<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4728546117996377999</id><updated>2026-04-02T21:31:57.029-04:00</updated><category term="Cisco"/><category term="Cisco ASA"/><category term="Cisco Pix"/><category term="Time Saver"/><category term="Capture"/><category term="Fail Over"/><category term="Failover"/><category term="Packet Capture"/><category term="ACL"/><category term="Access List"/><category term="Access-list"/><category term="Policy"/><category term="Pre Shared Key"/><category term="Pre-Shared Key"/><category term="Preshared key"/><category term="PresharedKey"/><category term="Proventia"/><category term="Proventia M"/><category term="Rename"/><category term="VPN"/><category term="6.3"/><category term="8.3"/><category term="8.4"/><category term="8.5"/><category term="8.6"/><category term="8.7"/><category term="9.1"/><category term="ARP"/><category term="CLI"/><category term="Checksum"/><category term="Class"/><category term="Class Inspection"/><category term="Ether-Type"/><category term="Fail-open"/><category term="GRE"/><category term="HA"/><category term="High Availability"/><category term="How to see"/><category term="IBM"/><category term="ISS"/><category term="Inspect"/><category term="Interface"/><category term="More"/><category term="More System"/><category term="Network Object"/><category term="Object"/><category term="Object-Group"/><category term="PCAP"/><category term="PPTP"/><category term="Per-Shared-Key"/><category term="Pix"/><category term="Policy-Map"/><category term="Running-Config"/><category term="Service Object"/><category term="Site to Site"/><category term="Sub Interface"/><category term="Subinterface"/><category term="Tunnel-Group"/><category term="VLAN"/><category term="VLANS"/><category term="Websense"/><category term="fail-close"/><category term="force"/><category term="http"/><category term="https"/><category term="md5sum"/><category term="psk"/><category term="url server"/><category term="url-server"/><title type='text'>Packet | Sent</title><subtitle type='html'>Making networks work one packet at a time.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.packetsent.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>14</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-5439140369979237739</id><published>2013-05-21T11:47:00.000-04:00</published><updated>2013-05-21T11:47:00.853-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Pix"/><category scheme="http://www.blogger.com/atom/ns#" term="CLI"/><category scheme="http://www.blogger.com/atom/ns#" term="More"/><category scheme="http://www.blogger.com/atom/ns#" term="More System"/><category scheme="http://www.blogger.com/atom/ns#" term="Pre Shared Key"/><category scheme="http://www.blogger.com/atom/ns#" term="Pre-Shared Key"/><category scheme="http://www.blogger.com/atom/ns#" term="Preshared key"/><category scheme="http://www.blogger.com/atom/ns#" term="PresharedKey"/><category scheme="http://www.blogger.com/atom/ns#" term="Running-Config"/><category scheme="http://www.blogger.com/atom/ns#" term="Site to Site"/><category scheme="http://www.blogger.com/atom/ns#" term="Tunnel-Group"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>How to see a Pre Shared Key for Site to Site VPN on Cisco ASA</title><summary type="text">To see the pre shared key for any Sites to Site VPN simply type the following in CLI:

more system:running-config | begin&amp;nbsp;tunnel-group


This will change:



tunnel-group 10.55.55.55 type ipsec-l2l
tunnel-group&amp;nbsp;10.55.55.55&amp;nbsp;ipsec-attributes
pre-shared-key *****


Into:


tunnel-group&amp;nbsp;10.55.55.55&amp;nbsp;type ipsec-l2l
tunnel-group&amp;nbsp;10.55.55.55&amp;nbsp;ipsec-attributes
</summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/5439140369979237739/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2013/05/how-to-see-pre-shared-key-for-site-to.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/5439140369979237739'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/5439140369979237739'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2013/05/how-to-see-pre-shared-key-for-site-to.html' title='How to see a Pre Shared Key for Site to Site VPN on Cisco ASA'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-7637345364403603305</id><published>2013-05-21T11:33:00.000-04:00</published><updated>2013-05-21T11:33:31.181-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Pix"/><category scheme="http://www.blogger.com/atom/ns#" term="Class"/><category scheme="http://www.blogger.com/atom/ns#" term="Class Inspection"/><category scheme="http://www.blogger.com/atom/ns#" term="GRE"/><category scheme="http://www.blogger.com/atom/ns#" term="Inspect"/><category scheme="http://www.blogger.com/atom/ns#" term="Policy"/><category scheme="http://www.blogger.com/atom/ns#" term="Policy-Map"/><category scheme="http://www.blogger.com/atom/ns#" term="PPTP"/><title type='text'>How to Make PPTP Connections Work Through a Cisco ASA</title><summary type="text">The most common reason &amp;nbsp;I find that PPTP connections do not work is because the&amp;nbsp;inspect&amp;nbsp;for PPTP it not enabled.

