<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa5520 problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741487#M979515</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no nat (Wan) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;no static (Lan,Wan) xx.xxx.xxx.xx access-list Lan_nat_static&lt;/P&gt;&lt;P&gt;no route Wan xx.xxx.xxx.xx 255.255.255.255 65.112.215.97 1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----then do---&lt;/P&gt;&lt;P&gt;nat (Lan) 1 0 0 &lt;/P&gt;&lt;P&gt;global (Wan) 1 interface&lt;/P&gt;&lt;P&gt;route Wan 0.0.0.0 0.0.0.0 65.112.215.97&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this assumes 65.112.215.97 is the next hop EXTERNAL to your ASA device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Jun 2007 18:21:01 GMT</pubDate>
    <dc:creator>srue</dc:creator>
    <dc:date>2007-06-05T18:21:01Z</dc:date>
    <item>
      <title>asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741481#M979497</link>
      <description>&lt;P&gt;I just got a asa5520 to replace my current firewall. I am having problems getting it even to work .I can 't get any traffic to pass through outbound or inbound even with the basic configs....am I missing something with this device??&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741481#M979497</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2019-03-11T10:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741482#M979498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you post a config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2007 14:06:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741482#M979498</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-04T14:06:55Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741483#M979502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA Version 7.2(2)19                    &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;hostname ciscoasa                 &lt;/P&gt;&lt;P&gt;domain-name xxxxxxx.                   &lt;/P&gt;&lt;P&gt;enable password xnGqPhwrHRAXC1MM encrypted                                          &lt;/P&gt;&lt;P&gt;names     &lt;/P&gt;&lt;P&gt;dns-guard         &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0                            &lt;/P&gt;&lt;P&gt; nameif Wan           &lt;/P&gt;&lt;P&gt; security-level 0                 &lt;/P&gt;&lt;P&gt; ip address xx.xxx.xxx.xx 255.255.255.224                                         &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1                            &lt;/P&gt;&lt;P&gt; nameif Lan           &lt;/P&gt;&lt;P&gt; security-level 100                   &lt;/P&gt;&lt;P&gt; ip address xx.xxx.x.xx 255.255.255.0                                     &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2                            &lt;/P&gt;&lt;P&gt; shutdown         &lt;/P&gt;&lt;P&gt; no nameif          &lt;/P&gt;&lt;P&gt; no security-level                  &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3                            &lt;/P&gt;&lt;P&gt; shutdown         &lt;/P&gt;&lt;P&gt; no nameif          &lt;/P&gt;&lt;P&gt; no security-level                  &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Management0/0                       &lt;/P&gt;&lt;P&gt; nameif management                  &lt;/P&gt;&lt;P&gt; security-level 100                   &lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255                         &lt;/P&gt;&lt;P&gt; management-only                &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted                                 &lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-19-k8.bin                                   &lt;/P&gt;&lt;P&gt;ftp mode passive                &lt;/P&gt;&lt;P&gt;dns domain-lookup Wan                     &lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS                           &lt;/P&gt;&lt;P&gt; name-server xxx.xxx.x.xx                         &lt;/P&gt;&lt;P&gt; name-server xxx.xxx.x.xx                         &lt;/P&gt;&lt;P&gt; domain-name xxxxxxxxxx.com                         &lt;/P&gt;&lt;P&gt;pager lines 24              &lt;/P&gt;&lt;P&gt;logging asdm informational                          &lt;/P&gt;&lt;P&gt;mtu Wan 1500            &lt;/P&gt;&lt;P&gt;mtu Lan 1500            &lt;/P&gt;&lt;P&gt;mtu management 1500                   &lt;/P&gt;&lt;P&gt;no failover           &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1                                          &lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin                              &lt;/P&gt;&lt;P&gt;no asdm history enable                      &lt;/P&gt;&lt;P&gt;arp timeout 14400                 &lt;/P&gt;&lt;P&gt;nat (Lan) 0 0.0.0.0 0.0.0.0                           &lt;/P&gt;&lt;P&gt;route Wan xx.xxx.xxx.xx 255.255.255.255 xx.xxx                                            &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00                     &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02                                                                 &lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00                                                                              &lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00                                                                               &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute                              &lt;/P&gt;&lt;P&gt;http server enable                  &lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management                                         &lt;/P&gt;&lt;P&gt;no snmp-server location                       &lt;/P&gt;&lt;P&gt;no snmp-server contact                      &lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart                                                                      &lt;/P&gt;&lt;P&gt;telnet timeout 5                &lt;/P&gt;&lt;P&gt;ssh timeout 5             &lt;/P&gt;&lt;P&gt;console timeout 0                 &lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management                                                  &lt;/P&gt;&lt;P&gt;dhcpd enable management                       &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;class-map inspection_default                            &lt;/P&gt;&lt;P&gt; match default-inspection-traffic                                 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:7a9b298480632c1bbfa46b3609bdf03b&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2007 19:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741483#M979502</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-04T19:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741484#M979504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know what your inside subnet is so I can only guess if you want to nat/pat. If so, this should get you from inside to outside. If not then just add the default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (Lan) 0 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;global (Wan) 1 interface&lt;/P&gt;&lt;P&gt;nat (Lan) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route Wan 0.0.0.0 0.0.0.0 &lt;NEXT.HOP.IP&gt;&lt;/NEXT.HOP.IP&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2007 19:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741484#M979504</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-04T19:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741485#M979509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using nat and also have some static routes. I have fully configured the firewall and could not get it to work.I have brought it back to the begining. If all I want is to get to the internet I should just need my wan ip and gateway and lan ip...correct? I have any outbound to allow &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2007 19:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741485#M979509</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-04T19:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741486#M979512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could someone check this config out I still cannot get to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2)19                    &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;hostname ciscoasa                 &lt;/P&gt;&lt;P&gt;domain-name xxxxxx.com                        &lt;/P&gt;&lt;P&gt;enable password xxxxxxxx encrypted                                          &lt;/P&gt;&lt;P&gt;names     &lt;/P&gt;&lt;P&gt;dns-guard         &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0                            &lt;/P&gt;&lt;P&gt; nameif Wan           &lt;/P&gt;&lt;P&gt; security-level 0                 &lt;/P&gt;&lt;P&gt; ip address xx.xx.xx.xx 255.255.255.224                                         &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1                            &lt;/P&gt;&lt;P&gt; nameif Lan           &lt;/P&gt;&lt;P&gt; security-level 100                   &lt;/P&gt;&lt;P&gt; ip address xx.xx.x.xx 255.255.255.0                                     &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2                            &lt;/P&gt;&lt;P&gt; shutdown         &lt;/P&gt;&lt;P&gt; no nameif          &lt;/P&gt;&lt;P&gt; no security-level                  &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3                            &lt;/P&gt;&lt;P&gt; shutdown         &lt;/P&gt;&lt;P&gt; no nameif          &lt;/P&gt;&lt;P&gt; no security-level                  &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Management0/0                       &lt;/P&gt;&lt;P&gt; nameif management                  &lt;/P&gt;&lt;P&gt; security-level 100                   &lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0                                     &lt;/P&gt;&lt;P&gt; management-only                &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encryp                             &lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-19-k8.bin                                   &lt;/P&gt;&lt;P&gt;ftp mode passive                &lt;/P&gt;&lt;P&gt;dns domain-lookup Wan                     &lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS                           &lt;/P&gt;&lt;P&gt; name-server xxx.xxx.x.xx                         &lt;/P&gt;&lt;P&gt; name-server xxx.xxx.x.xx                         &lt;/P&gt;&lt;P&gt; domain-name foleyinc.com                         &lt;/P&gt;&lt;P&gt;object-group network test                         &lt;/P&gt;&lt;P&gt; network-object 0.0.0.0 0.0.0.0                               &lt;/P&gt;&lt;P&gt;access-list Lan_nat_static extended permit ip interface Lan interface Wan                                                                         &lt;/P&gt;&lt;P&gt;pager lines 24              &lt;/P&gt;&lt;P&gt;logging asdm informational                          &lt;/P&gt;&lt;P&gt;mtu Wan 1500            &lt;/P&gt;&lt;P&gt;mtu Lan 1500            &lt;/P&gt;&lt;P&gt;mtu management 1500                   &lt;/P&gt;&lt;P&gt;no failover           &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1                                          &lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin                              &lt;/P&gt;&lt;P&gt;no asdm history enable                      &lt;/P&gt;&lt;P&gt;arp timeout           &lt;/P&gt;&lt;P&gt;nat-control           &lt;/P&gt;&lt;P&gt;nat (Wan) 0 0.0.0.0 0.0.0.0                           &lt;/P&gt;&lt;P&gt;static (Lan,Wan) xx.xxx.xxx.xx  access-list Lan_nat_static                                                          &lt;/P&gt;&lt;P&gt;route Wan xx.xxx.xxx.xx 255.255.255.255 65.112.215.97 