Hi Jon, thanks for your reponse. How can I test this works before deploying it. I put a router on the inside and can ping the inside asa address. My laptop on the outside and can ping the outside asa address. They cannot see through the asa though ?
Jon, I cannot seem to get this thing working. I am _so_ not the firewall person, this is my first:-) all I need to do is get this thing performing the NAT and so I can telnet to the outside address to manage it after it's installed at site - then the firewall peeps will take care of the rest :-) what am I doing wrong here ? Thanks again.
ASA Version 7.2(2)
enable password 8il5M/7PS/HH/mgc encrypted
ip address 192.168.5.234 255.255.255.0
ip address 10.96.112.15 255.255.255.0
switchport access vlan 2
passwd xxxxxxxxxxxx encrypted
ftp mode passive
access-list acl_outside extended permit icmp any any
access-list acl_outside extended permit ip any any
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :