<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Transparent mode and web server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315788#M838656</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The VPN access list is for VPN Server.&lt;/P&gt;&lt;P&gt;The WWW access list is for the WWW and Mail server. They are 2 different servers on a NAT scheme. &lt;/P&gt;&lt;P&gt;I need to apply the Access-list for WWW to the outside interface for HTTP traffic to our web server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Jul 2009 14:44:59 GMT</pubDate>
    <dc:creator>opsmaster</dc:creator>
    <dc:date>2009-07-29T14:44:59Z</dc:date>
    <item>
      <title>Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315775#M838643</link>
      <description>&lt;P&gt;I am installing a ASA 5510 in transparent mode, it's behind a cisco 3745 router that has NAT translation in the configs.&lt;/P&gt;&lt;P&gt;After I set up the ASA 5510, I created access lists for web server access. All traffic inside passes thru fine however, when an outside user tries to access the web site, the page connection will not load.&lt;/P&gt;&lt;P&gt;Do I have to set a NAT rule for outside access? If not what other suggestions does anyone have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315775#M838643</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2019-03-11T16:00:08Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315776#M838644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It sounds like that you do need to create a NAT translation in the router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 19:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315776#M838644</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-28T19:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315777#M838645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The router has a NAT translation already, when I remove the ASA everything is fine.&lt;/P&gt;&lt;P&gt;I just started the install with a functioning network in place already.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 19:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315777#M838645</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-28T19:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315778#M838646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, are you getting hit counts on your ACL? Any messages in your log?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 19:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315778#M838646</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-28T19:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315779#M838647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will check later, when I work on the firewall further. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 19:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315779#M838647</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-28T19:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315780#M838648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I check would you have any suggestions for me to try.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 20:03:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315780#M838648</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-28T20:03:49Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315781#M838649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just check the ACL and turn on logging if it's not enabled. I would turn logging buffer to debugging (but don't debug anything).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 20:05:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315781#M838649</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-28T20:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315782#M838650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my logging file I captured this morning. Any outside who tries to accept our website recieves the message:&lt;/P&gt;&lt;P&gt;"Connection to Server was reset while the page was loading, network linkwas interupted while negotiating a connection."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also is a copy of my ASA configs:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password I3KXhN9OZMFiyurw encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list permit extended permit eigrp any host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list permit extended permit eigrp any host 172.21.0.1 &lt;/P&gt;&lt;P&gt;access-list inside extended permit eigrp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp any any eq 548 &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp any any eq domain &lt;/P&gt;&lt;P&gt;access-list 112 extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.78 eq domain &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.3 eq domain &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.2 eq domain &lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any 172.21.4.0 255.255.252.0 range 3200 3300 &lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any 172.21.8.0 255.255.252.0 range 3200 3300 &lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any 172.21.12.0 255.255.252.0 range 3200 3300 &lt;/P&gt;&lt;P&gt;access-list 111 extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.4.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.8.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.12.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq www &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq smtp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq pop3 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq ftp &lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit tcp any host 172.21.0.14 &lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq isakmp &lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq 4500 &lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq 1701 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address 172.21.0.80 255.255.252.0&lt;/P&gt;&lt;P&gt;ip local pool heights 172.21.12.0 mask 255.255.252.0&lt;/P&gt;&lt;P&gt;ip local pool manito 172.21.4.0 mask 255.255.252.0&lt;/P&gt;&lt;P&gt;ip local pool dogwood 172.21.8.0 mask 255.255.252.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group Outside_VPN in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.21.0.7 1&lt;/P&gt;&lt;P&gt;route inside 172.21.0.0 255.255.0.0 0.0.0.0 1&lt;/P&gt;&lt;P&gt;route inside 172.21.0.0 255.255.0.0 0.0.0.0 1&lt;/P&gt;&lt;P&gt;route inside 172.21.0.0 255.255.0.0 0.0.0.0 1&lt;/P&gt;&lt;P&gt;route inside 172.21.4.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.4.2 255.255.255.255 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.8.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.8.2 255.255.255.255 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.12.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.12.2 255.255.255.255 172.21.0.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 11:32:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315782#M838650</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-29T11:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315783#M838651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't have an ACL entry allowing HTTP traffic in. You have the following ACL applied to the outside interface-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Outside_VPN in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here are the rules that allow traffic in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit tcp any host 172.21.0.14&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq isakmp&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq 4500&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq 1701 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing for HTTP. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 12:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315783#M838651</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-29T12:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315784#M838652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think:&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit tcp any host 172.21.0.14&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will allow all TCP traffic, including HTTP. Am I wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i'm correct, it shouldn't be a good point to allow this, from a security Point of view.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315784#M838652</guid>
      <dc:creator>netsec</dc:creator>
