<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,Can you not apply the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628336#M197242</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can you not apply the inside ACL and see what happens?&lt;/P&gt;&lt;P&gt;also can you change&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;nat (inside,outside) source dynamic NAT_ALL interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;to&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;nat (inside,outside) source dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;you don't need to say NAT_ALL in nat statement.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 08 Feb 2015 22:40:54 GMT</pubDate>
    <dc:creator>APPIREDDY</dc:creator>
    <dc:date>2015-02-08T22:40:54Z</dc:date>
    <item>
      <title>ASA 5505 9.2 No Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628329#M197235</link>
      <description>&lt;P&gt;Working with an&amp;nbsp;ASA 5505 that is not allowing me to connect to the internet.&lt;/P&gt;&lt;P&gt;I am able to ping desktop PC&amp;nbsp; inside interface but from the firewall not able to ping outside to&amp;nbsp;8.8.8.8.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ive troubleshooted with outside interface&amp;nbsp;ip DHCP routeset, icmp session,&lt;/P&gt;&lt;P&gt;Any help to correct this would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Internet - virgin modem mode sh2 - Firewall - Switch - PC]&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;description -OUTSIDE CONNECTION TO ISP-&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;no switchport protected&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;delay 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;switchport protected&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;&amp;nbsp;description -INSIDE CONNNECTION TO SWITCH-&lt;BR /&gt;&amp;nbsp;switchport access vlan 1&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;no switchport protected&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;delay 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa923-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any any echo&lt;BR /&gt;access-list outside_in extended deny ip any any log&lt;/P&gt;&lt;P&gt;access-list inside_in extended permit ip any any&lt;BR /&gt;access-list inside_in extended deny ip any any log&lt;/P&gt;&lt;P&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging monitor warnings&lt;BR /&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 240&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic obj_any interface&lt;/P&gt;&lt;P&gt;access-group inside_in in interface inside&lt;BR /&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 74.XX.XX.239&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp; &amp;lt;ip outside interface&amp;gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.0.2-192.168.0.33 inside&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username larias password I8668T9sKGdWDfCW encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:2c757df828bc16b3dd0d4d74e28a6917&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DEBUG - Ping 8.8.8.8 from FW&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Feb 08 2015 03:03:46|305011: Built dynamic UDP translation from inside:192.168.0.2/50432 to outside:74.XX.XX.239&amp;nbsp;/50432&lt;BR /&gt;6|Feb 08 2015 03:03:46|302015: Built outbound UDP connection 126 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.0.2/50432 (74.XX.XX.239&amp;nbsp;/50432)&lt;BR /&gt;6|Feb 08 2015 03:04:00|305012: Teardown dynamic UDP translation from inside:192.168.0.2/57818 to outside:74.XX.XX.239&amp;nbsp;/57818 duration 0:02:39&lt;BR /&gt;6|Feb 08 2015 03:04:23|302016: Teardown UDP connection 124 for outside:8.8.8.8/53 to inside:192.168.0.2/52833 duration 0:02:08 bytes 215&lt;BR /&gt;6|Feb 08 2015 03:04:36|305011: Built dynamic UDP translation from inside:192.168.0.2/50290 to outside:74.XX.XX.239&amp;nbsp;/50290&lt;BR /&gt;6|Feb 08 2015 03:04:36|302015: Built outbound UDP connection 127 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.0.2/50290 (74.XX.XX.239&amp;nbsp;/50290)&lt;BR /&gt;6|Feb 08 2015 03:04:39|305011: Built dynamic UDP translation from inside:192.168.0.2/51985 to outside:74.XX.XX.239&amp;nbsp;/51985&lt;BR /&gt;6|Feb 08 2015 03:04:39|302015: Built outbound UDP connection 128 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.0.2/51985 (74.XX.XX.239&amp;nbsp;/51985)&lt;BR /&gt;6|Feb 08 2015 03:04:53|302010: 4 in use, 19 most used&lt;BR /&gt;6|Feb 08 2015 03:04:54|305012: Teardown dynamic UDP translation from inside:192.168.0.2/52833 to outside:74.XX.XX.239&amp;nbsp;/52833 duration 0:02:39&lt;BR /&gt;6|Feb 08 2015 03:05:10|302016: Teardown UDP connection 125 for outside:8.8.8.8/53 to inside:192.168.0.2/50272 duration 0:02:08 bytes 215&lt;BR /&gt;6|Feb 08 2015 03:05:33|305011: Built dynamic UDP translation from inside:192.168.0.2/49447 to outside:74.XX.XX.239&amp;nbsp;/49447&lt;BR /&gt;6|Feb 08 2015 03:05:33|302015: Built outbound UDP connection 129 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.0.2/49447 (74.XX.XX.239&amp;nbsp;/49447)&lt;BR /&gt;6|Feb 08 2015 03:05:41|305012: Teardown dynamic UDP translation from inside:192.168.0.2/50272 to outside:74.XX.XX.239&amp;nbsp;/50272 duration 0:02:39&lt;BR /&gt;6|Feb 08 2015 03:05:54|302016: Teardown UDP connection 126 for outside:8.8.8.8/53 to inside:192.168.0.2/50432 duration 0:02:08 bytes 215&lt;BR /&gt;6|Feb 08 2015 03:06:25|305012: Teardown dynamic UDP translation from inside:192.168.0.2/50432 to outside:74.XX.XX.239&amp;nbsp;/50432 duration 0:02:39&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628329#M197235</guid>
      <dc:creator>Bighead81</dc:creator>
