<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cisco ASA Archives - Network Guy</title>
	<atom:link href="https://networkguy.de/category/cisco-asa/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Share your knowledge!</description>
	<lastBuildDate>Mon, 11 Jul 2016 06:45:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://networkguy.de/wp-content/uploads/2016/09/cropped-og-image-32x32.jpg</url>
	<title>Cisco ASA Archives - Network Guy</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">35051042</site>	<item>
		<title>Updating Cisco ASA HA Cluster</title>
		<link>https://networkguy.de/updating-cisco-asa-ha-cluster/</link>
					<comments>https://networkguy.de/updating-cisco-asa-ha-cluster/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Mon, 11 Jul 2016 06:43:32 +0000</pubDate>
				<category><![CDATA[Cisco ASA]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=1284</guid>

					<description><![CDATA[<p>Last week I updated a Cisco ASA HA cluster within a work project. The customer runs about 200 EasyVPN and IPsec VPN Site2Site connections. Our goal was to update the Cisco ASA HA cluster without an interrupt. The installed firmware version was 8.6(1)2 and we wanted to go straight to 9.4(2)11. In this case I was using two [&#8230;]</p>
<p>The post <a href="https://networkguy.de/updating-cisco-asa-ha-cluster/">Updating Cisco ASA HA Cluster</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last week I updated a Cisco ASA HA cluster within a work project. The customer runs about 200 EasyVPN and IPsec VPN Site2Site connections. Our goal was to update the Cisco ASA HA cluster without an interrupt. The installed firmware version was 8.6(1)2 and we wanted to go straight to 9.4(2)11. In this case I was using two notebooks and connect them directly to the console port. After copying the file from TFTP to flash, we saw the message &#8220;No Cfg structure found in downloaded image file&#8221;. So the version 8.6 couldn&#8217;t handle the new file format of the 9.4 image. We need to insert a stopover and installed the version 9.1.3, later 9.4.2. Here is a spreadsheet for your upgrade process:</p>
<p>&nbsp;</p>
<table class="sptable" width="100%">
<tbody>
<tr>
<th>Current ASA Image</th>
<th>First Upgrade</th>
<th>Final Upgrade</th>
</tr>
<tr>
<td valign="top">8.2.x</td>
<td valign="top">8.4.6</td>
<td valign="top">8.4.7 or later, 9.1.3 or later</td>
</tr>
<tr>
<td colspan="1">8.3.x</td>
<td colspan="1">8.4.6</td>
<td colspan="1">8.4.7 or later, 9.1.3 or later</td>
</tr>
<tr>
<td valign="top">8.4.1 through 8.4.4.10</td>
<td valign="top">8.4.6, 9.0.2</td>
<td valign="top">8.4.7 or later, 9.1.3 or later</td>
</tr>
<tr>
<td colspan="1">8.5.x</td>
<td colspan="1">9.0.2</td>
<td colspan="1">9.1.3 or later</td>
</tr>
<tr>
<td colspan="1">8.6.1</td>
<td colspan="1">9.0.2</td>
<td colspan="1">9.1.3 or later</td>
</tr>
<tr>
<td valign="top">9.0.1</td>
<td valign="top">9.0.2</td>
<td valign="top">9.1.3 or later</td>
</tr>
<tr>
<td valign="top">9.0.1.1 and later<br />
(to include 9.0.2 and later)</td>
<td valign="top">Not Applicable</td>
<td valign="top">9.1.3 or later</td>
</tr>
<tr>
<td valign="top">9.1.1</td>
<td valign="top">9.1.2</td>
<td valign="top">9.1.3 or later</td>
</tr>
<tr>
<td valign="top">9.1.1.1 and later</td>
<td valign="top">Not Applicable</td>
<td valign="top">9.1.3 or later</td>
</tr>
</tbody>
</table>
<p>The following spreadsheet shows the update-steps for a Cisco ASA HA cluster. If you need to insert a stopover, repeat the steps 3-10:</p>
<table class="sptable" width="100%">
<tbody>
<tr>
<th>Step</th>
<th>Cisco ASA primary</th>
<th>Cisco ASA secondary</th>
</tr>
<tr>
<td valign="top">1</td>
<td valign="top">Save the configuration (write memory) and document your configuration (pager lines 0; show run)</td>
<td valign="top"></td>
</tr>
<tr>
