
For this, you may have to make a rule specific to this situation. Make sure the syslog server on Firewall Analyzer can access the PIX firewall on the configured syslog port. To find out the version of your PIX firewall, Telnet to the PIX firewall and enter the show version command.Ĭisco PIX does not create log files, but instead directs a log stream to the syslog server, which writes the log information into a file. Snmp-server enable traps snmp authentication linkup linkdown coldstartĬrypto ipsec security-association lifetime seconds 28800Ĭrypto ipsec security-association lifetime kilobytes 4608000ĭhcpd address 10.0.0.100-10.0.0.Configuring Cisco Devices - PIX, ASA, FWSM, VPN Concentratorįirewall Analyzer supports the following versions of various Cisco devices. Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absoluteĭynamic-access-policy-record DfltAccessPolicy Static (inside,outside) tcp interface 5001 MiniSrvr 5001 netmask 255.255.255.255Īccess-group outside_access_in in interface outside

Icmp unreachable rate-limit 1 burst-size 1 Name 10.0.0.10 MiniSrvr description MiniSrvrĪccess-list outside_access_in extended permit tcp any host MiniSrvr object-group DM_INLINE_TCP_1 My running config is - ASA Version 8.2(5)Įnable password 8Ry2YjIyt7RRXU24 encrypted Not sure if I am overcomplicating this for myself or what but I am stuck. I am very new to IOS so I have mostly been working in ASDM. I am attemping to open port 5001 to the NAS. My setup is Comcast Business Modem (w/ single static IP) -> ASA (10.0.0.1) -> (dumb) Switch -> NAS (10.0.0.10). I am trying to configure a new 5505 but I am having difficulties opening ports that allow traffic in from the outside.