This is how you enable the inspect in the default inspection class:


conf t

policy-map global_policy
&amp;nbsp;class inspection_default
&amp;nbsp; inspect pptp
end
wr mem


This is needed&amp;nbsp;whenever&amp;nbsp;PAT is being used.

More details here:
http://www.cisco.com/en/US/</summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/7637345364403603305/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2013/05/how-to-make-pptp-connections-work.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/7637345364403603305'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/7637345364403603305'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2013/05/how-to-make-pptp-connections-work.html' title='How to Make PPTP Connections Work Through a Cisco ASA'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-2762608368311853527</id><published>2013-05-21T11:26:00.001-04:00</published><updated>2013-05-21T11:26:19.288-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ARP"/><category scheme="http://www.blogger.com/atom/ns#" term="Capture"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Pix"/><category scheme="http://www.blogger.com/atom/ns#" term="Ether-Type"/><category scheme="http://www.blogger.com/atom/ns#" term="Packet Capture"/><category scheme="http://www.blogger.com/atom/ns#" term="Time Saver"/><title type='text'>How to Capture ARP Requests on a Cisco ASA</title><summary type="text">Many times I have had to prove that the firewall was not&amp;nbsp;receiving&amp;nbsp;any ARP replies from the&amp;nbsp;workstation&amp;nbsp;/ router / switch / or server here is how I did it:

Log into the CLI and create a capture looking for only ARP request:

capture [CAP_NAME] interface [INT_NAME] ethernet-type arp

//Example
ASA# capure arpcap interface servers ethernet-type arp
ASA# show capture arpcap

//</summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/2762608368311853527/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2013/05/how-to-capture-arp-requests-on-cisco-asa.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/2762608368311853527'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/2762608368311853527'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2013/05/how-to-capture-arp-requests-on-cisco-asa.html' title='How to Capture ARP Requests on a Cisco ASA'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-7506747243343501788</id><published>2013-05-21T10:27:00.000-04:00</published><updated>2013-05-21T10:27:51.778-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="8.3"/><category scheme="http://www.blogger.com/atom/ns#" term="8.4"/><category scheme="http://www.blogger.com/atom/ns#" term="8.5"/><category scheme="http://www.blogger.com/atom/ns#" term="8.6"/><category scheme="http://www.blogger.com/atom/ns#" term="8.7"/><category scheme="http://www.blogger.com/atom/ns#" term="9.1"/><category scheme="http://www.blogger.com/atom/ns#" term="Access List"/><category scheme="http://www.blogger.com/atom/ns#" term="Access-list"/><category scheme="http://www.blogger.com/atom/ns#" term="ACL"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Pix"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Object"/><category scheme="http://www.blogger.com/atom/ns#" term="Object"/><category scheme="http://www.blogger.com/atom/ns#" term="Object-Group"/><category scheme="http://www.blogger.com/atom/ns#" term="Rename"/><category scheme="http://www.blogger.com/atom/ns#" term="Service Object"/><category scheme="http://www.blogger.com/atom/ns#" term="Time Saver"/><title type='text'>Cisco ASA Renaming Network Objects, Service Objects, Access Lists, and Details about Object-Groups</title><summary type="text">Renaming objects on the ASA is very simple:

NOTE: You cannot rename object-groups as of version 9.1 make sure you pick the correct name the first time!
Updating the objects names will automatically update the references in the policy.

