Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
IMAGE: ASA Before SG300My current setup has an ASA 5505 acting as my main gateway, firewall, and router for network. The ASA with its 100 MB bandwidth is a bottleneck for my network. Everything is working now though there are obvious speed issues. So...
Hello,I have been using an ASA 5505 as a router with multiple VLANs as all my switches are Layer 2. The ASA is responsible for InterVLAN routing. I'm attempting to upgrade to 9.1 from a 8.2. Luckily, I have an extra ASA and I'm attempting to set that...
I have an ASA configured for IPSEC VPN. I am able to connect but once I connect, I can only ping the ASA, I cannot ping anything on the internal network. I have many subnets and VLANS. I want to VPN clients to be able to access to the VLAN 1, 2, & 3...
Result of the command: "sh NAT"Manual NAT Policies (Section 1)1 (inside) to (cable) source dynamic any interface translate_hits = 0, untranslate_hits = 02 (inside) to (t1) source dynamic any interface translate_hits = 7349, untranslate_hits...
Here is the sh NAT from the ASA running 8.2.5 Result of the command: "sh nat"NAT policies on Interface inside: match ip inside 192.168.0.0 255.255.255.0 inside vpnpool 255.255.255.0 NAT exempt translate_hits = 0, untranslate_hits = 0 match ip...
I have included several packet traces.Outside to inside on .124 (problem ip shared with outside inteface)Outside to inside on .123 (working fine)Inside to outside on .124 (problem)Inside to outside on .123 (working fine)