<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL help on ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876208#M958972</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.179 &lt;/P&gt;&lt;P&gt;should be&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and we better dedicate 171 to 5. Apply the following please&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp 200.0.0.171 https 192.168.1.5 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp 200.0.0.171 www 192.168.1.5 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp 200.0.0.171 pptp 192.168.1.5 pptp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.171 192.168.1.5 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit gre any host 200.0.0.171&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Dec 2007 20:18:51 GMT</pubDate>
    <dc:creator>Alan Huseyin Kayahan</dc:creator>
    <dc:date>2007-12-12T20:18:51Z</dc:date>
    <item>
      <title>ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876192#M958920</link>
      <description>&lt;P&gt;I tried to setup my Cisco ASA 5505 (Version 7.1(1)) @ my own office. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN --&amp;gt; ASA --&amp;gt; ADSL router --&amp;gt; Internet &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to go from outside any to inside 192.168.1.5 eq (www and https)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to go from outside any to inside 192.168.1.5 eq (pptp and gre)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(I am not sure if it should go to 192.168.1.5 or 192.168.1.9)  I need to go from outside any to inside 192.168.1.4 eq (smtp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My overall network: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ADSL modem (200.0.0.169/29), which connected ASA outside VLAN2 (200.0.0.170/29) and then it connected to ASA inside VLAN1 (192.168.1.1/24) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;200.0.0.169/29 - DSL modem &lt;/P&gt;&lt;P&gt;200.0.0.170/29 - cisco ASA (LAN IP: 192.168.1.1/24) &lt;/P&gt;&lt;P&gt;200.0.0.171/29 - exchange and VPN (LAN IP: 192.168.1.5/24) &lt;/P&gt;&lt;P&gt;no public IP - MAIL FILTER server (LAN IP: 192.168.1.9/24)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876192#M958920</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2019-03-11T11:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876193#M958928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Victor&lt;/P&gt;&lt;P&gt;   MrHusy here from experts-exchange. Your internet problem is solved in EE, Lets handle your second problem here &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;   &lt;/P&gt;&lt;P&gt;I see in your config that you have following route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 209.112.47.170 &lt;/P&gt;&lt;P&gt;but your interface IP is 200.0.0.170/29 . So this route does not work.&lt;/P&gt;&lt;P&gt;You should either configure your DSL modem in bridged mode and assign the public ip to ASA interface, or add the following route in ASA&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.170/29 &lt;/P&gt;&lt;P&gt;And forward port 25 in DSL modem to 200.0.0.171&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or, forward all ports in DSL modem to interface IP (some modems call this forwarding type BIMAP) of ASA 200.0.0.170 then add the following to your config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.1.9 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any interface outside eq smtp&lt;/P&gt;&lt;P&gt;   &lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 16:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876193#M958928</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-11T16:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876194#M958936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have updated the following in my ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- route outside 0.0.0.0 0.0.0.0 200.0.0.170 1&lt;/P&gt;&lt;P&gt;- static (inside,outside) tcp 200.0.0.171 smtp 192.168.1.9 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;- access-list outside_access_in extended permit tcp any host 200.0.0.171 eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if I have make any mistake, and does this also fixed my OWA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently still facing the VPN problem to the 200.0.0.171 server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 16:48:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876194#M958936</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-11T16:48:45Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876195#M958942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your ADSL router is 200.0.0.169, the default route on the ASA should point at that i.e.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 20:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876195#M958942</guid>
      <dc:creator>john.dowson</dc:creator>
      <dc:date>2007-12-11T20:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876196#M958945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John is right, I got confused,. Do the following modification&lt;/P&gt;&lt;P&gt;no route outside 0.0.0.0 0.0.0.0 200.0.0.170&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you do do port forwarding in modem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 20:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876196#M958945</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-11T20:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876197#M958948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for all the inputs, it's always good to heard something back from the experts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure how to do the port forwarding for my modem yet, so I have to look into that, actually is there another work around on that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea regarding to the Window VPN access to 200.0.0.171?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 21:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876197#M958948</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-11T21:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876198#M958951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Following link contains a huge list of routers/modems port forwarding instructions. Choose yours and follow the steps&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.portforward.com/english/routers/port_forwarding/routerindex.htm" target="_blank"&gt;http://www.portforward.com/english/routers/port_forwarding/routerindex.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you mean by VPN access to 200.0.0.171?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 21:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876198#M958951</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-11T21:32:54Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876199#M958954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I am @ home, I would need to VPN into my company's network, with IP 200.0.0.171, and then connect to any internal servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Acutally, it works when I VPN into our network if I use the 200.0.0.172 instead of 200.0.0.171, and all I have to change are following 2 access-list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FROM&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object-group dynamictcp host 200.0.0.171 eq pptp&lt;/P&gt;&lt;P&gt;TO&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object-group dynamictcp host 200.0.0.172 eq pptp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FROM&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre any host 200.0.0.171&lt;/P&gt;&lt;P&gt;TO&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre any host 200.0.0.172&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But we would like to allow users to VPN into the network with 200.0.0.171, any ideas? I am wondering if this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.172 192.168.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 21:57:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876199#M958954</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-11T21:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876200#M958956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So 192.168.1.3 is running RRAS or ISA a VPN server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 22:14:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876200#M958956</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-11T22:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876201#M958958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RRAS is on both 192.168.1.3 and 192.168.1.5, both servers are the domain controller. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently we have another firewall and users can VPN into our network with 200.0.0.171&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you have any idea.