<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 ccna security lab setup problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3771032#M8292</link>
    <description>&lt;P&gt;i have now tried with both inbound and outbound rules for internet explorer and putty and it didn't worked.&lt;/P&gt;</description>
    <pubDate>Tue, 01 Jan 2019 14:48:03 GMT</pubDate>
    <dc:creator>sany98</dc:creator>
    <dc:date>2019-01-01T14:48:03Z</dc:date>
    <item>
      <title>ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3769713#M8139</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I'm heaving problem with my lab/asa setup. I can access (ping/https) asa/asdm from my home pc 192.168.1.15 but i cant ping or telnet to subnets 192.168.2, 192.168.3 and 192.168.4. I want to be able to access and configure my routers from my home pc, i know that it has something to do with outside to inside and other way but don't know ho to fix it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PC1, 2 and 3 have internet access from the ASA. PCs can ping to each other and ping to inside interface. RIP is enabled on all routers and on the ASA and all routers have default route to ASA. Here is problem that I cant access the ASDM on outside interface 192.168.1.133 and ping doesn't work either. Can anyone please help me?&lt;/P&gt;&lt;P&gt;My lab is located in the basement so that's why i want to be able to access everything from my home pc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Namnlös.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26765iBFA14F9A5186A94D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Namnlös.png" alt="Namnlös.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:36:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3769713#M8139</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2020-02-21T16:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3769733#M8147</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;You need an access-list on the outside interface to allow ssh from home-pc to required subnets&lt;/LI&gt;&lt;LI&gt;To allow asdm access from home-pc you need command: http 192.168.1.15 255.255.255.255 OUTSIDE&lt;/LI&gt;&lt;LI&gt;To allow ping from you home-pc add command: icmp permit host 192.168.1.15 OUTSIDE&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Fri, 28 Dec 2018 01:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3769733#M8147</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-12-28T01:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3769852#M8148</link>
      <description>&lt;P&gt;Hi john&lt;/P&gt;&lt;P&gt;Thank you for help!&lt;/P&gt;&lt;P&gt;1. created access list on outside like you said but still cant access the subnets on inside:&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;access-list outside_access_in extended permit tcp 192.168.1.0 255.255.255.0 object internal-lan eq ssh&lt;/PRE&gt;&lt;P&gt;2. i can already access the asdm from my home pc. problem is that i cant access the asdm from pc1, 2 and 3 on subnets (192.168.2, 3 and 4) on inside network&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. ping from home-pc to asa works now, but from home-pc to subnets on inside doesn't work&lt;/P&gt;</description>
      <pubDate>Fri, 28 Dec 2018 08:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3769852#M8148</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2018-12-28T08:44:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770003#M8256</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Have you applied the access list to an interface: access-group outside_access_in in interface OUTSIDE. You can use packet-tracer to troubleshoot access list. Please run packet tracer in ASDM and post result. You will find packet tracer from the Tools menu&lt;/LI&gt;&lt;LI&gt;if you need to access ASDM from the inside network, you need to add the commands: http 192.168.2.0 255.255.255.0 INSIDE,&amp;nbsp; http&amp;nbsp; 192.168.3.0 255.255.255.0 INSIDE and http 192.168.4.0 255.255.255.0 INSIDE&lt;/LI&gt;&lt;LI&gt;You need to add icmp in the access list outside_access_in&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Fri, 28 Dec 2018 15:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770003#M8256</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-12-28T15:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770146#M8258</link>
      <description>&lt;P&gt;1. access is applied to outside interface&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;access-group outside_access_in in interface outside&lt;/PRE&gt;&lt;P&gt;2. i had this command 192.168.0.0 255.255.0.0 and have changed to your suggestion but it still doesnt work. no access to asdm from inside network&lt;/P&gt;&lt;P&gt;3. tried that also but it didn't work either&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;access-list outside_access_in extended permit icmp 192.168.1.0 255.255.255.0 object-group internal-lan-group &lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Dec 2018 20:21:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770146#M8258</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2018-12-28T20:21:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770187#M8259</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the output when you run packet tracer? Can you post a sanitised running config of your asa.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Fri, 28 Dec 2018 22:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770187#M8259</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-12-28T22:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770365#M8260</link>
      <description>&lt;P&gt;There was an error in packet tracer with NAT rule, i added one more NAT rule from outside to inside and i got package is allowed. But still when try to telnet, shh or ping from home-pc&amp;nbsp; to inside subnets it still doesn't work. From home-pc it only works to outside/asdm 192.168.1.133. I've tried to disable windows firewall but nothing helps. Thanks for you help i really appreciate it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Namnlös.png" style="width: 844px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26811iE46D30EE7F45A442/image-size/large?v=v2&amp;amp;px=999" role="button" title="Namnlös.png" alt="Namnlös.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Dec 2018 17:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770365#M8260</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2018-12-29T17:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770366#M8261</link>
      <description>&lt;P&gt;hostname firewall&lt;/P&gt;&lt;P&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;passwd 9jNfZuG3TC5tCVH0 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;shutdown&lt;/P&gt;&lt;P&gt;&amp;nbsp;no nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif dmz&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 50&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 10.2.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 10.0.0.253 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.1.133 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;management-only&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif management&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 10.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa917-32-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network internal-lan&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network asa-outside-ip&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 192.168.1.133&lt;/P&gt;&lt;P&gt;object network inside-netw&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network 10.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 3&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 4&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network internal-lan-group&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object object 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object object 3&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object object 4&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip object-group internal-lan-group object asa-outside-ip&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.1.0 255.255.255.0 object internal-lan eq ssh&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 192.168.1.0 255.255.255.0 object-group internal-lan-group&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit 192.168.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;icmp permit 192.168.2.