<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5510 config with SSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468171#M856729</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey that's right you can't have two interfaces on the same device in the same network, worst of all with the same IP address. If you don't need out of band mangement which is what that management interface provides for I would suggest shutting down the port and removing the IP address so that it can be used on the inside interface and you will still be able to manage the device from this interface, with the following commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 192.168.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also configure a different network on the management interface all together if you still need the out of band management. Example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;management-only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 192.168.2.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh 192.168.2.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 May 2010 20:59:39 GMT</pubDate>
    <dc:creator>Kelvin Willacey</dc:creator>
    <dc:date>2010-05-13T20:59:39Z</dc:date>
    <item>
      <title>Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468166#M856720</link>
      <description>&lt;P&gt;I've been tasked to replace our old sonicwall tz170 firewall with an ASA 5510 and configure it (which I've never done, only routers and switches) and I have a few questions.&amp;nbsp; I'm inside the ASDM and I'm trying to setup my outside interface...&amp;nbsp; The 5510 came with an SSM card, and I assumed this would be my outside interface, but I'm guessing I'm wrong since it isn't an option when running through the wizard.&amp;nbsp; I know what the SSM card is for, I just don't understand why it isn't an outside interface.&amp;nbsp; Where does this connect (just to my LAN??)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently I set up the management interface to our ip and subnet and am connected through that.&amp;nbsp; I see the management interface and eth0 - eth 3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is as simple as it can get, I just need the outside interface to be our public ip, setup the access rules to match my sonicwall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also on the version, its running ASA 8.2.1.&amp;nbsp; Should I upgrade to 8.3.1?&amp;nbsp; What is the ED after the version (not familiar with it).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:45:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468166#M856720</guid>
      <dc:creator>kmacdonald</dc:creator>
      <dc:date>2019-03-11T17:45:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468167#M856721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SSM is not an outside interface and how it works depends on the type of module it is. Is it a CSC-SSM or an AIP-SSM? The configuration differs some what when using these modules but it's almost the same and yes it will connect to your LAN. Your outside interface should be one of the ports you select and like wise for the inside interface. Typically though the outside interface is Ethernet0/0. The following link may help with a basic setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094768.shtml"&gt;http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094768.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can upgrade to the latest version if you so desire but you may require a memory upgrade so I would stick with 8.2, see link below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_bulletin_c25-586414.html"&gt;http://www.cisco.com/en/US/partner/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_bulletin_c25-586414.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ED means early deployment by the way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 17:57:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468167#M856721</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-05-13T17:57:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468168#M856723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is a CSC SSM.&amp;nbsp; Not sure the difference but that is what it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you! I'll configure the eth0 as my outside int.&amp;nbsp; I'll keep you updated!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 18:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468168#M856723</guid>
      <dc:creator>kmacdonald</dc:creator>
      <dc:date>2010-05-13T18:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468169#M856725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The CSC-SSM is for content filtering smtp, ftp, http, the AIP-SSM is for Intrusion Prevention. So with the module you have you will be able to block websites, block downloads have time of day restrictions and all that stuff.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 18:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468169#M856725</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-05-13T18:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468170#M856727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yea I ordered all those features.&amp;nbsp; It makes sense now.&amp;nbsp; I'm having an issue with subnetting (I admit I dont know as much about it as I should).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My management interface has a static ip and is on the same subnet as my network (255.255.255.0) so I can hit the http server.&amp;nbsp; My eth0 is my outside interface.&amp;nbsp; I'm trying to make eth1 my inside interface and have it on the same subnet as everyone else (including my management interface) but it doesn't like it.&amp;nbsp; It tells me that it can't overlap with the management interface subnet.&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.200.4 255.255.255.0&lt;BR /&gt;management-only&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description Outside Interface&lt;BR /&gt;shutdown&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address xx.xxx.xx.xxx 255.255.255.248&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would really like my eth1 int on the same subnet as management since my because my entire network is on the 255.255.255.0 subnet.&amp;nbsp; Here's what I woudl LIKE to do with Eth1 but it errors out:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;description Inside LAN Interface&lt;BR /&gt;shutdown&lt;BR /&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;BR /&gt;ip address 192.168.200.4 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;How can I make this work?&amp;nbsp; Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 20:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468170#M856727</guid>
