit interface Vpn Drop&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit InNet 255.255.255.0 IN&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (OUT) 8 interface&lt;BR /&gt;nat (IN) 0 access-list IN_nat0_outbound_1&lt;BR /&gt;nat (IN) 8 InNet 255.255.255.0&lt;BR /&gt;access-group Out_access_in in interface OUT&lt;BR /&gt;access-group IN_access_in in interface IN&lt;BR /&gt;access-group Vpn_access_in in interface Vpn&lt;BR /&gt;route OUT 0.0.0.0 0.0.0.0 OUTR21 1&lt;BR /&gt;route OUT Zebulon 255.255.255.255 VpnGW 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http server idle-timeout 999&lt;BR /&gt;http InNet 255.255.255.0 IN&lt;BR /&gt;http redirect IN 80&lt;BR /&gt;http redirect OUT 80&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sysopt connection tcpmss minimum 48&lt;BR /&gt;service resetoutside&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 1&lt;BR /&gt;ssh scopy enable&lt;BR /&gt;ssh InNet 255.255.255.0 IN&lt;BR /&gt;ssh timeout 15&lt;BR /&gt;console timeout 0&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 69.69.69.4-69.69.69.6 Vpn&lt;BR /&gt;dhcpd lease 21200 interface Vpn&lt;BR /&gt;dhcpd domain J-Vpn.Internal.com interface Vpn&lt;BR /&gt;dhcpd option 3 ip VpnRouter interface Vpn&lt;BR /&gt;dhcpd option 20 hex 01 interface Vpn&lt;BR /&gt;dhcpd option 29 hex 01 interface Vpn&lt;BR /&gt;dhcpd option 30 hex 01 interface Vpn&lt;BR /&gt;dhcpd option 31 hex 01 interface Vpn&lt;BR /&gt;dhcpd enable Vpn&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat shun except ip-address OutNet 255.255.255.252&lt;BR /&gt;threat-detection scanning-threat shun except ip-address InNet 255.255.255.0&lt;BR /&gt;threat-detection scanning-threat shun except ip-address VpnNet 255.255.255.248&lt;BR /&gt;threat-detection scanning-threat shun duration 300&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 1 burst-rate 214783647 average-rate 214783647&lt;BR /&gt;ntp authenticate&lt;BR /&gt;ntp server InSuSe source IN prefer&lt;BR /&gt;ntp server InLinux source IN&lt;BR /&gt;ssl encryption aes128-sha1 aes256-sha1 des-sha1 3des-sha1 rc4-sha1 rc4-md5&lt;BR /&gt;webvpn&lt;BR /&gt;svc image disk0:/Anyconnect/anyconnect-win-3.1.04072-k9.pkg 1&lt;BR /&gt;!&lt;BR /&gt;class-map IN-class&lt;BR /&gt;match access-list IN_mpc&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map type inspect http match-all asdm_medium_security_methods&lt;BR /&gt;match not request method post&lt;BR /&gt;match not request method get&lt;BR /&gt;match not request method head&lt;BR /&gt;class-map type inspect http match-all asdm_high_security_methods&lt;BR /&gt;match not request method get&lt;BR /&gt;match not request method head&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ftp FTP&lt;BR /&gt;description FTP&lt;BR /&gt;parameters&lt;BR /&gt;mask-banner&lt;BR /&gt;mask-syst-reply&lt;BR /&gt;policy-map type inspect http HTTP&lt;BR /&gt;description HTTP&lt;BR /&gt;parameters&lt;BR /&gt;protocol-violation action drop-connection&lt;BR /&gt;class asdm_medium_security_methods&lt;BR /&gt;drop-connection&lt;BR /&gt;policy-map type inspect dns DNS&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;id-randomization&lt;BR /&gt;id-mismatch action log&lt;BR /&gt;tsig enforced action log&lt;BR /&gt;policy-map type inspect netbios Net&lt;BR /&gt;parameters&lt;BR /&gt;protocol-violation action drop log&lt;BR /&gt;policy-map Internal&lt;BR /&gt;description Internal&lt;BR /&gt;class IN-class&lt;BR /&gt;inspect dns DNS&lt;BR /&gt;inspect ftp strict FTP&lt;BR /&gt;inspect http HTTP&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect icmp error&lt;BR /&gt;inspect netbios Net&lt;BR /&gt;inspect pptp&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ctiqbe&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect ils&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect waas&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy Internal interface IN&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:5027b8ea3f81d1d7b770779d78cc51a1&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 20:28:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/plex-help/m-p/3773785#M7986</guid>
      <dc:creator>jjizzle1985</dc:creator>
      <dc:date>2019-01-06T20:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: Plex Help</title>
      <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3773788#M7987</link>