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;icmp permit 192.168.3.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;icmp permit 192.168.4.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-781-150.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static internal-lan-group internal-lan-group&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network internal-lan&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 10.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 192.168.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 192.168.1.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;version 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;no auto-summary&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;http 10.1.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.4.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.3.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh stricthostkeycheck&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 10.0.0.2 source outside&lt;/P&gt;&lt;P&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp;anyconnect-essentials&lt;/P&gt;&lt;P&gt;&amp;nbsp;cache&lt;/P&gt;&lt;P&gt;&amp;nbsp; disable&lt;/P&gt;&lt;P&gt;username ccna password 0UmvUgEJ6PEb01Te encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:5201ca74e2b54b1ac46e55d70a844b83&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-781-150.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;</description>
      <pubDate>Sat, 29 Dec 2018 17:10:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770366#M8261</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2018-12-29T17:10:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770402#M8263</link>
      <description>&lt;P&gt;What type of device is 192.168.1.254?&amp;nbsp; I am leaning towards there is an issue with the forwarding of traffic to other IPs on the LAN through this device.&amp;nbsp; If it is an off the shelf device like Belkin, Dlink, etc. check out the firewall and/or security settings.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Dec 2018 19:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770402#M8263</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-12-29T19:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770410#M8265</link>
      <description>&lt;P&gt;192.168.1.254 is an optical fiber router from my isp. Very simple settings available there but no static routes.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Dec 2018 20:14:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770410#M8265</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2018-12-29T20:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770422#M8266</link>
      <description>&lt;P&gt;So are both the PC and ASA connected directly to router or is this connected via a switch?&amp;nbsp; If they are, I am still leaning towards a forwarding issue on the router.&amp;nbsp; Are you able to ping the ASA from the router or if you connect your PC to the ASA outside interface, are you able to ping the outside interface and get access to the devices behind it?&lt;/P&gt;</description>
      <pubDate>Sat, 29 Dec 2018 20:37:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770422#M8266</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-12-29T20:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770423#M8267</link>
      <description>&lt;P&gt;&lt;SPAN&gt;So are both the PC and ASA connected directly to router or is this connected via a switch?&amp;nbsp; If they are, I am still leaning towards a forwarding issue on the router.&amp;nbsp; Are you able to ping the ASA from the router or if you connect your PC to the ASA outside interface, are you able to ping the outside interface and get access to the devices behind it?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Dec 2018 20:38:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770423#M8267</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-12-29T20:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770429#M8269</link>
      <description>&lt;P&gt;Yes, both the PC and ASA are directly connected to router. I can ping ASA outside interface 192.168.1.133 from my PC but no further than that. I will try with PC directly to outside.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Dec 2018 21:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770429#M8269</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2018-12-29T21:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770437#M8270</link>
      <description>&lt;P&gt;I have tried with PC directly connected to ASAs outside interface and everything works fine, so issue is with my "home" router. Is there any way to fix it? Like I said only basic settings available.&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot_20181229-222809_Chrome.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26815i58441440CBBAE615/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot_20181229-222809_Chrome.jpg" alt="Screenshot_20181229-222809_Chrome.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Dec 2018 21:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770437#M8270</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2018-12-29T21:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770443#M8271</link>
      <description>&lt;P&gt;What do you see under LAN and Wireless tabs?&lt;/P&gt;</description>
      <pubDate>Sat, 29 Dec 2018 21:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770443#M8271</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-12-29T21:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770446#M8273</link>
      <description>LAN only IP settings. On Wireless only name, password etc.</description>
      <pubDate>Sat, 29 Dec 2018 21:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770446#M8273</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2018-12-29T21:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770448#M8275</link>
      <description>&lt;P&gt;Then I would suggest looking through the user guide / configuration guide for your router and if those don't provide any clues perhaps contact the router support team.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Dec 2018 22:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770448#M8275</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-12-29T22:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770625#M8277</link>
      <description>&lt;P&gt;I've updated the router firmware to more advanced and managed to put static routes to inside subnets and now everything works. Just one new minor problem. I've installed Cisco ACS on subnet 192.168.3.0 but can't access it from home pc 192.168.1.0 on outside network. I've added the http and ssh lines on both outside and inside interface but it doesn't work. Only works from inside networks 192.168.2-4.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Dec 2018 20:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770625#M8277</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2018-12-30T20:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770628#M8279</link>
      <description>&lt;P&gt;You said you added ACL entry for HTTP, but ACS uses HTTPS.&amp;nbsp; Update your ACL entry and test again.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Dec 2018 20:26:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770628#M8279</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-12-30T20:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ccna security lab setup problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770758#M8281</link>
      <description>&lt;P&gt;I meant HTTPS but that was not the issue. Windows firewall was blocking the traffic. When i disable FW it works, i can access Cisco ACS on 192.168.3.133 and other routers using https on inside networks. When FW enabled nothing works. Whats weird is that HTTPS to asdm on 192.168.1.133 works without problem even with windows firewall enabled (maybe because its on same network). I've tried to add rule in firewall to allow inbound connections for 443 but it doesn't work. This is so frustrating, you solve one problem but the other one occurs :(..&lt;/P&gt;</description>
      <pubDate>Mon, 31 Dec 2018 11:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-ccna-security-lab-setup-problem/m-p/3770758#M8281</guid>
      <dc:creator>sany98</dc:creator>
      <dc:date>2018-12-31T11:40:20Z</dc:date>
    </item>
  </channel>
</rss>

