Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
The 1st PC connection is refused on the outside interface for ASDM access. The 2nd one works. I have both the 10.180.80 and 10.180.100 allowed in the Management configuration. Any suggestions?
PC = 10.180.80.112 255.255.255.0 (TCP Denied) ...
Had configuration working in LAB. . Just changed IP’s for new test….. now we cannot get into ASDM and access-list are dropping or packets… not sure what is wrong. Below is the configuration and the packet trace. Any help would be GREATLY appreciated....
I have attempted to create ACL's that would allow me to simply ping from any inside interfaces to desktops outside.... but nothing is working. Any help would be greatly appreciated by looking at the below config and telling me if you see anything wro...
Please see attached for diagram of what I need to do. This is ALL internal. The Firewall is a ASA 5525-X and connect to a private switch on the outside. I need for users to connect through this firewall to the lab. Do I need NAT for this?
Hello!
I am new to the Cisco ASA world. I do have exp with Cisco Switching and Routing, however, the ASA is a new learning opportunity for me. With that I have a question of Remote Connections through the ASA Firewall.
Environment: Lab Firewalled o...
Pulkit,
I have just gotten to the point where I could test the above and I am getting the below error when attempting to access the PC via RDP from another subnet. Please see below:
The message is seen when I attempt an RDP session to 10.190.201.23...
Rahul,
Below is the output of the packet-tracer... I also added the latest config ....FYI.. I changed the interface name from test to deltav.
again.. THANK YOU for ur continued help!!!
ciscoasa# packet-tracer input deltav icmp 192.168.3.50 8 0 192....
Rahul,
I added the "access-group 101 out interface outside" without success. I am pinging from a desktop on the test interface. I can ping the 192.168.3.100 interface fine.... tracert also... however, when I choose the 192.168.2.100 (outside interfac...
Thanks Marius!
Would I need to create a ACL in order to ping from the inside to the outside or should the security level of 100 on the inside interface allow all to the lower outside interface of 0?