<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This sounds like a DNS issue  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679813#M193773</link>
    <description>&lt;P&gt;This sounds like a DNS issue (considering you are able to ping to the internet but not browse).&amp;nbsp; What are you using as your DHCP server and is it issuing the clients with a DNS server IP?&amp;nbsp; If you configure a static DNS server on your client machine (for example 4.2.2.2 or 8.8.8.8) are you now able to browse the internet?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Sat, 18 Jul 2015 07:09:22 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2015-07-18T07:09:22Z</dc:date>
    <item>
      <title>Workstation behind asa cant browse the internet</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679805#M193747</link>
      <description>&lt;P&gt;Hi, i'm newbie to cisco asa, &amp;nbsp;but i have an experience in administering different firewall before (freebsd, watchguard)..I thought this setup would be a piece of cake in ASA but im stuck on this one for 2 days already&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so here is my topology, Internal network is 10.0.0.0/24, external is 192.168.254.0/24&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="http://i60.tinypic.com/rassac.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firewall IP is: 10.0.0.1 (internal) 192.168.254.171 (external)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Workstation behind the firewall (10.0.0.2) is &amp;nbsp;able to ping the IP 8.8.8.8 but cannot browse the internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I already configured the NAT/PAT, Access Rules (i configured any-to-any since i cant get it work just by simply allowing port 80/443)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is my config&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;nameif INSIDE&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;&amp;nbsp;nameif OUTSIDE&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.254.171 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list global_access extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source dynamic any interface&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 192.168.254.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.0.0 255.255.255.0 INSIDE&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous prompt 1&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;crashinfo save disable&lt;BR /&gt;Cryptochecksum:2fd0136763ed374daee31263c9544c1b&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Attached is the logs that im getting&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="http://i62.tinypic.com/2d1tuzd.png" /&gt;&lt;/P&gt;&lt;P&gt;Thanks in Advance&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:16:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679805#M193747</guid>
      <dc:creator>radarbackwards</dc:creator>
      <dc:date>2019-03-12T06:16:35Z</dc:date>
    </item>
    <item>
      <title>up!</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679806#M193749</link>
      <description>&lt;P&gt;up!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 02:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679806#M193749</guid>
      <dc:creator>radarbackwards</dc:creator>
      <dc:date>2015-07-17T02:56:41Z</dc:date>
    </item>
    <item>
      <title>Hi,Could you provide the</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679807#M193752</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Could you provide the output of following packet-tracer:&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 10.0.0.2 1025 4.2.2.2 80 de&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prateek Verma&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 06:02:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679807#M193752</guid>
      <dc:creator>prateek.verma</dc:creator>
      <dc:date>2015-07-17T06:02:20Z</dc:date>
    </item>
    <item>
      <title>Hi, as I can see from log PAT</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679808#M193755</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;as I can see from log PAT is ok. Please, provide the following information:&lt;/P&gt;&lt;P&gt;- as&amp;nbsp;&lt;A about="/users/prateekverma" class="username" datatype="" href="https://supportforums.cisco.com/users/prateekverma" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;prateek.verma&lt;/A&gt;&amp;nbsp;asked: packet-tracer result&lt;/P&gt;&lt;P&gt;-&amp;nbsp;sh run policy-map global_policy&lt;/P&gt;&lt;P&gt;- during connection&amp;nbsp;&lt;U&gt;show conn address 10.0.0.2 detail&lt;/U&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 07:57:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679808#M193755</guid>
      <dc:creator>Igor Mordiuk</dc:creator>
      <dc:date>2015-07-17T07:57:17Z</dc:date>
    </item>
    <item>
      <title>ciscoasa(config)# sh run</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679809#M193757</link>
      <description>&lt;P&gt;ciscoasa(config)# sh run policy-map global_policy&lt;BR /&gt;ERROR: % policy-map global_policy does not exist&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show conn address 10.0.0.2 detail&lt;/P&gt;&lt;P&gt;UDP OUTSIDE:8.8.8.8/53 INSIDE:10.0.0.2/55533,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags -, idle 18s, uptime 25s, timeout 2m0s, bytes 105&lt;BR /&gt;UDP OUTSIDE:4.2.2.2/53 INSIDE:10.0.0.2/55533,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags -, idle 18s, uptime 26s, timeout 2m0s, bytes 140&lt;BR /&gt;TCP OUTSIDE:74.125.130.106/80 INSIDE:10.0.0.2/49250,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags UIO, idle 26s, uptime 1m25s, timeout 1h0m, bytes 2983&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input inside tcp 10.0.0.2 1025 4.2.2.2 80 de&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xbbd64340, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=40150, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; OUTSIDE&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group global_access global&lt;BR /&gt;access-list global_access extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xbc89f900, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=35, user_data=0xb9466ac0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xbc29c430, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=293, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.0.0.2/1025 to 192.168.254.171/37074&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xbc8ab278, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=16, user_data=0xbc2cb600, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=INSIDE, output_ifc=OUTSIDE&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xbc2c38a8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=52, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=OUTSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 299, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: OUTSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 09:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679809#M193757</guid>
