<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Pulkit,I have done that in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689335#M193652</link>
    <description>&lt;P&gt;Hi Pulkit,&lt;/P&gt;&lt;P&gt;I have done that already and it works, I just thought the&amp;nbsp;ASA could behave as a DNS proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;New problem that I didnt pick up on earlier, the NAT rule added:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; background-color: rgb(245, 249, 237);"&gt;nat (inside) 1 192.168.255.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;prevents the remote access devices in the&amp;nbsp;VPN address pool (10.0.2.0/24) from reaching the internal network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there another NAT rule I can add to override this?&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jul 2015 01:38:50 GMT</pubDate>
    <dc:creator>cliveschneider</dc:creator>
    <dc:date>2015-07-21T01:38:50Z</dc:date>
    <item>
      <title>Cisco ASA 5505 cant grant inside devices outside access (ie intenet access)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689331#M193648</link>
      <description>&lt;P&gt;I have an ASA 5505 providing remote users VPN access to the inside network.&lt;/P&gt;&lt;P&gt;I need to provide a&amp;nbsp;server internet access from the inside. I have set its gateway to the ASA inside address and tinkered endlessly with Access Rules and NAT Rules but cant even ping the modem on the outside. The ASA can reach&amp;nbsp;the modem and the internet without any problems.&amp;nbsp;The packet tracer tool passes every time.&lt;/P&gt;&lt;P&gt;The basic architecture&amp;nbsp;is as follows:&lt;/P&gt;&lt;P&gt;server---(inside)-ASA-(outside)---modem---www---[vpn remote user]&lt;/P&gt;&lt;P&gt;inside network: 192.168.255.0/24&lt;/P&gt;&lt;P&gt;ASA inside:&amp;nbsp;192.168.255.254&lt;/P&gt;&lt;P&gt;ASA outside:&amp;nbsp;10.0.1.254&lt;/P&gt;&lt;P&gt;modem:&amp;nbsp;10.0.1.1&lt;/P&gt;&lt;P&gt;VPN network: 10.0.2.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have attached a copy of my ASA config.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:17:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689331#M193648</guid>
      <dc:creator>cliveschneider</dc:creator>
      <dc:date>2019-03-12T06:17:25Z</dc:date>
    </item>
    <item>
      <title>Hi,As  per your description,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689332#M193649</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;As &amp;nbsp;per your description, it seems we need to allow internet access for a server present on inside interface. It seems that your modem only allows access to internet for 10.x.x.x subnet.&lt;/P&gt;&lt;P&gt;Apply a dynamic NAT.&lt;/P&gt;&lt;P&gt;The statement that should make it work is :&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.255.0 255.255.255.0&lt;/P&gt;&lt;P&gt;We already have a matching global.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pulkit Saxena&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2015 05:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689332#M193649</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2015-07-19T05:07:36Z</dc:date>
    </item>
    <item>
      <title>Pulkit, that worked, thank</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689333#M193650</link>
      <description>&lt;P&gt;Pulkit, that worked, thank you very much!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can now ping the modem and internet IP addresses&amp;nbsp;from my inside server but DNS doesn't seem to be working (eg cant ping google.com).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have DNS Lookup configured on inside and outside:&lt;/P&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
dns domain-lookup inside
dns domain-lookup outside
dns server-group DefaultDNS
 name-server 139.130.4.4
 name-server 203.50.2.71&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2015 07:32:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689333#M193650</guid>
      <dc:creator>cliveschneider</dc:creator>
      <dc:date>2015-07-19T07:32:53Z</dc:date>
    </item>
    <item>
      <title>Hi,Please try changing the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689334#M193651</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please try changing the DNS servers to global DNS servers.&lt;/P&gt;&lt;P&gt;You can use 4.2.2.2 or 8.8.8.8.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pulkit Saxena&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 06:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689334#M193651</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2015-07-20T06:45:59Z</dc:date>
    </item>
    <item>
      <title>Hi Pulkit,I have done that</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689335#M193652</link>
      <description>&lt;P&gt;Hi Pulkit,&lt;/P&gt;&lt;P&gt;I have done that already and it works, I just thought the&amp;nbsp;ASA could behave as a DNS proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;New problem that I didnt pick up on earlier, the NAT rule added:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px; background-color: rgb(245, 249, 237);"&gt;nat (inside) 1 192.168.255.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;prevents the remote access devices in the&amp;nbsp;VPN address pool (10.0.2.0/24) from reaching the internal network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there another NAT rule I can add to override this?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 01:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689335#M193652</guid>
      <dc:creator>cliveschneider</dc:creator>
      <dc:date>2015-07-21T01:38:50Z</dc:date>
    </item>
    <item>
      <title>Hi,We can either specify this</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689336#M193653</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We can either specify this NAT statement itself. You can allow outbound access to only one server if required.&lt;/P&gt;&lt;P&gt;Can you provide ip address and traffic flow specifications, which is not working after the NAT statement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pulkit Saxena&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 08:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689336#M193653</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2015-07-21T08:56:59Z</dc:date>