      <dc:creator>kmacdonald</dc:creator>
      <dc:date>2010-05-13T20:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468171#M856729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey that's right you can't have two interfaces on the same device in the same network, worst of all with the same IP address. If you don't need out of band mangement which is what that management interface provides for I would suggest shutting down the port and removing the IP address so that it can be used on the inside interface and you will still be able to manage the device from this interface, with the following commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 192.168.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also configure a different network on the management interface all together if you still need the out of band management. Example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;management-only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 192.168.2.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh 192.168.2.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 20:59:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468171#M856729</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-05-13T20:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468172#M856731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry I was incorrect about the ip addresses, I want my management on 192.168.200.4 and my eth1 on 192.168.200.2 and have them on the same subnet.&amp;nbsp; Thats what I'm having problems with.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 21:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468172#M856731</guid>
      <dc:creator>kmacdonald</dc:creator>
      <dc:date>2010-05-13T21:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468173#M856732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;reading again, I'll do exactly that.&amp;nbsp; I'll do out of band management on the management port and manage from the eth0.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 21:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468173#M856732</guid>
      <dc:creator>kmacdonald</dc:creator>
      <dc:date>2010-05-13T21:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468174#M856735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yay I got the interfaces setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; description Outside WAN Interface&lt;BR /&gt; shutdown&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address xx.xxx.xx.xx 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description Inside LAN interface&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.200.2 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ASA also setup these access rules automatically, are they ok? &lt;A href="http://i.imgur.com/FR2MC.png"&gt;Screen&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now in my old firewall (Sonicwall), it has route policies that were auto added. &lt;A href="http://i.imgur.com/ZqICt.png"&gt;Screen&lt;/A&gt; I'm assuming I setup the ASA the same way vertabum right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also in my sonicwall, it used address objects to map aliases to hosts and IP's, &lt;A href="http://i.imgur.com/CJ5fI.png"&gt;Screen&lt;/A&gt;.&amp;nbsp; This would also be wise to do right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The sonicall also has NAT Policies (&lt;A href="http://imgur.com/Huzhq.png"&gt;SCREEN&lt;/A&gt;) and ACCESS RULES (&lt;A href="http://imgur.com/zB8Ra.png"&gt;SCREEN&lt;/A&gt;).&amp;nbsp; To me, these are exactly the same.&amp;nbsp; Or are the NAT policies the actual rule, and the access rule tell whether to ALLOW OR DENY the nat policy? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for all the questions, I just want to make sure this is done right.&amp;nbsp; THANKS!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 22:11:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468174#M856735</guid>
      <dc:creator>kmacdonald</dc:creator>
      <dc:date>2010-05-13T22:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468175#M856736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Those rules on the ASA are default rules, it is saying anything initiated from the inside is allowed out but nothing initiated from the outside is allowed in. Sorry but I am not familiar with SonicWall at all to give you any tips on the rules you will need to setup. However if all you have is an outside and inside interface then you will need a nat.pat to ensure that internal addresses can get out and access list to restrict those internal networks if needed. If you have inbound traffic ie to mail, web server etc then you will again a nat and a access list to allow the traffic in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The attached document (you can ignore the router configs) should hopefully give you a better idea of how inbound traffic works and how to apply access lists to interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 16:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468175#M856736</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-05-14T16:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468176#M856737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok that helps immensly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All we have is an outside and inside, so a nat 2 pat is required (once I figure it out &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; ).&lt;/P&gt;&lt;P&gt;We do have incoming traffic that I need to route (webserver, mailserver, etc..).&amp;nbsp; I've already created all my network objects and service groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm stuck now on routes.&amp;nbsp; The sonicwall (sorry I know you don't work with them) created some routes automatically.&amp;nbsp; My ASA currently has no routes.&amp;nbsp; Should I create the routes in the Sonicwall in the ASA?&amp;nbsp; Here's a screen of the routes automatically created by sonicwall device &lt;A href="http://i.imgur.com/ZqICt.png"&gt;screen&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 21:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468176#M856737</guid>
