<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem setting up ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741218#M976948</link>
    <description>&lt;P&gt;Now I can reach the firewall from internal network. But still don't get internet access nor can I see dmz.&lt;/P&gt;&lt;P&gt;CiscoASA# show route&lt;/P&gt;&lt;P&gt;S    0.0.0.0 0.0.0.0 [1/0] via xx.xx.xxy.1, outside&lt;/P&gt;&lt;P&gt;C    10.16.0.0 255.255.252.0 is directly connected, outside&lt;/P&gt;&lt;P&gt;C    10.16.52.0 255.255.252.0 is directly connected, inside&lt;/P&gt;&lt;P&gt;C    192.168.1.0 255.255.255.0 is directly connected, management&lt;/P&gt;&lt;P&gt;C    192.168.20.0 255.255.252.0 is directly connected, dmz &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the firewall config right now is:&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm506.bin&lt;/P&gt;&lt;P&gt;asdm location 192.168.20.100 255.255.255.255 dmz&lt;/P&gt;&lt;P&gt;asdm location 192.168.20.101 255.255.255.255 dmz&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(6) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname CiscoASA&lt;/P&gt;&lt;P&gt;domain-name DOMAINNAME&lt;/P&gt;&lt;P&gt;enable password AAAAAAAAAAAAA. encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.16.1.1 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 10.16.54.1 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2 &lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 192.168.20.1 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100 &lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd AAAAAAAAAAAAAA encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.20.100 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.20.101 eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm506.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (dmz) 200 xx.xx.xxx.70-xx.xx.xxx.71 netmask 255.255.252.0&lt;/P&gt;&lt;P&gt;global (outside) 200 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.16.54.0 255.255.255.0&lt;/P&gt;&lt;P&gt;- Show quoted text -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) xx.xx.xxx.70 192.168.20.100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,inside) xx.xx.xxx.71 192.168.20.101 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xxy.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.16.54.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default &lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512 &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;What IP address should I use for the outside interface? I made one up, not sure what ip is needed there and where it is used.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 10:41:04 GMT</pubDate>
    <dc:creator>SanderTaats</dc:creator>
    <dc:date>2019-03-11T10:41:04Z</dc:date>
    <item>
      <title>Problem setting up ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741218#M976948</link>
      <description>&lt;P&gt;Now I can reach the firewall from internal network. But still don't get internet access nor can I see dmz.&lt;/P&gt;&lt;P&gt;CiscoASA# show route&lt;/P&gt;&lt;P&gt;S    0.0.0.0 0.0.0.0 [1/0] via xx.xx.xxy.1, outside&lt;/P&gt;&lt;P&gt;C    10.16.0.0 255.255.252.0 is directly connected, outside&lt;/P&gt;&lt;P&gt;C    10.16.52.0 255.255.252.0 is directly connected, inside&lt;/P&gt;&lt;P&gt;C    192.168.1.0 255.255.255.0 is directly connected, management&lt;/P&gt;&lt;P&gt;C    192.168.20.0 255.255.252.0 is directly connected, dmz &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the firewall config right now is:&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm506.bin&lt;/P&gt;&lt;P&gt;asdm location 192.168.20.100 255.255.255.255 dmz&lt;/P&gt;&lt;P&gt;asdm location 192.168.20.101 255.255.255.255 dmz&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(6) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname CiscoASA&lt;/P&gt;&lt;P&gt;domain-name DOMAINNAME&lt;/P&gt;&lt;P&gt;enable password AAAAAAAAAAAAA. encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.16.1.1 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 10.16.54.1 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2 &lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 192.168.20.1 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100 &lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd AAAAAAAAAAAAAA encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.20.100 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.20.101 eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm506.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (dmz) 200 xx.xx.xxx.70-xx.xx.xxx.71 netmask 255.255.252.0&lt;/P&gt;&lt;P&gt;global (outside) 200 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.16.54.0 255.255.255.0&lt;/P&gt;&lt;P&gt;- Show quoted text -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) xx.xx.xxx.70 192.168.20.100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,inside) xx.xx.xxx.71 192.168.20.101 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xxy.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.16.54.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default &lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512 &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;What IP address should I use for the outside interface? I made one up, not sure what ip is needed there and where it is used.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:41:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741218#M976948</guid>
      <dc:creator>SanderTaats</dc:creator>