<td colspan="1">2</td>
<td colspan="1">Viewing the boot variables (show bootvar)</td>
<td colspan="1"></td>
</tr>
<tr>
<td colspan="1">3</td>
<td colspan="1">Copy the firmware image and ASDM image from TFTP to Flash (copy tftp flash)</td>
<td colspan="1"></td>
</tr>
<tr>
<td colspan="1">4</td>
<td colspan="1">Setting the primary device to standby (no failover active)</td>
<td colspan="1"></td>
</tr>
<tr>
<td colspan="1">5</td>
<td colspan="1"> Setting the boot firmware and ASDM image (delete the old &#8220;boot system xxx&#8221; entry and configure the new image to boot)</td>
<td colspan="1"></td>
</tr>
<tr>
<td colspan="1">6</td>
<td colspan="1"> reload</td>
<td colspan="1"></td>
</tr>
<tr>
<td colspan="1">7</td>
<td colspan="1"></td>
<td colspan="1">Check HA-cluster status (show failover state)</td>
</tr>
<tr>
<td colspan="1">8</td>
<td colspan="1"> Setting the primary device as active again (failover active)</td>
<td colspan="1"></td>
</tr>
<tr>
<td colspan="1">9</td>
<td colspan="1"></td>
<td colspan="1">Step 2-6</td>
</tr>
<tr>
<td colspan="1">10</td>
<td colspan="1"> Save the configuration (write memory)</td>
<td colspan="1"></td>
</tr>
<tr>
<td colspan="1">11</td>
<td colspan="1"> Restart the secondary device (failover reload-standby)</td>
<td colspan="1"></td>
</tr>
<tr>
<td colspan="1">12</td>
<td colspan="1"> Check HA-cluster status (show failover state)</td>
<td colspan="1"></td>
</tr>
<tr>
<td colspan="1">13</td>
<td colspan="1">Save the configuration (write memory) and document your configuration (pager lines 0; show run)</td>
<td colspan="1"></td>
</tr>
<tr>
<td colspan="1">14</td>
<td colspan="1"> Compare both configurations (the one before updating the cluster and the current configuration with the new firmware; you can use Notepad++ for this)</td>
<td colspan="1"></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>There are some different failover states.</p>
<p>One host is down or rebooting:</p>
<blockquote><p><em>This host &#8211; Primary Activ</em><br />
<em> Other host &#8211; Secondary Failed</em></p></blockquote>
<p>While syncing:</p>
<blockquote><p><em>This host &#8211; Primary Activ</em><br />
<em>Other host &#8211; Bulk Sync</em></p></blockquote>
<p>Cluster running in good state:</p>
<blockquote><p><em>This host &#8211; Primary Activ</em><br />
<em>Other host &#8211; Secondary Standby Ready</em></p></blockquote>
<p>After updating the Cisco ASA cluster (with the unexpected stepover) all VPN tunnels are working fine, no one had a disconnect :)</p>
<p>The post <a href="https://networkguy.de/updating-cisco-asa-ha-cluster/">Updating Cisco ASA HA Cluster</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/updating-cisco-asa-ha-cluster/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1284</post-id>	</item>
		<item>
		<title>Cisco ASA AES encryption disabled</title>
		<link>https://networkguy.de/cisco-asa-aes-encryption-disabled/</link>
					<comments>https://networkguy.de/cisco-asa-aes-encryption-disabled/#comments</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Mon, 04 May 2015 13:05:01 +0000</pubDate>
				<category><![CDATA[Cisco ASA]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=946</guid>

					<description><![CDATA[<p>Today I wanted to configure a site2site VPN on my Cisco ASA in my laboratory. When I tried to configure the transform-set I received the following error message: Firewall(config)# crypto ipsec ikev1 transform-set ESP-AES256-SHA esp-aes-256 esp-sha-hmac The 3DES/AES algorithms require a VPN-3DES-AES activation key. I&#8217;ve never saw this message before. It was very confusing seeing the 3DES-AES feature [&#8230;]</p>
<p>The post <a href="https://networkguy.de/cisco-asa-aes-encryption-disabled/">Cisco ASA AES encryption disabled</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today I wanted to configure a site2site VPN on my Cisco ASA in my laboratory. When I tried to configure the transform-set I received the following error message:</p>
