<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: securing active directory communication in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400597#M856925</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the PIX is running an old image, then you need to NAT.&lt;/P&gt;&lt;P&gt;But you can avoid the actual NATing by doing identity NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that if your internal network is 192.168.1.0/24, you can create a rule to be able to access the internal network with their real addresses, like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,out) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obviously, this will not work from the Internet since you have a private sheme.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're running a relatively new image, you can turn of NAT with the command:&amp;nbsp; no nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, you can communicate between interfaces without the need for NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Apr 2010 20:07:10 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-04-09T20:07:10Z</dc:date>
    <item>
      <title>securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400590#M856918</link>
      <description>&lt;P&gt;One is attempting to get a cisco pix 515e. So far,the internal hosts can perform many small tasks, like browsing the internet, etc.&lt;/P&gt;&lt;P&gt;However, these machines are joint to an external active directory. Therefore, between the network behind the firewall an a remote network, the cisco pix 515e must allow this traffic to go back and forth. At the same time, I do not want other internet networks have access to the computers behind the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What type of acl rule should allow me to acomplish this task?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone experience with this type of firewall share how you configure for windows active directory communication between local and remote networks?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400590#M856918</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2019-03-11T17:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400591#M856919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you considered establishing an IPsec VPN tunnel between both locations and restricting the access through the tunnel?&lt;/P&gt;&lt;P&gt;You should have on the other end, another PIX, router, ASA, concentrator, or any device that can terminate an IPsec site-to-site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 02:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400591#M856919</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-09T02:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400592#M856920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Beside using IPSec, can I created a set of object-group network objects? and, then create a set of acl rules for this communication?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 05:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400592#M856920</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-09T05:10:14Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400593#M856921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 14:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400593#M856921</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-09T14:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400594#M856922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have been testing a few rules:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list extended permit tcp host 172.31.53.36 host 10.8.1.2 eq 3389&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But,It does not work!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I doing wrong?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 18:19:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400594#M856922</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-09T18:19:09Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400595#M856923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;TCP 3389 is not for AD communication is for RD access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you create an ACL allowing TCP 3389 to an internal server, then that ACL needs to be applied to the correct interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say that you want to access an internal server that has the IP 192.168.1.1 and it's NAT IP is 200.200.200.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You configure the NAT rule:&lt;/P&gt;&lt;P&gt;static (in,out) 200.200.200.1 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you permit (in this case) TCP port 3389 or any other traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE permit tcp any host 200.200.200.1 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, you apply the ACL to the outside interface in the inbound direction:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUTSIDE in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the communication is through a VPN tunnel, then its different because you will access the server via its private real address (not the NATed).&lt;/P&gt;&lt;P&gt;In this case you will configure the rule (ACL) applied to the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 19:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400595#M856923</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-09T19:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400596#M856924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your patience, it did work. This NAT process is not very helpful for everything situation.&lt;/P&gt;&lt;P&gt;How can I stop using NAT for one of the internal interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Going to my original topic, I have an internal network that can't be doing NATing. The external network needs to see the addresses. The addresses are not public, instead private. But, they are routable inside our entire organization environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore,, How do I stop NATing in one of the interfaces, and make direct connections between out side and inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 20:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400596#M856924</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-09T20:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400597#M856925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the PIX is running an old image, then you need to NAT.&lt;/P&gt;&lt;P&gt;But you can avoid the actual NATing by doing identity NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that if your internal network is 192.168.1.0/24, you can create a rule to be able to access the internal network with their real addresses, like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,out) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obviously, this will not work from the Internet since you have a private sheme.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're running a relatively new image, you can turn of NAT with the command:&amp;nbsp; no nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, you can communicate between interfaces without the need for NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 20:07:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400597#M856925</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-09T20:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400598#M856926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The firewall is running version 6.3(5). Do I upgrade this to a&lt;/P&gt;&lt;P&gt; new version? Second, when I use the command you share on your last message:&lt;/P&gt;&lt;P&gt;static (in,out) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow the internal network to be visible outside of the firewall, but inside our organization network infrastructure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this a thruth statement?