<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CISCO ASA 5520 configuration problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250781#M827770</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hey Josh! thanks so far, I'm off to a running start. However I still have some issues. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Aug 2009 15:30:17 GMT</pubDate>
    <dc:creator>mark.stclaire</dc:creator>
    <dc:date>2009-08-24T15:30:17Z</dc:date>
    <item>
      <title>CISCO ASA 5520 configuration problems</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250779#M827709</link>
      <description>&lt;P&gt;Guys I'm stuck and need as much help as possible please. I'm from Guyana, South America. I have my ISP connected to one cisco 2800 series Router connected to a Cisco ASA 5520 firewall then to a dell power connect switch then 9 small networks on Cisco 881 Routers. Also from the ASA 5520 I have my servers connected as DMZ. Now What I want to accomplish is for my DMZ to have outbound and inbound access to the internet and my small networks to reach the DMZ and also the internet. Also VPN from remote networks to access the DMZ. below is my current running-config on the ASA 5520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname POLICEWALL&lt;/P&gt;&lt;P&gt;domain-name GPF.LOCAL&lt;/P&gt;&lt;P&gt;enable password &lt;/P&gt;&lt;P&gt;encrypted&lt;/P&gt;&lt;P&gt;passwd  encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif OUTSIDE&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 100.100.100.1 255.255.255.252 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;nameif INSIDE&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.10.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name GPF.LOCAL&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group protocol ip-allow&lt;/P&gt;&lt;P&gt;protocol-object ip&lt;/P&gt;&lt;P&gt;protocol-object icmp&lt;/P&gt;&lt;P&gt;protocol-object udp&lt;/P&gt;&lt;P&gt;protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_access_in extended permit object-group ip-allow any 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_access_in extended permit tcp any 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list INSIDE_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_1_cryptomap extended permit ip 100.100.100.0 255.255.255.252 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list INSIDE_nat0_outbound extended permit ip 100.100.100.0 255.255.255.252 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list allow_outside_connections extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list allow_outside_connections extended permit icmp any any source-quench &lt;/P&gt;&lt;P&gt;access-list allow_outside_connections extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list allow_outside_connections extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu OUTSIDE 1500&lt;/P&gt;&lt;P&gt;mtu INSIDE 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;monitor-interface OUTSIDE&lt;/P&gt;&lt;P&gt;monitor-interface INSIDE&lt;/P&gt;&lt;P&gt;monitor-interface DMZ&lt;/P&gt;&lt;P&gt;monitor-interface management&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (OUTSIDE) 101 100.100.100.3-100.100.100.4 netmask 255.255.255.252&lt;/P&gt;&lt;P&gt;global (OUTSIDE) 200 interface&lt;/P&gt;&lt;P&gt;global (INSIDE) 1 10.10.10.2 netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;global (DMZ) 1 192.168.1.2 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (INSIDE) 0 access-list INSIDE_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (INSIDE) 1 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (INSIDE) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 192.168.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_access_in in interface OUTSIDE&lt;/P&gt;&lt;P&gt;access-group INSIDE_access_out out interface INSIDE&lt;/P&gt;&lt;P&gt;access-group DMZ_access_out out interface DMZ&lt;/P&gt;&lt;P&gt;route OUTSIDE 100.100.100.3 255.255.255.255 100.100.100.1 1&lt;/P&gt;&lt;P&gt;route INSIDE 10.10.10.2 255.255.255.255 192.168.1.0 1&lt;/P&gt;&lt;P&gt;route DMZ 192.168.1.32 255.255.255.255 100.100.100.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;NOTE; MISSING THE REST OF THE CONFIG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250779#M827709</guid>
      <dc:creator>mark.stclaire</dc:creator>
      <dc:date>2019-03-11T16:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5520 configuration problems</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250780#M827743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be glad to help you.&lt;/P&gt;&lt;P&gt;Please message me via MSN Messenger:  &lt;A href="mailto:joshwalton@msn.com"&gt;joshwalton@msn.com&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will also post the solution (config) to your questions here for everyone to see.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Aug 2009 22:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250780#M827743</guid>
      <dc:creator>Joshua Walton</dc:creator>
      <dc:date>2009-08-23T22:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5520 configuration problems</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250781#M827770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hey Josh! thanks so far, I'm off to a running start. However I still have some issues. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Aug 2009 15:30:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250781#M827770</guid>
      <dc:creator>mark.stclaire</dc:creator>
      <dc:date>2009-08-24T15:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5520 configuration problems</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250782#M827796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no fix as it......... I'm lost. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Aug 2009 13:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250782#M827796</guid>
      <dc:creator>mark.stclaire</dc:creator>
      <dc:date>2009-08-25T13:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5520 configuration problems</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250783#M827818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I might be able to help you with part of your problem. I had a similar situation on my network the other day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you check your logs after one of your small networks tries to access the DMZ you might see an error about not having a translation group. I am not sure if this is the correct way of doing it but it worked for me.&lt;/P&gt;&lt;P&gt;You need a STATIC statement for the ASA to pass traffic from the LAN &amp;gt; DMZ and vice versa, without it trying to NAT. So your statement would look something like this:&lt;/P&gt;&lt;P&gt;STATIC (inside,DMZ) xxx.xxx.xxx.0 xxx.xxx.xxx.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if your ACLs are correct then this should work. Like I said before though, I am not sure if this is the correct and secure way of doing it, but I know this worked for me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Aug 2009 22:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250783#M827818</guid>
      <dc:creator>daniel.diaz</dc:creator>
      <dc:date>2009-08-27T22:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5520 configuration problems</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250784#M827840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll try that and get back to you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Aug 2009 15:59:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-configuration-problems/m-p/1250784#M827840</guid>
      <dc:creator>mark.stclaire</dc:creator>
      <dc:date>2009-08-28T15:59:13Z</dc:date>
    </item>
  </channel>
</rss>