<blockquote><p>Firewall(config)# crypto ipsec ikev1 transform-set ESP-AES256-SHA esp-aes-256 esp-sha-hmac<br />
<em>The 3DES/AES algorithms require a VPN-3DES-AES activation key.</em></p></blockquote>
<p>I&#8217;ve never saw this message before. It was very confusing seeing the 3DES-AES feature disabled:</p>
<blockquote><p>Firewall(config)# show activation-key<br />
Serial Number: *****<br />
Running Permanent Activation Key: 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000</p>
<p>Licensed features for this platform:<br />
Maximum Physical Interfaces : 8 perpetual<br />
VLANs : 3 DMZ Restricted<br />
Dual ISPs : Disabled perpetual<br />
VLAN Trunk Ports : 0 perpetual<br />
Inside Hosts : 10 perpetual<br />
Failover : Disabled perpetual<br />
Encryption-DES : Enabled perpetual<br />
<strong>Encryption-3DES-AES : Disabled</strong> perpetual</p></blockquote>
<p>You can request this license <strong>for free</strong> at <a href="https://tools.cisco.com/SWIFT/LicensingUI/Home" target="_blank">cisco.com</a>! Go to the <a href="https://tools.cisco.com/SWIFT/LicensingUI/Quickstart" target="_blank">Product License Registration</a>, Login with your Cisco CCO ID and mouseover &#8220;Get Other Licenses&#8221; and choose &#8220;Security Products&#8221; and &#8220;Cisco ASA 3DES/AES License&#8221;:</p>
<p><a href="http://networkguy.de/wp-content/uploads/2015/05/asa-license.png"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-947" src="http://networkguy.de/wp-content/uploads/2015/05/asa-license.png" alt="asa-license" width="795" height="554" srcset="https://networkguy.de/wp-content/uploads/2015/05/asa-license.png 795w, https://networkguy.de/wp-content/uploads/2015/05/asa-license-300x209.png 300w, https://networkguy.de/wp-content/uploads/2015/05/asa-license-620x432.png 620w, https://networkguy.de/wp-content/uploads/2015/05/asa-license-195x136.png 195w" sizes="(max-width: 795px) 100vw, 795px" /></a></p>
<p>type in the serial number of your device (&#8220;show version&#8221;) and get the license! You will receive the license by mail or can download it via the portal. To activate the license, go to your Cisco ASA device and type in &#8220;activation-key 0x3487fs3&#8230;&#8221; in the configuration level. Save config and restart for glory! :)</p>
<p>The post <a href="https://networkguy.de/cisco-asa-aes-encryption-disabled/">Cisco ASA AES encryption disabled</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/cisco-asa-aes-encryption-disabled/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">946</post-id>	</item>
		<item>
		<title>Link Aggregation with Cisco ASA</title>
		<link>https://networkguy.de/link-aggregation-with-cisco-asa/</link>
					<comments>https://networkguy.de/link-aggregation-with-cisco-asa/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Wed, 05 Feb 2014 14:50:25 +0000</pubDate>
				<category><![CDATA[Cisco ASA]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=621</guid>

					<description><![CDATA[<p>Interesting project that I got some days ago: I need to connect a Cisco ASA redundantly to a HP Switch Switch cluster (clustered with IRF protocol) and VLAN tag support. I configured a bridge-aggregation interface at the HP 5920AF-24XG like this (VLANs were already configured): interface Bridge-Aggregation1 description Link to Cisco ASA interface Ten-GigabitEthernet1/0/8 port link-aggregation [&#8230;]</p>
<p>The post <a href="https://networkguy.de/link-aggregation-with-cisco-asa/">Link Aggregation with Cisco ASA</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Interesting project that I got some days ago: I need to connect a Cisco ASA redundantly to a HP Switch Switch cluster (clustered with IRF protocol) and VLAN tag support. I configured a bridge-aggregation interface at the <a href="http://www.amazon.de/gp/product/B007QCIC4G/ref=as_li_qf_sp_asin_tl?ie=UTF8&amp;camp=1638&amp;creative=6742&amp;creativeASIN=B007QCIC4G&amp;linkCode=as2&amp;tag=netguy-21" target="_blank">HP 5920AF-24XG</a> like this (VLANs were already configured):</p>
<blockquote><p>interface Bridge-Aggregation1<br />
description Link to Cisco ASA</p>
<p><span style="line-height: 1.5em;">interface Ten-GigabitEthernet1/0/8<br />
</span>port link-aggregation group 1</p>
<p>interface Ten-GigabitEthernet2/0/8<br />
port link-aggregation group 1</p>
<p>interface Bridge-Aggregation1<br />
description Link to Cisco ASA<br />
port link-type hybrid<br />
port hybrid vlan 1 23 tagged</p>
<p>Configuring Ten-GigabitEthernet1/0/8 done.<br />
Configuring Ten-GigabitEthernet2/0/8 done.</p></blockquote>
<p>after this I saved the current Cisco ASA configuration to the flash and to my TFTP server. You can&#8217;t configure a port-channeling on used ports or can change the naming (like &#8220;inside&#8221;) directly to another interface. The interface name depends on so many configuration parameters like firewall and VPN settings. So I saved the current-configuration, edit it with a text editor, copied it <span style="line-height: 1.5em;">from the TFTP </span><span style="line-height: 1.5em;">to the startup-config and reload the device. Never do this from remote, please connect a serial cable to the Cisco ASA and make this changes via console. At startup you can see directly if commands are not recognized and you don&#8217;t need network access.</span></p>
<p>I took the two first interfaces because they have full gigabit support (Cisco ASA 5510). I first created the Port-Channel:</p>
<blockquote><p>interface Port-channel1<br />
description Link-Aggregation<br />
no nameif<br />
no security-level<br />
no ip address</p></blockquote>
<p>than I declared the interfaces to this port-channel:</p>
<blockquote><p>interface Ethernet0/0<br />
channel-group 1 mode on<br />
no nameif<br />
no security-level<br />
no ip address</p>
<p>interface Ethernet0/1<br />
channel-group 1 mode on<br />
no nameif<br />
no security-level<br />
no ip address</p></blockquote>
<p>Now we can configure sub-interfaces for our vlan tagged interfaces. The sub-interface number isn&#8217;t the vlan tag number but I would recommend to set it equal for your own harmony :)</p>
<blockquote><p>interface Port-channel1<br />
description Link-Aggregation<br />
no nameif<br />
no security-level<br />
no ip address</p>
<p>interface Port-channel1.1<br />
vlan 1<br />
nameif inside<br />
security-level 100<br />
ip address 192.168.1.1 255.255.255.0</p>
<p>interface Port-channel1.23<br />
vlan 23<br />
nameif dmz<br />
security-level 75<br />
ip address 192.168.23.1 255.255.255.0</p></blockquote>
<p>you can now look at both devices, if the aggregation is working. Example HP Stack:</p>
<blockquote><p>[IRF1]display link-aggregation verbose<br />
Loadsharing Type: Shar &#8212; Loadsharing, NonS &#8212; Non-Loadsharing<br />
Port Status: S &#8212; Selected, U &#8212; Unselected<br />
Flags: A &#8212; LACP_Activity, B &#8212; LACP_Timeout, C &#8212; Aggregation,<br />
D &#8212; Synchronization, E &#8212; Collecting, F &#8212; Distributing,<br />
G &#8212; Defaulted, H &#8212; Expired</p>
<p>Aggregate Interface: Bridge-Aggregation1<br />
Aggregation Mode: Static<br />
Loadsharing Type: Shar<br />
Port Status Priority Oper-Key<br />
&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br />
XGE1/0/8 S 32768 4<br />
XGE2/0/8 S 32768 4</p></blockquote>
<p>Example Cisco ASA:</p>
<blockquote><p>ASA5510# show port-channel<br />
Channel-group listing:<br />
&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;</p>
<p>Group: 1<br />
&#8212;&#8212;&#8212;-<br />
Span-cluster port-channel: No<br />
