<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I am testing in a &amp;quot;lab&amp;quot; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949891#M155859</link>
    <description>&lt;P&gt;I am testing in a "lab" environment in my home network. When I get the flows correct I will change the outside address to a legitimate, routable IP address.&lt;/P&gt;</description>
    <pubDate>Mon, 08 Aug 2016 00:30:53 GMT</pubDate>
    <dc:creator>fcampbell</dc:creator>
    <dc:date>2016-08-08T00:30:53Z</dc:date>
    <item>
      <title>ASA 5506 cannot get inside PCs to access the Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949889#M155857</link>
      <description>&lt;P&gt;I have a PIX 5506 version 9.5(1) out of the box configured using the ADSM Startup Wizard.&lt;/P&gt;
&lt;P&gt;Per documentation this configuration is supposed to allow any PC to access the Internet&lt;/P&gt;
&lt;P&gt;When I run a packet trace on the the inside (1 implicit incomming rule)&amp;nbsp;&amp;nbsp;to allow access for PCs from behind the firewall to the Internet I get a &amp;nbsp;(nat-xlate-failed) NAT failed error.&lt;/P&gt;
&lt;P&gt;What configuration step am I missing? Do I need to add an access list to allow traffic out?&lt;/P&gt;
&lt;P&gt;The current configuration is listed below. Any help greatly appreciated&lt;/P&gt;
&lt;P&gt;ciscoasa# wr t&lt;BR /&gt;: Saved&lt;/P&gt;
&lt;P&gt;:&lt;BR /&gt;: Serial Number: JAD194800DH&lt;BR /&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.5(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.2.10 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.2.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.100-192.168.1.200 inside&lt;BR /&gt;dhcpd dns 4.2.2.2 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:8b712a9090c458bd79e28403b205dffc&lt;BR /&gt;: end&lt;BR /&gt;[OK]&lt;BR /&gt;ciscoasa#&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949889#M155857</guid>
      <dc:creator>fcampbell</dc:creator>
      <dc:date>2019-03-12T08:06:04Z</dc:date>
    </item>
    <item>
      <title>Without having gone to deep</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949890#M155858</link>
      <description>&lt;P&gt;Without having gone to deep into this yet, I notice your outside and inside interfaces are both private IP ranges. So the question has to be asked about whether you need NAT at all? Are you wanting all traffic from the 192.168.1.0/24 subnet to be seen as coming from 192.168.2.10 ?&lt;/P&gt;</description>
      <pubDate>Sun, 07 Aug 2016 22:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949890#M155858</guid>
      <dc:creator>Bobby Stojceski</dc:creator>
      <dc:date>2016-08-07T22:53:23Z</dc:date>
    </item>
    <item>
      <title>I am testing in a "lab"</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949891#M155859</link>
      <description>&lt;P&gt;I am testing in a "lab" environment in my home network. When I get the flows correct I will change the outside address to a legitimate, routable IP address.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2016 00:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949891#M155859</guid>
      <dc:creator>fcampbell</dc:creator>
      <dc:date>2016-08-08T00:30:53Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949892#M155860</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you please remove the any,outside statement and be more specific:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;G class="gr_ gr_98 gr-alert gr_spell gr_run_anim ContextualSpelling" id="98" data-gr-id="98"&gt;nat&lt;/G&gt; (any,outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Please change it to&amp;nbsp;&lt;SPAN&gt;nat (inside,outside) dynamic interface and then test.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please rate helpful posts and mark correct answers.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2016 00:38:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949892#M155860</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-08-08T00:38:12Z</dc:date>
    </item>
    <item>
      <title>I made the change you</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949893#M155861</link>
      <description>&lt;P&gt;I made the change you suggested. No change in test results. Thank you for the suggestion.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2016 01:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949893#M155861</guid>
      <dc:creator>fcampbell</dc:creator>
      <dc:date>2016-08-08T01:05:44Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949894#M155862</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you share the packet tracer results ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2016 01:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949894#M155862</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-08-08T01:07:50Z</dc:date>
    </item>
    <item>
      <title>can you post for ACL's ? I'm</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949895#M155863</link>
      <description>&lt;P&gt;can you post for ACL's ? I'm not seeing any listed here.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2016 19:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949895#M155863</guid>
      <dc:creator>august70</dc:creator>
      <dc:date>2016-08-08T19:13:51Z</dc:date>
    </item>
    <item>
      <title>I finally have a working</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949896#M155864</link>
      <description>&lt;P&gt;I finally have a working configuration. Thank you all for your help! Comments and ideas greatly appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;From the&amp;nbsp;out of the box default I added/changed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface (default was (any,outside) Thank you Aditya!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network obj-192.168.1.0&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface (this may not be needed given the other nat declaration; comments appreciated)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.2.1 1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;dhcpd dns 4.2.2.2 interface inside (for DNS lookups)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list from_outside extended permit icmp any any echo (allow inside to ping)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect icmp (in policy-map global_policy--&amp;gt;class inspection_default)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is the entire configuration&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ciscoasa#&lt;BR /&gt;ciscoasa# wr t&lt;BR /&gt;: Saved&lt;/P&gt;
&lt;P&gt;:&lt;BR /&gt;: Serial Number: JAD194800DH&lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.5(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.10 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-192.168.1.0&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list from_outside extended permit icmp any any echo&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.2.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.100-192.168.1.200 inside&lt;BR /&gt;dhcpd dns 4.2.2.2 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:73451e2363b0be6416cccc805bdfffc8&lt;BR /&gt;: end&lt;BR /&gt;[OK]&lt;BR /&gt;ciscoasa#&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2016 00:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949896#M155864</guid>
      <dc:creator>fcampbell</dc:creator>
      <dc:date>2016-08-09T00:54:59Z</dc:date>
    </item>
    <item>
      <title>That's a good news.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949897#M155865</link>
      <description>&lt;P&gt;That's a good news.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Glad to assist.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i would request if you can close the post.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2016 01:57:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-cannot-get-inside-pcs-to-access-the-internet/m-p/2949897#M155865</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-08-09T01:57:10Z</dc:date>
    </item>
  </channel>
</rss>