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 20:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400598#M856926</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-09T20:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400599#M856927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct (only within your organization where 192.168.1.0/24 is routable)&lt;/P&gt;&lt;P&gt;To disable the need for NAT, you must upgrade.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But you can accomplish what you want with the command:&lt;/P&gt;&lt;P&gt;static (in,out) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And permitting the traffic with ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 20:16:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400599#M856927</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-09T20:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400600#M856928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created an object-group network administrative-servers&lt;/P&gt;&lt;P&gt;network-object host X.X.X.X&lt;/P&gt;&lt;P&gt;network-object host X.X.X.X&lt;/P&gt;&lt;P&gt;network-object host X.X.X.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are addresses located out side of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created a:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,out) 10.8.1.0 10.8.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list extended permit ip any object-group administrative-servers&lt;/P&gt;&lt;P&gt;access-list extended permit ip object-group administrative-servers any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will this allow communication back and forth between the internal network and the administrative-servers group?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 20:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400600#M856928</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-09T20:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400601#M856929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;network-object host X.X.X.X&lt;/P&gt;&lt;P&gt;network-object host X.X.X.X&lt;/P&gt;&lt;P&gt;network-object host X.X.X.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,out) 10.8.1.0 10.8.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit ip object-group administrative-servers 10.8.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration will allow the IPs defined in the object-group to allow the internal 10.8.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can further create object-groups for the ports that you which to allow to be more restrictive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 20:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400601#M856929</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-09T20:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: securing active directory communication</title>
      <link>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400602#M856930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just receive new subnet(s) for the network(s) behind the firewall. the addresses are public addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore, after entering the information for each respective internal interface, now, the internal network stop communicating to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because of the network privacy, this time, I will not be able to reveal network addresses. Can you take a look why the internal network will not be able to go out to the internet. Again, these are public addresses, they do not need to be NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;PIX Version 6.3(5)&lt;BR /&gt;interface ethernet0 auto&lt;BR /&gt;interface ethernet1 auto&lt;BR /&gt;interface ethernet2 auto&lt;BR /&gt;interface ethernet3 auto shutdown&lt;BR /&gt;interface ethernet4 auto shutdown&lt;BR /&gt;interface ethernet5 auto shutdown&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;nameif ethernet2 intf2 security4&lt;BR /&gt;nameif ethernet3 intf3 security6&lt;BR /&gt;nameif ethernet4 intf4 security8&lt;BR /&gt;nameif ethernet5 intf5 security10&lt;BR /&gt;enable password DAyT8Zy5o1YlaDcM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;hostname lvfw&lt;BR /&gt;domain-name lv.psu.edu&lt;BR /&gt;fixup protocol dns maximum-length 512&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;fixup protocol http 80&lt;BR /&gt;fixup protocol rsh 514&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;fixup protocol sqlnet 1521&lt;BR /&gt;fixup protocol tftp 69&lt;BR /&gt;names&lt;BR /&gt;object-group network administrative-servers&lt;BR /&gt;&amp;nbsp; network-object host X.X.X.X&lt;BR /&gt;&amp;nbsp; network-object host X.X.X.X&lt;BR /&gt;&amp;nbsp; network-object host X.X.X.X&lt;BR /&gt;&amp;nbsp; &lt;BR /&gt;access-list extended permit ip any any&lt;BR /&gt;access-list extended permit icmp any any&lt;BR /&gt;access-list extended permit ip any object-group administrative-servers&lt;BR /&gt;access-list extended permit ip object-group administrative-servers any&lt;BR /&gt;access-list outside permit icmp any any&lt;BR /&gt;access-list outside permit tcp any any eq domain&lt;BR /&gt;access-list inside permit tcp any any eq www&lt;BR /&gt;access-list outside permit udp any any eq domain&lt;BR /&gt;access-list outside permit tcp any any eq 3389&lt;BR /&gt;access-list outside permit ip object-group administrative-servers A.B.C.D 255.255.255.128&lt;BR /&gt;pager lines 24&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any echo-reply inside&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu intf2 1500&lt;BR /&gt;mtu intf3 1500&lt;BR /&gt;mtu intf4 1500&lt;BR /&gt;mtu intf5 1500&lt;BR /&gt;ip address outside C.D.E.F 255.255.255.248&lt;BR /&gt;ip address inside H.I.J.M 255.255.255.192&lt;BR /&gt;ip address intf2 A.B.C.D 255.255.255.128&lt;BR /&gt;no ip address intf3&lt;BR /&gt;no ip address intf4&lt;BR /&gt;no ip address intf5&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;ip audit attack action alarm&lt;BR /&gt;no failover&lt;BR /&gt;failover timeout 0:00:00&lt;BR /&gt;failover poll 15&lt;BR /&gt;no failover ip address outside&lt;BR /&gt;no failover ip address inside&lt;BR /&gt;no failover ip address intf2&lt;BR /&gt;no failover ip address intf3&lt;BR /&gt;no failover ip address intf4&lt;BR /&gt;no failover ip address intf5&lt;BR /&gt;pdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;static (inside,outside) A.B.C.D A.B.C.D netmask 255.255.255.128 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) H.I.J.M H.I.J.M netmask 255.255.255.192 0 0&lt;BR /&gt;access-group outside in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 T.O.P.Q 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt;aaa-server TACACS+ deadtime 10&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt;aaa-server RADIUS deadtime 10&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;http server enable&lt;BR /&gt;http A.B.C.D 255.255.255.128 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;no snmp-server enable traps&lt;BR /&gt;floodguard enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;terminal width 80&lt;BR /&gt;: end&lt;BR /&gt;lvfw#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 20:17:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securing-active-directory-communication/m-p/1400602#M856930</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2010-04-12T20:17:06Z</dc:date>
    </item>
  </channel>
</rss>