Ports: 2 Maxports = 16<br />
Port-channels: 1 Max Port-channels = 48<br />
Protocol: ON<br />
Minimum Links: 1<br />
Load balance: src-dst-ip</p></blockquote>
<p>there are several options for load balancing:</p>
<blockquote><p>ASA5510(config-if)# port-channel load-balance ?</p>
<p>interface mode commands/options:<br />
dst-ip Dst IP Addr<br />
dst-ip-port Dst IP Addr and TCP/UDP Port<br />
dst-mac Dst Mac Addr<br />
dst-port Dst TCP/UDP Port<br />
src-dst-ip Src XOR Dst IP Addr<br />
src-dst-ip-port Src XOR Dst IP Addr and TCP/UDP Port<br />
src-dst-mac Src XOR Dst Mac Addr<br />
src-dst-port Src XOR Dst TCP/UDP Port<br />
src-ip Src IP Addr<br />
src-ip-port Src IP Addr and TCP/UDP Port<br />
src-mac Src Mac Addr<br />
src-port Src TCP/UDP Port<br />
vlan-dst-ip Vlan, Dst IP Addr<br />
vlan-dst-ip-port Vlan, Dst IP Addr and TCP/UDP Port<br />
vlan-only Vlan<br />
vlan-src-dst-ip Vlan, Src XOR Dst IP Addr<br />
vlan-src-dst-ip-port Vlan, Src XOR Dst IP Addr and TCP/UDP Port<br />
vlan-src-ip Vlan, Src IP Addr<br />
vlan-src-ip-port Vlan, Src IP Addr and TCP/UDP Port</p></blockquote>
<p>you can find more information <a href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/interface_start.html#wp1346472" target="_blank">here</a>.</p>
<p>The post <a href="https://networkguy.de/link-aggregation-with-cisco-asa/">Link Aggregation with Cisco ASA</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/link-aggregation-with-cisco-asa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">621</post-id>	</item>
		<item>
		<title>Enabling passive FTP through Cisco ASA</title>
		<link>https://networkguy.de/enabling-passive-ftp-through-cisco-asa/</link>
					<comments>https://networkguy.de/enabling-passive-ftp-through-cisco-asa/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Wed, 19 Sep 2012 14:30:24 +0000</pubDate>
				<category><![CDATA[Cisco ASA]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=287</guid>

					<description><![CDATA[<p>As I explained 1:1 NAT (with example for PPTP passthrough) in this post you can also add more PAT just based on your access-list. I recognized a problem at one customer that FTP needs an inspection firewall entry. The customer runs a passive FTP server on tcp port 3002 which I forwarded to inside: object [&#8230;]</p>
<p>The post <a href="https://networkguy.de/enabling-passive-ftp-through-cisco-asa/">Enabling passive FTP through Cisco ASA</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As I explained 1:1 NAT (with example for PPTP passthrough) in <a href="http://networkguy.de/?p=246">this post</a> you can also add more PAT just based on your access-list. I recognized a problem at one customer that FTP needs an inspection firewall entry. The customer runs a passive FTP server on tcp port 3002 which I forwarded to inside:</p>
<blockquote><p>object network MyFTPserver<br />
host 192.168.23.33</p>
<p>object network MyFTPserver<br />
nat (inside,outside) static 88.77.66.24</p>
<p>access-list world_in extended permit tcp any object MyFTPserver eq 3002</p>
<p>access-group world_in in interface outside</p></blockquote>
<p>He could connect from outside but can&#8217;t list the folders so I configured a inspection firewall setting:</p>
<blockquote><p>class-map class_ftp<br />
match port tcp eq 3002</p>
<p>policy-map global_policy<br />
class class_ftp<br />
inspect ftp</p>
<p>service-policy global_policy global</p></blockquote>
<p>After this input the problem was solved!</p>
<p>The post <a href="https://networkguy.de/enabling-passive-ftp-through-cisco-asa/">Enabling passive FTP through Cisco ASA</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/enabling-passive-ftp-through-cisco-asa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">287</post-id>	</item>
		<item>
		<title>Cisco ASA NAT examples with software version 8.4</title>