      <description>&lt;P&gt;oh dear. that hell of the config you give us. hold on will take time to look into this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I only see a vpn config on router nothing on wireless. i guess you firewall is behind this router?&lt;/P&gt;&lt;P&gt;what are the config of your friend router/firewall&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 20:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/plex-help/m-p/3773788#M7987</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-06T20:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: Plex Help</title>
      <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3773797#M7988</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes the config is a bit much; correct only vpn config on router; nothing wireless; and yes my firewall sit behind my router and my friend is just using a standard ISP equipment; nothing cisco like i got it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 21:25:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/plex-help/m-p/3773797#M7988</guid>
      <dc:creator>jjizzle1985</dc:creator>
      <dc:date>2019-01-06T21:25:46Z</dc:date>
    </item>
    <item>
      <title>Re: Plex Help</title>
      <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3773800#M7990</link>
      <description>&lt;P&gt;your trying to build a site-to-site vpn with your friend. does his router is configured with VPN setting?&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 21:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/plex-help/m-p/3773800#M7990</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-06T21:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: Plex Help</title>
      <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3773803#M7991</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes from what i know its enable on his end; but that doesn't make sense on how i can't connect to his plex since that doesn't need vpn. This is weird and strange when i have the correct ports open to use Plex.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you see on why i get the same message when connections to plex are trying to be made; please see screen shot&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 22:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/plex-help/m-p/3773803#M7991</guid>
      <dc:creator>jjizzle1985</dc:creator>
      <dc:date>2019-01-06T22:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: Plex Help</title>
      <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3773804#M7994</link>
      <description>&lt;P&gt;you need to define a access-list to get this connection permit. as nothing is define in regards to this rule that is why traffic is drop/denied. I see DomMaWan is part of PplWan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object-group network PplWan&lt;BR /&gt;network-object host Zebulon&lt;BR /&gt;network-object host CiahWan&lt;BR /&gt;network-object host JasonWan&lt;BR /&gt;network-object host ReeWan&lt;BR /&gt;network-object host MarquitaWan&lt;BR /&gt;network-object host DomMaWan&lt;BR /&gt;network-object host ParentsWan&lt;BR /&gt;network-object host GabrielleWan&lt;BR /&gt;network-object host DreWan&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 22:36:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/plex-help/m-p/3773804#M7994</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-06T22:36:45Z</dc:date>
    </item>
    <item>
      <title>Re: Plex Help</title>
      <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3773807#M7996</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;&lt;P&gt;I have that already define on both interfaces OUT and IN to allow IP, udp, and TCp to pass thru; please see my screen shot on what i have enable on my FW right now&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 23:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/plex-help/m-p/3773807#M7996</guid>
      <dc:creator>jjizzle1985</dc:creator>
      <dc:date>2019-01-06T23:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: Plex Help</title>
      <link>https://community.cisco.com/t5/network-security/plex-help/m-p/3775261#M7999</link>
      <description>Run a packet tracer command and show us the output. This will let us where is the packet drop.&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Tue, 08 Jan 2019 16:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/plex-help/m-p/3775261#M7999</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-08T16:55:04Z</dc:date>
    </item>
  </channel>
</rss>

