Firewall ASA as Master NTP

Good Morning
We are facing this issue regarding network infrastructure of some customers we take care.
In those infrasctructure, only the network layer 3 is allowed to consult an NTP Master Server (as stratum 0 for example). Although this layer 3 device acts as a NTP client related to that server, for other devices in this infrastructure, the layer 3 becomes the master NTP (stratum > 0).
For some infrastructures a firewall ASA performs the layer 3 role and must to be this way. Other devices depends on the firewall to synchronize the clock.
The question is: how can we configure the ASA as a NTP server or is it not possible?

I don't think there is any firmware support for using an ASA as an NTP time source, sorry.
How deeply do you care about the stratum?  I run most of my clients at stratum 4, with only my outside DNS/NTP servers at stratum 3, consulting some upstream but nearby (inside the AS) stratum 2 servers.  This works fine; I'm not shooting for nanosecond precision.  There ought to be some NTP servers you can tap into closer than stratum 0 or 1.  Or you could buy a GPS based gizmo to act a a local time source.
-- Jim Leinweber, WI State Lab of Hygiene

Similar Messages

  • Natting in cisco firewall ASA

    Hi,
    Currently I was facing a problem on how do i do a internal natting for my network.
    how do I nat my vlan 116 to vlan 200 in my firewall asa?
    Source                        Natted                     Destination
    192.168.116.0/24  -> 192.168.200.0/24  ->   192.168.102.0/24
    attached was my diagram and appreciate if someone can give me some guideline.

    Hello,
    The link below will help you for any NAT scenario you want.
    https://supportforums.cisco.com/docs/DOC-9129

  • How to sync clock of Cisco ASA 5505 from NTP Server on internet

    Hi there!
    i've setup a site, with cisco ASA 5505. It has public ip also.
    i want to sync the clock of firewall from on ntp server on internet, or with internal domain controller that is inside LAN.
    The firewall has public IP also.
    how can i do this?
    Regards!

    Hello Lasandro,
    This should do it!
    http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/basic_hostname_pw.html#wp1236530
    Looking for some Networking Assistance? 
    Contact me directly at [email protected]
    I will fix your problem ASAP.
    Cheers,
    Julio Carvajal Segura
    http://laguiadelnetworking.com

  • UCS C200 M2 Servers Behind Firewall ASA

    Hi,
    We have a requirements that a customer will deploy two UCS C200M2 servers and I need to know what is the best practice and the recommendation for putting a UCS server behind a firewall (ASA5545) or outside the firewall( bypass FW).
    Please advise.
    Thanks,
    Amr Sherif

    This something need to be discussed with the customer
    Ucs will be the server side and it's up to the requirements and security policy this server has to be places inside, outside or in the DMZ of a firewall
    Sent from Cisco Technical Support iPad App

  • Cisco Firewall ASA 5510 series configuration

    Hellow folks i am persuing final year project .. then., i am having cisco firewall ASA5510 series and un-managable switches 2 and related system as 20..what kind of configuration can i  build up for the security protection to the following systems which i have..please...
    guide me and help us in our platform...
    This topic first appeared in the Spiceworks Community

    Hi satish,
    1. First thing make sure that the encryption domains are correct. like -like on both ends
    2. Also make sure that the transform set and all matcing as well. please double check the crypto map on both ends as well
    2. If you just added the new subnet to the ACL , looks like the crypto map is not recognising it. Maybe just rebuild the crypto map or something
    HTH
    Kishore

  • NTP server unreachable through ASA firewall

    Hi all,
    I've configured a DMZ switch to point to an NTP server on on the Inside, but I get a debug message on the switch that says:
    NTP: <NTP server IP address> unreachable
    I'm confident that the NTP server is configured properly, as there are more than a dozen other hosts using it, successfully. The difficulty here is that the NTP packets are having to flow from the DMZ to the Inside. I have a rule set on the firewall that permits the IP address of the switch to connect to the IP address of the NTP server as follows:
    access-list intdmz1_acl extended permit udp host <IP address of switch> host <IP address of NTP server> eq ntp
    I can see the hit counter on this rule incrementing.
    The firewall can ping the NTP server, and the NTP server can ping the switch, so I think routing is OK.
    Output from the DMZ switch:
    switch#show ntp associations
          address         ref clock     st  when  poll reach  delay  offset    disp
    ~192.168.65.254   0.0.0.0          16     -    64    0     0.0    0.00  16000.
    * master (synced), # master (unsynced), + selected, - candidate, ~ configured
    switch#show ntp status
    Clock is unsynchronized, stratum 16, no reference clock
    nominal freq is 119.2092 Hz, actual freq is 119.2092 Hz, precision is 2**17
    reference time is 00000000.00000000 (00:00:00.000 GMT Mon Jan 1 1900)
    clock offset is 0.0000 msec, root delay is 0.00 msec
    root dispersion is 0.00 msec, peer dispersion is 0.00 msec
    PRNLN-DMZ-SW01#sh run | inc ntp
    ntp source Vlan138
    ntp server 192.168.65.254
    ukhvdc00vs01#sh run | inc ntp
    ntp source Vlan65
    ntp master 3
    ntp update-calendar
    ntp server 0.uk.pool.ntp.org
    ntp server 1.uk.pool.ntp.org
    PRNLN-DMZ-SW01#show ntp status
    Clock is unsynchronized, stratum 16, no reference clock
    nominal freq is 119.2092 Hz, actual freq is 119.2092 Hz, precision is 2**17
    reference time is 00000000.00000000 (00:00:00.000 GMT Mon Jan 1 1900)
    clock offset is 0.0000 msec, root delay is 0.00 msec
    root dispersion is 0.00 msec, peer dispersion is 0.00 msec
    Does the firewall rule need to permit more than UDP/123 for this to work perhaps?
    NTPconfig on DMZ switch:
    switch#sh run | inc ntp
    ntp source Vlan138
    ntp server <IP address of NTP server>
    ===================
    NTP config on NTP server:
    NTP_Server#sh run | inc ntp
    ntp source Vlan65
    ntp master 3
    ntp update-calendar
    ntp server 0.uk.pool.ntp.org
    ntp server 1.uk.pool.ntp.org
    Any guidance welcomed.
    Thank you,
    Olly

    Hi Julio,
    Hi Julio,
    For the purposes of this information:
    DMZ switch IP = 5.6.7.8
    NTP server IP = 10.1.1.1
    Here's the output from the show commands:
    ciscoasa# show capture NTPCAPTUREDMZ
    11 packets captured
       1: 16:22:05.271500 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
       2: 16:23:09.276185 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
       3: 16:24:13.274033 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
       4: 16:24:57.272813 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
       5: 16:24:58.279480 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
       6: 16:24:59.277817 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
       7: 16:25:00.275971 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
       8: 16:25:01.275559 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
       9: 16:25:02.272599 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
      10: 16:25:03.279129 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
      11: 16:25:04.277710 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    11 packets shown
    ciscoasa# show capture NTPCAPTUREINSIDE
    0 packet captured
    0 packet shown
    ciscoasa# show capture NTPASP | include 10.1.1.1
    419: 16:24:13.274171 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    1820: 16:24:57.272904 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    1841: 16:24:58.279587 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    1876: 16:24:59.277909 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    1934: 16:25:00.276062 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2027: 16:25:01.275651 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2068: 16:25:02.272690 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2095: 16:25:03.279221 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2129: 16:25:04.277802 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2200: 16:25:05.275849 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2233: 16:25:06.274094 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2275: 16:25:07.273606 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2327: 16:25:08.280182 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2347: 16:25:09.277222 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2373: 16:25:10.275467 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2399: 16:25:11.273759 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    2414: 16:25:12.273347 802.1Q vlan#138 P6 5.6.7.8.123 > 10.1.1.1.123:  udp 48
    I'm guessing we should see some packets in the second capture, but we're not...
    Does this help?
    Thanks!
    Olly

  • Unable to see interface on ASA 5510 Firewall

    Hi All,
    I am unable to see 4th interface on my firewall i.e fastether0/3 on my firewall ASA 5510.
    Below is the output.
    ciscoasa# sh int ip br
    Interface                  IP-Address      OK? Method Status                Protocol
    Ethernet0/0                x.x.x.x           YES CONFIG up                    up
    Ethernet0/1                x.x.x.x           YES CONFIG up                    up
    Ethernet0/2                unassigned      YES unset  administratively down down
    Internal-Control0/0        127.0.1.1       YES unset  up                    up
    Internal-Data0/0           unassigned      YES unset  up                    up
    Management0/0              192.168.1.1     YES CONFIG up                    up
    Please suggest what could be the reason.
    Regards
    Pankaj