    </item>
    <item>
      <title>Hi Pulkit,The 'VPN network',</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689337#M193654</link>
      <description>&lt;P&gt;Hi Pulkit,&lt;/P&gt;&lt;P&gt;The 'VPN network', 10.0.2.0/24, which is assigned to any AnyConnect or IPsec VPN remote access device,&amp;nbsp;needs access to the entire internal network 192.168.255.0/24.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Clive&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 21:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689337#M193654</guid>
      <dc:creator>cliveschneider</dc:creator>
      <dc:date>2015-07-21T21:05:00Z</dc:date>
    </item>
    <item>
      <title>Clive,I do feel that our NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689338#M193655</link>
      <description>&lt;P&gt;Clive,&lt;/P&gt;&lt;P&gt;I do feel that our NAT statement should not affect the inbound access.&lt;/P&gt;&lt;P&gt;Since our NAT statement is allowing outbound access. Can you try making the NAT statement specific only allowing access to the server ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pulkit Saxena&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2015 06:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689338#M193655</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2015-07-22T06:13:22Z</dc:date>
    </item>
    <item>
      <title>Hi Pulkit,The NAT statement</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689339#M193656</link>
      <description>&lt;P&gt;Hi Pulkit,&lt;/P&gt;&lt;P&gt;The NAT statement needs to apply to the entire inside network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only changes I can see between the old and new config is the following entry seems to have been removed:&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;When I try and add it again I get an error unless I remove the new entry.&amp;nbsp;&lt;EM&gt;inside_nat0_outbound&lt;/EM&gt; corresponds to:&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;access-list inside_nat0_outbound extended permit ip any vpn-network 255.255.255.0&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2015 08:11:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689339#M193656</guid>
      <dc:creator>cliveschneider</dc:creator>
      <dc:date>2015-07-22T08:11:17Z</dc:date>
    </item>
    <item>
      <title>Clive,Can you share the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689340#M193657</link>
      <description>&lt;P&gt;Clive,&lt;/P&gt;&lt;P&gt;Can you share the current running configuration.&lt;/P&gt;&lt;P&gt;Our NAT statement &amp;nbsp;is certainly not the reason and the vpn will start working once this "nat 0" command is taken.&lt;/P&gt;&lt;P&gt;Provide me the configuration, &amp;nbsp;let me have a look at it and see if we need remove a command and then reapply it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pulkit Saxena&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2015 09:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689340#M193657</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2015-07-22T09:20:43Z</dc:date>
    </item>
    <item>
      <title>I have attached the running</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689341#M193658</link>
      <description>&lt;P&gt;I have attached the&amp;nbsp;running config file. With the two NAT rules, the VPN network dowesnt have access to the inside network. When I remove the rule:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;nat (inside) 1 192.168.255.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;connectivity is restored but the inside network no longer has internet access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also attached a screenshot of the 2 NAT rules on the ASDM.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2015 06:50:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689341#M193658</guid>
      <dc:creator>cliveschneider</dc:creator>
      <dc:date>2015-07-24T06:50:37Z</dc:date>
    </item>
    <item>
      <title>Clive,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689342#M193659</link>
      <description>&lt;P&gt;Clive,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I personally do not have much expertise over the VPN stuff.&lt;/P&gt;
&lt;P&gt;However after looking at the configuration, it seems that this access rule is causing the issue :&lt;/P&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
access-list inside_nat0_outbound extended permit object-group DM_INLINE_PROTOCOL_7 192.168.255.0 255.255.255.0 any&lt;/PRE&gt;

&lt;P&gt;Please remove the nat 0 command and then remove this access rule and then again apply the nat 0 statement.&lt;/P&gt;
&lt;P&gt;I think this should make both things works.&lt;/P&gt;
&lt;P&gt;Ideally to get outbound access, all we required was a dynamic PAT which we applied.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Pulkit Saxena&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2015 15:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689342#M193659</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2015-07-24T15:20:41Z</dc:date>
    </item>
    <item>
      <title>Thanks Pulkit, that worked</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689343#M193660</link>
      <description>&lt;P&gt;Thanks Pulkit, that worked.&lt;/P&gt;&lt;P&gt;That access rule gets automatically generated when I configure my NAT rules the way I had. After removing all NAT rules and corresponding access rules&amp;nbsp;and adding them again, it seems to have worked.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2015 01:41:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cant-grant-inside-devices-outside-access-ie/m-p/2689343#M193660</guid>
      <dc:creator>cliveschneider</dc:creator>
      <dc:date>2015-08-06T01:41:05Z</dc:date>
    </item>
  </channel>
</rss>

