<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 9.12 Can't connect out from inside interface... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599612#M1089538</link>
    <description>&lt;P&gt;I looked at that article&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;but it looks like I've done all it said.&amp;nbsp; Can you see something from that article that my config is missing?&amp;nbsp; Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
    <pubDate>Tue, 26 Apr 2022 00:09:17 GMT</pubDate>
    <dc:creator>djhillssc</dc:creator>
    <dc:date>2022-04-26T00:09:17Z</dc:date>
    <item>
      <title>ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599603#M1089534</link>
      <description>&lt;P&gt;I'm upgrading an old (OLD) Cisco PIX to a newer ASA unit.&amp;nbsp; Of course when I migrated the config (via CLI), it didn't like some of the old NAT commands and I had to modify appropriately.&amp;nbsp; I have 2 interfaces configured (inside 100 and outside 0).&amp;nbsp; I have a test PC plugged in via crossover cable to each of the 2 physical interfaces.&amp;nbsp; Both can ping their respective sides of the ASA.&amp;nbsp; I am able to get traffic IN (from outside to inside) via configured ACLs to allow http, RDP, etc.&amp;nbsp; However...I can't get ANYTHING to go from inside to outside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Outside test PC/server 169.160.35.70&lt;/P&gt;&lt;P&gt;Outside interface IP 169.160.35.94&lt;/P&gt;&lt;P&gt;Inside interface IP 10.1.1.1&lt;/P&gt;&lt;P&gt;Inside test PC/server 10.1.1.22&lt;/P&gt;&lt;P&gt;(defined with static nat to 169.160.35.80 on outside interface)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have no ACLs on my inside interface (only outside, for inbound traffic).&amp;nbsp; I have static NAT configured.&amp;nbsp; Packet tracer shows no issues sending traffic from the inside host to the outside host...but I can't hit the website on the outside host, FTP to it, or anything else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, interesting...I cannot FTP to the inside host from the outside.&amp;nbsp; While packet tracer shows no issue with it, and logging shows an FTP connection built and torn down, the client always times out (from both outside to inside and inside to outside).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe I must be missing something having to do with routing traffic from inside to outside interface (non ACL related as far as I can tell, and according to packet tracer).&amp;nbsp; I've read and read and searched and am not finding what it is.&amp;nbsp; Hoping somebody here more familiar with ASA can take a quick look through my config point out something that makes the difference!&amp;nbsp; Thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is my running config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: FCH1714J7GB&lt;BR /&gt;: Hardware: ASA5515, 4096 MB RAM, CPU Clarkdale 3059 MHz, 1 CPU (4 cores)&lt;BR /&gt;: Written by enable_15 at 22:53:56.989 UTC Mon Apr 25 2022&lt;BR /&gt;!&lt;BR /&gt;ASA Version 9.12(2)9&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name djhill.com&lt;BR /&gt;enable password ***** pbkdf2&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;BR /&gt;ip local pool vpn_addresses 10.1.2.2-10.1.2.20&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 169.160.35.94 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.1.1 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name djhill.com&lt;BR /&gt;object network ip_22&lt;BR /&gt;host 10.1.1.22&lt;BR /&gt;access-list outside_access_in extended permit tcp any object ip_22 eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any object ip_22 eq https&lt;BR /&gt;access-list outside_access_in extended permit tcp any object ip_22 eq 3389&lt;BR /&gt;access-list outside_access_in extended permit tcp any object ip_22 eq ftp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 169.160.35.80 eq ftp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 10.1.1.22 eq ftp&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging console debugging&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network ip_22&lt;BR /&gt;nat (inside,outside) static 169.160.35.80&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 169.160.35.65 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev1 transform-set trans esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set trans mode transport&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map dyno 10 set ikev1 transform-set trans&lt;BR /&gt;crypto map vpn 20 ipsec-isakmp dynamic dyno&lt;BR /&gt;crypto map vpn interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy vpngroup internal&lt;BR /&gt;group-policy vpngroup attributes&lt;BR /&gt;vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username djhillvpn password ***** nt-encrypted&lt;BR /&gt;username djhillssc password ***** pbkdf2&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt;address-pool vpn_addresses&lt;BR /&gt;default-group-policy vpngroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt;authentication ms-chap-v2&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2022 23:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599603#M1089534</guid>
      <dc:creator>djhillssc</dc:creator>
      <dc:date>2022-04-25T23:56:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599606#M1089536</link>
      <description>&lt;P&gt;&lt;A href="https://www.auvik.com/franklyit/blog/migrating-cisco-asa-firewall-configuration/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.auvik.com/franklyit/blog/migrating-cisco-asa-firewall-configuration/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;you need PAT for Inside Client to Outside Public IP.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 00:01:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599606#M1089536</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-04-26T00:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599612#M1089538</link>
      <description>&lt;P&gt;I looked at that article&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;but it looks like I've done all it said.&amp;nbsp; Can you see something from that article that my config is missing?&amp;nbsp; Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 00:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599612#M1089538</guid>
      <dc:creator>djhillssc</dc:creator>
      <dc:date>2022-04-26T00:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599617#M1089539</link>
      <description>&lt;PRE&gt;object network PAT-0_0_0_0
  subnet 0.0.0.0 0.0.0.0
  nat (inside,outside) dynamic interface&lt;/PRE&gt;</description>
      <pubDate>Tue, 26 Apr 2022 00:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599617#M1089539</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-04-26T00:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599621#M1089541</link>
      <description>&lt;P&gt;My understanding of that (based on that article) is it's used to do dynamic NAT.&amp;nbsp; For static nat, it's what I have (which is what that article seems to me to explain).&amp;nbsp; Am I misunderstanding?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 00:26:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599621#M1089541</guid>
      <dc:creator>djhillssc</dc:creator>
      <dc:date>2022-04-26T00:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599623#M1089542</link>
      <description>&lt;P&gt;You mean that this asa is serve only one host 10.1.1.22?&lt;/P&gt;&lt;P&gt;If yes then your config is ok no need dynamic nat&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 00:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599623#M1089542</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-04-26T00:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599626#M1089543</link>
      <description>&lt;P&gt;Ultimately the ASA (when I get the config sorted out) will have a dozen hosts on the inside interface, but all are servers that will all have static NAT configured, each with a dedicated IP for NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did add the dynamic nat as that article shows just to test it, but now connection attempts inside-&amp;gt;outside don't even show a connection being built/torn down at all...guessing it's creating a conflict with the static nat for that host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 00:34:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599626#M1089543</guid>
      <dc:creator>djhillssc</dc:creator>
      <dc:date>2022-04-26T00:34:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599637#M1089544</link>
      <description>&lt;P&gt;I would take a look in inspect. I saw you have some inspect entries, but I'd try to look at it as a possibility.&lt;/P&gt;&lt;P&gt;&amp;nbsp;I saw in the past some weird situation like this where nothing seemed to make sense and inspection was the reason.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 00:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599637#M1089544</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-26T00:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599651#M1089545</link>
      <description>&lt;P&gt;Can you say more about that&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp;?&amp;nbsp; I have the global policy set to inspect FTP (which Cisco shows in their article on setting up FTP access), but nothing else regarding FTP inspection enabled.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 01:18:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599651#M1089545</guid>
      <dc:creator>djhillssc</dc:creator>
      <dc:date>2022-04-26T01:18:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599655#M1089546</link>
      <description>&lt;P&gt;&lt;A title="https://www.ciscopress.com/articles/article.asp?p=2104954#:~:text=When%20many%20people%20think%20of,make%20the%20protocol%20work%20better." href="https://www.ciscopress.com/articles/article.asp?p=2104954#:~:text=When%20many%20people%20think%20of,make%20the%20protocol%20work%20better." target="_self"&gt;https://www.ciscopress.com/articles/article.asp?p=2104954#:~:text=When%20many%20people%20think%20of,make%20the%20protocol%20work%20better.&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A title="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-overview.html" href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-overview.html" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-overview.htmlhttps://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-overview.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 01:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599655#M1089546</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-26T01:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599656#M1089547</link>
      <description>&lt;P&gt;BTW - update for&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;&amp;nbsp;- I now can access http etc from inside -&amp;gt; outside. (Still no luck with FTP).&amp;nbsp; Felt like an idiot when I discovered why nothing at all was going through inside-&amp;gt;outside (test PC on inside was multi-homed and routing metric was causing it to try to route all traffic intended for outside interface through it's wireless connection...turned off wireless connection and now can get everything...EXCEPT FTP to work)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet tracer finds no issue routing FTP requests&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FTP connection attempts from outside or inside show connection being built/torn down, but FTP client times out after 30 seconds from either side (FTP is known to work on both machines, when not connected through the ASA - just on a switch, connections fire right up in only milliseconds...so FTP timeouts on either side can't be the issue).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know I can turn off FTP inspection, but then (if I understand correctly) ACTIVE mode FTP will no longer work (though none are working now, so maybe that's an upgrade lol)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 01:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599656#M1089547</guid>
      <dc:creator>djhillssc</dc:creator>
      <dc:date>2022-04-26T01:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599677#M1089548</link>
      <description>&lt;P&gt;Thanks.&amp;nbsp; In order to test if FTP inspection was causing a problem, I disabled FTP inspection (no inspect ftp on the global policy)...still FTP can't connect.&amp;nbsp; Same deal...packet-tracer shows no issues (not being blocked by ACL), logging shows TCP connection built when the FTP client makes connection request...request times out and ASA tears down the connection...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Log on FTP server doesn't show any attempt to connect at all...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anymore ideas?&amp;nbsp; I'm out of them lol&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 02:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4599677#M1089548</guid>
      <dc:creator>djhillssc</dc:creator>
      <dc:date>2022-04-26T02:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.12 Can't connect out from inside interface...</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4600013#M1089558</link>
      <description>&lt;P&gt;I send you link how you adjust the embryonic timeout ,&lt;BR /&gt;SYN timeout meaning the link is low speed and 3-way handshake can not complete within this time increase it to be at least 1.5 min.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 11:37:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-12-can-t-connect-out-from-inside-interface/m-p/4600013#M1089558</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-04-26T11:37:33Z</dc:date>
    </item>
  </channel>
</rss>

