<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CISCO ASA 5520, ASA version7, No internet to host in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4278314#M1077606</link>
    <description>&lt;P&gt;Hello ROB,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It was a bad configuration on cisco WLC, problem solved now&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;for help, I appreciate it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 24 Jan 2021 09:16:53 GMT</pubDate>
    <dc:creator>Rahul Kapadia</dc:creator>
    <dc:date>2021-01-24T09:16:53Z</dc:date>
    <item>
      <title>CISCO ASA 5520, ASA version7, No internet to host</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4276455#M1077524</link>
      <description>&lt;P&gt;I have an issue that my connected clients behind the firewall are not getting Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif Inside&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.20&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif VLAN20&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.100&lt;BR /&gt;vlan 100&lt;BR /&gt;nameif VLAN100&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.100.50 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns name-server 8.8.8.8&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network WAN&lt;BR /&gt;network-object host 192.168.100.1&lt;BR /&gt;object-group network LAN&lt;BR /&gt;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;object-group service SERVICES tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;object-group network inside-server&lt;BR /&gt;object-group network INSIDE_VLAN100&lt;BR /&gt;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list VLAN100_IN extended permit tcp any any eq www&lt;BR /&gt;access-list VLAN100_IN extended permit tcp any any eq https&lt;BR /&gt;access-list VLAN100_IN extended permit udp any any eq www&lt;BR /&gt;access-list VLAN20_IN extended permit tcp any any eq www&lt;BR /&gt;access-list VLAN20_IN extended permit tcp any any eq https&lt;BR /&gt;access-list OUT_IN extended permit tcp any any eq www&lt;BR /&gt;access-list OUT_IN extended permit tcp any any eq https&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 10000&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging history debugging&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging facility 23&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu VLAN100 1500&lt;BR /&gt;mtu VLAN20 1500&lt;BR /&gt;no failover&lt;BR /&gt;asdm image disk0:/asdm-508.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 100 interface&lt;BR /&gt;nat (VLAN100) 100 192.168.1.0 255.255.255.0&lt;BR /&gt;nat (VLAN20) 100 192.168.20.0 255.255.255.0&lt;BR /&gt;access-group OUT_IN in interface outside&lt;BR /&gt;access-group VLAN100_IN in interface VLAN100&lt;BR /&gt;access-group VLAN20_IN in interface VLAN20&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.100.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;BR /&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;username Admin password YBPmIylkw2GMywL/ encrypted&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 Inside&lt;BR /&gt;http 192.168.100.0 255.255.255.0 outside&lt;BR /&gt;http 192.168.100.50 255.255.255.255 outside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 VLAN100&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 Inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 Inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.10-192.168.1.250 VLAN100&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;BR /&gt;dhcpd lease 3600&lt;BR /&gt;dhcpd ping_timeout 50&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;dhcpd enable VLAN100&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect NetBIOS&lt;BR /&gt;inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 05:23:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4276455#M1077524</guid>
      <dc:creator>Rahul Kapadia</dc:creator>
      <dc:date>2021-01-21T05:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5520, ASA version7, No internet to host</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4276512#M1077528</link>
      <description>&lt;P&gt;This access-list, as applied to your outside interface with the access-group command is unnecessary and incorrect:&lt;/P&gt;
&lt;PRE&gt;access-list OUT_IN extended permit tcp any any eq www
access-list OUT_IN extended permit tcp any any eq https&lt;/PRE&gt;
&lt;P&gt;The return traffic from sessions initiated by hosts on VLANs 20 and 100 will be permitted because it is part of an allowed connection.&lt;/P&gt;
&lt;P&gt;By putting in that incorrect ACL, you are adding an implicit deny at the end, thus blocking traffic. Also, it is an incorrectly formed ACL - the destination port for return traffic that's part of http and https sessions will be ephemeral ports on the initiating hosts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 07:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4276512#M1077528</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-01-21T07:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5520, ASA version7, No internet to host</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4276720#M1077538</link>
