<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Allow Internet Traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069186#M1111251</link>
    <description>&lt;P&gt;No we solve the routing as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;mention you need now NAT&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Object network router&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Subnet &amp;lt;any preifx learn from router&amp;gt;&lt;/P&gt;
&lt;P&gt;Nat (inside'outside) dynamic interface&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Mon, 15 Apr 2024 08:44:13 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-04-15T08:44:13Z</dc:date>
    <item>
      <title>How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069021#M1111234</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;I need assistance to allow internet traffic from Cisco ASA Firewall version 9.14 to Cisco Router. I want user when to connect to the internet from Cisco Router where I configured DHCP Pool.&amp;nbsp; See below configuration output For Cisco ASA Firewall and Cisco Router.&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description OUTSIDE&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 172.29.129.10 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;Description connected to Cisco ROUTER Interface&lt;BR /&gt;description INSIDE&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.10.253 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;description DMZ&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 80&lt;BR /&gt;ip address 172.18.200.253 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;description MGMT&lt;BR /&gt;no management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;ip address 192.168.50.253 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup OUTSIDE&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 8.8.4.4&lt;BR /&gt;object network inside-network&lt;BR /&gt;subnet 192.168.10.252 255.255.255.252&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq https&lt;BR /&gt;pager lines 23&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;access-group outside_access_in in interface OUTSIDE&lt;BR /&gt;router ospf 1&lt;BR /&gt;router-id 192.168.10.253&lt;BR /&gt;network 172.29.129.0 255.255.255.0 area 0&lt;BR /&gt;network 192.168.10.0 255.255.255.0 area 0&lt;BR /&gt;log-adj-changes&lt;BR /&gt;redistribute connected&lt;BR /&gt;redistribute static&lt;BR /&gt;default-information originate&lt;BR /&gt;!&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 172.29.129.254 1&lt;BR /&gt;route INSIDE 0.0.0.0 0.0.0.0 192.168.10.254 2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa# show route ospf&lt;/P&gt;&lt;P&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN&lt;BR /&gt;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;o - ODR, P - periodic downloaded static route, + - replicated route&lt;BR /&gt;SI - Static InterVRF&lt;BR /&gt;Gateway of last resort is 172.29.129.254 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;O 192.168.200.0 255.255.255.0&lt;BR /&gt;[110/20] via 192.168.10.254, 00:40:27, INSIDE&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;BR /&gt;---------------------------------------------------------------------------------------&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ROUTER&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 192.168.200.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool LAN_POOL&lt;BR /&gt;network 192.168.200.0 255.255.255.0&lt;BR /&gt;default-router 192.168.200.1&lt;BR /&gt;dns-server 8.8.8.8 8.8.4.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;Description connected to Cisco ASA INSIDE Interface&lt;BR /&gt;ip address 192.168.10.254 255.255.255.252&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;ip address 192.168.200.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;duplex auto&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;duplex auto&lt;BR /&gt;!&lt;BR /&gt;router ospf 1&lt;BR /&gt;redistribute connected subnets&lt;BR /&gt;redistribute static subnets&lt;BR /&gt;network 192.168.10.252 0.0.0.3 area 0&lt;BR /&gt;network 192.168.200.0 0.0.0.255 area 0&lt;BR /&gt;neighbor 192.168.10.253&lt;BR /&gt;default-information originate&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip nat inside source list 10 interface Ethernet0/0 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 192.168.10.253&lt;BR /&gt;!&lt;BR /&gt;ipv6 ioam timestamp&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;access-list 10 permit 0.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;Router#show ip route ospf&lt;BR /&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;E1 - OSPF external type 1, E2 - OSPF external type 2&lt;BR /&gt;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP&lt;BR /&gt;a - application route&lt;BR /&gt;+ - replicated route, % - next hop override, p - overrides from PfR&lt;/P&gt;&lt;P&gt;Gateway of last resort is 192.168.10.253 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;172.29.0.0/24 is subnetted, 1 subnets&lt;BR /&gt;O 172.29.129.0 [110/20] via 192.168.10.253, 00:41:27, Ethernet0/0&lt;BR /&gt;Router#&lt;BR /&gt;Router#&lt;BR /&gt;Router#&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 07:38:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069021#M1111234</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-15T07:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069039#M1111239</link>
      <description>&lt;P&gt;is this a lab or a production environment you are setting up?&amp;nbsp; Where is NAT being done? If the ASA is connecting directly to the internet / ISP, and you have changed IPs to hide your public IP, then you are missing dynamic PAT / NAT statement on the ASA.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 07:47:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069039#M1111239</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-15T07:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069085#M1111246</link>
      <description>&lt;P&gt;&lt;SPAN&gt;route OUTSIDE 0.0.0.0 0.0.0.0 172.29.129.254 1 &amp;lt;- this OK&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;route INSIDE 0.0.0.0 0.0.0.0 192.168.10.254 2 &amp;lt;- this wrong' you run opsf in router why you dont use opsf between ASA and router?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 08:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069085#M1111246</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-15T08:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069175#M1111249</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;I have removed the static route on the ASA, OSPF has come up but from the router still i can not get to the internet.&lt;/P&gt;&lt;P&gt;what is missing on my configuration on both Cisco ASA and the router?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# show ospf neighbor&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Neighbor ID Pri State Dead Time Address Interface&lt;BR /&gt;192.168.200.1 1 FULL/DR 0:00:38 192.168.10.254 INSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Router#&lt;BR /&gt;Router#&lt;BR /&gt;Router#show ip ospf neighbor&lt;/P&gt;&lt;P&gt;Neighbor ID Pri State Dead Time Address Interface&lt;BR /&gt;192.168.10.253 1 FULL/BDR 00:00:30 192.168.10.253 Ethernet0/0&lt;BR /&gt;Router#&lt;BR /&gt;Router#&lt;BR /&gt;Router#ping 8.8.8.8&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;BR /&gt;.....&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;Router#&lt;BR /&gt;Router#&lt;BR /&gt;Router#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 08:36:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069175#M1111249</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-15T08:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069180#M1111250</link>
      <description>&lt;P&gt;Unless you have omitted the configuration from your original post, you are missing NAT on your ASA! I mentioned this in my previous post.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 08:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069180#M1111250</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-15T08:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069186#M1111251</link>
      <description>&lt;P&gt;No we solve the routing as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;mention you need now NAT&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Object network router&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Subnet &amp;lt;any preifx learn from router&amp;gt;&lt;/P&gt;
&lt;P&gt;Nat (inside'outside) dynamic interface&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 08:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069186#M1111251</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-15T08:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069187#M1111252</link>
      <description>&lt;P&gt;You have a private IP configured on your outside interface, so where is NAT being done if it is not on the ASA?&lt;/P&gt;
&lt;P&gt;you could set up a capture on the ASA inside and outside interfaces for your test traffic and see if you see your test traffic on both interfaces.&lt;/P&gt;
&lt;P&gt;Also, if you are only testing with ping, make sure that you have "inspect icmp" configured in your policy map:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; class inspection_default&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; inspect icmp&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 15 Apr 2024 08:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069187#M1111252</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-15T08:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069206#M1111258</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;I put below it work but wonder when I try to put &lt;SPAN&gt;nat (Inside,Outside) source static obj_inside obj_inside destination static obj_inside obj_inside&lt;/SPAN&gt;. Is not working&lt;/P&gt;&lt;P&gt;object network obj_inside&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) dynamic interface&lt;/P&gt;&lt;P&gt;it seems working.&lt;/P&gt;&lt;P&gt;Router#ping &lt;A href="http://www.google.com" target="_blank"&gt;www.google.com&lt;/A&gt; source 192.168.200.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 216.58.223.68, timeout is 2 seconds:&lt;BR /&gt;Packet sent with a source address of 192.168.200.1&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 9/9/10 ms&lt;BR /&gt;Router#&lt;BR /&gt;Router#&lt;BR /&gt;Router#ping 8.8.8.8 source 192.168.200.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;BR /&gt;Packet sent with a source address of 192.168.200.1&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 12/12/14 ms&lt;BR /&gt;Router#&lt;BR /&gt;Router#&lt;BR /&gt;Router#&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 09:12:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069206#M1111258</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-15T09:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069224#M1111263</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;nat (Inside,Outside) source static obj_inside obj_inside destination static obj_inside obj_inside&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;When you put the above statement you are translating the inside hosts to their original IPs. not to mention you are doing static translation which will not scale. if you are testing / lab you could change this statement to be "source dynamic obj_inside interface" and it should work.&lt;/P&gt;
&lt;P&gt;But the issue with it not working is that your inside network is not reachable by the L3 device that is the next hop from the ASA on the outside interface, and / or that L3 device is not doing NAT for the inside subnet.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 09:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069224#M1111263</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-04-15T09:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069242#M1111266</link>
      <description>&lt;P&gt;&lt;SPAN&gt;(Inside,Outside) source static obj_inside obj_inside destination static obj_inside obj_inside&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This identity NAT must not effect the dyanmic NAT since the destiantion is different'&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can I see&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Show run nat&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 09:51:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069242#M1111266</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-15T09:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to Allow Internet Traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069325#M1111267</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;Here is the output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show run nat&lt;BR /&gt;!&lt;BR /&gt;object network obj_inside&lt;BR /&gt;nat (INSIDE,OUTSIDE) dynamic interface&lt;BR /&gt;ciscoasa(config)#&lt;BR /&gt;ciscoasa(config)#&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;DI&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 10:36:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-internet-traffic/m-p/5069325#M1111267</guid>
      <dc:creator>dissai</dc:creator>
      <dc:date>2024-04-15T10:36:15Z</dc:date>
    </item>
  </channel>
</rss>