      <dc:date>2019-03-11T10:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: Problem setting up ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741219#M976952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Still working on this? Let's take one issue at a time. What is the topology of your network? Usually you do not make up an ip address for the outside of your firewall. It appears you have some public ip's, xx.xx.xxx.70 and xx.xx.xxx.71 for instance. Are you natting somewhere outside the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Your access-list entries are not correct, they need to look like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xx.xx.xxx.70 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xx.xx.xxx.71 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. You cannot see the internet becuase you are not natting inside hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. To see the dmz from the inside, add this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.16.54.0 10.16.54.0 netmask 255.255.252.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2007 13:07:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741219#M976952</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-06T13:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: Problem setting up ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741220#M976955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I reset everything to factory default after learning some more about what the different settings do. The result is same though I'm afraid. I can't access internet nor dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------------------------------------&lt;/P&gt;&lt;P&gt;inside = 10.16.54.0 255.255.255.0&lt;/P&gt;&lt;P&gt;firewall ip = 10.16.54.1&lt;/P&gt;&lt;P&gt;dhcp = 10.16.54.10&lt;/P&gt;&lt;P&gt;computers in network = 10.16.54.11-10.16.54.100&lt;/P&gt;&lt;P&gt;----------------------------------------&lt;/P&gt;&lt;P&gt;dmz 192.168.20.100-192.168.20.102 255.255.255.0&lt;/P&gt;&lt;P&gt;I have 3 servers in dmz.&lt;/P&gt;&lt;P&gt;192.168.20.100 = webbserver, needs to send mail with 192.168.20.102&lt;/P&gt;&lt;P&gt;192.168.20.101 = webb + sql + mail server&lt;/P&gt;&lt;P&gt;192.168.20.102 = mail server&lt;/P&gt;&lt;P&gt;----------------------------------------&lt;/P&gt;&lt;P&gt;outside xx.xx.xxx.70&lt;/P&gt;&lt;P&gt;I used one of the 2 public IPs we have as outside IP, not sure if that was correct or not.&lt;/P&gt;&lt;P&gt;----------------------------------------&lt;/P&gt;&lt;P&gt;We have 2 public IPs.&lt;/P&gt;&lt;P&gt;xx.xx.xxx.70 255.255.252.0&lt;/P&gt;&lt;P&gt;xx.xx.xxx.71 255.255.252.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xx.xx.xxx.70 -&amp;gt; 192.168.20.100 www&lt;/P&gt;&lt;P&gt;xx.xx.xxx.70 -&amp;gt; 192.168.20.102 smtp&lt;/P&gt;&lt;P&gt;xx.xx.xxx.71 -&amp;gt; 192.168.20.101 www&lt;/P&gt;&lt;P&gt;xx.xx.xxx.71 -&amp;gt; 192.168.20.101 smtp&lt;/P&gt;&lt;P&gt;----------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(6) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname CiscoASA&lt;/P&gt;&lt;P&gt;domain-name AAAAAAAAAAA&lt;/P&gt;&lt;P&gt;enable password AAAAAAAAAAAAAAAAAA encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address xx.xx.xxx.70 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 10.16.54.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.20.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xx.xx.xxx.70 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xx.xx.xxx.71 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xx.xx.xxx.70 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xx.xx.xxx.71 eq smtp &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm506.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.16.54.0 10.16.54.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (dmz,outside) xx.xx.xxx.70 192.168.20.100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) xx.xx.xxx.71 192.168.20.101 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route dmz xx.xx.xxx.71 255.255.255.255 xx.xx.xxy.1 1&lt;/P&gt;&lt;P&gt;route dmz xx.xx.xxx.70 255.255.255.255 xx.xx.xxz.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.16.54.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512 &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jul 2007 21:56:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741220#M976955</guid>
      <dc:creator>SanderTaats</dc:creator>
      <dc:date>2007-07-07T21:56:40Z</dc:date>
    </item>
    <item>
      <title>Re: Problem setting up ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741221#M976957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your security levels are backwards. The outside interface is considered less secure and should be given a lower security level such as 0. The inside is most trusted and should be given the highest (100). Higher Security levels have access to lower security levels by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0 &lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;interface Ethernet0/1 &lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are creating a static from the outside ip of your asa to an inside host. Lets configure port translation instead. We will also want to use the outside interface IP for PAT which will be needed by the inside interface hosts to get out to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (dmz,outside) xx.xx.xxx.70 192.168.20.100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface 80 192.168.20.100 80 &lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface 25 192.168.20.100 25&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;wr mem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now make sure you can ping your default gatway from the ASA. Also post the result of a "sh int e0/0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the tutorial I made is for 6.3(5) but is still pretty much relevant:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://firewalls.ath.cx/viewtopic.php?t=2" target="_blank"&gt;http://firewalls.ath.cx/viewtopic.php?t=2&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jul 2007 23:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741221#M976957</guid>
      <dc:creator>JBDanford2002</dc:creator>
