<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL help on ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876212#M958976</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;  Believe me there is no difference between the above config in post and the config in attachment that can affect internet connectivity or etc. An ACL grouped to inside interface is just for filtering outbound connections, by default; traffic from inside interface(higher security level) to outside interface (lower sec lvl) is permit already.  Maybe you did not run clear xlate clear route and clear arp to config really take effect, or didnt renew IP addresses of the inside clients.&lt;/P&gt;&lt;P&gt;  "route outside 0.0.0.0 0.0.0.0 200.0.0.169 1 &lt;/P&gt;&lt;P&gt;OR &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.170 1 &lt;/P&gt;&lt;P&gt;and intenet stills works. "&lt;/P&gt;&lt;P&gt;   Doesnt make sense. You are missing something in modem side in my opinion. Maybe your modem has an additional IP configured as 0.170 which conflicts with ASA interface&lt;/P&gt;&lt;P&gt;   Did you forward necessary ports to related IPs in your modem? &lt;/P&gt;&lt;P&gt;   You better configure your modem in bridged mode or ask your ISP to configure it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Dec 2007 14:28:41 GMT</pubDate>
    <dc:creator>Alan Huseyin Kayahan</dc:creator>
    <dc:date>2007-12-14T14:28:41Z</dc:date>
    <item>
      <title>ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876192#M958920</link>
      <description>&lt;P&gt;I tried to setup my Cisco ASA 5505 (Version 7.1(1)) @ my own office. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN --&amp;gt; ASA --&amp;gt; ADSL router --&amp;gt; Internet &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to go from outside any to inside 192.168.1.5 eq (www and https)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to go from outside any to inside 192.168.1.5 eq (pptp and gre)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(I am not sure if it should go to 192.168.1.5 or 192.168.1.9)  I need to go from outside any to inside 192.168.1.4 eq (smtp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My overall network: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ADSL modem (200.0.0.169/29), which connected ASA outside VLAN2 (200.0.0.170/29) and then it connected to ASA inside VLAN1 (192.168.1.1/24) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;200.0.0.169/29 - DSL modem &lt;/P&gt;&lt;P&gt;200.0.0.170/29 - cisco ASA (LAN IP: 192.168.1.1/24) &lt;/P&gt;&lt;P&gt;200.0.0.171/29 - exchange and VPN (LAN IP: 192.168.1.5/24) &lt;/P&gt;&lt;P&gt;no public IP - MAIL FILTER server (LAN IP: 192.168.1.9/24)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876192#M958920</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2019-03-11T11:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876193#M958928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Victor&lt;/P&gt;&lt;P&gt;   MrHusy here from experts-exchange. Your internet problem is solved in EE, Lets handle your second problem here &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;   &lt;/P&gt;&lt;P&gt;I see in your config that you have following route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 209.112.47.170 &lt;/P&gt;&lt;P&gt;but your interface IP is 200.0.0.170/29 . So this route does not work.&lt;/P&gt;&lt;P&gt;You should either configure your DSL modem in bridged mode and assign the public ip to ASA interface, or add the following route in ASA&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.170/29 &lt;/P&gt;&lt;P&gt;And forward port 25 in DSL modem to 200.0.0.171&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or, forward all ports in DSL modem to interface IP (some modems call this forwarding type BIMAP) of ASA 200.0.0.170 then add the following to your config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.1.9 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any interface outside eq smtp&lt;/P&gt;&lt;P&gt;   &lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 16:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876193#M958928</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-11T16:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876194#M958936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have updated the following in my ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- route outside 0.0.0.0 0.0.0.0 200.0.0.170 1&lt;/P&gt;&lt;P&gt;- static (inside,outside) tcp 200.0.0.171 smtp 192.168.1.9 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;- access-list outside_access_in extended permit tcp any host 200.0.0.171 eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if I have make any mistake, and does this also fixed my OWA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently still facing the VPN problem to the 200.0.0.171 server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 16:48:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876194#M958936</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-11T16:48:45Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876195#M958942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your ADSL router is 200.0.0.169, the default route on the ASA should point at that i.e.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 20:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876195#M958942</guid>
      <dc:creator>john.dowson</dc:creator>
      <dc:date>2007-12-11T20:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876196#M958945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John is right, I got confused,. Do the following modification&lt;/P&gt;&lt;P&gt;no route outside 0.0.0.0 0.0.0.0 200.0.0.170&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you do do port forwarding in modem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 20:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876196#M958945</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-11T20:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876197#M958948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for all the inputs, it's always good to heard something back from the experts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure how to do the port forwarding for my modem yet, so I have to look into that, actually is there another work around on that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea regarding to the Window VPN access to 200.0.0.171?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 21:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876197#M958948</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-11T21:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876198#M958951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Following link contains a huge list of routers/modems port forwarding instructions. Choose yours and follow the steps&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.portforward.com/english/routers/port_forwarding/routerindex.htm" target="_blank"&gt;http://www.portforward.com/english/routers/port_forwarding/routerindex.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you mean by VPN access to 200.0.0.171?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 21:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876198#M958951</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-11T21:32:54Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876199#M958954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I am @ home, I would need to VPN into my company's network, with IP 200.0.0.171, and then connect to any internal servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Acutally, it works when I VPN into our network if I use the 200.0.0.172 instead of 200.0.0.171, and all I have to change are following 2 access-list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FROM&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object-group dynamictcp host 200.0.0.171 eq pptp&lt;/P&gt;&lt;P&gt;TO&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object-group dynamictcp host 200.0.0.172 eq pptp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FROM&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre any host 200.0.0.171&lt;/P&gt;&lt;P&gt;TO&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre any host 200.0.0.172&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But we would like to allow users to VPN into the network with 200.0.0.171, any ideas? I am wondering if this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.172 192.168.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 21:57:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876199#M958954</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-11T21:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876200#M958956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So 192.168.1.3 is running RRAS or ISA a VPN server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 22:14:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876200#M958956</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-11T22:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876201#M958958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RRAS is on both 192.168.1.3 and 192.168.1.5, both servers are the domain controller. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently we have another firewall and users can VPN into our network with 200.0.0.171&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you have any idea.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much appreciated&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2007 22:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876201#M958958</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-11T22:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876202#M958960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 pptp 192.168.1.3 pptp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 gre 192.168.1.3 gre netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And leave the access-lists that are applied to 200.0.0.171. Dont change them to 200.0.0.172&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 08:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876202#M958960</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T08:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876203#M958963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct me if I am wrong, but am I suppose to add the following instead?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 pptp 192.168.1.5 pptp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 gre 192.168.1.5 gre netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;since I don't want 192.168.1.3 have anything to do with the VPN anymore, since we are planning to remove this server very soon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 14:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876203#M958963</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-12T14:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876204#M958965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct. I thought 1.3 was active.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 15:25:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876204#M958965</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T15:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876205#M958967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;asa5505(config)# static (inside,outside) tcp 200.0.0.171 gre ?&lt;/P&gt;&lt;P&gt;ERROR: % Unrecognized command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &amp;lt;0-65535&amp;gt;        Enter port number (0 - 65535)&lt;/P&gt;&lt;P&gt;  aol&lt;/P&gt;&lt;P&gt;  bgp&lt;/P&gt;&lt;P&gt;  chargen&lt;/P&gt;&lt;P&gt;  cifs&lt;/P&gt;&lt;P&gt;  citrix-ica&lt;/P&gt;&lt;P&gt;  cmd&lt;/P&gt;&lt;P&gt;  ctiqbe&lt;/P&gt;&lt;P&gt;  daytime&lt;/P&gt;&lt;P&gt;  discard&lt;/P&gt;&lt;P&gt;  domain&lt;/P&gt;&lt;P&gt;  echo&lt;/P&gt;&lt;P&gt;  exec&lt;/P&gt;&lt;P&gt;  finger&lt;/P&gt;&lt;P&gt;  ftp&lt;/P&gt;&lt;P&gt;  ftp-data&lt;/P&gt;&lt;P&gt;  gopher&lt;/P&gt;&lt;P&gt;  h323&lt;/P&gt;&lt;P&gt;  hostname&lt;/P&gt;&lt;P&gt;  http&lt;/P&gt;&lt;P&gt;  https&lt;/P&gt;&lt;P&gt;  ident&lt;/P&gt;&lt;P&gt;  imap4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 15:32:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876205#M958967</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-12T15:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876206#M958970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm, dont forward gre, it is an IP protocol. Check if it is working without gre&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 15:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876206#M958970</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T15:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876207#M958971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please let me know if there any incorrect configuration, I will try to test it out tonight, during off hours.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname asa5505&lt;/P&gt;&lt;P&gt;domain-name mydomain.com&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 200.0.0.170 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;level                  &lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name mydomain.com&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNSsunrpc&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre any host 200.0.0.171&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.173 eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any host 200.0.0.173&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.173 rangepcanywhere-data 5632&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq pptp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq smtp&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 https 192.168.1.5 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 www 192.168.1.5 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.1.9 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.0.0.171 pptp 192.168.1.5 pptp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.172 192.168.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.173 192.168.1.7 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.179 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect pptp&lt;/P&gt;&lt;P&gt;  inspect icmp error&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 16:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876207#M958971</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-12T16:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876208#M958972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.179 &lt;/P&gt;&lt;P&gt;should be&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and we better dedicate 171 to 5. Apply the following please&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp 200.0.0.171 https 192.168.1.5 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp 200.0.0.171 www 192.168.1.5 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp 200.0.0.171 pptp 192.168.1.5 pptp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.171 192.168.1.5 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit gre any host 200.0.0.171&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 20:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876208#M958972</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T20:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876209#M958973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks husycisco, I will give this a try tonight, here I make the changes accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname asa5505&lt;/P&gt;&lt;P&gt;domain-name mydomain.com&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 200.0.0.170 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name mydomain.com&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNSsunrpc&lt;/P&gt;&lt;P&gt;object-group service dynamictcp tcp&lt;/P&gt;&lt;P&gt; port-object range 1024 65535&lt;/P&gt;&lt;P&gt;object-group service timetcp udp&lt;/P&gt;&lt;P&gt; port-object eq ntp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre any host 200.0.0.171&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.173 eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any host 200.0.0.173&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.173 range pcanywhere-data 5632&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 200.0.0.171 eq pptp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq smtp&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.1.9 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.172 192.168.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.173 192.168.1.7 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.0.0.171 192.168.1.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect pptp&lt;/P&gt;&lt;P&gt;  inspect icmp error&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 21:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876209#M958973</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-12T21:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876210#M958974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are welcome. Config looks OK. &lt;/P&gt;&lt;P&gt;Good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 22:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876210#M958974</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T22:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876211#M958975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the config above, I have no internet/smtp/VPN/OWA, nothing works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then added all my previous inside ACLs and applied&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;I am then back to the point where I have intenet works, but not smtp/VPN/OWA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found that on my old config, internet works, if I have have either:&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.169 1&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.0.0.170 1&lt;/P&gt;&lt;P&gt;and intenet stills works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached my current config, any advise will helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2007 13:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-on-asa5505/m-p/876211#M958975</guid>
      <dc:creator>vvii</dc:creator>
      <dc:date>2007-12-14T13:45:06Z</dc:date>
    </item>
  </channel>
</rss>

