<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Asa 5505 no internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3204626#M1065241</link>
    <description>show route command:&lt;BR /&gt;C    24.x.x.x 255.255.255.248 is directly connected, outside&lt;BR /&gt;C    192.168.1.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;S*   0.0.0.0 0.0.0.0 [1/0] via 24.x.x.x, outside ....this is my outside gw address&lt;BR /&gt;</description>
    <pubDate>Wed, 25 Oct 2017 02:09:38 GMT</pubDate>
    <dc:creator>nyer4life</dc:creator>
    <dc:date>2017-10-25T02:09:38Z</dc:date>
    <item>
      <title>Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3204624#M1065240</link>
      <description>&lt;P&gt;I been trying to setup a new Cisco ASA 5505 for the past week and can't get the internal network to get out to the internet. I'm sure it's something very simple that I'm missing. I have configured everything that I have gathered online. Here is my show run. Any help would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;config)# show run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5)&lt;BR /&gt;!&lt;BR /&gt;hostname asa&lt;BR /&gt;enable password y7jWi9Ir.Didp encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2OU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 24.x.x.x 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit icmp any interface outside&lt;BR /&gt;access-list outside_access_in extended permit ip any interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq www&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit icmp any any&lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 24.x.x.x 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.132 inside&lt;BR /&gt;dhcpd dns 167.206.x.x 167.206.x.x interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username cisco password Ot.D2KMyR7d encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:a976dfc6262074f441652bc6c4f1a388&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;][-]&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:34:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3204624#M1065240</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2020-02-21T14:34:06Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3204626#M1065241</link>
      <description>show route command:&lt;BR /&gt;C    24.x.x.x 255.255.255.248 is directly connected, outside&lt;BR /&gt;C    192.168.1.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;S*   0.0.0.0 0.0.0.0 [1/0] via 24.x.x.x, outside ....this is my outside gw address&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Oct 2017 02:09:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3204626#M1065241</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2017-10-25T02:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3204753#M1065242</link>
      <description>&lt;P&gt;First off, any&amp;nbsp; chance you could upgrade past the 8.2 version ? The 8.2 version is running the old NAT standard that Cisco used. Everything after 8.3 --&amp;gt; is diffrent.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would propose checking the NAT rules to make the traffic from inside to outside PAT (hide) behind the outside interface.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Oct 2017 08:26:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3204753#M1065242</guid>
      <dc:creator>Jon Are Endrerud</dc:creator>
      <dc:date>2017-10-25T08:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3204915#M1065243</link>
      <description>Ok I will work on the upgrade. I have the dynamic Nat rule in place to allow any inside hosts to Pat to the outside interface. (This was there once I completed the setup wizard thru asdm).&lt;BR /&gt;Shouldn't that take care of the Nat/Pat? Or should I be looking elsewhere?</description>
      <pubDate>Wed, 25 Oct 2017 13:20:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3204915#M1065243</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2017-10-25T13:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205047#M1065244</link>
      <description>&lt;P&gt;HAve you confirmed that&amp;nbsp; the ASA itself reach the Internet?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your access-lists are over-broad and might be giving you an issue. There's generally no need to do an inside-access-in like you have. I would remove that one completely. You can disable it to troubleshoot or just run:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;no access-group inside_access_in&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are your test clients getting an IP address from the ASA? Is their traffic hitting the ASA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can test your configuration logic with packet-tracer like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;packet-tracer input inside tcp 192.168.1.10 1024 8.8.8.8 80&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Oct 2017 15:37:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205047#M1065244</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-25T15:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205112#M1065245</link>
      <description>The ASA can't reach the internet. I can ping from ASA to the inside interface, ping the inside host, ping the outside interface. CANNOT ping the outside gateway or Cannot ping out to 4.2.2.2 or 8.8.8.8.&lt;BR /&gt;&lt;BR /&gt;I purposely created those access-list so everything is opened for me to troubleshoot.&lt;BR /&gt;&lt;BR /&gt;Inside hosts receives IP 192.168.1.x from ASA. I see traffic moving in the asdm logs. But not sure if it's being blocked or not.</description>
      <pubDate>Wed, 25 Oct 2017 17:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205112#M1065245</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2017-10-25T17:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205117#M1065246</link>
      <description>&lt;P&gt;For ping to work through an ASA you need to add “inspect icmp” to your list of inspections in the default class-map.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A better test is to do an nslookup (udp flow) or browse to a website (tcp connection)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However if the ASA itself cannot reach the internet or upstream gateway then you have other issues as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you try the packet-tracer command?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Oct 2017 17:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205117#M1065246</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-25T17:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205141#M1065248</link>