      <dc:date>2009-07-29T13:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315785#M838653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct, that would allow all TCP traffic to host 172.21.0.14. You can restrict to just HTTP with this ACL-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_VPN ext permit tcp any host 172.21.0.14 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are right again about that first ACL not being very secure. The second should be fine. If you can/want you can further restict by filtering the source IP's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_VPN ext permit tcp 10.0.0.0 255.0.0.0 host 172.21.0.14 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would only allow people with a source address of 10.x.x.x to connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315785#M838653</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-29T13:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315786#M838654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq www&lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq smtp&lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq pop3&lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where did you apply this ACL? &lt;/P&gt;&lt;P&gt;it shouldn't be applied in outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:53:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315786#M838654</guid>
      <dc:creator>netsec</dc:creator>
      <dc:date>2009-07-29T13:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315787#M838655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's not applied to any interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:55:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315787#M838655</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-29T13:55:08Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315788#M838656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The VPN access list is for VPN Server.&lt;/P&gt;&lt;P&gt;The WWW access list is for the WWW and Mail server. They are 2 different servers on a NAT scheme. &lt;/P&gt;&lt;P&gt;I need to apply the Access-list for WWW to the outside interface for HTTP traffic to our web server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 14:44:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315788#M838656</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-29T14:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315789#M838657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your suggestion, also&lt;/P&gt;&lt;P&gt;Is there a global command to allow all subnets behind the router to communicate with each other regardless of protocols?&lt;/P&gt;&lt;P&gt;I want unrestricted traffic in the network, &lt;/P&gt;&lt;P&gt;however the gateway is on the WAN side of the ASA. Remember the ASA is in transparent mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 16:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315789#M838657</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-29T16:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315790#M838658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will have to create an entry in the ACL. You can do it with an object group which will make it cleaner. Let's say you have 3 internal subnets; 192.168.5.0 /24, 192.168.6.0 /24, and 10.10.0.0 /16.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create an object-group-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network INTERNAL_NETWORKS&lt;/P&gt;&lt;P&gt; network-object 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.6.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The use the object-group in the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list Outside_VPN extended permit ip object-group INTERNAL_NETWORKS object-group INTERNAL_NETWORKS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow internal network to communicate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 17:57:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315790#M838658</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-29T17:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315791#M838659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, your suggestions have worked.&lt;/P&gt;&lt;P&gt;Now I need to clean up the configs and fine tune the box.&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 18:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315791#M838659</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-29T18:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315792#M838660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;everything worked except dhcp clients cannot access web or mail in house.&lt;/P&gt;&lt;P&gt;The ranges for each subnet are:&lt;/P&gt;&lt;P&gt;172.21.7.1-172.21.7.254 gw:172.21.4.1&lt;/P&gt;&lt;P&gt;172.21.9.1-172.21.9.254 gw:172.21.8.1&lt;/P&gt;&lt;P&gt;172.21.13.1-172.21.13.254 gw: 172.21.12.1&lt;/P&gt;&lt;P&gt;The static ip clients can:&lt;/P&gt;&lt;P&gt;172.21.4.0, 172.21.8.0 and 172.21.12.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jul 2009 16:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315792#M838660</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-30T16:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315793#M838661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the ACL?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jul 2009 17:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315793#M838661</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-30T17:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315794#M838662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here it is: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network internal_group&lt;/P&gt;&lt;P&gt; network-object 172.21.4.0 255.255.252.0&lt;/P&gt;&lt;P&gt; network-object 172.21.8.0 255.255.252.0&lt;/P&gt;&lt;P&gt; network-object 172.21.12.0 255.255.252.0&lt;/P&gt;&lt;P&gt; network-object 172.21.0.0 255.255.252.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list permit extended permit eigrp any host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list permit extended permit eigrp any host 172.21.0.1 &lt;/P&gt;&lt;P&gt;access-list inside extended permit eigrp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp any any eq 548 &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp any any eq domain &lt;/P&gt;&lt;P&gt;access-list 112 extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp 172.21.4.0 255.255.252.0 host 172.21.0.78 eq domain &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp 172.21.8.0 255.255.252.0 host 172.21.0.78 eq domain &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp 172.21.12.0 255.255.252.0 host 172.21.0.78 eq domain &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.78 eq domain &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.3 eq domain &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.2 eq domain &lt;/P&gt;&lt;P&gt;access-list 125 extended permit tcp any host 172.21.0.9 &lt;/P&gt;&lt;P&gt;access-list 125 extended permit tcp any host 172.21.0.11 &lt;/P&gt;&lt;P&gt;access-list 125 extended permit tcp any host 172.21.0.5 &lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.4.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.8.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.12.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq www &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq smtp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq pop3 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq ftp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit udp any host 172.21.0.14 eq isakmp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit udp any host 172.21.0.14 eq 4500 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit udp any host 172.21.0.14 eq 1701 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any 172.21.0.0 255.255.255.0 eq nntp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq https &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.8 eq smtp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.8 eq pop3 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit ip object-group internal_group object-group internal_group &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address 172.21.0.80 255.255.252.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group Outside_WWW in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.21.0.7 1&lt;/P&gt;&lt;P&gt;route inside 172.21.4.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.8.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.12.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jul 2009 17:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315794#M838662</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-30T17:44:06Z</dc:date>
    </item>
  </channel>
</rss>