      <dc:creator>kmacdonald</dc:creator>
      <dc:date>2010-05-14T21:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468177#M856738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you will need to create the routes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For instance to get to the Internet you will need: route outside 0.0.0.0 0.0.0.0 1.1.1.1 (internet gateway)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you have a L3 switch on the LAN that provides for multiple networks then you will need routes on the ASA to get to those internal networks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 172.18.10.0 255.255.255.0 172.17.10.1&lt;/P&gt;&lt;P&gt;route inside 172.19.10.0 255.255.255.0 172.17.10.1 and so on and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not a fan of ASDM if that's what you are using so I can't really help there but I believe you will select the interface the traffic will be routed out, add the destination network and then the next hop address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For natting you can pat, or use a pool or static nat, but just for browsing you can do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 (this allows all networks to be natted as long as a route exists)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The document should help with the inbound traffic and the natting for the Internet as well. You can always post your config if you need anymore help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 21:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468177#M856738</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-05-14T21:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468178#M856739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll be having fun this weekend!&amp;nbsp; I just configured my pat and my route to my gateway.&amp;nbsp; I'm working on the&lt;/P&gt;&lt;P&gt;rest now.&amp;nbsp; Thank you so much! If I have issues I'll post my config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 21:31:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468178#M856739</guid>
      <dc:creator>kmacdonald</dc:creator>
      <dc:date>2010-05-14T21:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468179#M856740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I got the firewall up and running, internet traffic works great.&amp;nbsp; Problem is I'm having an issue with my NATs I&lt;/P&gt;&lt;P&gt;think.&amp;nbsp; I setup access rules for my servers inside my network.&amp;nbsp; For example I have an access list that allows any outside traffic coming in on mail ports to forward to my mail server, however its not working.&amp;nbsp; I ran a packet trace and it gets blocked by the final entry of my nat list:&lt;/P&gt;&lt;P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-color: #cccccc; border-style: solid;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;match ip inside any outside any&lt;BR /&gt;dynamic translation to pool 1 (WAN-Primary-IP [Interface PAT])&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure why though.&amp;nbsp; It seems all my access lists get blocked by this final nat entry.&amp;nbsp; Any idea why?&amp;nbsp; Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 May 2010 16:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468179#M856740</guid>
      <dc:creator>kmacdonald</dc:creator>
      <dc:date>2010-05-23T16:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468180#M856741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 May 2010 16:21:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468180#M856741</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-05-23T16:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468181#M856742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got it fixed!&amp;nbsp; I had the nat for it going&amp;nbsp;&amp;nbsp; (inside,inside) instead of (inside,outside).&amp;nbsp;&amp;nbsp; &lt;SPAN __jive_emoticon_name="blush" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/blush.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do have another quick question about the SSM card though.&amp;nbsp; Does the port have to be on the network for it to work?&amp;nbsp; I know to manage it I have to connect to it and give it an IP address, but does it have to be on the network in order to filter, scan, etc.. ?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you for everything!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 May 2010 18:45:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468181#M856742</guid>
      <dc:creator>kmacdonald</dc:creator>
      <dc:date>2010-05-23T18:45:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 config with SSM</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468182#M856743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm glad you got it working. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do need it to connect to the network for management purposes as it is managed through asdm and asdm will need to be able to reach the IP address assigned to the CSC's management port and also to ensure that it can connect to the Internet to pull real time updates.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 May 2010 19:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-config-with-ssm/m-p/1468182#M856743</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-05-23T19:01:57Z</dc:date>
    </item>
  </channel>
</rss>