Renaming Network Objects:
object network OLD_NAME rename NEW_NAME

Renaming Service Objects:
object service&amp;nbsp;OLD_NAME&amp;nbsp;rename&amp;nbsp;NEW_NAME

Renaming </summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/7506747243343501788/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2013/05/cisco-asa-renaming-network-objects.html#comment-form' title='9 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/7506747243343501788'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/7506747243343501788'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2013/05/cisco-asa-renaming-network-objects.html' title='Cisco ASA Renaming Network Objects, Service Objects, Access Lists, and Details about Object-Groups'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>9</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-8903294730389094013</id><published>2012-06-05T13:23:00.001-04:00</published><updated>2012-06-05T13:30:25.320-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Capture"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Pix"/><category scheme="http://www.blogger.com/atom/ns#" term="https"/><category scheme="http://www.blogger.com/atom/ns#" term="Packet Capture"/><category scheme="http://www.blogger.com/atom/ns#" term="PCAP"/><title type='text'>How to Download Packet Captures as a PCAP File to Use in Wireshark on a Cisco ASA</title><summary type="text">If you need to download your packet captures on a Cisco ASA/PIX so you can import them into Wireshark it is a very simple process.

I assume the following is true:

1. You have http (ASDM) access to the firewall
2. You already have a capture with captured packets: (See here how to create a capture)

If you want to just see the capture in the browser first to make sure there are packets you can do</summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/8903294730389094013/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2012/06/how-to-download-packet-captures-as-pcap.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/8903294730389094013'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/8903294730389094013'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2012/06/how-to-download-packet-captures-as-pcap.html' title='How to Download Packet Captures as a PCAP File to Use in Wireshark on a Cisco ASA'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-8525843284780972255</id><published>2012-06-05T13:10:00.000-04:00</published><updated>2012-06-05T13:31:49.700-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Capture"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Pix"/><category scheme="http://www.blogger.com/atom/ns#" term="Packet Capture"/><title type='text'>How to Capture traffic on a Cisco ASA with No Config Changes</title><summary type="text">Problem: You need to capture traffic between 1.1.1.1 and 2.2.2.2


In previous version of ASA/PIX code (7.2 and below) you had to go into config mode add a bi-directional access-list and then apply the packet capture. As of 7.2.1  you no longer have to do that and it makes creating captures a lot quicker and no configuration changes are made to the firewall since no access-list are created.


</summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/8525843284780972255/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2012/06/how-to-capture-traffic-on-cisco-asa.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/8525843284780972255'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/8525843284780972255'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2012/06/how-to-capture-traffic-on-cisco-asa.html' title='How to Capture traffic on a Cisco ASA with No Config Changes'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-8502728258387273700</id><published>2012-06-05T12:36:00.000-04:00</published><updated>2012-06-05T12:36:44.704-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Fail Over"/><category scheme="http://www.blogger.com/atom/ns#" term="Failover"/><title type='text'>How to failover the standby ASA from the primary ASA</title><summary type="text">If for some reason you cant access the standby firewall but need you reload it and only have access to the primary firewall you can easily reboot the standby firewall by issuing the following command via cli:

failover reload-standby

</summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/8502728258387273700/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2012/06/how-to-failover-standby-asa-from.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/8502728258387273700'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/8502728258387273700'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2012/06/how-to-failover-standby-asa-from.html' title='How to failover the standby ASA from the primary ASA'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-7137304321154409062</id><published>2012-03-06T14:28:00.004-05:00</published><updated>2013-05-26T00:00:32.151-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="fail-close"/><category scheme="http://www.blogger.com/atom/ns#" term="Fail-open"/><category scheme="http://www.blogger.com/atom/ns#" term="url server"/><category scheme="http://www.blogger.com/atom/ns#" term="url-server"/><category scheme="http://www.blogger.com/atom/ns#" term="Websense"/><title type='text'>How to Configure URL Filtering - Websense on a Cisco ASA</title><summary type="text">

