<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 Transparent Firewall with a Web server Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049823#M921305</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;Eventually went live with this today. Ther server is on the internet. We can RDP into it. But the applications are being blocked somewhere somehow. Can you fault the config we have below? The range commands for the ports are they good?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;xxxyyyASA(config)# sho run&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;: Saved&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;:&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;ASA Version 8.4(4)5&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;firewall transparent&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;hostname xxxyyASA&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;enable password msi14F/SlH4ZLjHH encrypted&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;names&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface Ethernet0/0&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;description --- Connected to the Internet ---&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;switchport access vlan 2&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface Ethernet0/1&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;description --- Connected to LAN ---&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface Ethernet0/2&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface Ethernet0/3&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;shutdown&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface Ethernet0/4&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface Ethernet0/5&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface Ethernet0/6&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface Ethernet0/7&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface Vlan1&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;nameif inside&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;bridge-group 1&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;security-level 100&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface Vlan2&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;nameif outside&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;bridge-group 1&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;security-level 0&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;interface BVI1&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;description --- For Management only ---&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;ip address xxx.yyy.zzz.143 255.255.255.224&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;ftp mode passive&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;object network WWW-SERVER-OBJ&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;host xxx.yyy.zzz.142&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;description --- The WEB server ----&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;object-group service WWW-SERVER-SERVICES-TCP-OBJ tcp&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;description --- Services published on WEB server ----&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq www&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq https&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq telnet&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object range 221 225&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 3306&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 3389&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object range 1719 1740&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object range sip 5090&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 5098&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 6098&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 9293&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 1812&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 1813&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 1845&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 1846&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 3799&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 10100&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 10200&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 10300&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 20235&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;object-group service WWW-SERVER-SERVICES-UDP-OBJ udp&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;description --- Services UDP published on WEB server ----&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object range 221 225&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object range 1719 1740&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object range sip 5090&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 9293&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 1812&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 1813&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 1845&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 1846&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 3799&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 10100&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 10200&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 10300&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object eq 20235&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;port-object range 20000 60000&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;access-list OUTSIDE-IN-ACL extended permit icmp any any&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;access-list OUTSIDE-IN-ACL extended permit tcp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-TCP-OBJ&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;access-list OUTSIDE-IN-ACL extended permit tcp host xxx.yyy.zzz.142 object WWW-SERVER-OBJ eq 3306&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;pager lines 24&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;mtu inside 1500&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;mtu outside 1500&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;no asdm history enable&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;arp timeout 14400&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;access-group OUTSIDE-IN-ACL in interface outside&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;http server enable&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;no snmp-server location&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;no snmp-server contact&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;crl configure&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;c&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;class-map inspection_default&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;match default-inspection-traffic&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;parameters&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;policy-map global_policy&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;class inspection_default&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;!&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;service-policy global_policy global&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;prompt hostname context&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;call-home reporting anonymous&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;Cryptochecksum:0319f1333ea85df7cc42784731f505ae&lt;/P&gt;&lt;P style="text-align: left; widows: 2; text-transform: none; margin: 0pt; letter-spacing: normal; font: 13px arial, helvetica, sans-serif; white-space: normal; orphans: 2; color: #333333; padding: 0pt;"&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Aug 2012 19:56:27 GMT</pubDate>
    <dc:creator>don_chuks</dc:creator>
