<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5505 setup at home in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950348#M941686</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, I can solve your problem. You need to create an access rule and source will be 0.0.0.0 and destination will be your inside host network ID like (192.168.10.0) and allow from any to ipsec (50) in ports section which use for make ipsec connection and open echo reply as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Feb 2008 21:55:07 GMT</pubDate>
    <dc:creator>ray_stone</dc:creator>
    <dc:date>2008-02-29T21:55:07Z</dc:date>
    <item>
      <title>ASA5505 setup at home</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950344#M941682</link>
      <description>&lt;P&gt;I have the outside interface setup for DHCP that connects to comcast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My inside interface is 192.168.69.1 and is setup to provide DHCP for my internal LAN.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have never logged into a firewall before and as I quickly found out the commands are not like my routers and switches.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I finally gave in and have been using the ASDM. I just want to allow everything from the inside out.  I didn't think it would be this difficult!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access rules don't make sense to me.   The outside in has an implicit deny rule for IP by default.  I would assume this means that nothing can make a connection from the outside in?  So why does it block my ping replies but it will allow me to surf the web?? &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a work laptop that won't connect to a VPN through the ASA, the logs say "regular translation creation failed for protocol 50"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled as much as I can and still can't figure this out.  At this point I'm not even sure if I'm blocking anything... heh  Well it must be blocking something cause my VPN still doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname viper&lt;/P&gt;&lt;P&gt;domain-name mydomain.net&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.69.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.70.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name mydomain.net&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit esp any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit esp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-523.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 norandomseq&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet 192.168.69.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.69.100-192.168.69.150 inside&lt;/P&gt;&lt;P&gt;dhcpd domain mydomain.net interface inside&lt;/P&gt;&lt;P&gt;dhcpd update dns both override interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end         &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, is there an easy way to allow everything out and block anything on the inside from creating a connection inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:10:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950344#M941682</guid>
      <dc:creator>miketta89</dc:creator>
      <dc:date>2019-03-11T12:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 setup at home</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950345#M941683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;  by default, the ASA will allow traffic from the interface with higher security level (i.e inside inteface with security level =100) and any other interface with lower security level (i.e outside interface with security level = 0). You dont need to define any access rule to allow traffic. by default all traffic from inside to outside interface is allowed. its better to remove the access lists you added, because they represent a high security threat.&lt;/P&gt;&lt;P&gt; for the laptop vpn problem, try to addd these commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp enable&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal 30 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2008 12:33:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950345#M941683</guid>
      <dc:creator>alanajjar</dc:creator>
      <dc:date>2008-02-28T12:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 setup at home</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950346#M941684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks I'll try that for the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If all traffic is allowed out why do my pings not resolve to yahoo.com with the default settings?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2008 18:04:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950346#M941684</guid>
      <dc:creator>miketta89</dc:creator>
      <dc:date>2008-02-28T18:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 setup at home</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950347#M941685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Because ICMP echo responses have to be specifically permitted as they return from the Outside to the Inside.  Try building an ACL for the outside interface that includes the following, though this will allow both tracert and ping responses:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_in remark PERMIT TRACEROUTE RETURN TRAFFIC&lt;/P&gt;&lt;P&gt;access-list acl_in permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list acl_in permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list acl_in permit icmp any any echo-reply &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2008 18:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950347#M941685</guid>
      <dc:creator>1cmerchant</dc:creator>
      <dc:date>2008-02-28T18:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 setup at home</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950348#M941686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, I can solve your problem. You need to create an access rule and source will be 0.0.0.0 and destination will be your inside host network ID like (192.168.10.0) and allow from any to ipsec (50) in ports section which use for make ipsec connection and open echo reply as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Feb 2008 21:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-setup-at-home/m-p/950348#M941686</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-02-29T21:55:07Z</dc:date>
    </item>
  </channel>
</rss>