      <dc:date>2007-07-07T23:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Problem setting up ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741222#M976959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now I could access dmz but it was very slow. Couldn't ping it either and no internet access.&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Result of the command: "sh int e0/0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface Ethernet0/0 "outside", is up, line protocol is up&lt;/P&gt;&lt;P&gt;  Hardware is i82546GB rev03, BW 100 Mbps&lt;/P&gt;&lt;P&gt;	Full-Duplex(Full-duplex), 100 Mbps(100 Mbps)&lt;/P&gt;&lt;P&gt;	MAC address A, MTU 1500&lt;/P&gt;&lt;P&gt;	IP address xx.xx.xxx.70, subnet mask 255.255.252.0&lt;/P&gt;&lt;P&gt;	170 packets input, 10900 bytes, 0 no buffer&lt;/P&gt;&lt;P&gt;	Received 163 broadcasts, 0 runts, 0 giants&lt;/P&gt;&lt;P&gt;	0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;/P&gt;&lt;P&gt;	0 L2 decode drops&lt;/P&gt;&lt;P&gt;	286 packets output, 18304 bytes, 0 underruns&lt;/P&gt;&lt;P&gt;	0 output errors, 0 collisions&lt;/P&gt;&lt;P&gt;	0 late collisions, 0 deferred&lt;/P&gt;&lt;P&gt;	input queue (curr/max blocks): hardware (7/0) software (0/0)&lt;/P&gt;&lt;P&gt;	output queue (curr/max blocks): hardware (0/1) software (0/0)&lt;/P&gt;&lt;P&gt;  Traffic Statistics for "outside":&lt;/P&gt;&lt;P&gt;	8 packets input, 382 bytes&lt;/P&gt;&lt;P&gt;	1 packets output, 28 bytes&lt;/P&gt;&lt;P&gt;	7 packets dropped&lt;/P&gt;&lt;P&gt;      1 minute input rate 0 pkts/sec,  0 bytes/sec&lt;/P&gt;&lt;P&gt;      1 minute output rate 0 pkts/sec,  0 bytes/sec&lt;/P&gt;&lt;P&gt;      1 minute drop rate, 0 pkts/sec&lt;/P&gt;&lt;P&gt;      5 minute input rate 0 pkts/sec,  0 bytes/sec&lt;/P&gt;&lt;P&gt;      5 minute output rate 0 pkts/sec,  0 bytes/sec&lt;/P&gt;&lt;P&gt;      5 minute drop rate, 0 pkts/sec&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(6) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname CiscoASA&lt;/P&gt;&lt;P&gt;domain-name A&lt;/P&gt;&lt;P&gt;enable password A encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xx.xx.xxx.70 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.16.54.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.20.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd A encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xx.xx.xxx.70 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xx.xx.xxx.71 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xx.xx.xxx.70 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xx.xx.xxx.71 eq smtp &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm506.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface www 192.168.20.100 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface smtp 192.168.20.100 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.16.54.0 10.16.54.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (dmz,outside) xx.xx.xxx.71 192.168.20.101 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route dmz xx.xx.xxx.71 255.255.255.255 xx.xx.xxy.1 1&lt;/P&gt;&lt;P&gt;route dmz xx.xx.xxx.70 255.255.255.255 xx.xx.xxy.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.16.54.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512 &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:AAA&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jul 2007 13:17:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741222#M976959</guid>
      <dc:creator>SanderTaats</dc:creator>
      <dc:date>2007-07-08T13:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Problem setting up ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741223#M976961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So from the ASA you could not ping the internet? What is the ASA connected to? Are you on a cable connection va t1? Can you ping your default gateway? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jul 2007 13:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741223#M976961</guid>
      <dc:creator>JBDanford2002</dc:creator>
      <dc:date>2007-07-08T13:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: Problem setting up ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741224#M976963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know how to ping stuff from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My gateway that I received from ISP is xx.xx.xxy.1 and I can ping it with the old firewall. The firewall is connected to the wall and that leads us to the city network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway for the computers in the network is = firewall ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an really old firewall here that I'm trying to replace. It's so old that we can't even access it to check the configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jul 2007 13:45:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741224#M976963</guid>
      <dc:creator>SanderTaats</dc:creator>
      <dc:date>2007-07-08T13:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: Problem setting up ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741225#M976964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok. What type of firewall is the "old firewall"? &lt;/P&gt;&lt;P&gt;From the command line on the ASA just type the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping xx.xx.xxy.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jul 2007 14:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741225#M976964</guid>
      <dc:creator>JBDanford2002</dc:creator>
      <dc:date>2007-07-08T14:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Problem setting up ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741226#M976965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The old firewall is a Pentium MMX computer with some Clavister firewall software I think.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I couldn't ping the gateway.&lt;/P&gt;&lt;P&gt;-------------------------------------------&lt;/P&gt;&lt;P&gt;Result of the command: "ping xx.xx.xxy.1"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to xx.xx.xxy.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jul 2007 18:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741226#M976965</guid>
      <dc:creator>SanderTaats</dc:creator>
      <dc:date>2007-07-08T18:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: Problem setting up ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741227#M976966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the old firewall still plugged in? Can you verify the IP/subnet mask of it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Jul 2007 19:36:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-setting-up-asa-5510/m-p/741227#M976966</guid>
      <dc:creator>JBDanford2002</dc:creator>
      <dc:date>2007-07-08T19:36:15Z</dc:date>
    </item>
  </channel>
</rss>

