<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: permit RIP without enabling it thru ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047922#M913995</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The link you sent is to allow L2TP or PPTP though firewall. It has no direct relation to this discussion. If you want to permit GRE then you can use a similar ACL as the link, as PPTP also uses GRE. But other than that, this link is not what you are looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Aug 2008 11:31:03 GMT</pubDate>
    <dc:creator>Farrukh Haroon</dc:creator>
    <dc:date>2008-08-26T11:31:03Z</dc:date>
    <item>
      <title>permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047914#M913954</link>
      <description>&lt;P&gt;is it possible to permit RIP through a 5510, using 7.2(10)2, without enabling RIP?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047914#M913954</guid>
      <dc:creator>ksvy_ksvy</dc:creator>
      <dc:date>2019-03-11T13:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047915#M913961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;in ur case u need to run the ASA in transparant mode&lt;/P&gt;&lt;P&gt;in this case the ASA will work as a layer two device will not participat in any layer three addressing things and u can put it between two devices in the same ip addressing subnet&lt;/P&gt;&lt;P&gt;for example if u have PC &amp;gt;&amp;gt; ASA transparant mode&amp;gt;&amp;gt; router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the PC default gateway will be thw router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so if u have &lt;/P&gt;&lt;P&gt;Router with rip &amp;gt;&amp;gt;ASA transparnt mode&amp;gt;&amp;gt;&amp;gt; router with rip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;those two routers can comunicate as in the same network as they connected to aswitch&lt;/P&gt;&lt;P&gt;however u need to permit the traffic through the ASA&lt;/P&gt;&lt;P&gt;just permit ip traffic for rip and multicasting for rip updates and thats it &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;have a look at the following link&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008089f467.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008089f467.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if helpful rate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 01:38:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047915#M913961</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-26T01:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047916#M913967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In transparent mode you can do this for sure. As in the 'Layer 2' mode of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the routed mode, you can make a GRE tunnel between the two devices and run inside it. You will then allow this GRE through the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 01:40:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047916#M913967</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-26T01:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047917#M913971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Farrukh&lt;/P&gt;&lt;P&gt;it sounds we overlaped here &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anyway this is 3 point for the GRE &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 01:42:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047917#M913971</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-26T01:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047918#M913975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lolz OK. I think you posted while I was typing mine &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 01:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047918#M913975</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-26T01:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047919#M913980</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, works in transparent mode, and will need a GRE tunnel to go thru routed mode... routed mode is required for the site where the 5510 is going to &lt;/P&gt;&lt;P&gt;one more favor; need a white page for setting up a GRE tunnel for this purpose&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks, kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 02:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047919#M913980</guid>
      <dc:creator>ksvy_ksvy</dc:creator>
      <dc:date>2008-08-26T02:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047920#M913987</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I could only find one link for GRE on the DOC-CD which is little different from your requimrent:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk86/tk89/technologies_configuration_example09186a008011520d.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk86/tk89/technologies_configuration_example09186a008011520d.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is one with GRE OVER IPSEC:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a008023ce5b.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a008023ce5b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 11:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047920#M913987</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-26T11:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047921#M913992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yeah, I am unable to locate much of anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 11:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047921#M913992</guid>
      <dc:creator>ksvy_ksvy</dc:creator>
      <dc:date>2008-08-26T11:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047922#M913995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The link you sent is to allow L2TP or PPTP though firewall. It has no direct relation to this discussion. If you want to permit GRE then you can use a similar ACL as the link, as PPTP also uses GRE. But other than that, this link is not what you are looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 11:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047922#M913995</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-26T11:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047923#M913997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;right, but it's the only reference to a GRE ACL for a ASA that I could find.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I not so sure a GRE tunnel for IOS routers is what would work either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks, Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 11:36:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047923#M913997</guid>
      <dc:creator>ksvy_ksvy</dc:creator>
      <dc:date>2008-08-26T11:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: permit RIP without enabling it thru ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047924#M914001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this link for router to router gre over IPSEC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if u want only gre ignore the ipsec configs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a008023ce5b.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a008023ce5b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the following one contains lots of gre config links&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk827/tk369/tk287/tsd_technology_support_sub-protocol_home.html" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk827/tk369/tk287/tsd_technology_support_sub-protocol_home.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if helpful Rate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 11:43:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-rip-without-enabling-it-thru-asa-5510/m-p/1047924#M914001</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-26T11:43:38Z</dc:date>
    </item>
  </channel>
</rss>

