Kureli Sankar Tue, 01/26/2010 - 12:20
User Badges:
  • Cisco Employee,

sh service-policy ---> This will tell you the inspections configured and the traffic that it has seen.


To see what ports are open on the ASA5505 you need to see what you are allowing on the ACL applied on the outside interface.


That will be for through the box traffic. http, ssh to the outside interface can be checked with the following commands.


sh run ssh

sh run http


-KS

skhirbash Tue, 01/26/2010 - 21:11
User Badges:

Thanks for the response.


I created a one to one NAT statement but when I ping the pubilc ip address from the outside, it doesn't responde. Can you tell me what I am doing wrong? Here is a sample of thenat statement:


nat (inside) 0 access-list nonat
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) 12.200.199.120 172.17.100.101 netmask 255.255.255.255
static (inside,outside) 12.200.199.121 172.17.100.102 netmask 255.255.255.255
static (inside,outside) 12.200.199.122 172.17.100.103 netmask 255.255.255.255
access-group outside_access_in in interface outside


Is there anything else I need to do.


Thanks in advance,

SK

Use " show run access-list" to view the access-list in

their simplest form.  Use "show access-list" to

see the access-list details, to include any object-group members and hit counts.

Use "show access-group" to see which access lists are applied to which interfaces.


If you are not familiar with the CLI, I recommend you use the ASDM gui.  It's much easier to see the ACL's in the ASDM than it is to interpret them in their raw form.

Actions

This Discussion