    Hi Ramraj,
    Even i have the base license for my ASA 5510 which is showing all the 4 interfaces in sh ver. I don't think so license would be an issue. There should be some IOS code bug that needs to be upgraded. If this goes for an OS upgrade it should get resolved.
    Its not showing up in sh ver . As Karsten said he might be running on old IOS version.
    fy-a# sh ver
    Cisco Adaptive Security Appliance Software Version 8.4(4)1
    Device Manager Version 6.4(5)
    Compiled on Thu 14-Jun-12 11:20 by builders
    System image file is "disk0:/asa844-1-k8.bin"
    Config file at boot was "startup-config"
    fy-a up 1 day 1 hour
    Hardware:   ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1600 MHz
    Internal ATA Compact Flash, 256MB
    BIOS Flash M50FW016 @ 0xfff00000, 2048KB
    Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)
                                 Boot microcode   : CN1000-MC-BOOT-2.00
                                 SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03
                                 IPSec microcode  : CNlite-MC-IPSECm-MAIN-2.06
                                 Number of accelerators: 1
    0: Ext: Ethernet0/0         : address is 2c54.2d0c.8f1a, irq 9
    1: Ext: Ethernet0/1         : address is 2c54.2d0c.8f1b, irq 9
    2: Ext: Ethernet0/2         : address is 2c54.2d0c.8f1c, irq 9
    3: Ext: Ethernet0/3         : address is 2c54.2d0c.8f1d, irq 9
    4: Ext: Management0/0       : address is 2c54.2d0c.8f1e, irq 11
    5: Int: Not used            : irq 11
    6: Int: Not used            : irq 5
    Licensed features for this platform:
    Maximum Physical Interfaces       : Unlimited      perpetual
    Maximum VLANs                     : 50             perpetual
    Inside Hosts                      : Unlimited      perpetual
    Failover                          : Disabled       perpetual
    VPN-DES                           : Enabled        perpetual
    VPN-3DES-AES                      : Enabled        perpetual
    Security Contexts                 : 0              perpetual
    GTP/GPRS                          : Disabled       perpetual
    AnyConnect Premium Peers          : 2              perpetual
    AnyConnect Essentials             : Disabled       perpetual
    Other VPN Peers                   : 250            perpetual
    Total VPN Peers                   : 250            perpetual
    Shared License                    : Disabled       perpetual
    AnyConnect for Mobile             : Disabled       perpetual
    AnyConnect for Cisco VPN Phone    : Disabled       perpetual
    Advanced Endpoint Assessment      : Disabled       perpetual
    UC Phone Proxy Sessions           : 2              perpetual
    Total UC Proxy Sessions           : 2              perpetual
    Botnet Traffic Filter             : Disabled       perpetual
    Intercompany Media Engine         : Disabled       perpetual
    This platform has a Base license.
    Serial Number: JMX1AXXXXX
    Running Permanent Activation Key: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
    Configuration register is 0x1
    Configuration has not been modified since last system restart.
    fy-a#
    Ramraj please do correct me if am wrong.
    Please do rate if the given information helps.
    By
    Karthik

  • Really Need Some Help with CME 8.6 using IOS as Firewall and Anyconnect VPN on Phones

    Hello,
    I have a 2911 Router with IOS Security and Voice enabled and we are using CME 8.6.  I am using a built-in Anyconnect VPN on 3 phones that are for remote users and thus I needed to enable security zones on the router which works because the remote phones will boot up, get their phone configs and I am able to call those remote phones from an outside line.
    The issue I am having is that when I try to dial a remote phone connected via the VPN through port g0/0 from and internal office phone, i.e., NOT involving the PSTN then there is no audio.  It's as if no audio is going back and forth.  When I take off the security zones from the virtual-template interface and the g0/0 interface then the audio works great and I can reach the phone from internal as I am supposed to.
    Could someone take a peek at my security config and see why audio would not be traveling through the VPN when I have my security zones turned on?
    clock timezone PST -8 0
    clock summer-time PST recurring
    network-clock-participate wic 0 
    network-clock-select 1 T1 0/0/0
    no ipv6 cef
    ip source-route
    ip cef
    ip dhcp excluded-address 192.168.8.1 192.168.8.19
    ip dhcp pool owhvoip
     network 192.168.8.0 255.255.248.0
     default-router 192.168.8.1 
     option 150 ip 192.168.8.1 
     lease 30
    multilink bundle-name authenticated
    isdn switch-type primary-ni
    crypto pki server cme_root
     database level complete
     grant auto
     lifetime certificate 7305
     lifetime ca-certificate 7305
    crypto pki token default removal timeout 0
    crypto pki trustpoint cme_root
     enrollment url http://192.168.8.1:80
     revocation-check none
     rsakeypair cme_root
    crypto pki trustpoint cme_cert
     enrollment url http://192.168.8.1:80
     revocation-check none
    crypto pki trustpoint TP-self-signed-2736782807
     enrollment selfsigned
     subject-name cn=IOS-Self-Signed-Certificate-2736782807
     revocation-check none
     rsakeypair TP-self-signed-2736782807
    voice-card 0
     dspfarm
     dsp services dspfarm
    voice service voip
     allow-connections h323 to h323
     allow-connections h323 to sip
     allow-connections sip to h323
     allow-connections sip to sip
     fax protocol t38 version 0 ls-redundancy 0 hs-redundancy 0 fallback none
     vpn-group 1
      vpn-gateway 1 https://66.111.111.111/SSLVPNphone
      vpn-trustpoint 1 trustpoint cme_cert leaf
     vpn-profile 1
      host-id-check disable
    voice class codec 1
     codec preference 1 g711ulaw
    voice class custom-cptone jointone
     dualtone conference
      frequency 600 900
      cadence 300 150 300 100 300 50
    voice class custom-cptone leavetone
     dualtone conference
      frequency 400 800
      cadence 400 50 200 50 200 50
    voice translation-rule 1
     rule 1 /9400/ /502/
     rule 2 /9405/ /215/
     rule 3 /9410/ /500/
    voice translation-rule 2
     rule 1 /.*/ /541999999/
    voice translation-rule 100
     rule 1 /^9/ // type any unknown plan any isdn
    voice translation-profile Inbound_Calls_To_CUE
     translate called 1
    voice translation-profile InternationalType
     translate called 100
    voice translation-profile Local-CLID
     translate calling 2
    license udi pid CISCO2911/K9 sn FTX1641AHX3
    hw-module pvdm 0/0
    hw-module pvdm 0/1
    hw-module sm 1
    username routeradmin password 7 091649040910450B41
    username cmeadmin privilege 15 password 7 03104803040E375F5E4D5D51
    redundancy
    controller T1 0/0/0
     cablelength long 0db
     pri-group timeslots 1-12,24
    class-map type inspect match-any sslvpn
     match protocol tcp
     match protocol udp
     match protocol icmp
    class-map type inspect match-all router-access
     match access-group name router-access
    policy-map type inspect firewall-policy
     class type inspect sslvpn
      inspect 
     class class-default
      drop
    policy-map type inspect outside-to-router-policy
     class type inspect router-access
      inspect 
     class class-default
      drop
    zone security trusted
    zone security internet
    zone-pair security trusted-to-internet source trusted destination internet
     service-policy type inspect firewall-policy
    zone-pair security untrusted-to-trusted source internet destination trusted
     service-policy type inspect outside-to-router-policy
    interface Loopback0
     ip address 192.168.17.1 255.255.248.0
    interface Embedded-Service-Engine0/0
     no ip address
     shutdown
    interface GigabitEthernet0/0
     description Internet
     ip address dhcp
     no ip redirects
     no ip proxy-arp
     zone-member security internet
     duplex auto
     speed auto
    interface GigabitEthernet0/1
     ip address 192.168.8.1 255.255.248.0
     duplex auto
     speed auto
    interface GigabitEthernet0/2
     no ip address
     shutdown
     duplex auto
     speed auto
    interface Serial0/0/0:23
     no ip address
     encapsulation hdlc
     isdn switch-type primary-ni
     isdn incoming-voice voice
     no cdp enable
    interface Integrated-Service-Engine1/0
     ip unnumbered Loopback0
     service-module ip address 192.168.17.2 255.255.248.0
     !Application: CUE Running on NME
     service-module ip default-gateway 192.168.17.1
     no keepalive
    interface Virtual-Template1
     ip unnumbered GigabitEthernet0/0
     zone-member security trusted
    ip local pool SSLVPNPhone_pool 192.168.9.1 192.168.9.5
    ip forward-protocol nd
    ip http server
    ip http authentication local
    no ip http secure-server
    ip http path flash:/cme-gui-8.6.0
    ip route 192.168.17.2 255.255.255.255 Integrated-Service-Engine1/0
    ip access-list extended router-access
     permit tcp any host 66.111.111.111 eq 443
    tftp-server flash:apps31.9-3-1ES26.sbn
    control-plane
    voice-port 0/0/0:23
    voice-port 0/3/0
    voice-port 0/3/1
    mgcp profile default
    sccp local GigabitEthernet0/1
    sccp ccm 192.168.8.1 identifier 1 priority 1 version 7.0 
    sccp
    sccp ccm group 1
     bind interface GigabitEthernet0/1
     associate ccm 1 priority 1
     associate profile 1 register CME-CONF
    dspfarm profile 1 conference  
     codec g729br8
     codec g729r8
     codec g729abr8
     codec g729ar8
     codec g711alaw
     codec g711ulaw
     maximum sessions 4
     associate application SCCP
    dial-peer voice 500 voip
     destination-pattern 5..
     session protocol sipv2
     session target ipv4:192.168.17.2
     dtmf-relay sip-notify
     codec g711ulaw
     no vad
    dial-peer voice 10 pots
     description Incoming Calls To AA
     translation-profile incoming Inbound_Calls_To_CUE
     incoming called-number .
     port 0/0/0:23
    dial-peer voice 20 pots
     description local 10 digit dialing
     translation-profile outgoing Local-CLID
     destination-pattern 9[2-9].........
     incoming called-number .
     port 0/0/0:23
     forward-digits 10
    dial-peer voice 30 pots
     description long distance dialing
     translation-profile outgoing Local-CLID
     destination-pattern 91..........
     incoming called-number .
     port 0/0/0:23
     forward-digits 11
    dial-peer voice 40 pots
     description 911
     destination-pattern 911
     port 0/0/0:23
     forward-digits all
    dial-peer voice 45 pots
     description 9911
     destination-pattern 9911
     port 0/0/0:23
     forward-digits 3
    dial-peer voice 50 pots
     description international dialing
     translation-profile outgoing InternationalType
     destination-pattern 9T
     incoming called-number .
     port 0/0/0:23
    dial-peer voice 650 pots
     huntstop
     destination-pattern 650
     fax rate disable
     port 0/3/0
    gatekeeper
     shutdown
    telephony-service
     protocol mode ipv4
     sdspfarm units 5
     sdspfarm tag 1 CME-CONF
     conference hardware
     moh-file-buffer 90
     no auto-reg-ephone
     authentication credential cmeadmin tshbavsp$$4
     max-ephones 50
     max-dn 200
     ip source-address 192.168.8.1 port 2000
     service dnis dir-lookup
     timeouts transfer-recall 30
     system message Oregon's Wild Harvest
     url services http://192.168.17.2/voiceview/common/login.do 
     url authentication http://192.168.8.1/CCMCIP/authenticate.asp  
     cnf-file location flash:
     cnf-file perphone
     load 7931 SCCP31.9-3-1SR4-1S.loads
     load 7936 cmterm_7936.3-3-21-0.bin
     load 7942 SCCP42.9-3-1SR4-1S.loads
     load 7962 SCCP42.9-4-2-1S.loads
     time-zone 5
     time-format 24
     voicemail 500
     max-conferences 8 gain -6
     call-park system application
     call-forward pattern .T
     moh moh.wav
     web admin system name cmeadmin secret 5 $1$60ro$u.0r/cno/OD2JmtvPq4w9.
     dn-webedit 
     transfer-digit-collect orig-call
     transfer-system full-consult
     transfer-pattern .T
     fac standard
     create cnf-files version-stamp Jan 01 2002 00:00:00
    ephone-template  1
     softkeys connected  Hold Park Confrn Trnsfer Endcall ConfList TrnsfVM
     button-layout 7931 2
    ephone-template  2
     softkeys idle  Dnd Gpickup Pickup Mobility
     softkeys connected  Hold Park Confrn Mobility Trnsfer TrnsfVM
     button-layout 7931 2
    ephone-dn  1  dual-line
     number 200
     label Lisa
     name Lisa Ziomkowsky
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  2  dual-line
     number 201
     label Dylan
     name Dylan Elmer
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  3  dual-line
     number 202
     label Kimberly
     name Kimberly Krueger
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  4  dual-line
     number 203
     label Randy
     name Randy Buresh
     mobility
     snr calling-number local
     snr 915035042317 delay 5 timeout 15 cfwd-noan 500
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  5  dual-line
     number 204
     label Mark
     name Mark McBride
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  6  dual-line
     number 205
     label Susan
     name Susan Sundin
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  7  dual-line
     number 206
     label Rebecca
     name Rebecca Vaught
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  8  dual-line
     number 207
     label Ronnda
     name Ronnda Daniels
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  9  dual-line
     number 208
     label Matthew
     name Matthew Creswell
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  10  dual-line
     number 209
     label Nate
     name Nate Couture
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  11  dual-line
     number 210
     label Sarah
     name Sarah Smith
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  12  dual-line
     number 211
     label Janis
     name Janis McFerren
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  13  dual-line
     number 212
     label Val
     name Val McBride
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  14  dual-line
     number 213
     label Shorty
     name Arlene Haugen
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  15  dual-line
     number 214
     label Ruta
     name Ruta Wells
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  16  dual-line
     number 215
     label 5415489405
     name OWH Sales
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  17  dual-line
     number 216
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  18  dual-line
     number 217
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  19  dual-line
     number 218
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  20  dual-line
     number 219
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  21  dual-line
     number 220
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  22  dual-line
     number 221
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  23  dual-line
     number 222
     label Pam
     name Pam Buresh
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  24  dual-line
     number 223
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  25  dual-line
     number 224
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  26  dual-line
     number 225
     label Elaine
     name Elaine Mahan
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  27  octo-line
     number 250
     label Shipping
     name Shipping
    ephone-dn  28  dual-line
     number 251
     label Eli
     name Eli Nourse
     call-forward busy 500
     call-forward noan 500 timeout 10
    ephone-dn  29  dual-line
     number 252
    ephone-dn  30  dual-line
     number 253
    ephone-dn  31  octo-line
     number 100
     label Customer Service
     name Customer Service
     call-forward busy 500
     call-forward noan 500 timeout 12
    ephone-dn  32  octo-line
     number 101
     label Sales
     name Sales
     call-forward busy 214
     call-forward noan 214 timeout 12
    ephone-dn  33  dual-line
     number 260
     label Conference Room
     name Conference Room
     call-forward busy 100
     call-forward noan 100 timeout 12
    ephone-dn  100
     number 300
     park-slot timeout 20 limit 2 recall
     description Park Slot For All Company
    ephone-dn  101
     number 301
     park-slot timeout 20 limit 2 recall
     description Park Slot for All Company
    ephone-dn  102
     number 302
     park-slot timeout 20 limit 2 recall
     description Park Slot for All Company
    ephone-dn  103
     number 700
     name All Company Paging
     paging ip 239.1.1.10 port 2000
    ephone-dn  104
     number 8000...
     mwi on
    ephone-dn  105
     number 8001...
     mwi off
    ephone-dn  106  octo-line
     number A00
     description ad-hoc conferencing
     conference ad-hoc
    ephone-dn  107  octo-line
     number A01
     description ad-hoc conferencing
     conference ad-hoc
    ephone-dn  108  octo-line
     number A02
     description ad-hoc conferencing
     conference ad-hoc
    ephone  1
     device-security-mode none
     mac-address 001F.CA34.88AE
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:2 2:31
    ephone  2
     device-security-mode none
     mac-address 001F.CA34.8A03
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:12
    ephone  3
     device-security-mode none
     mac-address 001F.CA34.898B
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
    ephone  4
     device-security-mode none
     mac-address 001F.CA34.893F
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
    ephone  5
     device-security-mode none
     mac-address 001F.CA34.8A71
     ephone-template 1
     max-calls-per-button 2
     username "susan"
     paging-dn 103
     type 7931
     button  1:6
    ephone  6
     device-security-mode none
     mac-address 001F.CA34.8871
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:7 2:31 3:32
    ephone  7
     device-security-mode none
     mac-address 001F.CA34.8998
     ephone-template 1
     max-calls-per-button 2
     username "matthew"
     paging-dn 103
     type 7931
     button  1:9
    ephone  8
     device-security-mode none
     mac-address 001F.CA36.8787
     ephone-template 1
     max-calls-per-button 2
     username "nate"
     paging-dn 103
     type 7931
     button  1:10
    ephone  9
     device-security-mode none
     mac-address 001F.CA34.8805
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:5
    ephone  10
     device-security-mode none
     mac-address 001F.CA34.880C
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:14
    ephone  11
     device-security-mode none
     mac-address 001F.CA34.8935
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:3
    ephone  12
     device-security-mode none
     mac-address 001F.CA34.8995
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:8 2:31
    ephone  13
     device-security-mode none
     mac-address 0021.5504.1796
     ephone-template 2
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:4
    ephone  14
     device-security-mode none
     mac-address 001F.CA34.88F7
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:23
    ephone  15
     device-security-mode none
     mac-address 001F.CA34.8894
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:26
    ephone  16
     device-security-mode none
     mac-address 001F.CA34.8869
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:28 2:27
    ephone  17
     device-security-mode none
     mac-address 001F.CA34.885F
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:11
    ephone  18
     device-security-mode none
     mac-address 001F.CA34.893C
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:27
    ephone  19
     device-security-mode none
     mac-address 001F.CA34.8873
     ephone-template 1
     max-calls-per-button 2
     paging-dn 103
     type 7931
     button  1:27
    ephone  20
     device-security-mode none
     mac-address A456.3040.B7DD
     paging-dn 103
     type 7942
     vpn-group 1
     vpn-profile 1
     button  1:13
    ephone  21
     device-security-mode none
     mac-address A456.30BA.5474
     paging-dn 103
     type 7942
     vpn-group 1
     vpn-profile 1
     button  1:15 2:16 3:32
    ephone  22
     device-security-mode none
     mac-address A456.3040.B72E
     paging-dn 103
     type 7942
     vpn-group 1
     vpn-profile 1
     button  1:1
    ephone  23
     device-security-mode none
     mac-address 00E0.75F3.D1D9
     paging-dn 103
     type 7936
     button  1:33
    line con 0
    line aux 0
    line 2
     no activation-character
     no exec
     transport preferred none
     transport input all
     transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
     stopbits 1
    line 67
     no activation-character
     no exec
     transport preferred none
     transport input all
     transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
    line vty 0 4
     transport input all
    scheduler allocate 20000 1000
    ntp master
    ntp update-calendar
    ntp server 216.228.192.69
    webvpn gateway sslvpn_gw
     ip address 66.111.111.111 port 443  
     ssl encryption 3des-sha1 aes-sha1
     ssl trustpoint cme_cert
     inservice
    webvpn context sslvpn_context
     ssl encryption 3des-sha1 aes-sha1
     ssl authenticate verify all
     policy group SSLVPNphone
       functions svc-enabled
       hide-url-bar
       svc address-pool "SSLVPNPhone_pool" netmask 255.255.248.0
       svc default-domain "bendbroadband.com"
     virtual-template 1
     default-group-policy SSLVPNphone
     gateway sslvpn_gw domain SSLVPNphone
     authentication certificate
     ca trustpoint cme_root
     inservice
    end

    I think your ACL could be the culprit.
    ip access-list extended router-access
     permit tcp any host 66.111.111.111 eq 443
    Would you be able to change the entry to permit ip any any (just for testing purpose) and then test to see if the calls function properly.  If they work fine then we know that we need to open som ports there.
    Please remember to select a correct answer and rate helpful posts

  • CCP - Advanced Firewall Creating Custom Ports Inbound Traffic

    Hey folks, i desperatly need some assistance with my ISR 800 series router zone based Firewall.
    The router is currently setup and routing traffic to the internet successfully.
    I would like to setup a custom inbound port(TCP-3389) accessible from the internet.
    Port destination termination will be an internal PC at say 192.168.1.50.
    How can i accomplish this using CPP or console.
    I have already defined the port to application mapping using CPP. however the firewall is recording the following syslog message:
    %FW-6-DROP_PKT: Dropping udp session 24.76.164.168:13925 192.168.1.50:3389  on zone-pair ccp-zp-out-zone-To-in-zone class class-default due to DROP action  found in policy-map with ip ident 0
    Any assistance is greatly appreciated
    If full config is required  to assist please let me know.

    Thanks for your response.
    Pardon my ignorance! how can i export this info from the CCP interface to share? In lue of that procedure, i have provided the full config below.
    Building configuration...
    Current configuration : 22564 bytes
    ! Last configuration change at 18:05:26 UTC Fri Aug 23 2013 by sshs
    ! NVRAM config last updated at 18:05:26 UTC Fri Aug 23 2013 by sshs
    ! NVRAM config last updated at 18:05:26 UTC Fri Aug 23 2013 by sshs
    version 15.3
    no service pad
    service tcp-keepalives-in
    service tcp-keepalives-out
    service timestamps debug datetime msec localtime show-timezone
    service timestamps log datetime msec localtime show-timezone
    service password-encryption
    service sequence-numbers
    hostname 881W-SSHS-R1
    boot-start-marker
    boot system flash:c880data-universalk9-mz.153-1.T.bin
    boot-end-marker
    security authentication failure rate 3 log
    security passwords min-length 6
    logging buffered 8192 warnings
    enable secret 4 tFiAfenrBMx7/HkdLMWd3Yp19y9eWwFQw9w0LSu/IRk
    enable password 7 09485B1F180B03175A
    aaa new-model
    aaa authentication login sslvpn local
    aaa session-id common
    memory-size iomem 10
    clock timezone EST -5 0
    clock summer-time UTC recurring
    service-module wlan-ap 0 bootimage autonomous
    crypto pki server 881-sshs-r1ca
    database archive pem password 7 121D1001130518017B
    issuer-name O=ssh solutions, OU=sshs support, CN=881w-sshs-r1, C=CA, ST=ON
    lifetime certificate 1095
    lifetime ca-certificate 1825
    crypto pki trustpoint sshs-trustpoint
    enrollment selfsigned
    serial-number
    subject-name CN=sshs-certificate
    revocation-check crl
    rsakeypair sshs-rsa-keys
    crypto pki trustpoint 881-sshs-r1ca
    revocation-check crl
    rsakeypair 881-sshs-r1ca
    crypto pki certificate chain sshs-trustpoint
    certificate self-signed 01
      308201DC 30820186 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
      4C311930 17060355 04031310 73736873 2D636572 74696669 63617465 312F3012
      06035504 05130B46 54583133 32353830 34593019 06092A86 4886F70D 01090216
      0C383831 572D5353 48532D52 31301E17 0D313330 34313332 31323334 315A170D
      32303031 30313030 30303030 5A304C31 19301706 03550403 13107373 68732D63
      65727469 66696361 7465312F 30120603 55040513 0B465458 31333235 38303459
      30190609 2A864886 F70D0109 02160C38 3831572D 53534853 2D523130 5C300D06
      092A8648 86F70D01 01010500 034B0030 48024100 C14B55D9 4B2D4124 D711B49E
      BBCA3A9D 4EE59818 3922DF07 8D7A3901 BE32D2C5 108FD57C BEA8BEAE F1CFEDF3
      6D8EF395 DD4D6880 846C9995 EB25B50A DC8E2CC7 02030100 01A35330 51300F06
      03551D13 0101FF04 05300301 01FF301F 0603551D 23041830 16801494 EBC22041
      8AEC4A0C E3D4399D AD736724 1241E730 1D060355 1D0E0416 041494EB C220418A
      EC4A0CE3 D4399DAD 73672412 41E7300D 06092A86 4886F70D 01010505 00034100
      BCB0E36C 74CB592B C7404CA2 3028AE4A EEBC2FF9 2195BD68 E9BC5D76 00F1C26F
      50837DEC 99E79BF5 E5C6C634 BE507705 83F6004B 1B4971E6 EAFBBB0D B3677087
          quit
    crypto pki certificate chain 881-sshs-r1ca
    certificate ca 01
      30820299 30820202 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
      60310B30 09060355 04081302 4F4E310B 30090603 55040613 02434131 15301306
      03550403 130C3838 31772D73 7368732D 72313115 30130603 55040B13 0C737368
      73207375 70706F72 74311630 14060355 040A130D 73736820 736F6C75 74696F6E
      73301E17 0D313330 34313931 37313331 315A170D 31383034 31383137 31333131
      5A306031 0B300906 03550408 13024F4E 310B3009 06035504 06130243 41311530
      13060355 0403130C 38383177 2D737368 732D7231 31153013 06035504 0B130C73
      73687320 73757070 6F727431 16301406 0355040A 130D7373 6820736F 6C757469
      6F6E7330 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
      BA7150D7 E4D5E06B 522A03C4 DBE95F4B C74A4BF5 D715814A 16B1D685 4873C6EB
      2ACF8A35 4E4B5234 90B0DE07 738D705E 70C4CEDE D10271CD 658B3939 788859C7
      B1730801 22DD5840 9EC1FC50 0AD4D2DF C5281E5F 891550B3 873B6305 02287605
      80274704 700D7512 4D780096 E21A2DEE 18F76109 F1D6189B 56561E12 52E5A74B
      02030100 01A36330 61300F06 03551D13 0101FF04 05300301 01FF300E 0603551D
      0F0101FF 04040302 0186301F 0603551D 23041830 168014CD 462ED740 1B5B89EC
      8510BAB3 E91629AE 6C14F030 1D060355 1D0E0416 0414CD46 2ED7401B 5B89EC85
      10BAB3E9 1629AE6C 14F0300D 06092A86 4886F70D 01010405 00038181 000EE548
      B5692815 E61D2086 E7B53CD4 0C077D9D 479F8F6A 9276356D FD18FBD7 FDFCE15A
      0224A686 F2154525 6F56CCD8 555E47EA 80C5223F A999260D 53E5AC53 A6AE6149
      2B28EC50 67AA35E7 3B32011B E82D0888 5D3EDCC3 28720D49 DC01ADBB 1B2B44AF
      CFD12481 7F1D9720 4A66D59A 8A3B7BB8 287F064C 41D788DD 0552FD91 F8
          quit
    no ip source-route
    ip port-map user-remote-app-tcp port tcp 3389 list 2 description remote-app
    ip dhcp excluded-address 192.168.10.1 192.168.10.200
    ip dhcp excluded-address 192.168.20.1 192.168.20.200
    ip dhcp excluded-address 192.168.30.1 192.168.30.200
    ip dhcp pool SSHS-LAN
    import all
    network 192.168.10.0 255.255.255.0
    dns-server 192.168.10.1
    default-router 192.168.10.1
    domain-name sshs.local
    lease 2
    ip dhcp pool VLAN20
    import all
    network 192.168.20.0 255.255.255.0
    dns-server 192.168.10.1
    default-router 192.168.20.1
    domain-name sshs.local
    lease 2
    ip dhcp pool VLAN30
    import all
    network 192.168.30.0 255.255.255.0
    dns-server 192.168.10.1
    default-router 192.168.30.1
    domain-name sshs.local
    lease 2
    no ip bootp server
    ip domain name sshs.local
    ip host 881W-SSHS-R1 192.168.10.1
    ip name-server 208.122.23.22
    ip name-server 208.122.23.23
    ip cef
    no ipv6 cef
    ipv6 multicast rpf use-bgp
    parameter-map type protocol-info msn-servers
    server name messenger.hotmail.com
    server name gateway.messenger.hotmail.com
    server name webmessenger.msn.com
    parameter-map type protocol-info aol-servers
    server name login.oscar.aol.com
    server name toc.oscar.aol.com
    server name oam-d09a.blue.aol.com
    parameter-map type protocol-info yahoo-servers
    server name scs.msg.yahoo.com
    server name scsa.msg.yahoo.com
    server name scsb.msg.yahoo.com
    server name scsc.msg.yahoo.com
    server name scsd.msg.yahoo.com
    server name cs16.msg.dcn.yahoo.com
    server name cs19.msg.dcn.yahoo.com
    server name cs42.msg.dcn.yahoo.com
    server name cs53.msg.dcn.yahoo.com
    server name cs54.msg.dcn.yahoo.com
    server name ads1.vip.scd.yahoo.com
    server name radio1.launch.vip.dal.yahoo.com
    server name in1.msg.vip.re2.yahoo.com
    server name data1.my.vip.sc5.yahoo.com
    server name address1.pim.vip.mud.yahoo.com
    server name edit.messenger.yahoo.com
    server name messenger.yahoo.com
    server name http.pager.yahoo.com
    server name privacy.yahoo.com
    server name csa.yahoo.com
    server name csb.yahoo.com
    server name csc.yahoo.com
    multilink bundle-name authenticated
    license udi pid CISCO881W-GN-A-K9 sn FTX1325804Y
    license boot module c880-data level advipservices
    username sshs privilege 15 password 7 050F131920425A0C48
    username sean secret 4 HKl1ouWejids3opAKgGPRpf0NznjhP7L/v.REW79pKc
    ip tcp synwait-time 10
    no ip ftp passive
    class-map type inspect imap match-any ccp-app-imap
    match invalid-command
    class-map match-any AutoQoS-Voice-Fa4
    match protocol rtp audio
    class-map type inspect match-all CCP_SSLVPN
    match access-group 199
    class-map match-any AutoQoS-Scavenger-Fa4
    match protocol bittorrent
    match protocol edonkey
    class-map type inspect match-any ccp-skinny-inspect
    match protocol skinny
    class-map type inspect match-any remote-app
    match protocol Other
    class-map type inspect match-all SDM_RIP_PT
    match protocol router
    class-map type inspect match-any bootps
    match protocol bootps
    class-map type inspect match-any SDM_WEBVPN
    match access-group name SDM_WEBVPN
    class-map type inspect match-any SDM_HTTP
    match access-group name SDM_HTTP
    class-map type inspect ymsgr match-any ccp-app-yahoo-otherservices
    match service any
    class-map type inspect msnmsgr match-any ccp-app-msn-otherservices
    match service any
    class-map type inspect match-any ccp-h323nxg-inspect
    match protocol h323-nxg
    class-map type inspect match-any ccp-cls-icmp-access
    match protocol icmp
    match protocol tcp
    match protocol udp
    class-map type inspect match-any ccp-cls-protocol-im
    match protocol ymsgr yahoo-servers
    match protocol msnmsgr msn-servers
    match protocol aol aol-servers
    class-map type inspect aol match-any ccp-app-aol-otherservices
    match service any
    class-map type inspect match-all ccp-protocol-pop3
    match protocol pop3
    class-map type inspect match-any ccp-h225ras-inspect
    match protocol h225ras
    class-map match-any AutoQoS-VoIP-Remark
    match ip dscp ef
    match ip dscp cs3
    match ip dscp af31
    class-map type inspect match-any ccp-h323annexe-inspect
    match protocol h323-annexe
    class-map type inspect match-any ccp-cls-insp-traffic
    match protocol pptp
    match protocol dns
    match protocol ftp
    match protocol https
    match protocol icmp
    match protocol imap
    match protocol pop3
    match protocol netshow
    match protocol shell
    match protocol realmedia
    match protocol rtsp
    match protocol smtp
    match protocol sql-net
    match protocol streamworks
    match protocol tftp
    match protocol vdolive
    match protocol tcp
    match protocol udp
    class-map type inspect match-any SDM_SSH
    match access-group name SDM_SSH
    class-map type inspect pop3 match-any ccp-app-pop3
    match invalid-command
    class-map type inspect match-any SDM_HTTPS
    match access-group name SDM_HTTPS
    class-map type inspect match-any bootpc_bootps
    match protocol bootpc
    match protocol bootps
    class-map type inspect match-all SDM_GRE
    match access-group name SDM_GRE
    class-map type inspect match-any SDM_SHELL
    match access-group name SDM_SHELL
    class-map type inspect match-any ccp-h323-inspect
    match protocol h323
    class-map type inspect msnmsgr match-any ccp-app-msn
    match service text-chat
    class-map type inspect ymsgr match-any ccp-app-yahoo
    match service text-chat
    class-map type inspect match-all ccp-invalid-src
    match access-group 100
    class-map type inspect http match-any ccp-app-httpmethods
    match request method bcopy
    match request method bdelete
    match request method bmove
    match request method bpropfind
    match request method bproppatch
    match request method connect
    match request method copy
    match request method delete
    match request method edit
    match request method getattribute
    match request method getattributenames
    match request method getproperties
    match request method index
    match request method lock
    match request method mkcol
    match request method mkdir
    match request method move
    match request method notify
    match request method options
    match request method poll
    match request method propfind
    match request method proppatch
    match request method put
    match request method revadd
    match request method revlabel
    match request method revlog
    match request method revnum
    match request method save
    match request method search
    match request method setattribute
    match request method startrev
    match request method stoprev
    match request method subscribe
    match request method trace
    match request method unedit
    match request method unlock
    match request method unsubscribe
    class-map match-any AutoQoS-VoIP-Control-UnTrust
    match access-group name AutoQoS-VoIP-Control
    class-map type inspect match-any ccp-sip-inspect
    match protocol sip
    class-map type inspect http match-any ccp-http-blockparam
    match request port-misuse im
    match request port-misuse p2p
    match req-resp protocol-violation
    class-map type inspect aol match-any ccp-app-aol
    match service text-chat
    class-map type inspect match-all ccp-protocol-imap
    match protocol imap
    class-map match-any AutoQoS-VoIP-RTP-UnTrust
    match protocol rtp audio
    match access-group name AutoQoS-VoIP-RTCP
    class-map type inspect http match-any ccp-http-allowparam
    match request port-misuse tunneling
    class-map type inspect match-all ccp-protocol-http
    match protocol http
    class-map type inspect match-any sdm-cls-access
    match class-map SDM_HTTPS
    match class-map SDM_SSH
    match class-map SDM_SHELL
    class-map type inspect match-any CCP_PPTP
    match class-map SDM_GRE
    class-map type inspect match-all SDM_WEBVPN_TRAFFIC
    match class-map SDM_WEBVPN
    match access-group 102
    class-map type inspect match-all ccp-cls-ccp-permit-icmpreply-1
    match class-map bootps
    match access-group name boops-DHCP
    class-map type inspect match-all ccp-insp-traffic
    match class-map ccp-cls-insp-traffic
    class-map type inspect match-all ccp-cls-ccp-permit-1
    match class-map bootpc_bootps
    match access-group name DHCP-Request
    class-map type inspect match-any SDM_CA_SERVER
    match class-map SDM_HTTPS
    match class-map SDM_HTTP
    class-map type inspect match-all ccp-cls-ccp-pol-outToIn-1
    match class-map uremote-app
    match access-group name remote-app
    class-map type inspect match-all ccp-protocol-im
    match class-map ccp-cls-protocol-im
    class-map type inspect match-all ccp-icmp-access
    match class-map ccp-cls-icmp-access
    class-map type inspect match-all sdm-access
    match class-map sdm-cls-access
    match access-group 101
    policy-map type inspect pop3 ccp-action-pop3
    class type inspect pop3 ccp-app-pop3
      log
    policy-map type inspect im ccp-action-app-im
    class type inspect aol ccp-app-aol
      log
      allow
    class type inspect msnmsgr ccp-app-msn
      log
      allow
    class type inspect ymsgr ccp-app-yahoo
      log
      allow
    class type inspect aol ccp-app-aol-otherservices
      log
    class type inspect msnmsgr ccp-app-msn-otherservices
      log
    class type inspect ymsgr ccp-app-yahoo-otherservices
      log
    policy-map type inspect ccp-pol-outToIn
    class type inspect CCP_PPTP
      pass
    class type inspect ccp-cls-ccp-pol-outToIn-1
      pass log
    class class-default
      drop log
    policy-map type inspect imap ccp-action-imap
    class type inspect imap ccp-app-imap
      log
    policy-map AutoQoS-Policy-Fa4
    class AutoQoS-Voice-Fa4
      priority percent 1
      set dscp ef
    class AutoQoS-Scavenger-Fa4
      bandwidth remaining percent 1
      set dscp cs1
    class class-default
      fair-queue
    policy-map AutoQoS-Policy-UnTrust
    class AutoQoS-VoIP-RTP-UnTrust
      priority percent 70
      set dscp ef
    class AutoQoS-VoIP-Control-UnTrust
      bandwidth percent 5
      set dscp af31
    class AutoQoS-VoIP-Remark
      set dscp default
    class class-default
      fair-queue
    policy-map type inspect http ccp-action-app-http
    class type inspect http ccp-http-blockparam
      log
    class type inspect http ccp-app-httpmethods
      log
    class type inspect http ccp-http-allowparam
      log
      allow
    policy-map type inspect ccp-inspect
    class type inspect ccp-invalid-src
      drop log
    class type inspect ccp-protocol-http
      inspect
      service-policy http ccp-action-app-http
    class type inspect ccp-protocol-imap
      inspect
      service-policy imap ccp-action-imap
    class type inspect ccp-protocol-pop3
      inspect
      service-policy pop3 ccp-action-pop3
    class type inspect ccp-protocol-im
      inspect
      service-policy im ccp-action-app-im
    class type inspect ccp-insp-traffic
      inspect
    class type inspect ccp-sip-inspect
      inspect
    class type inspect ccp-h323-inspect
      inspect
    class type inspect ccp-h323annexe-inspect
      inspect
    class type inspect ccp-h225ras-inspect
      inspect
    class type inspect ccp-h323nxg-inspect
      inspect
    class type inspect ccp-skinny-inspect
      inspect
    class class-default
      drop
    policy-map type inspect ccp-sslvpn-pol
    class type inspect CCP_SSLVPN
      pass
    class class-default
      drop
    policy-map type inspect ccp-permit
    class type inspect SDM_CA_SERVER
      inspect
    class type inspect ccp-cls-ccp-permit-1
      pass log
    class type inspect SDM_WEBVPN_TRAFFIC
      inspect
    class type inspect sdm-access
      inspect
    class type inspect SDM_RIP_PT
      pass
    class class-default
      drop
    policy-map type inspect ccp-permit-icmpreply
    class type inspect ccp-cls-ccp-permit-icmpreply-1
      pass log
    class type inspect ccp-icmp-access
      inspect
    class class-default
      pass
    zone security out-zone
    zone security in-zone
    zone security sslvpn-zone
    zone-pair security ccp-zp-self-out source self destination out-zone
    service-policy type inspect ccp-permit-icmpreply
    zone-pair security ccp-zp-out-zone-To-in-zone source out-zone destination in-zone
    service-policy type inspect ccp-pol-outToIn
    zone-pair security ccp-zp-in-out source in-zone destination out-zone
    service-policy type inspect ccp-inspect
    zone-pair security ccp-zp-out-self source out-zone destination self
    service-policy type inspect ccp-permit
    zone-pair security zp-out-zone-sslvpn-zone source out-zone destination sslvpn-zone
    service-policy type inspect ccp-sslvpn-pol
    zone-pair security zp-sslvpn-zone-out-zone source sslvpn-zone destination out-zone
    service-policy type inspect ccp-sslvpn-pol
    zone-pair security zp-in-zone-sslvpn-zone source in-zone destination sslvpn-zone
    service-policy type inspect ccp-sslvpn-pol
    zone-pair security zp-sslvpn-zone-in-zone source sslvpn-zone destination in-zone
    service-policy type inspect ccp-sslvpn-pol
    csdb tcp synwait-time 30
    csdb tcp idle-time 3600
    csdb tcp finwait-time 5
    csdb tcp reassembly max-memory 1024
    csdb tcp reassembly max-queue-length 16
    csdb udp idle-time 30
    csdb icmp idle-time 10
    csdb session max-session 65535
    interface Null0
    no ip unreachables
    interface FastEthernet0
    description LAN
    switchport mode trunk
    no ip address
    interface FastEthernet1
    description Not in Use
    no ip address
    interface FastEthernet2
    description Trunk to 861W-SSHS-R1
    switchport mode trunk
    no ip address
    auto discovery qos
    interface FastEthernet3
    description VoIP
    switchport access vlan 30
    no ip address
    service-policy output AutoQoS-Policy-UnTrust
    interface FastEthernet4
    description WAN$ETH-WAN$$FW_OUTSIDE$
    ip ddns update hostname xxx.xxxx.org
    ip address dhcp client-id FastEthernet4
    no ip redirects
    no ip proxy-arp
    ip flow ingress
    ip nat outside
    ip virtual-reassembly in
    zone-member security out-zone
    duplex auto
    speed auto
    auto qos
    service-policy output AutoQoS-Policy-Fa4
    interface Virtual-Template1
    ip unnumbered Vlan1
    no ip redirects
    no ip proxy-arp
    ip flow ingress
    zone-member security sslvpn-zone
    interface wlan-ap0
    description Service module interface to manage the embedded AP
    ip unnumbered Vlan1
    no ip redirects
    no ip proxy-arp
    ip flow ingress
    arp timeout 0
    interface Wlan-GigabitEthernet0
    description Internal switch interface connecting to the embedded AP
    switchport mode trunk
    no ip address
    interface Vlan1
    description SSHS Default LAN$FW_INSIDE$
    ip address 192.168.10.1 255.255.255.0
    no ip redirects
    no ip proxy-arp
    ip flow ingress
    ip nat inside
    ip virtual-reassembly in
    zone-member security in-zone
    interface Vlan20
    description $FW_INSIDE$
    ip address 192.168.20.1 255.255.255.0
    no ip redirects
    no ip proxy-arp
    ip flow ingress
    zone-member security in-zone
    interface Vlan30
    description $FW_INSIDE$
    ip address 192.168.30.1 255.255.255.0
    no ip redirects
    no ip proxy-arp
    ip flow ingress
    ip nat inside
    ip virtual-reassembly in
    zone-member security in-zone
    interface Dialer0
    description PPPoA Dialer for Int ATM0$FW_INSIDE$
    ip address negotiated
    ip access-group aclInternetInbound in
    no ip redirects
    no ip unreachables
    no ip proxy-arp
    ip mtu 1492
    ip flow ingress
    ip nat outside
    ip virtual-reassembly in
    zone-member security in-zone
    encapsulation ppp
    dialer pool 1
    ppp authentication chap callin
    ppp chap hostname SSHS-CHAP
    ppp chap password 7 045F1E100E2F584B
    ppp ipcp dns request accept
    ppp ipcp route default
    ppp ipcp address accept
    router rip
    network 192.168.10.0
    network 192.168.20.0
    network 192.168.30.0
    ip local pool sslvpn-pool 192.168.10.190 192.168.10.199
    ip forward-protocol nd
    ip http server
    ip http authentication local
    ip http secure-server
    ip dns server
    ip nat inside source list 1 interface FastEthernet4 overload
    ip nat inside source list 199 interface FastEthernet4 overload
    ip route 0.0.0.0 0.0.0.0 FastEthernet4 dhcp
    ip access-list extended AutoQoS-VoIP-Control
    permit tcp any any eq 1720
    permit tcp any any range 11000 11999
    permit udp any any eq 2427
    permit tcp any any eq 2428
    permit tcp any any range 2000 2002
    permit udp any any eq 1719
    permit udp any any eq 5060
    ip access-list extended AutoQoS-VoIP-RTCP
    permit udp any any range 16384 32767
    ip access-list extended DHCP-Request
    remark CCP_ACL Category=128
    permit ip any any
    ip access-list extended SDM_GRE
    remark CCP_ACL Category=1
    permit gre any any log
    ip access-list extended SDM_HTTP
    remark CCP_ACL Category=1
    permit tcp any any eq www log
    ip access-list extended SDM_HTTPS
    remark CCP_ACL Category=1
    permit tcp any any eq 443 log
    ip access-list extended SDM_SHELL
    remark CCP_ACL Category=1
    permit tcp any any eq cmd
    ip access-list extended SDM_SSH
    remark CCP_ACL Category=1
    permit tcp any any eq 22 log
    ip access-list extended SDM_WEBVPN
    remark CCP_ACL Category=1
    permit tcp any any eq 443 log
    ip access-list extended remote-app
    remark CCP_ACL Category=128
    permit ip any host 192.168.10.50
    ip access-list extended boops-DHCP
    remark CCP_ACL Category=128
    permit ip any any
    logging host 192.168.10.50
    access-list 1 permit 0.0.0.0 255.255.255.0
    access-list 2 remark CCP_ACL Category=1
    access-list 2 permit 192.168.10.50
    access-list 100 remark CCP_ACL Category=128
    access-list 100 permit ip host 255.255.255.255 any
    access-list 100 permit ip 127.0.0.0 0.255.255.255 any
    access-list 100 permit ip 192.168.1.0 0.0.0.255 any
    access-list 101 remark CCP_ACL Category=128
    access-list 101 permit ip 192.168.1.0 0.0.0.255 any
    access-list 199 permit ip any any
    control-plane
    rmon event 33333 log trap AutoQoS description "AutoQoS SNMP traps for Voice Drops" owner AutoQoS
    banner login ^C No Unauthorize access, all unauthorize users will be terminated at WILL! Enter user name and password to continue
    ^C
    banner motd ^C This router is designated as the primary router in the SSHS LAN ^C
    line con 0
    password 7 06021A374D401D1C54
    logging synchronous
    no modem enable
    transport output telnet
    line aux 0
    password 7 06021A374D401D1C54
    transport output telnet
    line 2
    no activation-character
    no exec
    transport preferred none
    transport input all
    line vty 0 4
    privilege level 15
    password 7 130102040A02102F7A
    length 0
    transport input telnet ssh
    transport output telnet ssh
    scheduler interval 500
    ntp master
    ntp update-calendar
    ntp server nist1-ny.ustiming.org prefer
    webvpn gateway sshs-WebVPN-Gateway
    ip interface FastEthernet4 port 443
    ssl encryption rc4-md5
    ssl trustpoint sshs-trustpoint
    inservice
    webvpn context sshs-WebVPN
    secondary-color white
    title-color #669999
    text-color black
    acl "ssl-acl"
       permit ip 192.168.0.0 255.255.255.0 192.168.0.0 255.255.255.0
    aaa authentication list sslvpn
    gateway sshs-WebVPN-Gateway
    max-users 4
    ssl authenticate verify all
    url-list "rewrite"
    inservice
    policy group sshs-webvpnpolicy
       functions svc-enabled
       filter tunnel ssl-acl
       svc address-pool "webvpnpool" netmask 255.255.255.0
       svc rekey method new-tunnel
       svc split include 192.168.0.0 255.255.255.0
    default-group-policy sshs-webvpnpolicy
    end

  • NTP synch issues

    Hello all
    Having an issue with NTP at my new location. Bit of background:
    Access A  Access B    Distro       Core
    |          |    |          |    |          |   |          |
    |          |----|          |----|          |---|          |
    |______|    |_____|    |______|   |______|       
    So, there is an NTP server hanging off the core. No firewall exists between the NTP server and the core (it's within the LAN)
    All devices above had the same NTP statements.
    All devices can ping the NTP server
    Access B, Distro, and Core show that NTP is working. They have associations, the clocks are synched, etc.
    Access A is NOT synched.
    I've gone line by line thru the NTP configs; they are identical on all switches (IP addresses changed):
    ntp logging
    ntp authentication-key 1 md5 happyday
    ntp authenticate
    ntp trusted-key 1
    ntp clock-period 36029132 (these vary with device)
    ntp source Vlan150
    ntp access-group peer 30
    ntp access-group serve-only 31
    ntp server 10.1.0.1 key 1
    ntp server 10.1.15.1
    ntp server 10.2.50.100 key 1 prefer
    I turned on all debuging for NTP. I can see that accessA is sending packets to the three time devices. I can see that the devices are sending NTP packets with the correct times and timezone back to AccessA. But AccessA is NOT associating:
    AccessA#sho ntp ass
          address         ref clock     st  when  poll reach  delay  offset    disp
    ~10.1.0.1         0.0.0.0          16     -    64    0     0.0    0.00  16000.
    ~10.1.15.1        0.0.0.0          16     -    64    0     0.0    0.00  16000.
    ~10.2.50.100      0.0.0.0          16     -    64    0     0.0    0.00  16000.
    * master (synced), # master (unsynced), + selected, - candidate, ~ configured
    I've tried to completely remove the NTP configs from the switch, and put them back in. No change.
    I've tried to change the PREFER statement from 10.2.50.100 to 10.1.0.1...and back again..no change.
    Like I said, all the other switches are having no issues. I even removed the accesslist for the management vlan just to ensure it was not blocking anything, and no change. Here is a sample of the debug output (ip's changed) Also note the *** in the xmit packets...
    121708: .May 26 23:00:59.597 KBL: NTP: xmit packet to 10.1.0.1:
    121709: .May 26 23:00:59.597 KBL:  leap 3, mode 3, version 3, stratum 0, ppoll 64
    121710: .May 26 23:00:59.597 KBL:  rtdel 0000 (0.000), rtdsp 10001 (1000.015), refid 00000000 (0.0.0.0)
    121711: .May 26 23:00:59.597 KBL:  ref 00000000.00000000 (04:30:00.000 KBL Mon Jan 1 1900)***
    121712: .May 26 23:00:59.597 KBL:  org 00000000.00000000 (04:30:00.000 KBL Mon Jan 1 1900)***
    121713: .May 26 23:00:59.597 KBL:  rec 00000000.00000000 (04:30:00.000 KBL Mon Jan 1 1900)***
    121714: .May 26 23:00:59.597 KBL:  xmt D54CD363.99185907 (23:00:59.598 KBL Sun May 26 2013)
    121715: .May 26 23:00:59.597 KBL:  Authentication key 1
    121716: .May 26 23:00:59.597 KBL: NTP: xmit packet to 10.2.50.100:
    121717: .May 26 23:00:59.597 KBL:  leap 3, mode 3, version 3, stratum 0, ppoll 64
    121718: .May 26 23:00:59.597 KBL:  rtdel 0000 (0.000), rtdsp 10001 (1000.015), refid 00000000 (0.0.0.0)
    121719: .May 26 23:00:59.597 KBL:  ref 00000000.00000000 (04:30:00.000 KBL Mon Jan 1 1900)***
    121720: .May 26 23:00:59.597 KBL:  org 00000000.00000000 (04:30:00.000 KBL Mon Jan 1 1900)***
    121721: .May 26 23:00:59.597 KBL:  rec 00000000.00000000 (04:30:00.000 KBL Mon Jan 1 1900)***
    121722: .May 26 23:00:59.597 KBL:  xmt D54CD363.9976DD46 (23:00:59.599 KBL Sun May 26 2013)
    121723: .May 26 23:00:59.597 KBL:  Authentication key 1
    121724: .May 26 23:00:59.597 KBL: NTP: rcv packet from 10.1.0.1 to 10.1.15.17 on VlanXXX:
    121725: .May 26 23:00:59.597 KBL:  leap 0, mode 4, version 3, stratum 2, ppoll 64
    121726: .May 26 23:00:59.597 KBL:  rtdel 0050 (1.221), rtdsp 02A6 (10.345), refid D62D81AE (10.2.50.100)
    121727: .May 26 23:00:59.597 KBL:  ref D54CD087.C41E4772 (22:48:47.766 KBL Sun May 26 2013)
    121728: .May 26 23:00:59.597 KBL:  org D54CD363.99185907 (23:00:59.598 KBL Sun May 26 2013)
    121729: .May 26 23:00:59.597 KBL:  rec D54CD384.9A245D48 (23:01:32.602 KBL Sun May 26 2013)
    121730: .May 26 23:00:59.597 KBL:  xmt D54CD384.9A2EF734 (23:01:32.602 KBL Sun May 26 2013)
    121731: .May 26 23:00:59.597 KBL:  inp D54CD363.99F9E10C (23:00:59.601 KBL Sun May 26 2013)
    121732: .May 26 23:00:59.597 KBL: NTP: rcv packet from 10.2.50.100 to 10.1.15.17 on Vlanxxx:
    121733: .May 26 23:00:59.597 KBL:  leap 0, mode 4, version 3, stratum 1, ppoll 64
    121734: .May 26 23:00:59.597 KBL:  rtdel 0000 (0.000), rtdsp 0012 (0.275), refid 464C5900 (70.76.89.0)
    121735: .May 26 23:00:59.597 KBL:  ref D54CD382.48C4F81B (23:01:30.284 KBL Sun May 26 2013)
    121736: .May 26 23:00:59.597 KBL:  org D54CD363.9976DD46 (23:00:59.599 KBL Sun May 26 2013)
    121737: .May 26 23:00:59.597 KBL:  rec D54CD384.9A828552 (23:01:32.603 KBL Sun May 26 2013)
    N-LNK-DASCB-ASW-3750#
    121738: .May 26 23:00:59.597 KBL:  xmt D54CD384.9A887AEC (23:01:32.603 KBL Sun May 26 2013)
    121739: .May 26 23:00:59.597 KBL:  inp D54CD363.9A68E2E3 (23:00:59.603 KBL Sun May 26 2013)
    As you can see, AccessA is sending packets to the timeserver devices. I MANUALLY set the date/time on AccessA. It is correct with the rest of the network. But you can see AccessA in the statements with the *** at the end is sending incorrect date/time info out. BUT, the time servers are sending back the correct date/time timezone info. And there are NO authentication errors.
    Several of us are at a quandry on what's up. Any thoughts?

    Duplicate posts. 

  • Unable to ping from mz to virtual interface of asa

    Dear All,
    one of my SNMP server 10.242.103.42 sits in MZ zone,and ACE 4710 is connected to core switch,coreswitch is connected to firewall asa.
    Now iam trying to ping from MZ zone SNMP server to loadbalancer ip 10.242.105.1,iam unable to ping my LB interface to discover SLB on my SNMP server.
    plese help me
    srinivas

    Is your device seeing the mac-address of the ASA in order to send the packets? What do the logs show on the firewall itself? Can you see the ARP entry on the ASA firewall for that host?
    Mike

  • How to tracert to outside in ASA 5505/5520?

    Hi,everybody
    The tracert issue have troubled me for a long time. I don't know how to deal with it. Pls give me some advice. Thanks!
    Following is the details.
    The network have two firewall(ASA 5505,ASA 5520) placed in different cities. And all person inside can reach the internet.
    The problem is that we can ping internet IP from inside but can not tracert outside IP. It always reply us "request time out".
    Why?
    Somebody know that?

