<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Attached the defautl in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039506#M135864</link>
    <description>&lt;P&gt;Attached the defautl inspections&lt;/P&gt;</description>
    <pubDate>Thu, 04 May 2017 16:31:54 GMT</pubDate>
    <dc:creator>servicioit</dc:creator>
    <dc:date>2017-05-04T16:31:54Z</dc:date>
    <item>
      <title>I can ping sites but not browse the Internet</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039504#M135853</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have an ASA 5505 and I can ping to 8.8.8.8 and ping to any sites like &lt;A href="https://community.cisco.com/www.google.es" target="_blank"&gt;www.google.es&lt;/A&gt;, but I cannot browse the internet&lt;/P&gt;
&lt;P&gt;In the log I can see:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;Deny TCP (no connection) from 192.168.1.199/49364 to 62.128.100.161/443 flags RST on interface outside&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;This is my configuration:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 100&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.20.100.200 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan100&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.200 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object ip&lt;BR /&gt;&amp;nbsp;service-object udp&lt;BR /&gt;&amp;nbsp;service-object tcp&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;&amp;nbsp;service-object ip&lt;BR /&gt;&amp;nbsp;service-object udp&lt;BR /&gt;&amp;nbsp;service-object tcp&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&lt;BR /&gt;access-list inside_access_in_1 extended permit object-group DM_INLINE_SERVICE_2 any any&lt;BR /&gt;access-list outside_access_in_1 extended permit object-group DM_INLINE_SERVICE_1 any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (outside,inside) dynamic interface&lt;BR /&gt;access-group inside_access_in_1 in interface inside&lt;BR /&gt;access-group outside_access_in_1 in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 172.20.0.0 255.255.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.20.100.204-172.20.101.75 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:965268bd0f8d4c4741847c9ad301c635&lt;BR /&gt;: end&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039504#M135853</guid>
      <dc:creator>servicioit</dc:creator>
      <dc:date>2019-03-12T09:19:19Z</dc:date>
    </item>
    <item>
      <title>I am by no means an ASA Guru</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039505#M135858</link>
      <description>&lt;P&gt;I am by no means an ASA Guru but shouldn't you be inspecting HTTP traffic? &amp;nbsp;Or does it automatically get matched&amp;nbsp;as part of the class-map inspection_default?&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 16:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039505#M135858</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2017-05-04T16:10:42Z</dc:date>
    </item>
    <item>
      <title>Attached the defautl</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039506#M135864</link>
      <description>&lt;P&gt;Attached the defautl inspections&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 16:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039506#M135864</guid>
      <dc:creator>servicioit</dc:creator>
      <dc:date>2017-05-04T16:31:54Z</dc:date>
    </item>
    <item>
      <title>Your NAT interfaces are</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039507#M135869</link>
      <description>&lt;P&gt;Your NAT interfaces are backwards. Should be&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network obj_any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can and should remove the ACL applied ot the outside interface. The ASA is stateful and will create pinholes back in to allow traffic.&lt;/P&gt;
&lt;P&gt;You&amp;nbsp;can&amp;nbsp;see where it is failing with the following command-&lt;/P&gt;
&lt;P&gt;packet-tracer input inside tcp 172.20.100.5 3943 8.8.8.8 80 detail&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 17:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039507#M135869</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2017-05-04T17:28:10Z</dc:date>
    </item>
    <item>
      <title>I need  the ACL from outside</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039508#M135873</link>
      <description>&lt;P&gt;I need &amp;nbsp;the ACL from outside to inside because I need to reach a captive portal on 172.20.100.2 from 192.168.1.99 (computer)&lt;/P&gt;
&lt;P&gt;So I reach this captive portal but I cannot surf internet after I authenticate succesfully in the captive portal although I can ping &lt;A href="https://community.cisco.com/www.google.es" target="_blank"&gt;www.google.es&lt;/A&gt; after authenticate&lt;/P&gt;
&lt;P&gt;do you have any ideas?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 19:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039508#M135873</guid>
      <dc:creator>servicioit</dc:creator>
      <dc:date>2017-05-04T19:04:46Z</dc:date>
    </item>
    <item>
      <title>If i understand the topology</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039509#M135876</link>
      <description>&lt;P&gt;If i understand the topology correct, you have a user (192.168.1.199) on the outside, who is being authenticated VIA captive portal using an internal machine(172.20.100.2) for internet access. Please correct me if i am wrong.&lt;/P&gt;
&lt;P&gt;Do you see the initial authentication connection from the .119 machine to .2 on the ASA ? &amp;nbsp;Run the command " show conn &amp;nbsp;| in 172.20.100.2 ".&lt;/P&gt;
&lt;P&gt;Do the internal subnet 172.20.0.0/16 have issue accessing the internet ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Run the below capture command on the outside interface:&lt;/P&gt;
&lt;P&gt;capture out interface outside match icmp any host 8.8.8.8&lt;/P&gt;
&lt;P&gt;initiate ping to 8.8.8.8 after the user is authenticated and &amp;nbsp;take the output of&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show capture out&lt;/P&gt;
&lt;P&gt;Also, please paste the logs prior to the Deny (No TCP connection)&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Akhil&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2017 19:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039509#M135876</guid>
      <dc:creator>Akhil.Balachandran</dc:creator>
      <dc:date>2017-05-04T19:33:32Z</dc:date>
    </item>
    <item>
      <title>Hi Akhil.</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039510#M135877</link>
      <description>&lt;P&gt;Hi Akhil.&lt;/P&gt;
&lt;P&gt;Thanks for your help.&lt;/P&gt;
&lt;P&gt;You are right. My user is on 192.168.1.199 Gw 192.168.1.200 and my captive portal is&amp;nbsp; on 172.20.100.2 and my asa interface inside is on 172.20.100.200/16 and my interface outside is on 192.168.1.200/24&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;&lt;EM&gt;Do you see the initial authentication connection from the .119 machine to .2 on the ASA ? &amp;nbsp;Run the command " show conn &amp;nbsp;| in 172.20.100.2 ".&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(128, 128, 128);"&gt;If I run sh con&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-size: 10pt;"&gt;&lt;EM&gt;UDP outside&amp;nbsp; 8.8.8.8:53 outside&amp;nbsp; 192.168.1.199:58282, idle 0:00:27, bytes 30, flags -&lt;BR /&gt;UDP outside&amp;nbsp; 8.8.8.8:53 outside&amp;nbsp; 192.168.1.199:60564, idle 0:00:27, bytes 30, flags -&lt;BR /&gt;UDP outside&amp;nbsp; 8.8.8.8:53 outside&amp;nbsp; 192.168.1.199:55531, idle 0:00:27, bytes 30, flags -&lt;BR /&gt;UDP outside&amp;nbsp; 8.8.8.8:53 outside&amp;nbsp; 192.168.1.199:58089, idle 0:00:27, bytes 30, flags -&lt;BR /&gt;UDP outside&amp;nbsp; 8.8.8.8:53 outside&amp;nbsp; 192.168.1.199:51813, idle 0:00:27, bytes 30, flags -&lt;BR /&gt;UDP outside&amp;nbsp; 8.8.8.8:53 outside&amp;nbsp; 192.168.1.199:64212, idle 0:00:28, bytes 41, flags -&lt;BR /&gt;UDP outside&amp;nbsp; 8.8.8.8:53 outside&amp;nbsp; 192.168.1.199:57634, idle 0:00:31, bytes 29, flags -&lt;BR /&gt;UDP outside&amp;nbsp; 8.8.8.8:53 outside&amp;nbsp; 192.168.1.199:64760, idle 0:00:31, bytes 32, flags -&lt;BR /&gt;TCP outside&amp;nbsp; 172.20.100.200(192.168.1.199):65069 inside&amp;nbsp; 172.20.100.2:8880, idle 0:00:18, bytes 3007, flags UfrxIOB&lt;BR /&gt;TCP outside&amp;nbsp; 172.20.100.200(192.168.1.199):65040 inside&amp;nbsp; 172.20.0.122:13000, idle 0:03:38, bytes 423463, flags UxIOB&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;&lt;EM&gt;Do the internal subnet 172.20.0.0/16 have issue accessing the internet &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(128, 128, 128);"&gt;Yes, this is&amp;nbsp;my problem. The internal subnet (&lt;FONT color="#808080"&gt;172.20.0.0/16&lt;/FONT&gt;) cannot acces to the internet&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;initiate ping to 8.8.8.8 after the user is authenticated and &amp;nbsp;take the output of&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;show capture out&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa# show capture out&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;12 packets captured&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp; 1: 00:00:36.174475&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp; 2: 00:00:36.174673&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp; 3: 00:00:37.174032&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp; 4: 00:00:37.174063&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp; 5: 00:00:38.172308&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp; 6: 00:00:38.172339&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp; 7: 00:00:39.170080&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp; 8: 00:00:39.170111&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp; 9: 00:00:50.669505&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; 10: 00:00:50.669719&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; 11: 00:00:51.663112&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; 12: 00:00:51.663143&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#100 P0 192.168.1.199 &amp;gt; 8.8.8.8: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;12 packets shown&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;please paste the logs prior to the Deny (No TCP connection)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;4|May 05 2017|00:04:41|733100|||||[ Scanning] drop rate-2 exceeded. Current burst rate is 3 per second, max configured rate is 8; Current average rate is 50 per second, max configured rate is 4; Cumulative total count is 180400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;4|May 05 2017|00:04:41|733100|||||[ Scanning] drop rate-1 exceeded. Current burst rate is 23 per second, max configured rate is 10; Current average rate is 50 per second, max configured rate is 5; Cumulative total count is 30222&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:27|302014|192.168.1.199|65160|193.110.128.109|80|Teardown TCP connection 34951 for outside:192.168.1.199/65160 to outside:193.110.128.109/80 duration 0:00:00 bytes 0 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:27|302013|192.168.1.199|65160|193.110.128.109|80|Built inbound TCP connection 34951 for outside:192.168.1.199/65160 (192.168.1.199/65160) to outside:193.110.128.109/80 (193.110.128.109/80)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:25|106015|192.168.1.199|65160|193.110.128.109|80|Deny TCP (no connection) from 192.168.1.199/65160 to 193.110.128.109/80 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:21|106015|192.168.1.199|65160|193.110.128.109|80|Deny TCP (no connection) from 192.168.1.199/65160 to 193.110.128.109/80 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;4|May 05 2017|00:04:21|733100|||||[ Scanning] drop rate-1 exceeded. Current burst rate is 22 per second, max configured rate is 10; Current average rate is 50 per second, max configured rate is 5; Cumulative total count is 30237&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:21|302014|192.168.1.199|65160|193.110.128.109|80|Teardown TCP connection 34950 for outside:192.168.1.199/65160 to outside:193.110.128.109/80 duration 0:00:00 bytes 0 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:21|302013|192.168.1.199|65160|193.110.128.109|80|Built inbound TCP connection 34950 for outside:192.168.1.199/65160 (192.168.1.199/65160) to outside:193.110.128.109/80 (193.110.128.109/80)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:20|106015|192.168.1.199|65158|195.122.177.165|443|Deny TCP (no connection) from 192.168.1.199/65158 to 195.122.177.165/443 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:19|106015|192.168.1.199|65160|193.110.128.109|80|Deny TCP (no connection) from 192.168.1.199/65160 to 193.110.128.109/80 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:18|302014|192.168.1.199|65160|193.110.128.109|80|Teardown TCP connection 34949 for outside:192.168.1.199/65160 to outside:193.110.128.109/80 duration 0:00:00 bytes 0 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:18|302013|192.168.1.199|65160|193.110.128.109|80|Built inbound TCP connection 34949 for outside:192.168.1.199/65160 (192.168.1.199/65160) to outside:193.110.128.109/80 (193.110.128.109/80)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:17|106015|192.168.1.199|65158|195.122.177.165|443|Deny TCP (no connection) from 192.168.1.199/65158 to 195.122.177.165/443 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:15|106015|192.168.1.199|65157|195.122.177.147|443|Deny TCP (no connection) from 192.168.1.199/65157 to 195.122.177.147/443 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:14|106015|192.168.1.199|65158|195.122.177.165|443|Deny TCP (no connection) from 192.168.1.199/65158 to 195.122.177.165/443 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:12|106015|192.168.1.199|65157|195.122.177.147|443|Deny TCP (no connection) from 192.168.1.199/65157 to 195.122.177.147/443 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:11|106015|192.168.1.199|65158|195.122.177.165|443|Deny TCP (no connection) from 192.168.1.199/65158 to 195.122.177.165/443 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:11|302014|192.168.1.199|65158|195.122.177.165|443|Teardown TCP connection 34948 for outside:192.168.1.199/65158 to outside:195.122.177.165/443 duration 0:00:00 bytes 0 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:11|302013|192.168.1.199|65158|195.122.177.165|443|Built inbound TCP connection 34948 for outside:192.168.1.199/65158 (192.168.1.199/65158) to outside:195.122.177.165/443 (195.122.177.165/443)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:09|106015|192.168.1.199|65157|195.122.177.147|443|Deny TCP (no connection) from 192.168.1.199/65157 to 195.122.177.147/443 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:08|106015|192.168.1.199|65158|195.122.177.165|443|Deny TCP (no connection) from 192.168.1.199/65158 to 195.122.177.165/443 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:06|302014|192.168.1.199|65157|195.122.177.147|443|Teardown TCP connection 34943 for outside:192.168.1.199/65157 to outside:195.122.177.147/443 duration 0:00:09 bytes 0 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:06|302014|192.168.1.199|65156|193.110.128.109|80|Teardown TCP connection 34947 for outside:192.168.1.199/65156 to outside:193.110.128.109/80 duration 0:00:00 bytes 0 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:06|302013|192.168.1.199|65156|193.110.128.109|80|Built inbound TCP connection 34947 for outside:192.168.1.199/65156 (192.168.1.199/65156) to outside:193.110.128.109/80 (193.110.128.109/80)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:05|106015|192.168.1.199|65158|195.122.177.165|443|Deny TCP (no connection) from 192.168.1.199/65158 to 195.122.177.165/443 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:05|302014|192.168.1.199|65158|195.122.177.165|443|Teardown TCP connection 34946 for outside:192.168.1.199/65158 to outside:195.122.177.165/443 duration 0:00:00 bytes 0 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:05|302013|192.168.1.199|65158|195.122.177.165|443|Built inbound TCP connection 34946 for outside:192.168.1.199/65158 (192.168.1.199/65158) to outside:195.122.177.165/443 (195.122.177.165/443)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:02|302014|192.168.1.199|65158|195.122.177.165|443|Teardown TCP connection 34945 for outside:192.168.1.199/65158 to outside:195.122.177.165/443 duration 0:00:00 bytes 0 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:02|302013|192.168.1.199|65158|195.122.177.165|443|Built inbound TCP connection 34945 for outside:192.168.1.199/65158 (192.168.1.199/65158) to outside:195.122.177.165/443 (195.122.177.165/443)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;4|May 05 2017|00:04:01|733100|||||[ Scanning] drop rate-1 exceeded. Current burst rate is 26 per second, max configured rate is 10; Current average rate is 50 per second, max configured rate is 5; Cumulative total count is 30172&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:00|106015|192.168.1.199|65156|193.110.128.109|80|Deny TCP (no connection) from 192.168.1.199/65156 to 193.110.128.109/80 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:00|302014|192.168.1.199|65156|193.110.128.109|80|Teardown TCP connection 34944 for outside:192.168.1.199/65156 to outside:193.110.128.109/80 duration 0:00:00 bytes 0 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:04:00|302013|192.168.1.199|65156|193.110.128.109|80|Built inbound TCP connection 34944 for outside:192.168.1.199/65156 (192.168.1.199/65156) to outside:193.110.128.109/80 (193.110.128.109/80)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:58|106015|192.168.1.199|65156|193.110.128.109|80|Deny TCP (no connection) from 192.168.1.199/65156 to 193.110.128.109/80 flags RST&amp;nbsp; on interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:57|302014|192.168.1.199|65156|193.110.128.109|80|Teardown TCP connection 34942 for outside:192.168.1.199/65156 to outside:193.110.128.109/80 duration 0:00:00 bytes 0 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:57|302013|192.168.1.199|65157|195.122.177.147|443|Built inbound TCP connection 34943 for outside:192.168.1.199/65157 (192.168.1.199/65157) to outside:195.122.177.147/443 (195.122.177.147/443)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:57|302013|192.168.1.199|65156|193.110.128.109|80|Built inbound TCP connection 34942 for outside:192.168.1.199/65156 (192.168.1.199/65156) to outside:193.110.128.109/80 (193.110.128.109/80)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:56|305012|192.168.1.199|65147|172.20.100.200|65147|Teardown dynamic TCP translation from outside:192.168.1.199/65147 to inside:172.20.100.200/65147 duration 0:00:06&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:56|302014|192.168.1.199|65147|172.20.100.2|8880|Teardown TCP connection 34940 for outside:192.168.1.199/65147 to inside:172.20.100.2/8880 duration 0:00:06 bytes 2194 TCP FINs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:56|302013|192.168.1.199|65150|172.20.100.2|8880|Built inbound TCP connection 34941 for outside:192.168.1.199/65150 (172.20.100.200/65150) to inside:172.20.100.2/8880 (172.20.100.2/8880)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:56|305011|192.168.1.199|65150|172.20.100.200|65150|Built dynamic TCP translation from outside:192.168.1.199/65150 to inside:172.20.100.200/65150&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:50|302013|192.168.1.199|65147|172.20.100.2|8880|Built inbound TCP connection 34940 for outside:192.168.1.199/65147 (172.20.100.200/65147) to inside:172.20.100.2/8880 (172.20.100.2/8880)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:50|305011|192.168.1.199|65147|172.20.100.200|65147|Built dynamic TCP translation from outside:192.168.1.199/65147 to inside:172.20.100.200/65147&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:49|302015|192.168.1.199|55720|8.8.8.8|53|Built inbound UDP connection 34939 for outside:192.168.1.199/55720 (192.168.1.199/55720) to outside:8.8.8.8/53 (8.8.8.8/53)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:49|302015|192.168.1.199|59800|8.8.8.8|53|Built inbound UDP connection 34938 for outside:192.168.1.199/59800 (192.168.1.199/59800) to outside:8.8.8.8/53 (8.8.8.8/53)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:49|302015|192.168.1.199|53363|8.8.8.8|53|Built inbound UDP connection 34937 for outside:192.168.1.199/53363 (192.168.1.199/53363) to outside:8.8.8.8/53 (8.8.8.8/53)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:49|302015|192.168.1.199|54153|8.8.8.8|53|Built inbound UDP connection 34936 for outside:192.168.1.199/54153 (192.168.1.199/54153) to outside:8.8.8.8/53 (8.8.8.8/53)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:42|302014|192.168.1.199|65124|13.107.5.80|80|Teardown TCP connection 34921 for outside:192.168.1.199/65124 to outside:13.107.5.80/80 duration 0:00:30 bytes 0 SYN Timeout&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;4|May 05 2017|00:03:41|733100|||||[ Scanning] drop rate-1 exceeded. Current burst rate is 25 per second, max configured rate is 10; Current average rate is 50 per second, max configured rate is 5; Cumulative total count is 30193&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:41|302014|172.20.100.2|59304|172.20.100.200|443|Teardown TCP connection 34928 for inside:172.20.100.2/59304 to identity:172.20.100.200/443 duration 0:00:26 bytes 595 TCP FINs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:41|302014|172.20.100.2|59308|172.20.100.200|443|Teardown TCP connection 34930 for inside:172.20.100.2/59308 to identity:172.20.100.200/443 duration 0:00:26 bytes 441 TCP FINs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:41|302014|172.20.100.2|59310|172.20.100.200|443|Teardown TCP connection 34931 for inside:172.20.100.2/59310 to identity:172.20.100.200/443 duration 0:00:26 bytes 579 TCP FINs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;4|May 05 2017|00:03:21|733100|||||[ Scanning] drop rate-1 exceeded. Current burst rate is 26 per second, max configured rate is 10; Current average rate is 50 per second, max configured rate is 5; Cumulative total count is 30167&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:18|305012|192.168.1.199|65132|172.20.100.200|65132|Teardown dynamic TCP translation from outside:192.168.1.199/65132 to inside:172.20.100.200/65132 duration 0:00:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:18|302014|192.168.1.199|65132|172.20.0.122|13000|Teardown TCP connection 34935 for outside:192.168.1.199/65132 to inside:172.20.0.122/13000 duration 0:00:00 bytes 17680 TCP FINs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:18|302013|192.168.1.199|65132|172.20.0.122|13000|Built inbound TCP connection 34935 for outside:192.168.1.199/65132 (172.20.100.200/65132) to inside:172.20.0.122/13000 (172.20.0.122/13000)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:18|305011|192.168.1.199|65132|172.20.100.200|65132|Built dynamic TCP translation from outside:192.168.1.199/65132 to inside:172.20.100.200/65132&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:16|305012|192.168.1.199|65131|172.20.100.200|65131|Teardown dynamic TCP translation from outside:192.168.1.199/65131 to inside:172.20.100.200/65131 duration 0:00:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:16|302014|192.168.1.199|65131|172.20.0.122|13000|Teardown TCP connection 34934 for outside:192.168.1.199/65131 to inside:172.20.0.122/13000 duration 0:00:00 bytes 0 TCP FINs&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:16|302013|192.168.1.199|65131|172.20.0.122|13000|Built inbound TCP connection 34934 for outside:192.168.1.199/65131 (172.20.100.200/65131) to inside:172.20.0.122/13000 (172.20.0.122/13000)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:16|305011|192.168.1.199|65131|172.20.100.200|65131|Built dynamic TCP translation from outside:192.168.1.199/65131 to inside:172.20.100.200/65131&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|302015|192.168.1.199|64843|8.8.8.8|53|Built inbound UDP connection 34933 for outside:192.168.1.199/64843 (192.168.1.199/64843) to outside:8.8.8.8/53 (8.8.8.8/53)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|106015|172.20.100.2|59314|172.20.100.200|443|Deny TCP (no connection) from 172.20.100.2/59314 to 172.20.100.200/443 flags FIN ACK&amp;nbsp; on interface inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|302014|172.20.100.2|59314|172.20.100.200|443|Teardown TCP connection 34932 for inside:172.20.100.2/59314 to identity:172.20.100.200/443 duration 0:00:00 bytes 1465 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725007|172.20.100.2|59314|||SSL session with client inside:172.20.100.2/59314 terminated.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|605005|172.20.100.2|59314|172.20.100.200|https|Login permitted from 172.20.100.2/59314 to inside:172.20.100.200/https for user "enable_15"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725002|172.20.100.2|59314|||Device completed SSL handshake with client inside:172.20.100.2/59314&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725003|172.20.100.2|59314|||SSL client inside:172.20.100.2/59314 request to resume previous session.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725001|172.20.100.2|59314|||Starting SSL handshake with client inside:172.20.100.2/59314 for TLS session.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|302013|172.20.100.2|59314|172.20.100.200|443|Built inbound TCP connection 34932 for inside:172.20.100.2/59314 (172.20.100.2/59314) to identity:172.20.100.200/443 (172.20.100.200/443)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725007|172.20.100.2|59310|||SSL session with client inside:172.20.100.2/59310 terminated.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|605005|172.20.100.2|59310|172.20.100.200|https|Login permitted from 172.20.100.2/59310 to inside:172.20.100.200/https for user "enable_15"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725002|172.20.100.2|59310|||Device completed SSL handshake with client inside:172.20.100.2/59310&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725003|172.20.100.2|59310|||SSL client inside:172.20.100.2/59310 request to resume previous session.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725001|172.20.100.2|59310|||Starting SSL handshake with client inside:172.20.100.2/59310 for TLS session.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725007|172.20.100.2|59308|||SSL session with client inside:172.20.100.2/59308 terminated.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|302013|172.20.100.2|59310|172.20.100.200|443|Built inbound TCP connection 34931 for inside:172.20.100.2/59310 (172.20.100.2/59310) to identity:172.20.100.200/443 (172.20.100.200/443)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|605005|172.20.100.2|59308|172.20.100.200|https|Login permitted from 172.20.100.2/59308 to inside:172.20.100.200/https for user "enable_15"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725002|172.20.100.2|59308|||Device completed SSL handshake with client inside:172.20.100.2/59308&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725003|172.20.100.2|59308|||SSL client inside:172.20.100.2/59308 request to resume previous session.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725001|172.20.100.2|59308|||Starting SSL handshake with client inside:172.20.100.2/59308 for TLS session.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725007|172.20.100.2|59306|||SSL session with client inside:172.20.100.2/59306 terminated.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|302013|172.20.100.2|59308|172.20.100.200|443|Built inbound TCP connection 34930 for inside:172.20.100.2/59308 (172.20.100.2/59308) to identity:172.20.100.200/443 (172.20.100.200/443)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|106015|172.20.100.2|59306|172.20.100.200|443|Deny TCP (no connection) from 172.20.100.2/59306 to 172.20.100.200/443 flags FIN ACK&amp;nbsp; on interface inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|302014|172.20.100.2|59306|172.20.100.200|443|Teardown TCP connection 34929 for inside:172.20.100.2/59306 to identity:172.20.100.200/443 duration 0:00:00 bytes 393 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;5|May 05 2017|00:03:14|111010|||||User 'enable_15', running 'CLI' from IP 0.0.0.0, executed 'dir disk0:/dap.xml'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;5|May 05 2017|00:03:14|111008|||||User 'enable_15' executed the 'dir disk0:/dap.xml' command.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|605005|172.20.100.2|59306|172.20.100.200|https|Login permitted from 172.20.100.2/59306 to inside:172.20.100.200/https for user "enable_15"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725002|172.20.100.2|59306|||Device completed SSL handshake with client inside:172.20.100.2/59306&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725003|172.20.100.2|59306|||SSL client inside:172.20.100.2/59306 request to resume previous session.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725001|172.20.100.2|59306|||Starting SSL handshake with client inside:172.20.100.2/59306 for TLS session.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725007|172.20.100.2|59304|||SSL session with client inside:172.20.100.2/59304 terminated.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|302013|172.20.100.2|59306|172.20.100.200|443|Built inbound TCP connection 34929 for inside:172.20.100.2/59306 (172.20.100.2/59306) to identity:172.20.100.200/443 (172.20.100.200/443)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|605005|172.20.100.2|59304|172.20.100.200|https|Login permitted from 172.20.100.2/59304 to inside:172.20.100.200/https for user "enable_15"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725002|172.20.100.2|59304|||Device completed SSL handshake with client inside:172.20.100.2/59304&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|302014|172.20.100.2|59302|172.20.100.200|443|Teardown TCP connection 34927 for inside:172.20.100.2/59302 to identity:172.20.100.200/443 duration 0:00:00 bytes 10070 TCP Reset-O&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725003|172.20.100.2|59304|||SSL client inside:172.20.100.2/59304 request to resume previous session.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725001|172.20.100.2|59304|||Starting SSL handshake with client inside:172.20.100.2/59304 for TLS session.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;6|May 05 2017|00:03:14|725007|172.20.100.2|59302|||SSL session with client inside:172.20.100.2/59302 terminated.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 10:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039510#M135877</guid>
      <dc:creator>servicioit</dc:creator>
      <dc:date>2017-05-05T10:23:52Z</dc:date>
    </item>
    <item>
      <title>Thanks for the output.</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039511#M135878</link>
      <description>&lt;P&gt;Thanks for the output.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;From the captures, i see that the echo request is going out, but there is no echo reply seen on the ASA. From the earlier post ,i believe the pings work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This looks like an issue with asymmetric routing. &amp;nbsp;Ideally, the ASA should have seen both the echo request and echo reply.But in this case, AsA is only seeing the echo request, but the pings still succeeds which proves that there might be some asymmetric routing, where in the upstream device is sending the traffic directly over to the host machine, instead of sending it VIA the ASA.&lt;/P&gt;
&lt;P&gt;The reason, the pings works is because it is a stateless connection, ASA does not keep track of ICMP connection (this can be changed by enabling icmp inspection). &amp;nbsp;However, TCP connection is stateful, ASA has to see the full flow (SYN,SYNACK, ACK) to built a connection successfully.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Logs TCP connections&amp;nbsp;when the .199 machine tries to go out to the internet, but it times out, probably because there is no reply coming back to the ASA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;0|Teardown TCP connection 34921 for outside:192.168.1.199/65124 to outside:13.107.5.80/80 duration 0:00:30 bytes 0 SYN Timeout&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Try the below Nat statements and let me know if it works,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; Object network obj_172.16&lt;BR /&gt; subnet 172.20.0.0 255.255.0.0&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt; &lt;BR /&gt; object network obj_192.168.1.0&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt; nat (outside,outside) dynamic interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The 192.168.1.0 nat is to check if the reply traffic is sent back to the ASA instead of the machine 192.168.1.199&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Akhil&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 12:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039511#M135878</guid>
      <dc:creator>Akhil.Balachandran</dc:creator>
      <dc:date>2017-05-05T12:24:22Z</dc:date>
    </item>
    <item>
      <title>Hi Akhil</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039512#M135879</link>
      <description>&lt;P&gt;Hi Akhil&lt;/P&gt;
&lt;P&gt;Thanks for your response.&lt;/P&gt;
&lt;P&gt;I put your two rules and the portal captive is not reachable now.&lt;/P&gt;
&lt;P&gt;So, I change the first nat rule from inside to inside and &lt;SPAN style="color: rgb(255, 0, 0);"&gt;everything works OK.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Now, I deleted my old nat rule from inside to outside and everytihing is still working.&lt;/P&gt;
&lt;P&gt;I don't understand why, but with these new rules I can reach captive portal and I can authenticate and I can surf to the Internet. Just what I needed......&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network obj_172.16&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;nat (inside,inside) dynamic interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network obj_192.168.1.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;nat (outside,outside) dynamic interface&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Do you thing this configuration is correct?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks a lot....&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 13:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039512#M135879</guid>
      <dc:creator>servicioit</dc:creator>
      <dc:date>2017-05-05T13:56:04Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039513#M135880</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That's strange. &amp;nbsp;Can you remove the Nat (inside, inside) and let me know if everything still works.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I dont see a reason why you require the inside, inside nat. Is there any traffic hair pining or &amp;nbsp;on the inside interface ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Akhil&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 12:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-sites-but-not-browse-the-internet/m-p/3039513#M135880</guid>
      <dc:creator>Akhil.Balachandran</dc:creator>
      <dc:date>2017-05-08T12:54:48Z</dc:date>
    </item>
  </channel>
</rss>