      <description>On the access-list I had allowed icmp echo-reply both inside and outside while doing the pings.&lt;BR /&gt;&lt;BR /&gt;Yes I did try the packet-tracer thru asdm...the result showed "The packet is allowed".</description>
      <pubDate>Wed, 25 Oct 2017 17:48:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205141#M1065248</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2017-10-25T17:48:42Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205350#M1065250</link>
      <description>I added inspect icmp” to the list of inspections in the default class-map. Still can't ping outside from the asa or my internal hosts. Here is the result of the packet-tracer command:&lt;BR /&gt;&lt;BR /&gt;packet-tracer input inside tcp 192.168.1.6 http 8.8.8.8 80&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in   0.0.0.0         0.0.0.0         outside&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;  match ip inside any outside any&lt;BR /&gt;    dynamic translation to pool 1 (asa-outside [Interface PAT])&lt;BR /&gt;    translate_hits = 326, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.1.6/80 to asa-outside/162 using netmask 255.255.255.255&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;  match ip inside any inside any&lt;BR /&gt;    dynamic translation to pool 1 (No matching global)&lt;BR /&gt;    translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 10707, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Oct 2017 23:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205350#M1065250</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2017-10-25T23:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205390#M1065253</link>
      <description>&lt;P&gt;The fact that your ASA itself cannot ping Internet hosts or even its upstream gateway tells us there is a problem on that leg of the connectivity. Until you resolve that there is no way any host on the inside of the ASA will reach the Internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you instead plug a PC directly into the connection that the ASA uses for the outside interface and test whether it can reach the Internet?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2017 01:56:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205390#M1065253</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-26T01:56:48Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205441#M1065254</link>
      <description>Asa is able to ping internal hosts and outside interface. Just not the outside gateway or 8.8.8.or 4.2.2.2..&lt;BR /&gt;&lt;BR /&gt;I connected my laptop directly to the modem(asa uses as outside interface). I can reach the internet without any issues.</description>
      <pubDate>Thu, 26 Oct 2017 04:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205441#M1065254</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2017-10-26T04:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205706#M1065256</link>
      <description>&lt;P&gt;When connected to the modem directly, does your PC get a DHCP address or are you replicating the static IP (and default gateway) that you have indicated in the ASA configuration above?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2017 13:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205706#M1065256</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-26T13:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205820#M1065257</link>
      <description>I type in the static IP, gateway, dns servers that was provided by isp. We have business internet with static ips.</description>
      <pubDate>Thu, 26 Oct 2017 15:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3205820#M1065257</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2017-10-26T15:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3206126#M1065258</link>
      <description>&lt;P&gt;Sorry but from everything you described it should work.&lt;/P&gt;
&lt;P&gt;You plug a PC configured with the same address and gateway as the ASA into the modem connection and it works.&lt;/P&gt;
&lt;P&gt;The ASA itself when plugged into that connection does not work - even when initiating traffic from the ASA.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2017 02:52:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3206126#M1065258</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-27T02:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3207682#M1065259</link>
      <description>I upgraded to the latest version of IOS 9.x as suggested. I still don't get any internet from my internal host.&lt;BR /&gt;&lt;BR /&gt;In addition, the link light on interface 0/0 is only lit yellow on the left side of the interface. Does this mean anything? I tried to force full duplex and 100MB thru asdm. Didn't help.</description>
      <pubDate>Mon, 30 Oct 2017 18:08:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3207682#M1065259</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2017-10-30T18:08:19Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3208435#M1065260</link>
      <description>Is there a packet tracer command I can use to check if incoming is being allowed? From outside to inside?</description>
      <pubDate>Tue, 31 Oct 2017 22:11:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3208435#M1065260</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2017-10-31T22:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3208562#M1065261</link>
      <description>&lt;P&gt;you could try adding the command "icmp permit any outside" and then try pinging from the ASA to the gateway address, and / or 8.8.8.8.&lt;/P&gt;
&lt;P&gt;If this works then we know that connection between ASA and internet is fine and we can focus our efforts elsewhere.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2017 08:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3208562#M1065261</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-11-01T08:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 no internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3212696#M1065262</link>
      <description>&lt;P&gt;After upgrading to a newer modem, still not able to get out to the internet. It turned out that interface 0/0 on the ASA was bad. I changed the outside interface to 1...boom internet right away. Thanks for everyone for the help and guidance!&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 20:24:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet/m-p/3212696#M1065262</guid>
      <dc:creator>nyer4life</dc:creator>
      <dc:date>2017-11-07T20:24:56Z</dc:date>
    </item>
  </channel>
</rss>

