<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 Transparent Firewall with a Web server Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049813#M921295</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From preview e-mails I understood the server has the public IP, and wanted to be in this way.&lt;BR /&gt;The solution for this, is transparent firewall, but this will not do NAT and you don’t need NAT in this situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow everything:&lt;BR /&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit ip any any&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-group OUTSIDE-IN-ACL in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don’t know why you want server to have the public IP (maybe is a reason).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The professional solution is to use the firewall in routed mode, and the server to have a private IP.&lt;BR /&gt;Instead of server having the public IP, the firewall will have that public IP, and when a&amp;nbsp; http request is made to that public IP, the firewall will forward traffic inside to the server.&lt;BR /&gt;In this situation NAT is needed, and will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or maybe server doesn't really have the public Ip?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;BR /&gt;Sam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Aug 2012 20:16:37 GMT</pubDate>
    <dc:creator>Samuel Petrescu</dc:creator>
    <dc:date>2012-08-23T20:16:37Z</dc:date>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049802#M921284</link>
      <description>&lt;P&gt;I&amp;nbsp; have the need to replace my Sonicwall firewall and I got an ASA 5505. However, I need to have a transparent firewall, no Natting and Web server will have a public IP address with relevant ports kept open.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The simple illustration is&amp;nbsp; Internet ----------------&amp;gt;Transparent Firewall--------------------------------Web Server(With public IP Address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. There should be no natting&lt;/P&gt;&lt;P&gt;2. The web server must have a public IP and be accessible from the internet.&lt;/P&gt;&lt;P&gt;3. Ports can be blocked or re-opened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if its possible to have this arrangement.&lt;/P&gt;&lt;P&gt;If yes, can I get a command line sequence that enables this to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My version is&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.4(4)5&lt;/P&gt;&lt;P&gt;Device Manager Version 6.4(9)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in&amp;nbsp; advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Don Chuks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:42:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049802#M921284</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2020-02-21T12:42:57Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049803#M921285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes that can be done with the ASA. The procedere is specified in the config-guide. First go through the config of transparent firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/mode_fw.html"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/mode_fw.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then configure your access-control:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/access_rules.html"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/access_rules.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 08:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049803#M921285</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-23T08:22:37Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049804#M921286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The URL's are not working for me. Says they either broken or that I do not have access&lt;/P&gt;&lt;P&gt;Can I get the text on here?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 14:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049804#M921286</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T14:26:09Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049805#M921287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a minimal configuration for your need (is running on ASA 5520).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;firewall transparent&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface GigabitEthernet0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; description --- Connected to the Internet ---&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; nameif outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; bridge-group 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface GigabitEthernet3&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; description --- Connected to LAN ---&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; nameif inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; bridge-group 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;interface BVI1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description --- For Management only ---&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ip address 10.1.10.1 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;object network WWW-SERVER-OBJ&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; description --- The WEB server ---- &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; host 123.123.123.123&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;object-group service WWW-SERVER-SERVICES-TCP-OBJ tcp&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; description --- Serices published on WEB server ---- &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; port-object eq www&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; port-object eq https&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit tcp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-TCP-OBJ&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-group OUTSIDE-IN-ACL in interface outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 15:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049805#M921287</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T15:01:29Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049806#M921288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; when I apply this config, system remains inaccessible from outside.The system does not get to the internet as well&lt;/P&gt;&lt;P&gt;below is my sho run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sho run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(4)5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password msi14F/SlH4ZLjHH encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt; description --- For Management only ---&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object network WWW-SERVER-OBJ&lt;/P&gt;&lt;P&gt; host y.y.y.y&lt;/P&gt;&lt;P&gt; description --- The WEB server ----&lt;/P&gt;&lt;P&gt;object-group service WWW-SERVER-SERVICES-TCP-OBJ tcp&lt;/P&gt;&lt;P&gt; description --- Serices published on WEB server ----&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN-ACL extended permit tcp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-TCP-OBJ&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN-ACL in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:fdda72841b7b2d386dccbed6b996d2af&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 17:34:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049806#M921288</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T17:34:39Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049807#M921289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; You forgot this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;bridge-group 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 17:41:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049807#M921289</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T17:41:35Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049808#M921290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks&lt;/P&gt;&lt;P&gt;When I do that, there is a big change but I still cannot access http/https&lt;/P&gt;&lt;P&gt;Also when I ping the station, no luck&lt;/P&gt;&lt;P&gt;I also tried RDP but no luck&lt;/P&gt;&lt;P&gt;Thanks indeed for all the help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 17:52:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049808#M921290</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T17:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049809#M921291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, you don't have any interface in vlan1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If interface &lt;A&gt;&lt;/A&gt;Ethernet0/2 wants to be inside interface (where server is connected) this should belongs to vlan1. (not valn 2) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface e0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; switchport access vlan 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connect the internet cable to Ethernet0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also by default ICMP will not pass through, you have to allow it.&lt;/P&gt;&lt;P&gt;Also in this configuration only http and https is allowed, if you want to rdp in, you have to allow it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:09:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049809#M921291</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T18:09:56Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049810#M921292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks.&lt;/P&gt;&lt;P&gt;I made the change. System is plugged into Et0/1 and the internet cable is plugged into Et0/0&lt;/P&gt;&lt;P&gt;When I show Et0/0 I get and show vlan is as below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show int et0/1&lt;/P&gt;&lt;P&gt;Interface Ethernet0/1 "", is up, line protocol is up&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hardware is 88E6095, BW 100 Mbps, DLY 100 usec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Input flow control is unsupported, output flow control is unsupported&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Available but not configured via nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address 5475.d0fc.ad1b, MTU not set&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address unassigned&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 44852 packets input, 4149552 bytes, 0 no buffer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 36135 broadcasts, 0 runts, 0 giants&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause input, 0 resume input&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 L2 decode drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 switch ingress policy drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6939 packets output, 1563776 bytes, 0 underruns&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause output, 0 resume output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 late collisions, 0 deferred&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 rate limit drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 switch egress policy drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input reset drops, 0 output reset drops&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show switch vlan&lt;/P&gt;&lt;P&gt;VLAN Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp; Ports&lt;/P&gt;&lt;P&gt;---- -------------------------------- --------- -----------------------------&lt;/P&gt;&lt;P&gt;1&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Et0/1, Et0/2, Et0/3, Et0/4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Et0/5, Et0/6, Et0/7&lt;/P&gt;&lt;P&gt;2&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Et0/0&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049810#M921292</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T18:17:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049811#M921293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Now looks good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow icmp from outside (the easy way):&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit icmp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnak you&lt;/P&gt;&lt;P&gt;Sam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049811#M921293</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T18:53:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049812#M921294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Samuel.&lt;/P&gt;&lt;P&gt;However, I am wondering if this solution is really possible.&lt;/P&gt;&lt;P&gt;I had spoken to many networking people around and they say its only sonicwall that supports that mode.&lt;/P&gt;&lt;P&gt;Strangely, its been more than a week and the nearest to it is your solution above.We had tried a paid approach but most the people simply did not get back because they say its only possible with NAT.&lt;/P&gt;&lt;P&gt;Http/https traffic is still not passing not sure why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to just allow everything without bypassing the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That way, we can get to know why its not allowing http/https traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks indeed for all the help, its given us a ray of hope&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 19:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049812#M921294</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T19:32:10Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049813#M921295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From preview e-mails I understood the server has the public IP, and wanted to be in this way.&lt;BR /&gt;The solution for this, is transparent firewall, but this will not do NAT and you don’t need NAT in this situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow everything:&lt;BR /&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit ip any any&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-group OUTSIDE-IN-ACL in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don’t know why you want server to have the public IP (maybe is a reason).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The professional solution is to use the firewall in routed mode, and the server to have a private IP.&lt;BR /&gt;Instead of server having the public IP, the firewall will have that public IP, and when a&amp;nbsp; http request is made to that public IP, the firewall will forward traffic inside to the server.&lt;BR /&gt;In this situation NAT is needed, and will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or maybe server doesn't really have the public Ip?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;BR /&gt;Sam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 20:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049813#M921295</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T20:16:37Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049814#M921296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Samuel&lt;/P&gt;&lt;P&gt;You are correct&lt;/P&gt;&lt;P&gt;We have an application that can only work with a public IP address&lt;/P&gt;&lt;P&gt;It does not support NAT&lt;/P&gt;&lt;P&gt;So I deally what we need is where this firewall can protect on the webserver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We open the ports that we need including http and https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is a way to make the server see the internet in this configuration, that will do it&lt;/P&gt;&lt;P&gt;Even when we allow everything it still wont allow http traffic.&lt;/P&gt;&lt;P&gt;I strngly think your solution is very close to it.&lt;/P&gt;&lt;P&gt;Unfortunately, I cant seem to be able to open the URL posted in the first reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes that can be done with the ASA. The procedere is specified in the config-guide. First go through the config of transparent firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/mode_fw.html" rel="nofollow"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/mode_fw.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then configure your access-control:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/access_rules.html" rel="nofollow"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/access_rules.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 20:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049814#M921296</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T20:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049815#M921297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The error is: "&lt;STRONG&gt;Management interface has to have IP from the same subclass as your public ip on the server&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;This, even if you don't use it for management.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface BVI1&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;description --- For Management only ---&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ip address "public ip" subnetmask&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I built a test environment to verify,&amp;nbsp; and without this management ip from correct subnet, arp protocol will fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# &lt;STRONG&gt;debug arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;debug arp&amp;nbsp; enabled at level 1&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 23:01:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049815#M921297</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T23:01:10Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049816#M921298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Samuel.&lt;/P&gt;&lt;P&gt;It works. Strangely I did everything afresh but it allowed http and https, and rdp works. This I am not sure why RDP works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, I keep asking. I intend to open some udp ports as well UDP/TCP 1812,1813, 1845,1846,3799, 10100,10200, 10300, 20235&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will let you know how that goes though I am yet to figure out how to block UDP ports.&lt;/P&gt;&lt;P&gt;See access list and see if you can see why RDP works&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show access-list OUTSIDE-IN-ACL&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN-ACL; 3 elements; name hash: 0x585e19e6&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN-ACL line 1 extended permit tcp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-TCP-OBJ (hitcnt=16) 0x28efdb7f&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list OUTSIDE-IN-ACL line 1 extended permit tcp any host xxx.yy.zzz.mmm eq www (hitcnt=2) 0x6a290a4e&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list OUTSIDE-IN-ACL line 1 extended permit tcp any host xxx.yy.zzz.mmm eq https (hitcnt=14) 0x41cdf538&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN-ACL line 2 extended permit ip any any (hitcnt=186) 0x74278021&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 05:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049816#M921298</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-24T05:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049817#M921299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is allowed everything because of last line "&lt;STRONG&gt;access-list OUTSIDE-IN-ACL line 2 extended permit ip any any&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;You have to take it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how should look:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service WWW-SERVER-SERVICES-TCP-OBJ tcp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; description --- Serices TCP published on WEB server ---- &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 80&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 1812&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 1813&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 1845&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 1846&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 3799&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 10100&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 10200&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 10300&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 20235&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service WWW-SERVER-SERVICES-UDP-OBJ udp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; description --- Serices UDP published on WEB server ---- &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 1812&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 1813&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 1845&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 1846&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 3799&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 10100&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 10200&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 10300&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 20235&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit tcp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-TCP-OBJ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit udp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-UDP-OBJ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;You can customize access based on this template&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 11:02:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049817#M921299</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-24T11:02:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049818#M921300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This will allow only specified ports TCP/UDP, everything else will be blocked, because an implicit rule at the end of the ACL "deny ip any any"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 11:13:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049818#M921300</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-24T11:13:17Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049819#M921301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a great deal Samuel.&lt;/P&gt;&lt;P&gt;It works great now. If only you know how many people that said the solution is no possible, you will be surprised.&lt;/P&gt;&lt;P&gt;Thanks once again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On &lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;To allow icmp from outside (the easy way):&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;access-list OUTSIDE-IN-ACL extended permit icmp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the elaborate way of doing it? It helps the learning process I think.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Aug 2012 14:21:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049819#M921301</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-25T14:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049820#M921302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By default icmp traffic is not inspected by asa, and will not be allowed to pass through.&lt;BR /&gt;“&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;” is old way to tell asa to inspect icmp, but is still working with newer versions of IOS.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit icmp any any &lt;/STRONG&gt;will allow &lt;STRONG&gt;all types of icmp &lt;/STRONG&gt;from anywhere to anywhere, but from security standpoint is not recommended.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;A better way to allow ICMP (ping) from outside is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group icmp-type WWW-SERVER-SERVICES-ICMP-OBJ&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-object echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-object echo-reply&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-object unreachable&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-object time-exceeded&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-object source-quench&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit icmp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-ICMP-OBJ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Aug 2012 17:39:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049820#M921302</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-25T17:39:23Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049821#M921303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;So is there really away to say allow host ip address on port 3306?&lt;/P&gt;&lt;P&gt;i.e have a port open only to a particular host and block it for the rest?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 15:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049821#M921303</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-29T15:14:37Z</dc:date>
    </item>
  </channel>
</rss>