This is the standard configuration I use to bring up websense on the firewall. There are other options available you can check those out in the Cisco Links

url-server (inside) vendor websense host 10.55.55.55 timeout 15 protocol TCP version 4 &amp;nbsp;
url-block url-mempool 1500
url-block url-size 4
url-block block 128

filter url http 10.40.40.0 255.255.255.0 0.0.0.0 0.0.0.0 longurl-truncate </summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/7137304321154409062/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2012/03/how-to-configure-url-filtering-websense.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/7137304321154409062'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/7137304321154409062'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2012/03/how-to-configure-url-filtering-websense.html' title='How to Configure URL Filtering - Websense on a Cisco ASA'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-5751040401499201574</id><published>2011-12-23T14:46:00.000-05:00</published><updated>2012-03-06T11:49:19.132-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Pix"/><category scheme="http://www.blogger.com/atom/ns#" term="Fail Over"/><category scheme="http://www.blogger.com/atom/ns#" term="Failover"/><category scheme="http://www.blogger.com/atom/ns#" term="force"/><title type='text'>How to Force a Manual Failover on a Cisco ASA via Command Line</title><summary type="text">

Forcing a manual failover via command line can be done in two&amp;nbsp;different&amp;nbsp;ways.

######################################

On the active firewall you can do the following:


CiscoASA#&amp;nbsp;no failover active



-----------------------------------------------------------------------------



On the standby firewall you can do the following:



CiscoASA#&amp;nbsp;failover active



############</summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/5751040401499201574/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2011/12/how-to-force-failover-on-cisco-asa-via.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/5751040401499201574'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/5751040401499201574'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2011/12/how-to-force-failover-on-cisco-asa-via.html' title='How to Force a Manual Failover on a Cisco ASA via Command Line'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-932992218758720946</id><published>2011-12-21T21:36:00.002-05:00</published><updated>2011-12-21T21:43:42.587-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Interface"/><category scheme="http://www.blogger.com/atom/ns#" term="Sub Interface"/><category scheme="http://www.blogger.com/atom/ns#" term="Subinterface"/><category scheme="http://www.blogger.com/atom/ns#" term="VLAN"/><category scheme="http://www.blogger.com/atom/ns#" term="VLANS"/><title type='text'>How to Create a Subinterface on a Cisco ASA</title><summary type="text">
If you need to create a subinterface on an ASA &amp;nbsp;you will need the following information:

1. Identify which interface is going to be used on the firewall
2. Identify which subinterface ID is going to be used. Vaild IDs are&amp;nbsp;1 through 4294967293
3. Identify which VLAN ID is going to be used, I would recommend using the same VLAN ID as the subinterface ID however only IDs support for </summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/932992218758720946/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2011/12/how-to-create-subinterface-on-cisco-asa.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/932992218758720946'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/932992218758720946'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2011/12/how-to-create-subinterface-on-cisco-asa.html' title='How to Create a Subinterface on a Cisco ASA'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-8771824687134245465</id><published>2011-12-15T11:46:00.000-05:00</published><updated>2011-12-15T11:53:10.746-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Checksum"/><category scheme="http://www.blogger.com/atom/ns#" term="md5sum"/><category scheme="http://www.blogger.com/atom/ns#" term="Policy"/><category scheme="http://www.blogger.com/atom/ns#" term="Proventia"/><category scheme="http://www.blogger.com/atom/ns#" term="Proventia M"/><category scheme="http://www.blogger.com/atom/ns#" term="Time Saver"/><title type='text'>How to compare firewall policies between two IBM Proventia M</title><summary type="text">If you have to RMA an IBM Proventia M firewall and move the policy from one firewall to another one there is a simple test you can perform to make sure the policy on the new RMA firewall is the same as the old one. Once you have applied the snapshot to the new RMA firewall. Run the following command on both firewalls:[root@proventiaM root]# cd /etc/crm/policies/cml/NetworkProtector/fwm/[root@</summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/8771824687134245465/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2011/12/how-to-compare-firewall-policies.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/8771824687134245465'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/8771824687134245465'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2011/12/how-to-compare-firewall-policies.html' title='How to compare firewall policies between two IBM Proventia M'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-5069894638182035444</id><published>2011-12-14T10:00:00.000-05:00</published><updated>2013-12-04T12:19:28.023-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fail Over"/><category scheme="http://www.blogger.com/atom/ns#" term="Failover"/><category scheme="http://www.blogger.com/atom/ns#" term="HA"/><category scheme="http://www.blogger.com/atom/ns#" term="High Availability"/><category scheme="http://www.blogger.com/atom/ns#" term="IBM"/><category scheme="http://www.blogger.com/atom/ns#" term="ISS"/><category scheme="http://www.blogger.com/atom/ns#" term="Proventia"/><category scheme="http://www.blogger.com/atom/ns#" term="Proventia M"/><title type='text'>How to tell if a Proventia M is in HA mode via SSH</title><summary type="text">