    <dc:date>2012-08-30T19:56:27Z</dc:date>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049802#M921284</link>
      <description>&lt;P&gt;I&amp;nbsp; have the need to replace my Sonicwall firewall and I got an ASA 5505. However, I need to have a transparent firewall, no Natting and Web server will have a public IP address with relevant ports kept open.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The simple illustration is&amp;nbsp; Internet ----------------&amp;gt;Transparent Firewall--------------------------------Web Server(With public IP Address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. There should be no natting&lt;/P&gt;&lt;P&gt;2. The web server must have a public IP and be accessible from the internet.&lt;/P&gt;&lt;P&gt;3. Ports can be blocked or re-opened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if its possible to have this arrangement.&lt;/P&gt;&lt;P&gt;If yes, can I get a command line sequence that enables this to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My version is&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.4(4)5&lt;/P&gt;&lt;P&gt;Device Manager Version 6.4(9)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in&amp;nbsp; advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Don Chuks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:42:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049802#M921284</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2020-02-21T12:42:57Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049803#M921285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes that can be done with the ASA. The procedere is specified in the config-guide. First go through the config of transparent firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/mode_fw.html"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/mode_fw.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then configure your access-control:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/access_rules.html"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/access_rules.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 08:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049803#M921285</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-23T08:22:37Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049804#M921286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The URL's are not working for me. Says they either broken or that I do not have access&lt;/P&gt;&lt;P&gt;Can I get the text on here?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 14:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049804#M921286</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T14:26:09Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049805#M921287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a minimal configuration for your need (is running on ASA 5520).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;firewall transparent&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface GigabitEthernet0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; description --- Connected to the Internet ---&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; nameif outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; bridge-group 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface GigabitEthernet3&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; description --- Connected to LAN ---&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; nameif inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; bridge-group 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;interface BVI1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description --- For Management only ---&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ip address 10.1.10.1 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;object network WWW-SERVER-OBJ&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; description --- The WEB server ---- &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; host 123.123.123.123&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;object-group service WWW-SERVER-SERVICES-TCP-OBJ tcp&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; description --- Serices published on WEB server ---- &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; port-object eq www&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; port-object eq https&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit tcp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-TCP-OBJ&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-group OUTSIDE-IN-ACL in interface outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 15:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049805#M921287</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T15:01:29Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049806#M921288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; when I apply this config, system remains inaccessible from outside.The system does not get to the internet as well&lt;/P&gt;&lt;P&gt;below is my sho run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sho run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(4)5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password msi14F/SlH4ZLjHH encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt; description --- For Management only ---&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object network WWW-SERVER-OBJ&lt;/P&gt;&lt;P&gt; host y.y.y.y&lt;/P&gt;&lt;P&gt; description --- The WEB server ----&lt;/P&gt;&lt;P&gt;object-group service WWW-SERVER-SERVICES-TCP-OBJ tcp&lt;/P&gt;&lt;P&gt; description --- Serices published on WEB server ----&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN-ACL extended permit tcp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-TCP-OBJ&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN-ACL in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:fdda72841b7b2d386dccbed6b996d2af&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 17:34:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049806#M921288</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T17:34:39Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049807#M921289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; You forgot this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;bridge-group 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 17:41:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049807#M921289</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T17:41:35Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049808#M921290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks&lt;/P&gt;&lt;P&gt;When I do that, there is a big change but I still cannot access http/https&lt;/P&gt;&lt;P&gt;Also when I ping the station, no luck&lt;/P&gt;&lt;P&gt;I also tried RDP but no luck&lt;/P&gt;&lt;P&gt;Thanks indeed for all the help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 17:52:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049808#M921290</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T17:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049809#M921291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, you don't have any interface in vlan1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If interface &lt;A&gt;&lt;/A&gt;Ethernet0/2 wants to be inside interface (where server is connected) this should belongs to vlan1. (not valn 2) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface e0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; switchport access vlan 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connect the internet cable to Ethernet0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also by default ICMP will not pass through, you have to allow it.&lt;/P&gt;&lt;P&gt;Also in this configuration only http and https is allowed, if you want to rdp in, you have to allow it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:09:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049809#M921291</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T18:09:56Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049810#M921292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks.&lt;/P&gt;&lt;P&gt;I made the change. System is plugged into Et0/1 and the internet cable is plugged into Et0/0&lt;/P&gt;&lt;P&gt;When I show Et0/0 I get and show vlan is as below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show int et0/1&lt;/P&gt;&lt;P&gt;Interface Ethernet0/1 "", is up, line protocol is up&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hardware is 88E6095, BW 100 Mbps, DLY 100 usec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Input flow control is unsupported, output flow control is unsupported&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Available but not configured via nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address 5475.d0fc.ad1b, MTU not set&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address unassigned&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 44852 packets input, 4149552 bytes, 0 no buffer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 36135 broadcasts, 0 runts, 0 giants&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause input, 0 resume input&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 L2 decode drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 switch ingress policy drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6939 packets output, 1563776 bytes, 0 underruns&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause output, 0 resume output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 late collisions, 0 deferred&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 rate limit drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 switch egress policy drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input reset drops, 0 output reset drops&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show switch vlan&lt;/P&gt;&lt;P&gt;VLAN Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp; Ports&lt;/P&gt;&lt;P&gt;---- -------------------------------- --------- -----------------------------&lt;/P&gt;&lt;P&gt;1&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Et0/1, Et0/2, Et0/3, Et0/4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Et0/5, Et0/6, Et0/7&lt;/P&gt;&lt;P&gt;2&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Et0/0&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049810#M921292</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T18:17:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049811#M921293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Now looks good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow icmp from outside (the easy way):&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit icmp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnak you&lt;/P&gt;&lt;P&gt;Sam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049811#M921293</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T18:53:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049812#M921294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Samuel.&lt;/P&gt;&lt;P&gt;However, I am wondering if this solution is really possible.&lt;/P&gt;&lt;P&gt;I had spoken to many networking people around and they say its only sonicwall that supports that mode.&lt;/P&gt;&lt;P&gt;Strangely, its been more than a week and the nearest to it is your solution above.We had tried a paid approach but most the people simply did not get back because they say its only possible with NAT.&lt;/P&gt;&lt;P&gt;Http/https traffic is still not passing not sure why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to just allow everything without bypassing the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That way, we can get to know why its not allowing http/https traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks indeed for all the help, its given us a ray of hope&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 19:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049812#M921294</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T19:32:10Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049813#M921295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From preview e-mails I understood the server has the public IP, and wanted to be in this way.&lt;BR /&gt;The solution for this, is transparent firewall, but this will not do NAT and you don’t need NAT in this situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow everything:&lt;BR /&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit ip any any&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-group OUTSIDE-IN-ACL in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don’t know why you want server to have the public IP (maybe is a reason).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The professional solution is to use the firewall in routed mode, and the server to have a private IP.&lt;BR /&gt;Instead of server having the public IP, the firewall will have that public IP, and when a&amp;nbsp; http request is made to that public IP, the firewall will forward traffic inside to the server.&lt;BR /&gt;In this situation NAT is needed, and will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or maybe server doesn't really have the public Ip?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;BR /&gt;Sam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 20:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049813#M921295</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T20:16:37Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049814#M921296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Samuel&lt;/P&gt;&lt;P&gt;You are correct&lt;/P&gt;&lt;P&gt;We have an application that can only work with a public IP address&lt;/P&gt;&lt;P&gt;It does not support NAT&lt;/P&gt;&lt;P&gt;So I deally what we need is where this firewall can protect on the webserver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We open the ports that we need including http and https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is a way to make the server see the internet in this configuration, that will do it&lt;/P&gt;&lt;P&gt;Even when we allow everything it still wont allow http traffic.&lt;/P&gt;&lt;P&gt;I strngly think your solution is very close to it.&lt;/P&gt;&lt;P&gt;Unfortunately, I cant seem to be able to open the URL posted in the first reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes that can be done with the ASA. The procedere is specified in the config-guide. First go through the config of transparent firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/mode_fw.html" rel="nofollow"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/mode_fw.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then configure your access-control:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/access_rules.html" rel="nofollow"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa84/configuration/guide/access_rules.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 20:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049814#M921296</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-23T20:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049815#M921297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The error is: "&lt;STRONG&gt;Management interface has to have IP from the same subclass as your public ip on the server&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;This, even if you don't use it for management.