garnetbobcat
Thank you for your tips.. Basically what im looking for is command authorizarion via an ACS server so that I can create a group on the ACS server and place my usernames that are allowed to login to over 80 of our ASA/PIX Firewalls. Currently its not an easy process to assign...
I am trying to use our Cisco ACS Server and our Cisco ASA & PIX firewalls so that when a user tries to login the firewall it will authenticate with ACL and then permit a list of allowed commands and user priledges via what I have configured in ACS.. I cant find anything on how to do this, any...
I am aware that the address I want to assign to the Firewall can be reserved on the DHCP server but that is not our practice. We always reserve by MAC Address .
I have a few Cisco ASA 5505 and ASA 5510 Firewalls that I have asked out DHCP team to reserve me an IP Address for these Firewalls but the issue is that when Microsoft see this ASA's Interface 0 MAC address its a many characters long. How or what are others dealing with this issue. If I do a...
Ok I figured out the issue, well the hard way... I appeared that after I rebooted the router it worked.. Is there another way this would of worked rather then rebooting the router?
I have a router (Cisco 1751) that is doing DHCP and also reserving a range of addresses also.
Now what I want to do is also reserve an IP Address to a specific MAC Address.
Currently my dhcp setting look like this
ip dhcp excluded-address 10.89.1.1 10.89.1.100
!
ip dhcp pool Pool1
network...
Ru55ell
Yes the routing information in specified in the Concentrator as it know where to push all the VPN traffic too.
I have also looked at all my router configs and I currently dont have a "default" statement next to the set peer 65.221.x.x I suppose this is because I only have one peer...
Ru55ell,
Curently we have two concentrators (Cisco 3060's) and setup in fail-over not load-balanced. So they way it works is all VPN Clients and Site-2-Sites point to the VRRP address and if the Primary reports as DOWN then the Secondary (backup Cocnetrator) becomes primary. So yes only one...
Our company will be switching External addressed shortly and want to see if you all can help me make sure I can so this and do it correctly.
Currently our Cisco 1700 series router are doing a Site-2-Site back to the main office (3000 series Cisco Concentrator) head end device. The routers...
Here you go
Current configuration : 3838 bytes
!
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname RTR01
!
boot-start-marker
boot-end-marker
!
enable secret XXXXXXXXXXXXXXXXXXXXXXXXXXXXX
!
username admin password...
I currently already have this
!
ip nat pool natpool-0 82.206.x.x 82.206.x.x netmask 255.255.255.248
ip nat inside source list 1 pool natpool-0 overload
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/0
no ip http server
ip pim bidir-enable
Is this correct? If so your saying I dont need and...
So how should my ACL look like then? I thought that
access-list 101 permit tcp any any established allows connections from the inside to be returned.
look at my acl above and can you post what the ACL should look like?
Thanks
The way this setup is my ISP is a satellite connection (VSAT). My interface Serial0/0 is plugging into the satellite modem via a serial cable
So to answer your question the interface Serial0/0 is the interface the is directly connected to the modem but
interface FastEthernet0/0 is the one that...
Here is my config for the serial interface and the outside interface
interface FastEthernet0/0
description connected to Internet
ip address 82.206.x.x 255.255.255.248
no ip proxy-arp
ip nat inside
ip inspect fw in
ip virtual-reassembly
no ip route-cache cef
no ip route-cache
no ip...
I am having a problem when I try to apply this access-list to my outside interface.. When I apply the ACL that site can lo longer get to the internet, when I remove the ACL they can.. What is wrong with this ACL?
access-list 101 permit icmp host 65.x.x.x host 82.206.x.x echo
access-list 101...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.