1                                                       &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00                     &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02                                                                 &lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00                                                                              &lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00                                                                               &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute                              &lt;/P&gt;&lt;P&gt;http server enable                  &lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management                                         &lt;/P&gt;&lt;P&gt;no snmp-server location                       &lt;/P&gt;&lt;P&gt;no snmp-server contact                      &lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart                                                                      &lt;/P&gt;&lt;P&gt;telnet timeout 5                &lt;/P&gt;&lt;P&gt;ssh timeout 5             &lt;/P&gt;&lt;P&gt;console timeout 0                 &lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management                                                  &lt;/P&gt;&lt;P&gt;dhcpd enable management                       &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;class-map inspection_default                            &lt;/P&gt;&lt;P&gt; match default-inspection-traffic                                 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2007 17:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741486#M979512</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-05T17:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741487#M979515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no nat (Wan) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;no static (Lan,Wan) xx.xxx.xxx.xx access-list Lan_nat_static&lt;/P&gt;&lt;P&gt;no route Wan xx.xxx.xxx.xx 255.255.255.255 65.112.215.97 1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----then do---&lt;/P&gt;&lt;P&gt;nat (Lan) 1 0 0 &lt;/P&gt;&lt;P&gt;global (Wan) 1 interface&lt;/P&gt;&lt;P&gt;route Wan 0.0.0.0 0.0.0.0 65.112.215.97&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this assumes 65.112.215.97 is the next hop EXTERNAL to your ASA device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2007 18:21:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741487#M979515</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-06-05T18:21:01Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741488#M979517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added those rules in and still no luck. If i go into asdm and do a packet trace it dies at the acl.It point to an implicit rule that you cannot modify.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2007 19:23:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741488#M979517</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-05T19:23:07Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741489#M979520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what ACL does it die at?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2007 19:29:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741489#M979520</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-06-05T19:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741490#M979523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you do packet trace make sure you are selecting Lan interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2007 19:29:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741490#M979523</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-05T19:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741491#M979525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lan(incoming Rules)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any  any ip  deny  implicit rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did use the lan interface as well for the test&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2007 19:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741491#M979525</guid>
      <dc:creator>kmcilvaine</dc:creator>
      <dc:date>2007-06-05T19:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: asa5520 problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741492#M979527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first of all remove the service policy. i believe u have some ssm module installed on your f/w. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then add these lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (lan) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global(wan) 1 interface outside&lt;/P&gt;&lt;P&gt;route wan 0.0.0.0 0.0.0.0 65.112.215.97 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (Lan,Wan) xx.xxx.xxx.xx access-list Lan_nat_static &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group 110 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: if you allow ip any any, then virus will attack, so try once with this command, then change to ur desired access:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp any eq domain any&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp any eq smtp any&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp any eq pop3 any&lt;/P&gt;&lt;P&gt;access-list 110 extended permit udp any eq domain any&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp any any eq ftp-data&lt;/P&gt;&lt;P&gt;access-list 110 extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2007 03:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-problems/m-p/741492#M979527</guid>
      <dc:creator>acharyr123</dc:creator>
      <dc:date>2007-06-06T03:54:22Z</dc:date>
    </item>
  </channel>
</rss>

