<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LAN USERS UNABLE TO BROWSE INTERNET AFTER CISCO ROUTER WITH CISCO ASA FOR INTERNET ACCESS CONFIGURATION in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315723#M1079758</link>
    <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;The nat command was removed, but the LAN computer could not browse internet can only ping the IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ladilayo&lt;/P&gt;</description>
    <pubDate>Mon, 29 Mar 2021 21:08:33 GMT</pubDate>
    <dc:creator>ladilayo</dc:creator>
    <dc:date>2021-03-29T21:08:33Z</dc:date>
    <item>
      <title>LAN USERS UNABLE TO BROWSE INTERNET AFTER CISCO ROUTER WITH CISCO ASA FOR INTERNET ACCESS CONFIGURATION</title>
      <link>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315644#M1079752</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;After configuring both the router and firewall for LAN internet access the LAN computers was able to ping 8.8.8.8, 4.2.2.2 and 172.217.171.196 from their systems but was unable to load any page from the browser on the same system. I cannot ping the above IP from the firewall but can ping them from the router. Below are my router and firewall configuration, Also the packet tracer done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will appreciate if somebody can assist on what I have done wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Router Configurations:&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 2508 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 17:24:20 UTC Mon Mar 29 2021&lt;BR /&gt;! NVRAM config last updated at 17:24:33 UTC Mon Mar 29 2021&lt;BR /&gt;! NVRAM config last updated at 17:24:33 UTC Mon Mar 29 2021&lt;BR /&gt;version 15.1&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname ********_HQINTERNET&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;ip source-route&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip name-server 8.8.8.8&lt;BR /&gt;ip name-server 4.2.2.2&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid CISCO1941/K9&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Embedded-Service-Engine0/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description ***_INTERNET&lt;BR /&gt;ip address *.*.*.58 255.255.255.252&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description ********_TOINTERNETASA&lt;BR /&gt;ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/1&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/2&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/3&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.1.6 491 *.*.*.58 491 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.1.4 9996 *.*.*.58 9996 extendable&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 *.*.*.57&lt;/P&gt;&lt;P&gt;ip route 192.168.1.0 255.255.255.0 10.0.0.2&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit 192.168.1.0 0.0.0.255&lt;BR /&gt;control-plane&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firewall Configurations:&lt;/P&gt;&lt;P&gt;Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: JAD24071TW5&lt;BR /&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ******internetasa&lt;BR /&gt;domain-name *********.com&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;description CONNECTION FROM ROUTER&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.0.0.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;description CONNECTION TO INTERNAL LAN SWITCH&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 4.2.2.2 outside&lt;BR /&gt;name-server 8.8.8.8 outside&lt;BR /&gt;name-server 192.168.1.5 inside&lt;BR /&gt;domain-name ********.com&lt;BR /&gt;object network inside_mapped&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network internal-lan&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network 192.168.1.6&lt;BR /&gt;host 192.168.1.6&lt;BR /&gt;object network 192.168.1.4&lt;BR /&gt;host 192.168.1.4&lt;BR /&gt;object-group service Goglobal tcp&lt;BR /&gt;port-object eq 491&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object 192.168.1.6&lt;BR /&gt;network-object object internal-lan&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object object 192.168.1.4&lt;BR /&gt;network-object object internal-lan&lt;BR /&gt;object-group service Mobile tcp&lt;BR /&gt;port-object eq 9996&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;network-object object internal-lan&lt;BR /&gt;access-list OUTSIDE-IN extended permit icmp any any echo-reply&lt;BR /&gt;access-list OUTSIDE-IN extended deny ip any any log&lt;BR /&gt;access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_3 any log&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 eq 491 log&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_2 eq 9996 log&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network internal-lan&lt;BR /&gt;nat (inside,outside) static inside_mapped&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.0.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.1.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca 513fb9743870b73440418d30930699ff&lt;BR /&gt;&lt;BR /&gt;quit&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;dhcpd address 10.1.1.2-10.1.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet tracer Result&lt;/P&gt;&lt;P&gt;*******internetasa# packet-tracer input inside tcp 192.168.1.1 80 172.217.171.$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.0.1 using egress ifc outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;*******internetasa# packet-tracer input inside tcp 192.168.1.9 80 172.217.171.$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.0.1 using egress ifc outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip object internal-lan any log&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network internal-lan&lt;BR /&gt;nat (inside,outside) static inside_mapped&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.1.9/80 to 192.168.1.9/80&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 332844, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will appreciate a favorable solutions.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 19:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315644#M1079752</guid>
      <dc:creator>ladilayo</dc:creator>
      <dc:date>2021-03-29T19:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: LAN USERS UNABLE TO BROWSE INTERNET AFTER CISCO ROUTER WITH CISCO ASA FOR INTERNET ACCESS CONFIGURATION</title>
      <link>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315651#M1079753</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1179050"&gt;@ladilayo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are natting on the ASA from 192.168.1.0 to 192.168.1.0 why not just route the traffic instead. Remove the nat rule (&lt;STRONG&gt;no object network internal-lan&lt;/STRONG&gt;) on the ASA, as the router is already configured to nat the 192.168.1.0 traffic anyway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 19:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315651#M1079753</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-03-29T19:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: LAN USERS UNABLE TO BROWSE INTERNET AFTER CISCO ROUTER WITH CISCO ASA FOR INTERNET ACCESS CONFIGURATION</title>
      <link>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315679#M1079755</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;I got this error&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;internetasa(config)# no object network internal-lan&lt;BR /&gt;ERROR: unable to delete object (internal-lan). object is being used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ladilayo&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 19:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315679#M1079755</guid>
      <dc:creator>ladilayo</dc:creator>
      <dc:date>2021-03-29T19:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: LAN USERS UNABLE TO BROWSE INTERNET AFTER CISCO ROUTER WITH CISCO ASA FOR INTERNET ACCESS CONFIGURATION</title>
      <link>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315685#M1079756</link>
      <description>&lt;P&gt;That object is in use by the object group DM_INLINE_NETWORK_3, perhaps just remove the nat command from it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object network internal-lan&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt;no&lt;/STRONG&gt; nat (inside,outside) static inside_mapped&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;Or remove the object internal-lan from the object-group&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 20:13:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315685#M1079756</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-03-29T20:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: LAN USERS UNABLE TO BROWSE INTERNET AFTER CISCO ROUTER WITH CISCO ASA FOR INTERNET ACCESS CONFIGURATION</title>
      <link>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315723#M1079758</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;The nat command was removed, but the LAN computer could not browse internet can only ping the IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ladilayo&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 21:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315723#M1079758</guid>
      <dc:creator>ladilayo</dc:creator>
      <dc:date>2021-03-29T21:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: LAN USERS UNABLE TO BROWSE INTERNET AFTER CISCO ROUTER WITH CISCO ASA FOR INTERNET ACCESS CONFIGURATION</title>
      <link>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315731#M1079759</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1179050"&gt;@ladilayo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The LAN computer has the correct DNS servers configured?&lt;/P&gt;
&lt;P&gt;Are you pinging the IP address or the hostname?&lt;/P&gt;
&lt;P&gt;Provide the updated packet-tracer output simulating traffic, use the source of the LAN computer.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 21:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315731#M1079759</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-03-29T21:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: LAN USERS UNABLE TO BROWSE INTERNET AFTER CISCO ROUTER WITH CISCO ASA FOR INTERNET ACCESS CONFIGURATION</title>
      <link>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315792#M1079760</link>
      <description>&lt;P&gt;Hello Rob,&lt;/P&gt;&lt;P&gt;The DNS was correctly done&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the Packet tracer result&lt;/P&gt;&lt;P&gt;internetasa# packet-tracer input inside tcp 192.168.1.4 80 172.217.171.$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.0.1 using egress ifc outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_3 any log&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;network-object object internal-lan&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 361463, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 22:24:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/lan-users-unable-to-browse-internet-after-cisco-router-with/m-p/4315792#M1079760</guid>
      <dc:creator>ladilayo</dc:creator>
      <dc:date>2021-03-29T22:24:44Z</dc:date>
    </item>
  </channel>
</rss>

