<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Transparent mode and web server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315809#M838677</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, these are not.  I have been playing with the issue. The routing issue is in the asa. When removed from the network all traffic moves easily. With the ASA in line, traffic from remote subnets can go out to the web but not to the 172.21.0.0 network for email or file sharing. However I can  ping computers in that subnet, but not traceroute.&lt;/P&gt;&lt;P&gt;I allowed eigrp to go thru the ASA, but I wonder if the commands are correct.&lt;/P&gt;&lt;P&gt;What commands should be used to allow eigrp to pass from 172.21.0.1 to 172.21.0.7 and vice versa?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Aug 2009 16:56:33 GMT</pubDate>
    <dc:creator>opsmaster</dc:creator>
    <dc:date>2009-08-03T16:56:33Z</dc:date>
    <item>
      <title>Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315775#M838643</link>
      <description>&lt;P&gt;I am installing a ASA 5510 in transparent mode, it's behind a cisco 3745 router that has NAT translation in the configs.&lt;/P&gt;&lt;P&gt;After I set up the ASA 5510, I created access lists for web server access. All traffic inside passes thru fine however, when an outside user tries to access the web site, the page connection will not load.&lt;/P&gt;&lt;P&gt;Do I have to set a NAT rule for outside access? If not what other suggestions does anyone have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315775#M838643</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2019-03-11T16:00:08Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315776#M838644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It sounds like that you do need to create a NAT translation in the router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 19:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315776#M838644</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-28T19:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315777#M838645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The router has a NAT translation already, when I remove the ASA everything is fine.&lt;/P&gt;&lt;P&gt;I just started the install with a functioning network in place already.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 19:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315777#M838645</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-28T19:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315778#M838646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, are you getting hit counts on your ACL? Any messages in your log?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 19:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315778#M838646</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-28T19:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315779#M838647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will check later, when I work on the firewall further. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 19:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315779#M838647</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-28T19:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315780#M838648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I check would you have any suggestions for me to try.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 20:03:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315780#M838648</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-28T20:03:49Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315781#M838649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just check the ACL and turn on logging if it's not enabled. I would turn logging buffer to debugging (but don't debug anything).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 20:05:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315781#M838649</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-28T20:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315782#M838650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my logging file I captured this morning. Any outside who tries to accept our website recieves the message:&lt;/P&gt;&lt;P&gt;"Connection to Server was reset while the page was loading, network linkwas interupted while negotiating a connection."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also is a copy of my ASA configs:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password I3KXhN9OZMFiyurw encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list permit extended permit eigrp any host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list permit extended permit eigrp any host 172.21.0.1 &lt;/P&gt;&lt;P&gt;access-list inside extended permit eigrp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp any any eq 548 &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp any any eq domain &lt;/P&gt;&lt;P&gt;access-list 112 extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.78 eq domain &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.3 eq domain &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.2 eq domain &lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any 172.21.4.0 255.255.252.0 range 3200 3300 &lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any 172.21.8.0 255.255.252.0 range 3200 3300 &lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any 172.21.12.0 255.255.252.0 range 3200 3300 &lt;/P&gt;&lt;P&gt;access-list 111 extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.4.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.8.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.12.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq www &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq smtp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq pop3 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq ftp &lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit tcp any host 172.21.0.14 &lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq isakmp &lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq 4500 &lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq 1701 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address 172.21.0.80 255.255.252.0&lt;/P&gt;&lt;P&gt;ip local pool heights 172.21.12.0 mask 255.255.252.0&lt;/P&gt;&lt;P&gt;ip local pool manito 172.21.4.0 mask 255.255.252.0&lt;/P&gt;&lt;P&gt;ip local pool dogwood 172.21.8.0 mask 255.255.252.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group Outside_VPN in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.21.0.7 1&lt;/P&gt;&lt;P&gt;route inside 172.21.0.0 255.255.0.0 0.0.0.0 1&lt;/P&gt;&lt;P&gt;route inside 172.21.0.0 255.255.0.0 0.0.0.0 1&lt;/P&gt;&lt;P&gt;route inside 172.21.0.0 255.255.0.0 0.0.0.0 1&lt;/P&gt;&lt;P&gt;route inside 172.21.4.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.4.2 255.255.255.255 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.8.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.8.2 255.255.255.255 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.12.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.12.2 255.255.255.255 172.21.0.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 11:32:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315782#M838650</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-29T11:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315783#M838651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't have an ACL entry allowing HTTP traffic in. You have the following ACL applied to the outside interface-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Outside_VPN in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here are the rules that allow traffic in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit tcp any host 172.21.0.14&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq isakmp&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq 4500&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit udp any host 172.21.0.14 eq 1701 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing for HTTP. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 12:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315783#M838651</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-29T12:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315784#M838652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think:&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit tcp any host 172.21.0.14&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will allow all TCP traffic, including HTTP. Am I wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i'm correct, it shouldn't be a good point to allow this, from a security Point of view.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315784#M838652</guid>
      <dc:creator>netsec</dc:creator>