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface BVI1&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;description --- For Management only ---&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ip address "public ip" subnetmask&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I built a test environment to verify,&amp;nbsp; and without this management ip from correct subnet, arp protocol will fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# &lt;STRONG&gt;debug arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;debug arp&amp;nbsp; enabled at level 1&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;arp-in: Arp packet received from 173.x.x.x&amp;nbsp; which is in different subnet than the connected interface 0.0.0.0/255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 23:01:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049815#M921297</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T23:01:10Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049816#M921298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Samuel.&lt;/P&gt;&lt;P&gt;It works. Strangely I did everything afresh but it allowed http and https, and rdp works. This I am not sure why RDP works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, I keep asking. I intend to open some udp ports as well UDP/TCP 1812,1813, 1845,1846,3799, 10100,10200, 10300, 20235&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will let you know how that goes though I am yet to figure out how to block UDP ports.&lt;/P&gt;&lt;P&gt;See access list and see if you can see why RDP works&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show access-list OUTSIDE-IN-ACL&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN-ACL; 3 elements; name hash: 0x585e19e6&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN-ACL line 1 extended permit tcp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-TCP-OBJ (hitcnt=16) 0x28efdb7f&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list OUTSIDE-IN-ACL line 1 extended permit tcp any host xxx.yy.zzz.mmm eq www (hitcnt=2) 0x6a290a4e&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list OUTSIDE-IN-ACL line 1 extended permit tcp any host xxx.yy.zzz.mmm eq https (hitcnt=14) 0x41cdf538&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN-ACL line 2 extended permit ip any any (hitcnt=186) 0x74278021&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 05:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049816#M921298</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-24T05:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049817#M921299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is allowed everything because of last line "&lt;STRONG&gt;access-list OUTSIDE-IN-ACL line 2 extended permit ip any any&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;You have to take it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how should look:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service WWW-SERVER-SERVICES-TCP-OBJ tcp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; description --- Serices TCP published on WEB server ---- &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 80&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 1812&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 1813&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 1845&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 1846&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 3799&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 10100&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 10200&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 10300&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq&amp;nbsp; 20235&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service WWW-SERVER-SERVICES-UDP-OBJ udp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; description --- Serices UDP published on WEB server ---- &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 1812&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 1813&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 1845&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 1846&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 3799&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 10100&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 10200&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 10300&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 20235&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit tcp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-TCP-OBJ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit udp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-UDP-OBJ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;You can customize access based on this template&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 11:02:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049817#M921299</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-24T11:02:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049818#M921300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This will allow only specified ports TCP/UDP, everything else will be blocked, because an implicit rule at the end of the ACL "deny ip any any"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 11:13:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049818#M921300</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-24T11:13:17Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049819#M921301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a great deal Samuel.&lt;/P&gt;&lt;P&gt;It works great now. If only you know how many people that said the solution is no possible, you will be surprised.&lt;/P&gt;&lt;P&gt;Thanks once again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On &lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;To allow icmp from outside (the easy way):&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;access-list OUTSIDE-IN-ACL extended permit icmp any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the elaborate way of doing it? It helps the learning process I think.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Aug 2012 14:21:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049819#M921301</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-25T14:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049820#M921302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By default icmp traffic is not inspected by asa, and will not be allowed to pass through.&lt;BR /&gt;“&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;” is old way to tell asa to inspect icmp, but is still working with newer versions of IOS.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit icmp any any &lt;/STRONG&gt;will allow &lt;STRONG&gt;all types of icmp &lt;/STRONG&gt;from anywhere to anywhere, but from security standpoint is not recommended.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;A better way to allow ICMP (ping) from outside is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group icmp-type WWW-SERVER-SERVICES-ICMP-OBJ&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-object echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-object echo-reply&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-object unreachable&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-object time-exceeded&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp-object source-quench&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN-ACL extended permit icmp any object WWW-SERVER-OBJ object-group WWW-SERVER-SERVICES-ICMP-OBJ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Aug 2012 17:39:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049820#M921302</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-25T17:39:23Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Transparent Firewall with a Web server Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049821#M921303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;So is there really away to say allow host ip address on port 3306?&lt;/P&gt;&lt;P&gt;i.e have a port open only to a particular host and block it for the rest?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 15:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-transparent-firewall-with-a-web-server-question/m-p/2049821#M921303</guid>
      <dc:creator>don_chuks</dc:creator>
      <dc:date>2012-08-29T15:14:37Z</dc:date>
    </item>
  </channel>
</rss>

