<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to browse websites from inside LAN 5506-X in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015442#M1108947</link>
    <description>&lt;P&gt;The packet capture shows that the traffic should be allowed so it should work. However, your WAN interface has a private IP (192.168.15.50), so the question is, do you have NAT applied on the ISP device for that traffic? or is it going out to the internet un-NAT'ed? if it goes without any NAT it would most likely be dropped by the ISP. Also, I'm not sure if you changed anything on the NAT config since you pasted the configs in your original post, but the packet capture is showing the "nat (Inside,WAN) source &lt;STRONG&gt;static&lt;/STRONG&gt;" applied to the traffic. The NAT rule should be configured with "source dynamic" as you are doing PAT (many-to-one) in this case.&lt;/P&gt;</description>
    <pubDate>Fri, 09 Feb 2024 11:29:56 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2024-02-09T11:29:56Z</dc:date>
    <item>
      <title>Unable to browse websites from inside LAN 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5013819#M1108844</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;I am currently configuring a 5506-X for my home network. Currently, I can ping outside IP addresses, but cannot browse to any websites. Browser messages like "Can't reach this page" or "took too long to respond".&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DNS is configured, NSlookup works fine&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any assistance would be greatly appreciated&lt;/P&gt;
&lt;P&gt;Config below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hostname ciscoasa&lt;BR /&gt;domain-name ciscoasa&lt;BR /&gt;enable password xxx&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd lz0KX8ev8B0kt0XS encrypted&lt;BR /&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif WAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.15.50 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.10&lt;BR /&gt;shutdown&lt;BR /&gt;no vlan&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.20&lt;BR /&gt;shutdown&lt;BR /&gt;no vlan&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.20.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.30&lt;BR /&gt;shutdown&lt;BR /&gt;no vlan&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.30.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.40&lt;BR /&gt;shutdown&lt;BR /&gt;no vlan&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.40.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.50&lt;BR /&gt;shutdown&lt;BR /&gt;no vlan&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.50.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;nameif Inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.14.153.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.1.150 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;nameif test&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 10.0.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;ip address 172.16.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa982-lfbff-k8.SPA&lt;BR /&gt;boot system disk0:/asa981-lfbff-k8.SPA&lt;BR /&gt;boot system disk0:/asdm-782.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name ciscoasa&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_vlan_10&lt;BR /&gt;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network obj_vlan_20&lt;BR /&gt;subnet 192.168.20.0 255.255.255.0&lt;BR /&gt;object network obj_vlan_30&lt;BR /&gt;subnet 192.168.30.0 255.255.255.0&lt;BR /&gt;object network obj_vlan_40&lt;BR /&gt;subnet 192.168.40.0 255.255.255.0&lt;BR /&gt;object network obj_vlan_50&lt;BR /&gt;subnet 192.168.50.0 255.255.255.0&lt;BR /&gt;object network DMZ&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network inside&lt;BR /&gt;subnet 10.14.153.0 255.255.255.0&lt;BR /&gt;access-list inside extended permit icmp any any&lt;BR /&gt;access-list INSIDE extended permit tcp any any eq www&lt;BR /&gt;access-list INSIDE extended permit tcp any any eq https&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu WAN 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu test 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-782.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;nat (Inside,WAN) after-auto source dynamic any interface&lt;BR /&gt;nat (DMZ,WAN) after-auto source dynamic any interface&lt;BR /&gt;route WAN 0.0.0.0 0.0.0.0 192.168.15.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 Inside&lt;BR /&gt;http 10.14.153.0 255.255.255.0 test&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh 10.14.153.0 255.255.255.0 Inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd address 10.0.1.5-10.0.1.250 test&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username asdm password&amp;nbsp;&lt;BR /&gt;username admin password&amp;nbsp;&lt;BR /&gt;username bipin password&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:86c12e853db38591da614f2ec3826c8d&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 07:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5013819#M1108844</guid>
      <dc:creator>noelcox</dc:creator>
      <dc:date>2024-02-07T07:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to browse websites from inside LAN 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5013922#M1108846</link>
      <description>&lt;P&gt;The ASA config is pretty basic and a quick glance appears to have the necessary elements for traffic to pass. Please run the following command from the ASA cli enable mode and share the results:&lt;/P&gt;
&lt;P&gt;packet tracer input Inside tcp 10.14.153.10 1234 8.8.8.8 443&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 07:54:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5013922#M1108846</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-02-07T07:54:45Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to browse websites from inside LAN 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5013952#M1108849</link>
      <description>&lt;P&gt;Your WAN interface is configured with the security level 100, is that intended? By default the ASA won't allow the traffic to pass between the interfaces that have the same security level, so I think the security level of the WAN interface should be changed to 0.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nterface GigabitEthernet1/1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; nameif WAN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; security-level 100 &amp;lt;- this should be replaced with 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; ip address 192.168.15.50 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 09:22:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5013952#M1108849</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-07T09:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to browse websites from inside LAN 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5014061#M1108852</link>
      <description>&lt;P&gt;You have issue with MSS&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check this link&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113137-asa-83-browse-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113137-asa-83-browse-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 12:22:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5014061#M1108852</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-07T12:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to browse websites from inside LAN 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015221#M1108926</link>
      <description>&lt;P&gt;Yes, I noticed that and it had actually been changed to 0, but still not working&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 23:12:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015221#M1108926</guid>
      <dc:creator>noelcox</dc:creator>
      <dc:date>2024-02-08T23:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to browse websites from inside LAN 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015222#M1108927</link>
      <description>&lt;P&gt;ciscoasa# packet-tracer input Inside tcp 10.14.153.10 1234 8.8.8.8 443&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.15.1 using egress ifc WAN&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map http-map1&lt;BR /&gt;match access-list http-list2&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class http-map1&lt;BR /&gt;set connection advanced-options mss-map&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside,WAN) source static any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.14.153.10/1234 to 192.168.15.50/1234&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside,WAN) source static any interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 32150, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: WAN&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 23:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015222#M1108927</guid>
      <dc:creator>noelcox</dc:creator>
      <dc:date>2024-02-08T23:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to browse websites from inside LAN 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015281#M1108929</link>
      <description>&lt;P&gt;I have implemented the below from another chat, but no change:&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config)# access-list http-list2 permit ip any any&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config)# class-map http-map1&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config-cmap)# match access-list http-list2&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config-cmap)# exit&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config)# tcp-map mss-map&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config-tcp-map)# exceed-mss allow&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config-tcp-map)# exit&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config)# policy-map global_policy&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config-pmap)# class http-map1&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config-pmap-c)# set connection advanced-options mss-map&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config-pmap-c)# exit&lt;/P&gt;&lt;P&gt;ASA-5510-8x(config-pmap)# exit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 04:19:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015281#M1108929</guid>
      <dc:creator>noelcox</dc:creator>
      <dc:date>2024-02-09T04:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to browse websites from inside LAN 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015294#M1108930</link>
      <description>&lt;P&gt;did you add this policy to service ?&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 06:00:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015294#M1108930</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-09T06:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to browse websites from inside LAN 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015442#M1108947</link>
      <description>&lt;P&gt;The packet capture shows that the traffic should be allowed so it should work. However, your WAN interface has a private IP (192.168.15.50), so the question is, do you have NAT applied on the ISP device for that traffic? or is it going out to the internet un-NAT'ed? if it goes without any NAT it would most likely be dropped by the ISP. Also, I'm not sure if you changed anything on the NAT config since you pasted the configs in your original post, but the packet capture is showing the "nat (Inside,WAN) source &lt;STRONG&gt;static&lt;/STRONG&gt;" applied to the traffic. The NAT rule should be configured with "source dynamic" as you are doing PAT (many-to-one) in this case.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 11:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015442#M1108947</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-02-09T11:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to browse websites from inside LAN 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015766#M1108966</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;do you have a DHCP configured for 10.14.153.0/24? do you have an internal DNS server?&lt;/P&gt;&lt;P&gt;can you post a &lt;STRONG&gt;ipconfig /all&lt;/STRONG&gt; from a windows command prompt?&lt;/P&gt;&lt;P&gt;try to connect your laptop directly in g1/3, manually set your LAN IP settings:&lt;/P&gt;&lt;P&gt;IP: 10.14.153.3&lt;BR /&gt;SM: 255.255.255.0&lt;BR /&gt;GW: 10.14.153.2&lt;BR /&gt;DNS: 8.8.8.8&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2024 02:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-browse-websites-from-inside-lan-5506-x/m-p/5015766#M1108966</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2024-02-10T02:10:11Z</dc:date>
    </item>
  </channel>
</rss>

