<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can we allow Internal network to access external web? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976405#M1106803</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1636764"&gt;@Beginnerrr&lt;/a&gt; ACL 12 on router B is incorrect, traffic will be natted behind the ASA outside interface (192.168.20.1), so traffic will not come from the internal network. For testing remove the ACL and try again, then apply the ACL with the correct network/host.&lt;/P&gt;
&lt;P&gt;Also is routing setup on the routers and ASA, so they know how to communicate with each other? Make sure the ASA can ping 209.170.200.225.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Dec 2023 16:27:29 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2023-12-12T16:27:29Z</dc:date>
    <item>
      <title>How can we allow Internal network to access external web?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976400#M1106802</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am configuring the Cisco ASA&amp;nbsp; to allow the Internal network to access external web which is run by the router at Cisco B as shown in the diagram below. I run the web server from the router using ip http server.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="inside to external.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/204783iD86FF336B519DAD3/image-size/large?v=v2&amp;amp;px=999" role="button" title="inside to external.png" alt="inside to external.png" /&gt;&lt;/span&gt;&lt;BR /&gt;interface g0/0&lt;/P&gt;&lt;P&gt;ip address 192.168.50.1 255.255.255.0&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;interface g0/1&lt;/P&gt;&lt;P&gt;ip address 192.168.20.1 255.255.255.252&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip route outside 0.0.0.0 0.0.0.0 192.168.20.2&lt;/P&gt;&lt;P&gt;object-group internal-network&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; subnet 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; nat (inside,outside) static interface&lt;/P&gt;&lt;P&gt;object-group external&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;subnet 209.170.200.224 255.255.255.252&lt;/P&gt;&lt;P&gt;access-list inside_external extended permit tcp object-group internal-network object-group external eq http&lt;/P&gt;&lt;P&gt;access-group inside_external in interface inside&lt;/P&gt;&lt;P&gt;Router B&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list 12 permit any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ip http access-class 12&lt;BR /&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;username cisco privilege 15 secret cisco&lt;/P&gt;&lt;P&gt;I tried running the external IP, 209.170.200.225 on the web browser and it is not showing the web server.&lt;BR /&gt;Please kindly assist.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 16:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976400#M1106802</guid>
      <dc:creator>Beginnerrr</dc:creator>
      <dc:date>2023-12-12T16:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: How can we allow Internal network to access external web?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976405#M1106803</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1636764"&gt;@Beginnerrr&lt;/a&gt; ACL 12 on router B is incorrect, traffic will be natted behind the ASA outside interface (192.168.20.1), so traffic will not come from the internal network. For testing remove the ACL and try again, then apply the ACL with the correct network/host.&lt;/P&gt;
&lt;P&gt;Also is routing setup on the routers and ASA, so they know how to communicate with each other? Make sure the ASA can ping 209.170.200.225.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 16:27:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976405#M1106803</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-12T16:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: How can we allow Internal network to access external web?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976410#M1106804</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I have recorrect-ed access-list 12 and allow any host to access.&lt;/P&gt;&lt;P&gt;Yes routing is set up on the routers and ASA. They are configured as 0.0.0.0 0.0.0.0 to the next hop interface.&lt;BR /&gt;ASA can ping 209.170.200.225.&lt;BR /&gt;Is the NAT configuration wrong?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 16:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976410#M1106804</guid>
      <dc:creator>Beginnerrr</dc:creator>
      <dc:date>2023-12-12T16:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: How can we allow Internal network to access external web?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976415#M1106805</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1636764"&gt;@Beginnerrr&lt;/a&gt; tweak the NAT as below&lt;/P&gt;
&lt;PRE&gt;object network internal-network&lt;BR /&gt;&amp;nbsp;subnet 192.168.50.0 255.255.255.0&lt;BR /&gt; nat (inside,outside) &lt;STRONG&gt;dynamic &lt;/STRONG&gt;interface&lt;/PRE&gt;
&lt;P&gt;If that doesn't work run packet-tracer from the CLI of the ASA to simulate the traffic flow, example:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;packet-tacer input inside tcp 192.168.50.5 3000 209.170.200.225 80&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 18:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976415#M1106805</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-12T18:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: How can we allow Internal network to access external web?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976459#M1106807</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;It did not work when I accessed the web ip from the browser. 209.170.200.225&lt;/P&gt;&lt;P&gt;the command you provide is not applicable for the NAT&lt;/P&gt;&lt;P&gt;I typed this command,&amp;nbsp;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the output of the packet-tracer is down below.&lt;/P&gt;&lt;P&gt;packet-tacer input inside tcp 192.168.50.5 3000 209.170.200.225 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.20.2 using egress ifc outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_external in interface inside&lt;BR /&gt;access-list inside_external extended permit tcp object-group internal-network object-group external eq www&lt;BR /&gt;object-group network internal-network&lt;BR /&gt;network-object 192.168.50.0 255.255.255.0&lt;BR /&gt;object-group network external&lt;BR /&gt;network-object 209.170.200.224 255.255.255.252&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.50.5/3000 to 192.168.20.1/3000&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 2, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 18:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976459#M1106807</guid>
      <dc:creator>Beginnerrr</dc:creator>
      <dc:date>2023-12-12T18:12:29Z</dc:date>
    </item>
    <item>
      <title>Re: How can we allow Internal network to access external web?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976466#M1106808</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1636764"&gt;@Beginnerrr&lt;/a&gt; I've amended the command above, regardless the packet-tracer output confirms that traffic should work. &lt;/P&gt;
&lt;P&gt;Does the internal PC have the correct default gateway of the ASA?&lt;/P&gt;
&lt;P&gt;Run a packet capture on the ASA to confirm the traffic is sent and run a packet capture on the web server to confirm the traffic is received.&lt;/P&gt;
&lt;P&gt;Allow ping - run the command &lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt; on the ASA and ping the web server from the PC to confirm connectivity.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 18:31:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976466#M1106808</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-12T18:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: How can we allow Internal network to access external web?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976476#M1106809</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;the access worked. there is some issue in the asa. i have resetted the ASA device and redo the configuration.&lt;/P&gt;&lt;P&gt;it is working.&lt;/P&gt;&lt;P&gt;For the NAT configuration, is there a difference between your and mine?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 18:49:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976476#M1106809</guid>
      <dc:creator>Beginnerrr</dc:creator>
      <dc:date>2023-12-12T18:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: How can we allow Internal network to access external web?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976477#M1106810</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1636764"&gt;@Beginnerrr&lt;/a&gt; using the after-auto will process those NAT rules last, after the other NAT rules. If you apply both NAT rules, then run "show nat detail" you will see the order of the rules being processed.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 18:55:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-we-allow-internal-network-to-access-external-web/m-p/4976477#M1106810</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-12T18:55:49Z</dc:date>
    </item>
  </channel>
</rss>