If you need to check if an ISS / IBM Proventia M is in High Availability  mode or which firewall is primary or secondary check the following via ssh:

cat /etc/sysconfig/ham

The output will be, no such file, primary, or secondary. 


[root@proventiaM root]# cat /etc/sysconfig/ham
cat: /etc/sysconfig/ham: No such file or directory &amp;lt;-------- Means&amp;nbsp;NOT part of an HA cluster


[root@</summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/5069894638182035444/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2011/12/how-to-tell-if-proventia-m-is-in-ha.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/5069894638182035444'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/5069894638182035444'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2011/12/how-to-tell-if-proventia-m-is-in-ha.html' title='How to tell if a Proventia M is in HA mode via SSH'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-2849091693048307999</id><published>2011-12-13T22:25:00.003-05:00</published><updated>2011-12-13T22:59:14.382-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Access List"/><category scheme="http://www.blogger.com/atom/ns#" term="Access-list"/><category scheme="http://www.blogger.com/atom/ns#" term="ACL"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco ASA"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Pix"/><category scheme="http://www.blogger.com/atom/ns#" term="Rename"/><category scheme="http://www.blogger.com/atom/ns#" term="Time Saver"/><title type='text'>Cisco ASA Renaming Access List</title><summary type="text">Save yourself some time and rename your access-list instead of having to recreate them all!On Cisco ASA version 8.0(2) and above you can rename an access-list:access-list OLD_NAME rename NEW_NAMEhttp://www.cisco.com/en/US/docs/security/asa/asa81/command/ref/a1.html#wp1554657</summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/2849091693048307999/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2011/12/cisco-asa-renaming-access-list.html#comment-form' title='11 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/2849091693048307999'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/2849091693048307999'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2011/12/cisco-asa-renaming-access-list.html' title='Cisco ASA Renaming Access List'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>11</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4728546117996377999.post-4657528786666744363</id><published>2011-11-16T12:51:00.003-05:00</published><updated>2013-05-21T11:39:31.376-04:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="6.3"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Cisco Pix"/><category scheme="http://www.blogger.com/atom/ns#" term="How to see"/><category scheme="http://www.blogger.com/atom/ns#" term="http"/><category scheme="http://www.blogger.com/atom/ns#" term="Per-Shared-Key"/><category scheme="http://www.blogger.com/atom/ns#" term="Pix"/><category scheme="http://www.blogger.com/atom/ns#" term="Pre Shared Key"/><category scheme="http://www.blogger.com/atom/ns#" term="Pre-Shared Key"/><category scheme="http://www.blogger.com/atom/ns#" term="Preshared key"/><category scheme="http://www.blogger.com/atom/ns#" term="PresharedKey"/><category scheme="http://www.blogger.com/atom/ns#" term="psk"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>Display VPN preshared key on a Cisco Pix 6.3</title><summary type="text">
Displaying the preshared key for vpn site to site tunnels on Pix 6.3 devices, I always thought was impossible until I came across this: 



http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00807f2d37.shtml#solution3


Basically you can get the PSK via the http service on the firewall.



You will need to do the following:

1. Enable the http server

2. Allow access </summary><link rel='replies' type='application/atom+xml' href='http://www.packetsent.com/feeds/4657528786666744363/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.packetsent.com/2011/11/display-vpn-preshared-key-on-cisco-pix.html#comment-form' title='34 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/4657528786666744363'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4728546117996377999/posts/default/4657528786666744363'/><link rel='alternate' type='text/html' href='http://www.packetsent.com/2011/11/display-vpn-preshared-key-on-cisco-pix.html' title='Display VPN preshared key on a Cisco Pix 6.3'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>34</thr:total></entry></feed>