I just upgraded my firewall to ASA 5505. Now, my original static ip address cofiguration is gone. Apperantly, Cisco went away from static ip address to something like nat (inside,outside) dynamic interface.
Can anyone share how to create a static ip address under version 8.4? By the way, I am sharing what my configuration used to look before upgrading.
ip address 10.2.1.1 255.255.255.0
ip address 22.214.171.124 255.255.255.240
switchport access vlan 2
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
dns server-group DefaultDNS
object-group network dts-servers
network-object host 126.96.36.199
network-object host 188.8.131.52
object-group network frs_servers
network-object 184.108.40.206 255.255.255.255
access-list extended extended permit ip any any
access-list extended extended permit icmp any any
access-list extended extended permit ip any object-group dts-servers
access-list acl_out extended permit tcp any object-group frs_servers eq https access-list outside_access_in extended permit ip any host 220.127.116.11
I am looking at the sh nat detail, and there is an indication that traffic is trying to reach the external interface. however, I am not able to ping the external interface 18.104.22.168 or can't access the internal computer from one of my servers. Can you please provide additional help?
sh run nat works: the results came back as nat (inside,outside) source static a-10.2.1.2 a-22.214.171.124. As far the other two commands, sh global and sh run static did not return any results. For both command, the asa 5505 v. 8.4 returned saying input detected at '^' marker.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :