<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Internet Access blocked by ACL or Firewall? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561574#M1087844</link>
    <description>&lt;P&gt;I have just been handed over infra without diagrams or information as the previous guy left without notice. Hope experts here can enlighten me or at least point me in the right direction. Everything was working fine till our proxy server went down. I am not sure how the previous implementation "forced" internet traffic through the proxy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Disabled proxy (such as on application level or internet browsers) but there is still no internet access.&lt;/LI&gt;&lt;LI&gt;Previously working fine with a 3rd party proxy.Other Network Security Topics&lt;/LI&gt;&lt;LI&gt;Checkpoint Firewall accepts traffic to internet (tested with sites like google.com and 8.8.8.8) based on logs. Therefore my guess is the traffic is dropped somewhere on the router after the firewall.&lt;/LI&gt;&lt;LI&gt;Possible it's the ACL causing the problems? Is it the ACL "BLOCK_INB" blocking all return traffic?&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;The company is using Checkpoint as it's firewall solution with a Cisco 2911 ISR facing the Internet / acting as the WAN router. To simply, its like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Clients/Servers/Devices ---&amp;gt; Switch --&amp;gt; Checkpoint FW ---&amp;gt; DMZ Switch --&amp;gt; Cisco 2911 WAN Router --&amp;gt; Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the router config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Port-channel1&lt;/P&gt;&lt;P&gt;description to CP-FW&lt;/P&gt;&lt;P&gt;ip address 203.X.X.29 255.255.255.224&lt;/P&gt;&lt;P&gt;ip access-group 102 in&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Embedded-Service-Engine0/0&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;description WAN Internet&lt;/P&gt;&lt;P&gt;ip address 164.x.x.230 255.255.255.252&lt;/P&gt;&lt;P&gt;ip access-group BLOCK_INB in&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;description To DMZSwitch&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;channel-group 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 164.X.X.229&lt;/P&gt;&lt;P&gt;ip route 192.168.5.0 255.255.255.0 203.X.X.30&lt;/P&gt;&lt;P&gt;ip route 203.X.X.0 255.255.255.224 203.X.X.30&lt;/P&gt;&lt;P&gt;ip ssh time-out 60&lt;/P&gt;&lt;P&gt;ip ssh version 2&lt;/P&gt;&lt;P&gt;ip ssh server algorithm mac hmac-sha1&lt;/P&gt;&lt;P&gt;ip ssh server algorithm encryption aes256-ctr&lt;/P&gt;&lt;P&gt;ip ssh client algorithm mac hmac-sha1&lt;/P&gt;&lt;P&gt;ip ssh client algorithm encryption aes256-ctr&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended BLOCK_INB&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 0.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;deny &amp;nbsp;&amp;nbsp;ip 192.0.2.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 224.0.0.0 31.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any log&lt;/P&gt;&lt;P&gt;permit ip any any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; icmp any any redirect&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; icmp any any timestamp-request&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; icmp any any information-request&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; 53 any any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; 55 any any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; 77 any any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; pim any any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 0.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 161.229.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 172.0.0.0 0.31.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 224.0.0.0 31.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 255.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; udp any any eq 0&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any log&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 203.X.X.0 0.0.0.31 any&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.5.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; udp any any eq 0&lt;/P&gt;&lt;P&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;access-list 103 deny&amp;nbsp;&amp;nbsp; udp any any eq 0&lt;/P&gt;&lt;P&gt;access-list 103 permit ip any any log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 01 Mar 2022 17:05:21 GMT</pubDate>
    <dc:creator>mechbearcat</dc:creator>
    <dc:date>2022-03-01T17:05:21Z</dc:date>
    <item>
      <title>Internet Access blocked by ACL or Firewall?</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561574#M1087844</link>
      <description>&lt;P&gt;I have just been handed over infra without diagrams or information as the previous guy left without notice. Hope experts here can enlighten me or at least point me in the right direction. Everything was working fine till our proxy server went down. I am not sure how the previous implementation "forced" internet traffic through the proxy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Disabled proxy (such as on application level or internet browsers) but there is still no internet access.&lt;/LI&gt;&lt;LI&gt;Previously working fine with a 3rd party proxy.Other Network Security Topics&lt;/LI&gt;&lt;LI&gt;Checkpoint Firewall accepts traffic to internet (tested with sites like google.com and 8.8.8.8) based on logs. Therefore my guess is the traffic is dropped somewhere on the router after the firewall.&lt;/LI&gt;&lt;LI&gt;Possible it's the ACL causing the problems? Is it the ACL "BLOCK_INB" blocking all return traffic?&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;The company is using Checkpoint as it's firewall solution with a Cisco 2911 ISR facing the Internet / acting as the WAN router. To simply, its like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Clients/Servers/Devices ---&amp;gt; Switch --&amp;gt; Checkpoint FW ---&amp;gt; DMZ Switch --&amp;gt; Cisco 2911 WAN Router --&amp;gt; Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the router config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Port-channel1&lt;/P&gt;&lt;P&gt;description to CP-FW&lt;/P&gt;&lt;P&gt;ip address 203.X.X.29 255.255.255.224&lt;/P&gt;&lt;P&gt;ip access-group 102 in&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Embedded-Service-Engine0/0&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;description WAN Internet&lt;/P&gt;&lt;P&gt;ip address 164.x.x.230 255.255.255.252&lt;/P&gt;&lt;P&gt;ip access-group BLOCK_INB in&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;description To DMZSwitch&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;channel-group 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 164.X.X.229&lt;/P&gt;&lt;P&gt;ip route 192.168.5.0 255.255.255.0 203.X.X.30&lt;/P&gt;&lt;P&gt;ip route 203.X.X.0 255.255.255.224 203.X.X.30&lt;/P&gt;&lt;P&gt;ip ssh time-out 60&lt;/P&gt;&lt;P&gt;ip ssh version 2&lt;/P&gt;&lt;P&gt;ip ssh server algorithm mac hmac-sha1&lt;/P&gt;&lt;P&gt;ip ssh server algorithm encryption aes256-ctr&lt;/P&gt;&lt;P&gt;ip ssh client algorithm mac hmac-sha1&lt;/P&gt;&lt;P&gt;ip ssh client algorithm encryption aes256-ctr&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended BLOCK_INB&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 0.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;deny &amp;nbsp;&amp;nbsp;ip 192.0.2.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 224.0.0.0 31.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any log&lt;/P&gt;&lt;P&gt;permit ip any any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; icmp any any redirect&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; icmp any any timestamp-request&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; icmp any any information-request&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; 53 any any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; 55 any any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; 77 any any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; pim any any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 0.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 161.229.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 172.0.0.0 0.31.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 224.0.0.0 31.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 255.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; udp any any eq 0&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any log&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 203.X.X.0 0.0.0.31 any&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.5.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; udp any any eq 0&lt;/P&gt;&lt;P&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;access-list 103 deny&amp;nbsp;&amp;nbsp; udp any any eq 0&lt;/P&gt;&lt;P&gt;access-list 103 permit ip any any log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 17:05:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561574#M1087844</guid>
      <dc:creator>mechbearcat</dc:creator>
      <dc:date>2022-03-01T17:05:21Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access blocked by ACL or Firewall?</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561578#M1087845</link>
      <description>&lt;P&gt;As per your description of the problem, you have not changed anything on the router (have you ?)&lt;/P&gt;
&lt;P&gt;The ACL Looks ok high level.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My guess your Checkpoint Doing NAT here for your Local Internet.&lt;/P&gt;
&lt;P&gt;To confirm you have internet or not, connect any device using Public IP in DMZ switch and check is the Internet working or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what is your Lan side IP address ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 17:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561578#M1087845</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-03-01T17:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access blocked by ACL or Firewall?</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561581#M1087846</link>
      <description>&lt;P&gt;Thanks! I had a feeling it must be something related to NAT on the firewall side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My LAN side client IP address is 192.168.5.x&lt;/P&gt;&lt;P&gt;All the clients/servers are not able to access Internet at all (once proxy is disabled). How do you even "force" traffic to make use of a 3rd party proxy?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;One more novice question on the "BLOCK_INB" ACL (which is applied on WAN interface):&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;deny ip any any log&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Wouldn't this cause return any/all traffic to be blocked?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 17:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561581#M1087846</guid>
      <dc:creator>mechbearcat</dc:creator>
      <dc:date>2022-03-01T17:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access blocked by ACL or Firewall?</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561589#M1087847</link>
      <description>&lt;PRE&gt;All the clients/servers are not able to access Internet at all (once proxy is disabled).&lt;/PRE&gt;
&lt;P&gt;how is the proxy configured manually in browser, check browser setting in proxy settings&lt;/P&gt;
&lt;P&gt;If you remove the proxy, the FW not able to make connection due to NAT, i belive in your CP Only proxy IP allowed and NAtted (as per the information)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt; How do you even "force" traffic to make use of a 3rd party proxy?&lt;/PRE&gt;
&lt;P&gt;what 3rd party proxy ? you any brand, is this up and running ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 17:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561589#M1087847</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-03-01T17:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access blocked by ACL or Firewall?</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561594#M1087848</link>
      <description>&lt;UL&gt;&lt;LI&gt;Proxy went down due to hardware failure (believe it's&amp;nbsp;&lt;EM&gt;Barracuda Web Security and Filtering&lt;/EM&gt;) on its host.&lt;/LI&gt;&lt;LI&gt;As such, I made use of GPO to remove all proxy settings including browsers (Internet Options). However, most servers/clients are not even able to connect to Internet to retrieve updates.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Thanks yet again, I understand this is the Cisco forum but you have been helpful. I will try to check Checkpoint FW once I am back in office and see if there are any options to "bypass" proxy. Or if any of the switches are "redirecting" traffic to proxy.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 17:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561594#M1087848</guid>
      <dc:creator>mechbearcat</dc:creator>
      <dc:date>2022-03-01T17:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access blocked by ACL or Firewall?</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561600#M1087849</link>
      <description>&lt;P&gt;I can understand the situation now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you have 2 Options :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Configure Checkpoint to NAT all Internal IP address using NAT, so all device can access Internet ( given below link not sure you running R80 ?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/6724.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/6724.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. If you have spare PC, you can install Linux and Squid (this act as Proxy) replace in place of Barracuda proxy Place. using same IP address, that resolve the issue.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.digitalocean.com/community/tutorials/how-to-set-up-squid-proxy-on-ubuntu-20-04" target="_blank" rel="noopener"&gt;https://www.digitalocean.com/community/tutorials/how-to-set-up-squid-proxy-on-ubuntu-20-04&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You choose which one best, let me know any help i can do to help to resolve the issue, happy to help get back your network connection and user happy using internet again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 17:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-blocked-by-acl-or-firewall/m-p/4561600#M1087849</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-03-01T17:43:28Z</dc:date>
    </item>
  </channel>
</rss>