      <dc:creator>radarbackwards</dc:creator>
      <dc:date>2015-07-17T09:37:47Z</dc:date>
    </item>
    <item>
      <title>packet-tracer shows that your</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679810#M193762</link>
      <description>&lt;P&gt;packet-tracer shows that your requests can successfully&amp;nbsp;pass firewall. Maybe on server&amp;nbsp;4.2.2.2 port 80 is not listening.&lt;/P&gt;&lt;P&gt;Can you initiate connect one more time and on ASA immediately run&amp;nbsp;&lt;EM&gt;show conn address 10.0.0.2 detail &lt;/EM&gt;(witch will show you the current state of connections through ASA)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 09:48:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679810#M193762</guid>
      <dc:creator>Igor Mordiuk</dc:creator>
      <dc:date>2015-07-17T09:48:10Z</dc:date>
    </item>
    <item>
      <title>UDP OUTSIDE:8.8.8.8/53 INSIDE</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679811#M193765</link>
      <description>&lt;P&gt;UDP OUTSIDE:8.8.8.8/53 INSIDE:10.0.0.2/60564,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags -, idle 8s, uptime 16s, timeout 2m0s, bytes 136&lt;BR /&gt;TCP OUTSIDE:120.28.26.242/80 INSIDE:10.0.0.2/49304,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags saA, idle 1s, uptime 4s, timeout 30s, bytes 0&lt;BR /&gt;UDP OUTSIDE:4.2.2.2/53 INSIDE:10.0.0.2/60564,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags -, idle 8s, uptime 15s, timeout 2m0s, bytes 102&lt;BR /&gt;TCP OUTSIDE:120.28.26.232/80 INSIDE:10.0.0.2/49303,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags saA, idle 16s, uptime 25s, timeout 30s, bytes 0&lt;BR /&gt;TCP OUTSIDE:120.28.26.232/80 INSIDE:10.0.0.2/49302,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags saA, idle 27s, uptime 27s, timeout 30s, bytes 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 20:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679811#M193765</guid>
      <dc:creator>radarbackwards</dc:creator>
      <dc:date>2015-07-17T20:35:05Z</dc:date>
    </item>
    <item>
      <title>hi, I tried setting up a</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679812#M193772</link>
      <description>&lt;P&gt;hi, I tried setting up a local webserver and interconnecting it outside through another router, i managed to access the web server, im sorry i forgot to tell that its only a gns3 lab + virtualbox&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2015 01:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679812#M193772</guid>
      <dc:creator>radarbackwards</dc:creator>
      <dc:date>2015-07-18T01:33:53Z</dc:date>
    </item>
    <item>
      <title>This sounds like a DNS issue</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679813#M193773</link>
      <description>&lt;P&gt;This sounds like a DNS issue (considering you are able to ping to the internet but not browse).&amp;nbsp; What are you using as your DHCP server and is it issuing the clients with a DNS server IP?&amp;nbsp; If you configure a static DNS server on your client machine (for example 4.2.2.2 or 8.8.8.8) are you now able to browse the internet?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2015 07:09:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679813#M193773</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-07-18T07:09:22Z</dc:date>
    </item>
    <item>
      <title>no, im not using an internal</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679814#M193774</link>
      <description>&lt;P&gt;no, im not using an internal dns, my machine in vmware is using external dns 8.8.8.8 and 4.2.2.2 from the beginning&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2015 14:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679814#M193774</guid>
      <dc:creator>radarbackwards</dc:creator>
      <dc:date>2015-07-18T14:24:31Z</dc:date>
    </item>
    <item>
      <title>This could very well be a</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679815#M193775</link>
      <description>&lt;P&gt;This could very well be a GNS3 issue.&amp;nbsp; Have you tried saving all your config and restarting GNS3 and all the devices?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2015 12:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679815#M193775</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-07-19T12:44:28Z</dc:date>
    </item>
    <item>
      <title>TCP handshake doesn't pass</title>
      <link>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679816#M193778</link>
      <description>&lt;P&gt;TCP handshake doesn't pass.&lt;BR /&gt;What we can see from your output:&lt;/P&gt;

&lt;PRE&gt;
TCP OUTSIDE:120.28.26.232/80 INSIDE:10.0.0.2/49303,
    flags saA, idle 16s, uptime 25s, timeout 30s, bytes 0&lt;/PRE&gt;

&lt;P&gt;Flags:&lt;/P&gt;
&lt;P&gt;a - awaiting outside ACK to SYN,&lt;/P&gt;
&lt;P&gt;s - awaiting outside SYN,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A - awaiting inside ACK to SYN&lt;/P&gt;
&lt;P&gt;So, host 10.0.0.2 (inside side) sent TCP SYN, and ASA saw this request (as proof, it creates this note in Connections &amp;nbsp;Table)&lt;/P&gt;
&lt;P&gt;But flag 'a' means that&amp;nbsp;120.28.26.232 doesn't reply on your TCP SYN with ACK and it doesn't send his own TCP SYN to 10.0.0.2.&lt;/P&gt;
&lt;P&gt;Maybe&amp;nbsp;120.28.26.232 doesn't receive your request at all or tcp port 80 is closed on it.&lt;BR /&gt;But at least, we know that problem is not with ASA.&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2015 07:01:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/workstation-behind-asa-cant-browse-the-internet/m-p/2679816#M193778</guid>
      <dc:creator>Igor Mordiuk</dc:creator>
      <dc:date>2015-07-20T07:01:08Z</dc:date>
    </item>
  </channel>
</rss>