		<link>https://networkguy.de/cisco-asa-nat-examples-with-software-version-8-4/</link>
					<comments>https://networkguy.de/cisco-asa-nat-examples-with-software-version-8-4/#comments</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Thu, 30 Aug 2012 12:26:36 +0000</pubDate>
				<category><![CDATA[Cisco ASA]]></category>
		<guid isPermaLink="false">http://networkguy.de/?p=246</guid>

					<description><![CDATA[<p>I know that they take LSD (yes Lysergic acid diethylamide) at Cisco like Kevin Herbert but can they consume less? Every release of a new 8.x software version of the Cisco ASA has new NAT statements and logic. This week I replaced an old Cisco PIX 6.x with a new Cisco ASA 8.4(4)1 (asa844-1-k8.bin) and [&#8230;]</p>
<p>The post <a href="https://networkguy.de/cisco-asa-nat-examples-with-software-version-8-4/">Cisco ASA NAT examples with software version 8.4</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I know that they take LSD (yes Lysergic acid diethylamide) at Cisco like <a href="http://www.wired.com/science/discoveries/news/2006/01/70015?currentPage=all" target="_blank">Kevin Herbert</a> but can they consume less? Every release of a new 8.x software version of the Cisco ASA has new NAT statements and logic. This week I replaced an old Cisco PIX 6.x with a new Cisco ASA 8.4(4)1 (asa844-1-k8.bin) and ran into some logic traps and I decided to write some examples here for you in case that this can help you. My customer has a provider router but the examples are also working with a PPPoE uplink (except multiple IPNAT commands).</p>
<p>NAT from inside to outside:</p>
<blockquote><p>object network MyInternalNetwork<br />
subnet 192.168.23.0 255.255.255.0<br />
object network MyInternalNetwork<br />
nat (inside,outside) dynamic interface</p></blockquote>
<p>You will see that an incoming packet will be first translated and than be checked by the firewall. PAT for port-forwarding a network service (in this example https tcp 443):</p>
<blockquote><p>object network MyExchangeServer<br />
host 192.168.23.5<br />
object network MyExchangeServer<br />
nat (inside,outside) static interface service tcp https https<br />
access-list world_in extended permit tcp any object MyExchangeServer eq https<br />
access-group world_in in interface outside</p></blockquote>
<p>1:1 NAT (with example for PPTP passthrough):</p>
<blockquote><p>object network MyPPTPserver<br />
host 192.168.23.10<br />
object network MyPPTPserver<br />
nat (inside,outside) static 88.77.66.23<br />
access-list world_in extended permit tcp any object MyPPTPserver eq pptp<br />
access-list world_in extended permit gre any object MyPPTPserver<br />
access-group world_in in interface outside</p></blockquote>
<p>No-NAT Statements (for <strong>not</strong> natting into connected VPN-networks):</p>
<blockquote><p>object network MyHeadquarter<br />
subnet 192.168.23.0 255.255.255.0<br />
object network MyBranchOffice<br />
subnet 192.168.80.0 255.255.255.0<br />
nat (inside,any) source static MyHeadquarter MyHeadquarter destination static MyBranchOffice MyBranchOffice no-proxy-arp</p></blockquote>
<p>don&#8217;t forget to place no-proxy-arp at the end of the NAT statement, otherwhise your Cisco ASA will answer on every ARP-Broadcast &#8220;YES THAT&#8217;S ME HERE IS MY MAC-ADDRESS!!!11111&#8221; -.-</p>
<p>If you have any further wishes on NAT-config-examples or older NAT-statements (just like for Cisco ASA software version 8.0, 8.1, 8.2 and/or 8.3) just let me know!</p>
<p>The post <a href="https://networkguy.de/cisco-asa-nat-examples-with-software-version-8-4/">Cisco ASA NAT examples with software version 8.4</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/cisco-asa-nat-examples-with-software-version-8-4/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">246</post-id>	</item>
	</channel>
</rss>
