<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem accessing internet through ASA 5540 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933386#M144783</link>
    <description>&lt;P&gt;Hello, I´m setting up an ASA 5540 from scratch. Right now is only for testing and understanding purposes, so the configuration is very simple. My problem is that I have a PC in my LAN that can´t reach internet through the ASA. I can´t see what I´m missing, like I said the configuration is very simple so this shouldn´t be an issue. Here´s the configuration:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# show running-config &lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.3(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password X encrypted&lt;BR /&gt;passwd X encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif OUTSIDE&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 200.X.X.194 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif INSIDE&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.227.225.1 255.255.252.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif FTTH&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.229.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;nameif CMTS &amp;nbsp;&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.61.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.22 255.255.255.0 &lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network CACTI &lt;BR /&gt;&amp;nbsp;host 10.227.224.11&lt;BR /&gt;object network ip120 &lt;BR /&gt;&amp;nbsp;host 200.X.X.120&lt;BR /&gt;object network ip101 &lt;BR /&gt;&amp;nbsp;host 200.X.X.101&lt;BR /&gt;object network ip102 &lt;BR /&gt;&amp;nbsp;host 200.X.X.102&lt;BR /&gt;object network ip121 &lt;BR /&gt;&amp;nbsp;host 200.X.X.121&lt;BR /&gt;object network ip122 &lt;BR /&gt;&amp;nbsp;host 200.X.X.122&lt;BR /&gt;object network ip123 &lt;BR /&gt;&amp;nbsp;host 200.X.X.123&lt;BR /&gt;object network ip124 &lt;BR /&gt;&amp;nbsp;host 200.X.X.124&lt;BR /&gt;object network ip125 &lt;BR /&gt;&amp;nbsp;host 200.X.X.125&lt;BR /&gt;object network ip126 &lt;BR /&gt;&amp;nbsp;host 200.X.X.126&lt;BR /&gt;object network ip127 &lt;BR /&gt;&amp;nbsp;host 200.X.X.127&lt;BR /&gt;object network Caja_Hipodromo &lt;BR /&gt;&amp;nbsp;host 10.227.225.29&lt;BR /&gt;object network Farma_Eco_NI &lt;BR /&gt;&amp;nbsp;host 10.227.255.3&lt;BR /&gt;object network Gas_Holanda &lt;BR /&gt;&amp;nbsp;host 10.227.225.41&lt;BR /&gt;object network Gasolinera_CM &lt;BR /&gt;&amp;nbsp;host 10.227.225.22&lt;BR /&gt;object network Gasolinera_Samantha &lt;BR /&gt;&amp;nbsp;host 10.227.225.21&lt;BR /&gt;object network Notigram &lt;BR /&gt;&amp;nbsp;host 10.227.224.225&lt;BR /&gt;object network Odoo &lt;BR /&gt;&amp;nbsp;host 10.227.224.226&lt;BR /&gt;object network AutopartesStgo_SucNI_81 &lt;BR /&gt;&amp;nbsp;host 10.227.225.12&lt;BR /&gt;object network AutopartesStgo_SucNI_554 &lt;BR /&gt;&amp;nbsp;host 10.227.225.12&lt;BR /&gt;object network AutopartesStgo_SucNI_8000 &lt;BR /&gt;&amp;nbsp;host 10.227.225.12&lt;BR /&gt;access-list INSIDE_nat_outbound extended permit ip 10.227.224.0 255.255.252.0 any &lt;BR /&gt;access-list OUTSIDE_access_in remark Cacti&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any object ip120 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Caja Hipodromo&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.123 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto caja hipodromo NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10443 inactive &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto caja hipodromo NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10500 inactive &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto caja hipodromo NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 14500 inactive &lt;BR /&gt;access-list OUTSIDE_access_in remark Farmacia Economica NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.102 &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto Ferrepisos NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 13389 &lt;BR /&gt;access-list OUTSIDE_access_in remark Gasolinera Samantha&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.127 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Autopartes Stgo Suc NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10081 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Autopartes Stgo Suc NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10554 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Autopartes Stgo Suc NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 18000 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark caja popular progreso&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10587 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark caja popular progreso&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10110 &lt;BR /&gt;access-list OUTSIDE_access_in extended permit udp 200.X.X.0 255.255.255.0 any range 10000 20000 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Odoo Felipe&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.121 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Gasolinera Holanda&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.101 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Servidor Notigram&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.122 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Gasolinera CM&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.124 log disable &lt;BR /&gt;access-list CMTS_nat_outbound extended permit ip 10.39.0.0 255.255.0.0 any &lt;BR /&gt;access-list CMTS_nat_outbound_1 extended permit ip 10.27.0.0 255.255.0.0 any &lt;BR /&gt;access-list CMTS_nat_outbound_2 extended permit ip 10.25.0.0 255.255.0.0 any &lt;BR /&gt;access-list FTTH_nat_outbound_1 extended permit ip 10.229.0.0 255.255.255.0 any &lt;BR /&gt;access-list FTTH_nat_outbound_1 extended permit ip 10.228.0.0 255.255.240.0 any &lt;BR /&gt;access-list INSIDE_access_in extended permit ip 10.227.224.0 255.255.252.0 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu FTTH 1500&lt;BR /&gt;mtu CMTS 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network AutopartesStgo_SucNI_81&lt;BR /&gt;&amp;nbsp;nat (INSIDE,OUTSIDE) static interface service tcp 81 10081 &lt;BR /&gt;object network AutopartesStgo_SucNI_554&lt;BR /&gt;&amp;nbsp;nat (INSIDE,OUTSIDE) static interface service tcp rtsp 10554 &lt;BR /&gt;object network AutopartesStgo_SucNI_8000&lt;BR /&gt;&amp;nbsp;nat (INSIDE,OUTSIDE) static interface service tcp 8000 18000 &lt;BR /&gt;!&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static CACTI ip120&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Gas_Holanda ip101&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Farma_Eco_NI ip102&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Odoo ip121&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Notigram ip122&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Caja_Hipodromo ip123&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Gasolinera_CM ip124&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Gasolinera_Samantha ip127&lt;BR /&gt;access-group OUTSIDE_access_in in interface OUTSIDE&lt;BR /&gt;access-group INSIDE_access_in in interface INSIDE&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 200.X.X.193 1&lt;BR /&gt;route CMTS 10.24.0.0 255.255.0.0 192.168.61.122 1&lt;BR /&gt;route CMTS 10.25.0.0 255.255.0.0 192.168.61.122 1&lt;BR /&gt;route CMTS 10.26.0.0 255.255.0.0 192.168.61.123 1&lt;BR /&gt;route CMTS 10.27.0.0 255.255.0.0 192.168.61.123 1&lt;BR /&gt;route CMTS 10.38.0.0 255.255.0.0 192.168.61.133 1&lt;BR /&gt;route CMTS 10.39.0.0 255.255.0.0 192.168.61.133 1&lt;BR /&gt;route FTTH 10.228.0.0 255.255.240.0 10.229.0.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 management&lt;BR /&gt;snmp-server location X&lt;BR /&gt;snmp-server contact X&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.0.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username X password X encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:X&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;Right now I'm only using INSIDE and OUTSIDE interfaces, the rest are disconnected. PC have ip address 10.227.224.228, Mask 255.255.252.0, GW 10.227.225.1, DNS publics. PC can ping INSIDE interface 10.227.225.1. Any ideas what I´m doing wrong??? Can anybody help please??&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:33:30 GMT</pubDate>
    <dc:creator>gasparmenendez</dc:creator>
    <dc:date>2019-03-12T08:33:30Z</dc:date>
    <item>
      <title>Problem accessing internet through ASA 5540</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933386#M144783</link>
      <description>&lt;P&gt;Hello, I´m setting up an ASA 5540 from scratch. Right now is only for testing and understanding purposes, so the configuration is very simple. My problem is that I have a PC in my LAN that can´t reach internet through the ASA. I can´t see what I´m missing, like I said the configuration is very simple so this shouldn´t be an issue. Here´s the configuration:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# show running-config &lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.3(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password X encrypted&lt;BR /&gt;passwd X encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif OUTSIDE&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 200.X.X.194 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif INSIDE&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.227.225.1 255.255.252.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif FTTH&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.229.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;nameif CMTS &amp;nbsp;&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.61.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.22 255.255.255.0 &lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network CACTI &lt;BR /&gt;&amp;nbsp;host 10.227.224.11&lt;BR /&gt;object network ip120 &lt;BR /&gt;&amp;nbsp;host 200.X.X.120&lt;BR /&gt;object network ip101 &lt;BR /&gt;&amp;nbsp;host 200.X.X.101&lt;BR /&gt;object network ip102 &lt;BR /&gt;&amp;nbsp;host 200.X.X.102&lt;BR /&gt;object network ip121 &lt;BR /&gt;&amp;nbsp;host 200.X.X.121&lt;BR /&gt;object network ip122 &lt;BR /&gt;&amp;nbsp;host 200.X.X.122&lt;BR /&gt;object network ip123 &lt;BR /&gt;&amp;nbsp;host 200.X.X.123&lt;BR /&gt;object network ip124 &lt;BR /&gt;&amp;nbsp;host 200.X.X.124&lt;BR /&gt;object network ip125 &lt;BR /&gt;&amp;nbsp;host 200.X.X.125&lt;BR /&gt;object network ip126 &lt;BR /&gt;&amp;nbsp;host 200.X.X.126&lt;BR /&gt;object network ip127 &lt;BR /&gt;&amp;nbsp;host 200.X.X.127&lt;BR /&gt;object network Caja_Hipodromo &lt;BR /&gt;&amp;nbsp;host 10.227.225.29&lt;BR /&gt;object network Farma_Eco_NI &lt;BR /&gt;&amp;nbsp;host 10.227.255.3&lt;BR /&gt;object network Gas_Holanda &lt;BR /&gt;&amp;nbsp;host 10.227.225.41&lt;BR /&gt;object network Gasolinera_CM &lt;BR /&gt;&amp;nbsp;host 10.227.225.22&lt;BR /&gt;object network Gasolinera_Samantha &lt;BR /&gt;&amp;nbsp;host 10.227.225.21&lt;BR /&gt;object network Notigram &lt;BR /&gt;&amp;nbsp;host 10.227.224.225&lt;BR /&gt;object network Odoo &lt;BR /&gt;&amp;nbsp;host 10.227.224.226&lt;BR /&gt;object network AutopartesStgo_SucNI_81 &lt;BR /&gt;&amp;nbsp;host 10.227.225.12&lt;BR /&gt;object network AutopartesStgo_SucNI_554 &lt;BR /&gt;&amp;nbsp;host 10.227.225.12&lt;BR /&gt;object network AutopartesStgo_SucNI_8000 &lt;BR /&gt;&amp;nbsp;host 10.227.225.12&lt;BR /&gt;access-list INSIDE_nat_outbound extended permit ip 10.227.224.0 255.255.252.0 any &lt;BR /&gt;access-list OUTSIDE_access_in remark Cacti&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any object ip120 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Caja Hipodromo&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.123 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto caja hipodromo NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10443 inactive &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto caja hipodromo NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10500 inactive &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto caja hipodromo NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 14500 inactive &lt;BR /&gt;access-list OUTSIDE_access_in remark Farmacia Economica NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.102 &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto Ferrepisos NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 13389 &lt;BR /&gt;access-list OUTSIDE_access_in remark Gasolinera Samantha&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.127 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Autopartes Stgo Suc NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10081 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Autopartes Stgo Suc NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10554 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Autopartes Stgo Suc NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 18000 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark caja popular progreso&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10587 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark caja popular progreso&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10110 &lt;BR /&gt;access-list OUTSIDE_access_in extended permit udp 200.X.X.0 255.255.255.0 any range 10000 20000 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Odoo Felipe&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.121 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Gasolinera Holanda&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.101 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Servidor Notigram&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.122 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Gasolinera CM&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.124 log disable &lt;BR /&gt;access-list CMTS_nat_outbound extended permit ip 10.39.0.0 255.255.0.0 any &lt;BR /&gt;access-list CMTS_nat_outbound_1 extended permit ip 10.27.0.0 255.255.0.0 any &lt;BR /&gt;access-list CMTS_nat_outbound_2 extended permit ip 10.25.0.0 255.255.0.0 any &lt;BR /&gt;access-list FTTH_nat_outbound_1 extended permit ip 10.229.0.0 255.255.255.0 any &lt;BR /&gt;access-list FTTH_nat_outbound_1 extended permit ip 10.228.0.0 255.255.240.0 any &lt;BR /&gt;access-list INSIDE_access_in extended permit ip 10.227.224.0 255.255.252.0 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu FTTH 1500&lt;BR /&gt;mtu CMTS 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network AutopartesStgo_SucNI_81&lt;BR /&gt;&amp;nbsp;nat (INSIDE,OUTSIDE) static interface service tcp 81 10081 &lt;BR /&gt;object network AutopartesStgo_SucNI_554&lt;BR /&gt;&amp;nbsp;nat (INSIDE,OUTSIDE) static interface service tcp rtsp 10554 &lt;BR /&gt;object network AutopartesStgo_SucNI_8000&lt;BR /&gt;&amp;nbsp;nat (INSIDE,OUTSIDE) static interface service tcp 8000 18000 &lt;BR /&gt;!&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static CACTI ip120&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Gas_Holanda ip101&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Farma_Eco_NI ip102&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Odoo ip121&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Notigram ip122&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Caja_Hipodromo ip123&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Gasolinera_CM ip124&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Gasolinera_Samantha ip127&lt;BR /&gt;access-group OUTSIDE_access_in in interface OUTSIDE&lt;BR /&gt;access-group INSIDE_access_in in interface INSIDE&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 200.X.X.193 1&lt;BR /&gt;route CMTS 10.24.0.0 255.255.0.0 192.168.61.122 1&lt;BR /&gt;route CMTS 10.25.0.0 255.255.0.0 192.168.61.122 1&lt;BR /&gt;route CMTS 10.26.0.0 255.255.0.0 192.168.61.123 1&lt;BR /&gt;route CMTS 10.27.0.0 255.255.0.0 192.168.61.123 1&lt;BR /&gt;route CMTS 10.38.0.0 255.255.0.0 192.168.61.133 1&lt;BR /&gt;route CMTS 10.39.0.0 255.255.0.0 192.168.61.133 1&lt;BR /&gt;route FTTH 10.228.0.0 255.255.240.0 10.229.0.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 management&lt;BR /&gt;snmp-server location X&lt;BR /&gt;snmp-server contact X&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.0.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username X password X encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:X&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;Right now I'm only using INSIDE and OUTSIDE interfaces, the rest are disconnected. PC have ip address 10.227.224.228, Mask 255.255.252.0, GW 10.227.225.1, DNS publics. PC can ping INSIDE interface 10.227.225.1. Any ideas what I´m doing wrong??? Can anybody help please??&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:33:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933386#M144783</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2019-03-12T08:33:30Z</dc:date>
    </item>
    <item>
      <title>Hi there,</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933387#M144784</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Did you look at the ASA logs what it's doing with the outbound packet originated by the PC? you can do "logging on" and "logging console 7" you can safely use these commands as you mentioned this ASA is not live yet. Also, I would look at the xlate table when you send outbound traffic to make sure it's getting Nated with the right address "sh xlate".&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You have this nat rule configured and it doesn't look right:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (INSIDE,OUTSIDE) static interface service tcp 81 10081&amp;nbsp; ( can you remove service tcp 81 10081) and then check if it works. I assume you have a DNS server configured.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can also use the packet tracer command to see if the traffic is allowed and if not what's the issue-&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input inside tcp "pc address" 1024 (random port number) destination address port number&amp;nbsp; (for destination address you can choose any public address that's reachable via your outside interface)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I hope this helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Nov 2016 22:09:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933387#M144784</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-19T22:09:19Z</dc:date>
    </item>
    <item>
      <title>Looks like a NAT issue. You</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933388#M144785</link>
      <description>&lt;P&gt;Looks like a NAT issue. You have multiple static NAT rules configured but in case your source ip does not match the address specified in your nat rules it will not translate to the ip address of your outside interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You may configure PAT to NAT all traffic from inside to your outside interface ip address&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;B class="cBold"&gt;nat (inside,outside) dynamic interface&lt;/B&gt;&lt;/PRE&gt;
&lt;P&gt;As cofee has already pointed out you may want to check your translation table using &lt;STRONG&gt;show xlate&lt;/STRONG&gt; to verify your traffic is correctly NATed and use the &lt;STRONG&gt;packet-tracer&lt;/STRONG&gt; command to simulate a flow to verify which ACL and which NAT rule would match.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Nov 2016 12:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933388#M144785</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-11-20T12:17:22Z</dc:date>
    </item>
    <item>
      <title>First of all thank you both</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933389#M144786</link>
      <description>&lt;P&gt;First of all thank you both for your help.&lt;/P&gt;
&lt;P&gt;Today's hollyday on my country so I can't run the tests you're suggesting coz I'm not at office, but tomorrow morning first thing will be check what you're telling me.&lt;/P&gt;
&lt;P&gt;I just want to tell you that I have an ASA 5520 in production and working fine. My idea is to replace that 5520 with the 5540 mentioned before, once it's running well. Because that, the 5540 have some configurations from the 5520 that I tried to clone from one to another. Maybe isn't right??&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2016 18:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933389#M144786</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2016-11-21T18:52:04Z</dc:date>
    </item>
    <item>
      <title>I tried what you both told me</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933390#M144787</link>
      <description>&lt;P&gt;I tried what you both told me, without any luck. Firstly I removed nat (INSIDE,OUTSIDE) static interface service tcp 81 10081 and then show xlate, here's the result:&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# show xlate &lt;BR /&gt;10 in use, 11 most used&lt;BR /&gt;Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice&lt;BR /&gt;TCP PAT from INSIDE:10.227.225.12 554-554 to OUTSIDE:200.X.X.194 10554-10554&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sr idle 92:13:11 timeout 0:00:00&lt;BR /&gt;TCP PAT from INSIDE:10.227.225.12 8000-8000 to OUTSIDE:200.X.X.194 18000-18000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sr idle 92:13:11 timeout 0:00:00&lt;BR /&gt;NAT from INSIDE:10.227.224.11 to OUTSIDE:200.X.X.120&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 92:13:11 timeout 0:00:00&lt;BR /&gt;NAT from INSIDE:10.227.225.41 to OUTSIDE:200.X.X.101&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 92:13:11 timeout 0:00:00&lt;BR /&gt;NAT from INSIDE:10.227.255.3 to OUTSIDE:200.X.X.102&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 92:13:11 timeout 0:00:00&lt;BR /&gt;NAT from INSIDE:10.227.224.226 to OUTSIDE:200.X.X.121&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 92:13:11 timeout 0:00:00&lt;BR /&gt;NAT from INSIDE:10.227.224.225 to OUTSIDE:200.X.X.122&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 92:13:11 timeout 0:00:00&lt;BR /&gt;NAT from INSIDE:10.227.225.29 to OUTSIDE:200.X.X.123&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 92:13:11 timeout 0:00:00&lt;BR /&gt;NAT from INSIDE:10.227.225.22 to OUTSIDE:200.X.X.124&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 92:13:11 timeout 0:00:00&lt;BR /&gt;NAT from INSIDE:10.227.225.21 to OUTSIDE:200.X.X.127&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 92:13:11 timeout 0:00:00&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After that I tried packet-tracer. Here's the result:&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# packet-tracer input inSIDE tcp 10.227.224.228 1024 8.8.8.8 8080&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; OUTSIDE&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group INSIDE_access_in in interface INSIDE&lt;BR /&gt;access-list INSIDE_access_in extended permit ip 10.227.224.0 255.255.252.0 any &lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 32580, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: INSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: OUTSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I tried to do nat (inSIDE,ouTSIDE) source dynamic interface but returns error. I also tried "logging on" and "logging console 7" but nothing happens.&lt;/P&gt;
&lt;P&gt;I have public DNS configured in my PC.&lt;/P&gt;
&lt;P&gt;Any other ideas please?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 16:02:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933390#M144787</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2016-11-22T16:02:42Z</dc:date>
    </item>
    <item>
      <title>Nat syntax:</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933391#M144788</link>
      <description>&lt;P&gt;Nat syntax:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source dynamic pc interface&amp;nbsp;(pc is object that you need create and call it. like I said you can name it whatever)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Create object network PC (you can name it whatever):&lt;/P&gt;
&lt;P&gt;object network pc&lt;/P&gt;
&lt;P&gt;subnet 10.227.224.0 255.255.252.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Instead of subnet you can also just specify a single node with host command. Also check the logs to see if you see any deny when you generate traffic for outside from the pc. Can you do a nslookup from the pc and make sure it can resolve things like yahoo and google.com&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 16:32:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933391#M144788</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-22T16:32:50Z</dc:date>
    </item>
    <item>
      <title>Excellent my friend!!! now is</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933392#M144789</link>
      <description>&lt;P&gt;Excellent my friend!!! now is working fine... Cause this is for testing I'll run one more test, this time changing the outside interface. Keep in touch.&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 17:15:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933392#M144789</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2016-11-22T17:15:56Z</dc:date>
    </item>
    <item>
      <title>Hi folks!! Now I have a new</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933393#M144790</link>
      <description>&lt;P&gt;Hi folks!! Now I have a new problem, now in this new scenario:&lt;/P&gt;
&lt;P&gt;I have a Cablemodem connected directly to internet through the WAN interface and in the LAN interface it has&amp;nbsp; ip address 192.168.1.1 and it's not serving DHCP. When I connect my PC directly to de CM I setup a static ip address (192.168.1.3) and can reach the internet without problem. So far so good.&lt;/P&gt;
&lt;P&gt;Now I configured one of the ASA interfaces with that ip address (192.168.1.3), named CM and connected the Cablemodem to it. Right after I do "nat (INSIDE,OUTSIDE) source dynamic PC interface" and make "nat (INSIDE,CM) source dynamic PC interface but the PC isn't reaching internet.&lt;/P&gt;
&lt;P&gt;What I'm doing wrong?? Can anybody helpme please??&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 20:14:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933393#M144790</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2016-11-22T20:14:07Z</dc:date>
    </item>
    <item>
      <title>I didn't see this new block</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933394#M144791</link>
      <description>&lt;P&gt;I didn't see this new block 192.168.1.x/24 anywhere in the configuration you sent earlier. Can you send how you are Nating this address and how is it getting routed to internet? also if you can send the route table.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 20:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933394#M144791</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-22T20:23:20Z</dc:date>
    </item>
    <item>
      <title>Sorry my friend, here's the</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933395#M144792</link>
      <description>&lt;P&gt;Sorry my friend, here's the new configuration:&lt;/P&gt;
&lt;P&gt;ciscoasa# show running-config &lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.3(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password X encrypted&lt;BR /&gt;passwd X encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif OUTSIDE&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 200.X.X.194 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif INSIDE&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.227.225.1 255.255.252.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif CM&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.3 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;nameif CMTS &amp;nbsp;&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.61.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.22 255.255.255.0 &lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network CACTI &lt;BR /&gt;&amp;nbsp;host 10.227.224.11&lt;BR /&gt;object network ip120 &lt;BR /&gt;&amp;nbsp;host 200.X.X.120&lt;BR /&gt;object network ip101 &lt;BR /&gt;&amp;nbsp;host 200.X.X.101&lt;BR /&gt;object network ip102 &lt;BR /&gt;&amp;nbsp;host 200.X.X.102&lt;BR /&gt;object network ip121 &lt;BR /&gt;&amp;nbsp;host 200.X.X.121&lt;BR /&gt;object network ip122 &lt;BR /&gt;&amp;nbsp;host 200.X.X.122&lt;BR /&gt;object network ip123 &lt;BR /&gt;&amp;nbsp;host 200.X.X.123&lt;BR /&gt;object network ip124 &lt;BR /&gt;&amp;nbsp;host 200.X.X.124&lt;BR /&gt;object network ip125 &lt;BR /&gt;&amp;nbsp;host 200.X.X.125&lt;BR /&gt;object network ip126 &lt;BR /&gt;&amp;nbsp;host 200.X.X.126&lt;BR /&gt;object network ip127 &lt;BR /&gt;&amp;nbsp;host 200.X.X.127&lt;BR /&gt;object network Caja_Hipodromo &lt;BR /&gt;&amp;nbsp;host 10.227.225.29&lt;BR /&gt;object network Farma_Eco_NI &lt;BR /&gt;&amp;nbsp;host 10.227.255.3&lt;BR /&gt;object network Gas_Holanda &lt;BR /&gt;&amp;nbsp;host 10.227.225.41&lt;BR /&gt;object network Gasolinera_CM &lt;BR /&gt;&amp;nbsp;host 10.227.225.22&lt;BR /&gt;object network Gasolinera_Samantha &lt;BR /&gt;&amp;nbsp;host 10.227.225.21&lt;BR /&gt;object network Notigram &lt;BR /&gt;&amp;nbsp;host 10.227.224.225&lt;BR /&gt;object network Odoo &lt;BR /&gt;&amp;nbsp;host 10.227.224.226&lt;BR /&gt;object network AutopartesStgo_SucNI_81 &lt;BR /&gt;&amp;nbsp;host 10.227.225.12&lt;BR /&gt;object network AutopartesStgo_SucNI_554 &lt;BR /&gt;&amp;nbsp;host 10.227.225.12&lt;BR /&gt;object network AutopartesStgo_SucNI_8000 &lt;BR /&gt;&amp;nbsp;host 10.227.225.12&lt;BR /&gt;object network PC &lt;BR /&gt;&amp;nbsp;subnet 10.227.224.0 255.255.252.0&lt;BR /&gt;access-list INSIDE_nat_outbound extended permit ip object PC any &lt;BR /&gt;access-list OUTSIDE_access_in remark Cacti&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any object ip120 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Caja Hipodromo&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.123 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto caja hipodromo NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10443 inactive &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto caja hipodromo NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10500 inactive &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto caja hipodromo NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 14500 inactive &lt;BR /&gt;access-list OUTSIDE_access_in remark Farmacia Economica NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.102 &lt;BR /&gt;access-list OUTSIDE_access_in remark puerto Ferrepisos NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 13389 &lt;BR /&gt;access-list OUTSIDE_access_in remark Gasolinera Samantha&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.127 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Autopartes Stgo Suc NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10081 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Autopartes Stgo Suc NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10554 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Autopartes Stgo Suc NI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 18000 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark caja popular progreso&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10587 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark caja popular progreso&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any host 200.X.X.118 eq 10110 &lt;BR /&gt;access-list OUTSIDE_access_in extended permit udp 200.X.X.0 255.255.255.0 any range 10000 20000 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Odoo Felipe&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.121 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Gasolinera Holanda&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.101 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Servidor Notigram&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.122 log disable &lt;BR /&gt;access-list OUTSIDE_access_in remark Gasolinera CM&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any host 200.X.X.124 log disable &lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any any &lt;BR /&gt;access-list CMTS_nat_outbound extended permit ip 10.39.0.0 255.255.0.0 any &lt;BR /&gt;access-list CMTS_nat_outbound_1 extended permit ip 10.27.0.0 255.255.0.0 any &lt;BR /&gt;access-list CMTS_nat_outbound_2 extended permit ip 10.25.0.0 255.255.0.0 any &lt;BR /&gt;access-list FTTH_nat_outbound_1 extended permit ip 10.229.0.0 255.255.255.0 any &lt;BR /&gt;access-list FTTH_nat_outbound_1 extended permit ip 10.228.0.0 255.255.240.0 any &lt;BR /&gt;access-list INSIDE_access_in extended permit ip object PC any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging console debugging&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu CM 1500&lt;BR /&gt;mtu CMTS 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (INSIDE,CM) source dynamic PC interface&lt;BR /&gt;!&lt;BR /&gt;object network AutopartesStgo_SucNI_81&lt;BR /&gt;&amp;nbsp;nat (INSIDE,OUTSIDE) static interface service tcp 81 10081 &lt;BR /&gt;object network AutopartesStgo_SucNI_554&lt;BR /&gt;&amp;nbsp;nat (INSIDE,OUTSIDE) static interface service tcp rtsp 10554 &lt;BR /&gt;object network AutopartesStgo_SucNI_8000&lt;BR /&gt;&amp;nbsp;nat (INSIDE,OUTSIDE) static interface service tcp 8000 18000 &lt;BR /&gt;!&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static CACTI ip120&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Gas_Holanda ip101&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Farma_Eco_NI ip102&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Odoo ip121&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Notigram ip122&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Caja_Hipodromo ip123&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Gasolinera_CM ip124&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source static Gasolinera_Samantha ip127&lt;BR /&gt;access-group OUTSIDE_access_in in interface OUTSIDE&lt;BR /&gt;access-group INSIDE_access_in in interface INSIDE&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 200.X.X.193 1&lt;BR /&gt;route CMTS 10.24.0.0 255.255.0.0 192.168.61.122 1&lt;BR /&gt;route CMTS 10.25.0.0 255.255.0.0 192.168.61.122 1&lt;BR /&gt;route CMTS 10.26.0.0 255.255.0.0 192.168.61.123 1&lt;BR /&gt;route CMTS 10.27.0.0 255.255.0.0 192.168.61.123 1&lt;BR /&gt;route CMTS 10.38.0.0 255.255.0.0 192.168.61.133 1&lt;BR /&gt;route CMTS 10.39.0.0 255.255.0.0 192.168.61.133 1&lt;BR /&gt;route CM 10.228.0.0 255.255.240.0 10.229.0.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 management&lt;BR /&gt;snmp-server location Site-X&lt;BR /&gt;snmp-server contact X&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.0.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username X password X encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:X&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;I only changed:&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif CM&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.3 255.255.255.0&lt;/P&gt;
&lt;P&gt;and:&lt;/P&gt;
&lt;P&gt;nat (INSIDE,CM) source dynamic PC interface&lt;/P&gt;
&lt;P&gt;Regarding route table:&lt;/P&gt;
&lt;P&gt;ciscoasa# show route&lt;BR /&gt;&lt;BR /&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;BR /&gt;&lt;BR /&gt;Gateway of last resort is 200.X.X.193 to network 0.0.0.0&lt;BR /&gt;&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.X.X.192 255.255.255.252 is directly connected, OUTSIDE&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.227.224.0 255.255.252.0 is directly connected, INSIDE&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.228.0.0 255.255.240.0 [1/0] via 10.229.0.2, CM&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.0 255.255.255.0 is directly connected, management&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.0 255.255.255.0 is directly connected, CM&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 200.X.X.193, OUTSIDE&lt;/P&gt;
&lt;P&gt;The only thing I need is that traffic from PC reach internet through CM interface, without affecting other routes that wil reach internet through the OUTSIDE interface.&lt;/P&gt;
&lt;P&gt;Does this help you?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 21:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933395#M144792</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2016-11-22T21:30:42Z</dc:date>
    </item>
    <item>
      <title>You want to NAT your inside</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933396#M144793</link>
      <description>&lt;P&gt;You want to NAT your inside network to CM (192.168.1.x) but you have outside interface configured as the default gateway therefore it doesn't know how to get out.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Since destination address won't be specific you can't configure a route pointing to CM and you can't have dual default gateways. I will have to look it up if there is a way to do it. In the meantime may be someone else can assist you with this.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 21:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933396#M144793</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-22T21:51:46Z</dc:date>
    </item>
    <item>
      <title>create another default router</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933397#M144794</link>
      <description>&lt;P&gt;create another default router using cm interface:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;route cm 0.0.0.0 0.0.0.0 next hop&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;see if that works&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 21:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933397#M144794</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-22T21:57:53Z</dc:date>
    </item>
    <item>
      <title>Sorry these are 2 different</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933398#M144795</link>
      <description>&lt;P&gt;Sorry these are 2 different interfaces so ASA won't accept dual default gateways. Yeah don't install this route because it will remove your current default gateway. I can't think of a solution for this right now.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 22:09:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933398#M144795</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-22T22:09:01Z</dc:date>
    </item>
    <item>
      <title>I really apreciate your help</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933399#M144796</link>
      <description>&lt;P&gt;I really apreciate your help very much &lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A href="https://supportforums.cisco.com/users/cofee0400" title="View user profile." class="username" lang="" about="/users/cofee0400" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;cofee@0400&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;I'm totally agree with you about what you say regarding the 2 default gateways.&lt;/P&gt;
&lt;P&gt;I have only 1 doubt: since the inside network is NATed to CM interface, is not the Cablemodem it self who works as gateway for everything incoming to the LAN port??&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 23:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933399#M144796</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2016-11-22T23:07:47Z</dc:date>
    </item>
    <item>
      <title>The problem is that your ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933400#M144797</link>
      <description>&lt;P&gt;The problem is that your ASA can only use one default route. If traffic from your inside network is received, ASA will determine which outbound interface should be used to route the traffic to.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In case no specific route is found, it will fall back to your configured default route and route traffic according to your configuration. In case you would like to utilize source-based routing (e.g. route traffic from Subnet A to Internet via Uplink CM) PBR would be needed which is available since 9.5.x&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there any reason you want to route traffic destined to the internet to different interfaces?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 23:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933400#M144797</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-11-22T23:17:30Z</dc:date>
    </item>
    <item>
      <title>According to the latest route</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933401#M144798</link>
      <description>&lt;P&gt;According to the latest route table that you sent CM is not the gateway for your Inside network because your inside network is directly connected to the firewall and you are NATing your inside network to CM network hoping that it will route traffic destined to internet using CM interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Think of it like this - source address - 10.x.x.x , destination 98.x.x.x (random public address) , NAted address - 192.168.1.3&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now if you look at the route table you don't have a specific route for 98.x.x.x so it will fall back to default route which is the outside interface in your case.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So may be you will be able to accomplish that using PBR like Kaisero has recommended. I don't know if you would also need to configure a floating default route pointing to CM for PBR to work. But Per Kaisero this is only supported since 9.5 so you may want to think about upgrading your firewall since it's not live yet. I think minimum flash requirement for post ASA 8.3 is 2GB, so make sure you meet that requirement if you decide to go that route.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I will try to mock this in the lab tonight if I get time. Not sure if I have 9.5. Will let you know.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2016 00:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933401#M144798</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-23T00:10:39Z</dc:date>
    </item>
    <item>
      <title>Aight guys I just tested PBR</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933402#M144799</link>
      <description>&lt;DIV&gt;Aight guys I just tested PBR in ASA 9.5 and it will do the job you are looking for. Thanks to&amp;nbsp; Kaisero for pointing this out because I didn't&amp;nbsp; know that PBR was supported by ASA now. I didn't have to create floating default route to make it work cause I guess next hop is specified inside the route-map. But this was tested in a virtual lab so if for some reason it doesn't work you can create this ( route cm 0.0.0.0 0.0.0.0 192.168.1.3 2 )&lt;/DIV&gt;
&lt;DIV&gt;So if your management really wants to implement this then upgrading your firewall to 9.5 ( I think 9.4 also supports but be safe and upgrade to 9.5) and use policy based routing is your only option.&lt;/DIV&gt;
&lt;DIV&gt;For troubleshooting - debug policy-route&lt;/DIV&gt;
&lt;DIV&gt;* NAT is already there from inside to CM so you are good there.&lt;/DIV&gt;
&lt;DIV&gt;This is what you will need to do:&lt;BR /&gt;* Create access list for interesting traffic:&lt;BR /&gt;access-list inside_to_cm permit ip 10.x.x.x 255.x.x.x any log&lt;BR /&gt;!&lt;BR /&gt;* Create route-map&lt;BR /&gt;route-map PBR&amp;nbsp; permit 10&lt;BR /&gt;match ip address inside_to_cm &lt;BR /&gt;set ip next-hop 192.168.1.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (ip for wan interface)&lt;/DIV&gt;
&lt;DIV&gt;* Apply route-map to inside interface&lt;BR /&gt;interface g.xx ( this will be applied to your inside interface)&lt;BR /&gt;policy-route route-map PBR&lt;BR /&gt;!&lt;/DIV&gt;</description>
      <pubDate>Wed, 23 Nov 2016 04:00:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933402#M144799</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-23T04:00:45Z</dc:date>
    </item>
    <item>
      <title>Thank you all guys for your</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933403#M144800</link>
      <description>&lt;P&gt;Thank you all guys for your help. I already tried to upgrade my ASA once but it wasn't possible due to the cost of the license.&lt;/P&gt;
&lt;P&gt;Again thank you very much for your help.&lt;/P&gt;
&lt;P&gt;I'll continue running some tests.&lt;/P&gt;
&lt;P&gt;Keep in touch.&lt;/P&gt;
&lt;P&gt;BR.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2016 15:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933403#M144800</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2016-11-23T15:45:16Z</dc:date>
    </item>
    <item>
      <title>Hi folks, me again...</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933404#M144801</link>
      <description>&lt;P&gt;Hi folks, me again...&lt;/P&gt;
&lt;P&gt;I'm still running tests in the ASA 5540. My problem now is that I can't see the log, don't know how...&lt;/P&gt;
&lt;P&gt;In the ASDM at the bottom I can see the "Latest ASDM Syslog Messages" but are show so fast that I can't see them. In the CLI I don't even have a clue about how to see the log. Can anybody helpme please???&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 19:46:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933404#M144801</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2016-11-29T19:46:42Z</dc:date>
    </item>
    <item>
      <title>Inside the ASDM portal click</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933405#M144802</link>
      <description>&lt;P&gt;Inside the ASDM portal click on monitoring (at the top) - logging (at the bottom of screen) - view&amp;nbsp; ( on this page you can filter the traffic you want to monitor)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;CLI - show log ( show log | inc ip address (address you want to monitor.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 20:03:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-internet-through-asa-5540/m-p/2933405#M144802</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-29T20:03:12Z</dc:date>
    </item>
  </channel>
</rss>