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much appreciated&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 22:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876201#M958958</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-11T22:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876202#M958960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 pptp 192.168.1.3 pptp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 gre 192.168.1.3 gre netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And leave the access-lists that are applied to 200.0.0.171. Dont change them to 200.0.0.172&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 08:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876202#M958960</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T08:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876203#M958963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct me if I am wrong, but am I suppose to add the following instead?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 pptp 192.168.1.5 pptp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 gre 192.168.1.5 gre netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;since I don't want 192.168.1.3 have anything to do with the VPN anymore, since we are planning to remove this server very soon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 14:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876203#M958963</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-12T14:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876204#M958965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct. I thought 1.3 was active.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 15:25:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876204#M958965</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T15:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876205#M958967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;asa5505(config)# static (inside,outside) tcp 200.0.0.171 gre ?&lt;/P&gt;&lt;P&gt;ERROR: % Unrecognized command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &amp;lt;0-65535&amp;gt;        Enter port number (0 - 65535)&lt;/P&gt;&lt;P&gt;  aol&lt;/P&gt;&lt;P&gt;  bgp&lt;/P&gt;&lt;P&gt;  chargen&lt;/P&gt;&lt;P&gt;  cifs&lt;/P&gt;&lt;P&gt;  citrix-ica&lt;/P&gt;&lt;P&gt;  cmd&lt;/P&gt;&lt;P&gt;  ctiqbe&lt;/P&gt;&lt;P&gt;  daytime&lt;/P&gt;&lt;P&gt;  discard&lt;/P&gt;&lt;P&gt;  domain&lt;/P&gt;&lt;P&gt;  echo&lt;/P&gt;&lt;P&gt;  exec&lt;/P&gt;&lt;P&gt;  finger&lt;/P&gt;&lt;P&gt;  ftp&lt;/P&gt;&lt;P&gt;  ftp-data&lt;/P&gt;&lt;P&gt;  gopher&lt;/P&gt;&lt;P&gt;  h323&lt;/P&gt;&lt;P&gt;  hostname&lt;/P&gt;&lt;P&gt;  http&lt;/P&gt;&lt;P&gt;  https&lt;/P&gt;&lt;P&gt;  ident&lt;/P&gt;&lt;P&gt;  imap4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 15:32:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876205#M958967</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-12T15:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876206#M958970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm, dont forward gre, it is an IP protocol. Check if it is working without gre&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 15:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876206#M958970</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T15:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876207#M958971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please let me know if there any incorrect configuration, I will try to test it out tonight, during off hours.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname asa5505&lt;/P&gt;&lt;P&gt;domain-name mydomain.com&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 200.0.0.170 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;level                  &lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name mydomain.com&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNSsunrpc&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre any host 200.0.0.171&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.173 eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any host 200.0.0.173&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.173 rangepcanywhere-data 5632&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq pptp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq smtp&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 https 192.168.1.5 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 www 192.168.1.5 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.1.9 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 pptp 192.168.1.5 pptp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.172 192.168.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.173 192.168.1.7 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.179 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect pptp&lt;/P&gt;&lt;P&gt;  inspect icmp error&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 16:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876207#M958971</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-12T16:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876208#M958972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.179 &lt;/P&gt;&lt;P&gt;should be&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and we better dedicate 171 to 5. Apply the following please&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp 200.0.0.171 https 192.168.1.5 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp 200.0.0.171 www 192.168.1.5 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp 200.0.0.171 pptp 192.168.1.5 pptp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.171 192.168.1.5 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit gre any host 200.0.0.171&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 20:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876208#M958972</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T20:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876209#M958973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks husycisco, I will give this a try tonight, here I make the changes accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname asa5505&lt;/P&gt;&lt;P&gt;domain-name mydomain.com&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 200.0.0.170 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name mydomain.com&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNSsunrpc&lt;/P&gt;&lt;P&gt;object-group service dynamictcp tcp&lt;/P&gt;&lt;P&gt; port-object range 1024 65535&lt;/P&gt;&lt;P&gt;object-group service timetcp udp&lt;/P&gt;&lt;P&gt; port-object eq ntp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre any host 200.0.0.171&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.173 eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any host 200.0.0.173&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.173 range pcanywhere-data 5632&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq pptp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq smtp&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.1.9 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.172 192.168.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.173 192.168.1.7 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.171 192.168.1.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect pptp&lt;/P&gt;&lt;P&gt;  inspect icmp error&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 21:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876209#M958973</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-12T21:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876210#M958974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are welcome. Config looks OK. &lt;/P&gt;&lt;P&gt;Good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 22:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876210#M958974</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T22:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876211#M958975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the config above, I have no internet/smtp/VPN/OWA, nothing works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then added all my previous inside ACLs and applied&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;I am then back to the point where I have intenet works, but not smtp/VPN/OWA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found that on my old config, internet works, if I have have either:&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169 1&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.170 1&lt;/P&gt;&lt;P&gt;and intenet stills works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached my current config, any advise will helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2007 13:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876211#M958975</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-14T13:45:06Z</dc:date>
    </item>
  </channel>
</rss>