      <dc:date>2009-07-29T13:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315785#M838653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct, that would allow all TCP traffic to host 172.21.0.14. You can restrict to just HTTP with this ACL-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_VPN ext permit tcp any host 172.21.0.14 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are right again about that first ACL not being very secure. The second should be fine. If you can/want you can further restict by filtering the source IP's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_VPN ext permit tcp 10.0.0.0 255.0.0.0 host 172.21.0.14 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would only allow people with a source address of 10.x.x.x to connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315785#M838653</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-29T13:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315786#M838654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq www&lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq smtp&lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq pop3&lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where did you apply this ACL? &lt;/P&gt;&lt;P&gt;it shouldn't be applied in outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:53:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315786#M838654</guid>
      <dc:creator>netsec</dc:creator>
      <dc:date>2009-07-29T13:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315787#M838655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's not applied to any interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:55:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315787#M838655</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-29T13:55:08Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315788#M838656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The VPN access list is for VPN Server.&lt;/P&gt;&lt;P&gt;The WWW access list is for the WWW and Mail server. They are 2 different servers on a NAT scheme. &lt;/P&gt;&lt;P&gt;I need to apply the Access-list for WWW to the outside interface for HTTP traffic to our web server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 14:44:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315788#M838656</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-29T14:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315789#M838657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your suggestion, also&lt;/P&gt;&lt;P&gt;Is there a global command to allow all subnets behind the router to communicate with each other regardless of protocols?&lt;/P&gt;&lt;P&gt;I want unrestricted traffic in the network, &lt;/P&gt;&lt;P&gt;however the gateway is on the WAN side of the ASA. Remember the ASA is in transparent mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 16:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315789#M838657</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-29T16:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315790#M838658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will have to create an entry in the ACL. You can do it with an object group which will make it cleaner. Let's say you have 3 internal subnets; 192.168.5.0 /24, 192.168.6.0 /24, and 10.10.0.0 /16.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create an object-group-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network INTERNAL_NETWORKS&lt;/P&gt;&lt;P&gt; network-object 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.6.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The use the object-group in the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list Outside_VPN extended permit ip object-group INTERNAL_NETWORKS object-group INTERNAL_NETWORKS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow internal network to communicate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 17:57:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315790#M838658</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-29T17:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315791#M838659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, your suggestions have worked.&lt;/P&gt;&lt;P&gt;Now I need to clean up the configs and fine tune the box.&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 18:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315791#M838659</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-29T18:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315792#M838660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;everything worked except dhcp clients cannot access web or mail in house.&lt;/P&gt;&lt;P&gt;The ranges for each subnet are:&lt;/P&gt;&lt;P&gt;172.21.7.1-172.21.7.254 gw:172.21.4.1&lt;/P&gt;&lt;P&gt;172.21.9.1-172.21.9.254 gw:172.21.8.1&lt;/P&gt;&lt;P&gt;172.21.13.1-172.21.13.254 gw: 172.21.12.1&lt;/P&gt;&lt;P&gt;The static ip clients can:&lt;/P&gt;&lt;P&gt;172.21.4.0, 172.21.8.0 and 172.21.12.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jul 2009 16:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315792#M838660</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-30T16:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315793#M838661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the ACL?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jul 2009 17:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315793#M838661</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-30T17:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Transparent mode and web server</title>
      <link>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315794#M838662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here it is: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network internal_group&lt;/P&gt;&lt;P&gt; network-object 172.21.4.0 255.255.252.0&lt;/P&gt;&lt;P&gt; network-object 172.21.8.0 255.255.252.0&lt;/P&gt;&lt;P&gt; network-object 172.21.12.0 255.255.252.0&lt;/P&gt;&lt;P&gt; network-object 172.21.0.0 255.255.252.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list permit extended permit eigrp any host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list permit extended permit eigrp any host 172.21.0.1 &lt;/P&gt;&lt;P&gt;access-list inside extended permit eigrp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp any any eq 548 &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp any any eq domain &lt;/P&gt;&lt;P&gt;access-list 112 extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp 172.21.4.0 255.255.252.0 host 172.21.0.78 eq domain &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp 172.21.8.0 255.255.252.0 host 172.21.0.78 eq domain &lt;/P&gt;&lt;P&gt;access-list 112 extended permit tcp 172.21.12.0 255.255.252.0 host 172.21.0.78 eq domain &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.78 eq domain &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.3 eq domain &lt;/P&gt;&lt;P&gt;access-list 120 extended permit tcp any host 172.21.0.2 eq domain &lt;/P&gt;&lt;P&gt;access-list 125 extended permit tcp any host 172.21.0.9 &lt;/P&gt;&lt;P&gt;access-list 125 extended permit tcp any host 172.21.0.11 &lt;/P&gt;&lt;P&gt;access-list 125 extended permit tcp any host 172.21.0.5 &lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.4.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.8.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list 111 extended permit tcp 172.21.12.0 255.255.252.0 host 172.21.0.7 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq www &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq smtp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq pop3 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq ftp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit udp any host 172.21.0.14 eq isakmp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit udp any host 172.21.0.14 eq 4500 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit udp any host 172.21.0.14 eq 1701 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any 172.21.0.0 255.255.255.0 eq nntp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq https &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.2 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.8 eq smtp &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit tcp any host 172.21.0.8 eq pop3 &lt;/P&gt;&lt;P&gt;access-list Outside_WWW extended permit ip object-group internal_group object-group internal_group &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address 172.21.0.80 255.255.252.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group Outside_WWW in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.21.0.7 1&lt;/P&gt;&lt;P&gt;route inside 172.21.4.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.8.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;P&gt;route inside 172.21.12.0 255.255.252.0 172.21.0.1 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jul 2009 17:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-mode-and-web-server/m-p/1315794#M838662</guid>
      <dc:creator>opsmaster</dc:creator>
      <dc:date>2009-07-30T17:44:06Z</dc:date>
    </item>
  </channel>
</rss>