      <description>&lt;P&gt;Hello Mr,Marvin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've removed access-group OUT_IN and got internet access on my LAN but websites are not opening.&lt;/P&gt;&lt;P&gt;I've checked logs on ASA and found following logs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jan 21 2021 15:56:30: %ASA-4-106023: Deny udp src VLAN100:192.168.1.50/58346 dst outside:8.8.4.4/53 by access-group "VLAN100_IN"&lt;BR /&gt;Jan 21 2021 15:56:30: %ASA-4-106023: Deny udp src VLAN100:192.168.1.50/64495 dst outside:8.8.4.4/53 by access-group "VLAN100_IN"&lt;BR /&gt;Jan 21 2021 15:56:30: %ASA-4-106023: Deny udp src VLAN100:192.168.1.50/49393 dst outside:8.8.8.8/53 by access-group "VLAN100_IN"&lt;BR /&gt;Jan 21 2021 15:56:30: %ASA-4-106023: Deny udp src VLAN100:192.168.1.50/49393 dst outside:8.8.4.4/53 by access-group "VLAN100_IN"&lt;BR /&gt;Jan 21 2021 15:56:30: %ASA-4-106023: Deny udp src VLAN100:192.168.1.50/49559 dst outside:8.8.4.4/53 by access-group "VLAN100_IN"&lt;BR /&gt;Jan 21 2021 15:56:31: %ASA-4-106023: Deny udp src VLAN100:192.168.1.50/64495 dst outside:8.8.4.4/53 by access-group "VLAN100_IN"&lt;BR /&gt;Jan 21 2021 15:56:31: %ASA-4-106023: Deny udp src VLAN100:192.168.1.50/63410 dst outside:8.8.8.8/53 by access-group "VLAN100_IN"&lt;BR /&gt;Jan 21 2021 15:56:31: %ASA-4-106023: Deny udp src VLAN100:192.168.1.50/63410 dst outside:8.8.4.4/53 by access-group "VLAN100_IN"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will you please guide with this logs?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 12:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4276720#M1077538</guid>
      <dc:creator>Rahul Kapadia</dc:creator>
      <dc:date>2021-01-21T12:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5520, ASA version7, No internet to host</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4276725#M1077539</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1154322"&gt;@Rahul Kapadia&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's DNS that is being dropped, you need to modify your ACL VLAN100_IN to permit DNS. E.g.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list VLAN100_IN extended permit udp any any eq 53&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 12:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4276725#M1077539</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-01-21T12:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5520, ASA version7, No internet to host</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4278293#M1077605</link>
      <description>&lt;P&gt;ROB,&lt;/P&gt;&lt;P&gt;Thank you its working now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My topology is--&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP modem---&amp;gt;ASA(outside)---&amp;gt;ASA(inside 'VLAN100,VLAN20')---&amp;gt;Cisco Switch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My LAN network getting internet access but wifi clients are not getting internet.&lt;/P&gt;&lt;P&gt;I'm using Cisco WLC and Cisco Access Points connected with Cisco switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While checking logs for WIFI clients I found bellow logs&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jan 24 2021 10:47:53: %ASA-7-710005: UDP request discarded from 192.168.2.3/29908 to VLAN20:192.168.2.1/53&lt;BR /&gt;Jan 24 2021 10:47:53: %ASA-7-710005: UDP request discarded from 192.168.2.3/9567 to VLAN20:192.168.2.1/53&lt;BR /&gt;Jan 24 2021 10:47:53: %ASA-7-710005: UDP request discarded from 192.168.2.3/19870 to VLAN20:192.168.2.1/53&lt;BR /&gt;Jan 24 2021 10:47:53: %ASA-7-710005: UDP request discarded from 192.168.2.3/14337 to VLAN20:192.168.2.1/53&lt;BR /&gt;Jan 24 2021 10:47:53: %ASA-7-710005: UDP request discarded from 192.168.2.3/14472 to VLAN20:192.168.2.1/53&lt;BR /&gt;Jan 24 2021 10:47:53: %ASA-7-710005: UDP request discarded from 192.168.2.3/26685 to VLAN20:192.168.2.1/53&lt;BR /&gt;Jan 24 2021 10:47:53: %ASA-7-710005: UDP request discarded from 192.168.2.3/18035 to VLAN20:192.168.2.1/53&lt;BR /&gt;Jan 24 2021 10:47:53: %ASA-7-710005: UDP request discarded from 192.168.2.3/9165 to VLAN20:192.168.2.1/53&lt;BR /&gt;Jan 24 2021 10:47:53: %ASA-7-710005: UDP request discarded from 192.168.2.3/24719 to VLAN20:192.168.2.1/53&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;192.168.2.3 is WIFI client connected using mobile device, Do I need to permit particular range of ports according to logs?&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 07:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4278293#M1077605</guid>
      <dc:creator>Rahul Kapadia</dc:creator>
      <dc:date>2021-01-24T07:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5520, ASA version7, No internet to host</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4278314#M1077606</link>
      <description>&lt;P&gt;Hello ROB,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It was a bad configuration on cisco WLC, problem solved now&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;for help, I appreciate it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 09:16:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-asa-version7-no-internet-to-host/m-p/4278314#M1077606</guid>
      <dc:creator>Rahul Kapadia</dc:creator>
      <dc:date>2021-01-24T09:16:53Z</dc:date>
    </item>
  </channel>
</rss>