    Hello,
    I know this has been a long time ago, but I'm facing the same issue in the ASA. Weirdly enough, I can reach the destination using traceroute with no problem, but I can't see the path to it. I pasted the result below.
    I also checked my ASA configuration and the only setting that is not present is the "match any " for the "class-map class_default", because when I enter "class-map class_default" I get the following warning:
    ASA(config)# class-map class-default
    ERROR: % class-default is a well-known class and is not configurable under class-map
    Can you guys help me? I posted below the tracert output and the concerned configuration. I can't find the misfit and I already checked most of the configuration forums.
    C:\>tracert www.google.com
    Tracing route to www.google.com [173.194.79.104]
    over a maximum of 30 hops:
      1    <1 ms    <1 ms    <1 ms  10.0.0.1
      2     *        *        *     Request timed out.
      3     *        *        *     Request timed out.
      4     *        *        *     Request timed out.
      5     *        *        *     Request timed out.
      6     *        *        *     Request timed out.
      7     *        *        *     Request timed out.
      8     *        *        *     Request timed out.
      9     *        *        *     Request timed out.
     10     *        *        *     Request timed out.
     11     *        *        *     Request timed out.
     12     *        *        *     Request timed out.
     13     *        *        *     Request timed out.
     14     *        *        *     Request timed out.
     15     *        *        *     Request timed out.
     16     *        *        *     Request timed out.
     17     *        *        *     Request timed out.
     18     *        *        *     Request timed out.
     19     *        *        *     Request timed out.
     20     *        *        *     Request timed out.
     21     *        *        *     Request timed out.
     22     *        *        *     Request timed out.
     23   212 ms   212 ms   212 ms  pb-in-f104.1e100.net [173.194.79.104]
    Trace complete.
    ---Router configuration
    icmp unreachable rate-limit 10 burst-size 5
    object-group service ICMP_Return
     service-object icmp echo-reply
     service-object icmp time-exceeded
     service-object icmp traceroute
     service-object icmp unreachable
     service-object icmp6 echo-reply
     service-object icmp6 time-exceeded
     service-object icmp6 unreachable
    access-list IF_outside_access_in remark ICMP Return
    access-list IF_outside_access_in extended permit object-group ICMP_Return any any
    access-group IF_outside_access_in in interface IF_outside
    class-map class_default
    !--- This does not exit -> match any 
    class-map inspection_default
     match default-inspection-traffic
    policy-map global_policy
     class class-default
      set connection decrement-ttl
    service-policy global_policy global

  • No boot info on ASA 5505

    Hi all,
    I received a firewall ASA 5505 and I have a problem with it. It always boot on rommon. When I do show boot I get those informations:
    ciscoasa# show boot
    BOOT variable =
    Current BOOT variable =
    CONFIG_FILE variable =
    Current CONFIG_FILE variable =
    I'm really confused on why it doesn't have any values registered for the boot.
    Thanks,
    Francis

    Hi Francis,
    Usually the firewall boots with the  the first application image that it finds in internal flash memory.
    Try the following:
    >Set the boot variable as:
    hostname(config)# boot system url
    url being:
    {flash:/ | disk0:/ | disk1:/}[path/]filename
    >Save the configuration:
    hostname(config)# wr mem
    >Now confirm that the boot image has been set:
    show bootvar
    Once done, reload the ASA and check if it is still going to the rommon mode.
    Regards,
    Shrinkhala

  • Nat/pat asa 5505 asdm ver 8.4

    hi all,
    i have a problem with portfoarwarding on asa 5505.
    i have this situation:
    internet ---> pubblic ip address-> router albacom -- 10.0.0.15 ---> -nat farward port 80--10.0.0.1 -outside -firewall asa -inside - 192.168.0.1------------server web 192.168.0.99
    the server is not in dmz but it's on the lan network
    my user must connect from internet, with any browser http://albacom_pubblic_address and router albacom and then asa firewall must nat  and farward the port 80 on server web 192.168.0.99
    any idea or tutorial
    ths, best regards

    Hi Luca,
    On the ASA, you would need the following:
    object network server_ip
      host 192.168.0.99
    object service tcp_80
    service tcp destination eq 80
    nat (outside,inside) source static any any destination static interface server_ip service tcp_80 tcp_80
    That would port forward all the request coming on port 80 on the outside interface of the firewall, to your internal server on port 80.
    Hope that helps
    Thanks,
    Varun

  • ASA 5505 boot problem

    Hello,
    I have a problem with a firewall ASA 5505. I erased the flash via command line.
    Then there's what I did:
    Rebooting ....
    CISCO SYSTEMS
    Embedded BIOS Version 1.0 (12) 13 08/28/08 15:50:37.45
    Low Memory: 632 KB
    High Memory: 251 MB
    PCI Device Table.
    Bus Dev Func VendID DevID Class Irq
      00 01 00 1022 2080 Host Bridge
      00 01 02 1022 2082 Chipset En / Decrypt 11
      00 0C 00 1148 4320 Ethernet 11
      00 0D 00 177D 0003 Network En / Decrypt 10
      00 0F 00 1022 2090 ISA Bridge
      00 0F 02 1022 2092 IDE Controller
      00 0F 03 1022 2093 Audio 10
      00 0F 04 1022 2094 Serial Bus 9
      00 0F 05 1022 2095 Serial Bus 9
    Evaluating BIOS Options ...
    Launch BIOS Extension to setup ROMMON
    Cisco Systems ROMMON Version (1.0 (12) 13) # 0: Thu Aug 28 15:55:27 PDT 2008
    Platform ASA5505
    Use BREAK or ESC to interrupt boot.
    Use SPACE to begin boot immediately.
    Boot interrupted.
    Ethernet0 / 0
    MAC Address: 0024.c49e.7efb
    Link is UP
    Use? for help.
    rommon # 1> set
    ROMMON Variable Settings:
       ADDRESS = 192.168.1.1
       SERVER = 192.168.1.2
       GATEWAY = 0.0.0.0
       PORT = Ethernet0 / 0
       = Untagged VLAN
       IMAGE = asa902-k8.bin
       CONFIG =
       LINKTIMEOUT = 20
       PKTTIMEOUT = 4
       RETRY = 20
    rommon #5> tftpdnld
    ROMMON Variable Settings:
      ADDRESS=192.168.1.1
      SERVER=192.168.1.2
      GATEWAY=0.0.0.0
      PORT=Ethernet0/0
      VLAN=untagged
      IMAGE=asa902-k8.bin
      CONFIG=
      LINKTIMEOUT=20
      PKTTIMEOUT=4
      RETRY=20
    tftp [email protected]
    Received 27611136 bytes
    Launching TFTP Image...
    Cisco Security Appliance admin loader (3.0) #0: Thu Feb 21 13:10:34 PST 2013
    sumval(0x7a4 ) chksum(0x0   )md5(0x41130662 0xeacd779e 0x367c620f 0xa940e651)
    md5(0x1dc0f999 0x599b1643 0x10101012 0xd50a8b8d)
    Checksum verification on install image failed.
    CISCO SYSTEMS
    Embedded BIOS Version 1.0(12)13 08/28/08 15:50:37.45
    Low Memory: 632 KB
    High Memory: 251 MB
    PCI Device Table.
    Bus Dev Func VendID DevID Class              Irq
    00  01  00   1022   2080  Host Bridge
    00  01  02   1022   2082  Chipset En/Decrypt 11
    00  0C  00   1148   4320  Ethernet           11
    00  0D  00   177D   0003  Network En/Decrypt 10
    00  0F  00   1022   2090  ISA Bridge
    00  0F  02   1022   2092  IDE Controller
    00  0F  03   1022   2093  Audio              10
    00  0F  04   1022   2094  Serial Bus         9
    00  0F  05   1022   2095  Serial Bus         9
    Evaluating BIOS Options ...
    Launch BIOS Extension to setup ROMMON
    Cisco Systems ROMMON Version (1.0(12)13) #0: Thu Aug 28 15:55:27 PDT 2008
    Platform ASA5505
    Use BREAK or ESC to interrupt boot.
    Use SPACE to begin boot immediately.
    Launching BootLoader...
    Default configuration file contains 1 entry.
    Searching / for images to boot.
    No images in /
    Error 15: File not found
    unable to boot an image
    Default configuration file contains 1 entry.
    Searching / for images to boot.
    No images in /
    Error 15: File not found
    unable to boot an image
    Failsafe booting engaged.
    Default configuration file contains 1 entry.
    Searching / for images to boot.
    No images in /
    Error 15: File not found
    unable to boot an image
    CISCO SYSTEMS
    Embedded BIOS Version 1.0(12)13 08/28/08 15:50:37.45
    Low Memory: 632 KB
    High Memory: 251 MB
    PCI Device Table.
    Bus Dev Func VendID DevID Class              Irq
    00  01  00   1022   2080  Host Bridge
    00  01  02   1022   2082  Chipset En/Decrypt 11
    00  0C  00   1148   4320  Ethernet           11
    00  0D  00   177D   0003  Network En/Decrypt 10
    00  0F  00   1022   2090  ISA Bridge
    00  0F  02   1022   2092  IDE Controller
    00  0F  03   1022   2093  Audio              10
    00  0F  04   1022   2094  Serial Bus         9
    00  0F  05   1022   2095  Serial Bus         9
    Evaluating BIOS Options ...
    Launch BIOS Extension to setup ROMMON
    Cisco Systems ROMMON Version (1.0(12)13) #0: Thu Aug 28 15:55:27 PDT 2008
    Platform ASA5505
    Use BREAK or ESC to interrupt boot.
    Use SPACE to begin boot immediately.
    Boot interrupted.
    Ethernet0/0
    MAC Address: 0024.c49e.7efb
    Link is UP
    Use ? for help.
    rommon #0>
    How can I do to recover the device?
    Keeps rebooting endlessly!
    Thank you.
    Andrea

    When the checksum fails, either the IOS image you are trying to load is corrupted (or incomplete) or the tftp download corrupted the image.
    I would start by using an older, smaller image. Such as 8.2(5). Tftp that image to get the ASA booted, then upgrade to 9.0(2).

Maybe you are looking for