      <dc:date>2019-03-12T05:28:24Z</dc:date>
    </item>
    <item>
      <title>Hi,It looks like there is an</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628330#M197236</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;It looks like there is an issue with NAT. try the following.&lt;/P&gt;&lt;P&gt;1) remove the following statements with 'no' followed by the command&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;object network obj_any&lt;/SPAN&gt;&lt;BR style="font-size: 14.399998664856px;" /&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;and&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;nat (inside,outside) source dynamic obj_any interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;2) now add the following&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;object network 192.168.0.0_net&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;subnet 192.168.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this will help.&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;reddy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 11:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628330#M197236</guid>
      <dc:creator>APPIREDDY</dc:creator>
      <dc:date>2015-02-08T11:22:02Z</dc:date>
    </item>
    <item>
      <title>Thanks for the response. I</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628331#M197237</link>
      <description>&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I removed and added your recommendations and then had to add route outside 0.0.0.0 0.0.0.0 7.x.x.1 (default gw isp)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still no outside ping!&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 14:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628331#M197237</guid>
      <dc:creator>Bighead81</dc:creator>
      <dc:date>2015-02-08T14:28:16Z</dc:date>
    </item>
    <item>
      <title>object network NAT_ALL subnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628332#M197238</link>
      <description>&lt;P&gt;object network NAT_ALL&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp;nat (inside,outside) source dynamic NAT_ALL interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That will nat anything from inside to your asa's external interface IP...in asa 8.4, not sure how the wording is in 9.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you say you added a default route -- did you make that default route point to the next layer 3 hop?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you ping the next hop from your ASA?&amp;nbsp; can you ping the external interface at that next hop device?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you do the following on your asa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list CAPNAME extended permit ip any any&lt;/P&gt;&lt;P&gt;capture CAPIN interface inside match access-list CAPNAME&lt;/P&gt;&lt;P&gt;capture CAPOUT interface outside match access-list CAPNAME&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That would be nice to see the request going to the inside interface, being translated, and leaving the outside interface as the NAT'd ip address.&amp;nbsp; Running those capture, then a ping from the host to 8.8.8.8 (just 4 is fine) then posting show cap CAPIN and show cap CAPOUT will probably solve our issue, or at least really narrow it down by telling us where to look.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 17:04:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628332#M197238</guid>
      <dc:creator>David paull</dc:creator>
      <dc:date>2015-02-08T17:04:04Z</dc:date>
    </item>
    <item>
      <title>The default route ip is the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628333#M197239</link>
      <description>&lt;P&gt;The default route ip&amp;nbsp;is the default gateway of my ISP. When I connect&amp;nbsp;modem directly to PC I get&amp;nbsp;connection and I can see DGW and assigned ip address.&amp;nbsp; This has remained static as both FW and desktop&amp;nbsp;have been assigned the same MAC.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not able to ping anything at all after ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have added capture.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Opened port dhcps port and seeing capture below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;home-fw-1# sh capture CAPOUT&lt;/P&gt;&lt;P&gt;14 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 11:03:57.960155&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 11:04:02.960079&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 11:04:08.960094&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 11:04:15.960094&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 11:04:23.960109&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 11:04:32.960094&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 11:04:42.960079&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 11:04:45.960094&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 11:04:49.960094&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 10: 11:04:54.960109&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 11: 11:05:00.960079&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 12: 11:05:07.960094&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 13: 11:05:15.960094&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 14: 11:05:24.960079&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;14 packets shown&lt;BR /&gt;home-fw-1# sh capture CAPIN&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;BR /&gt;home-fw-1#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;home-fw-1# sh route&lt;/P&gt;&lt;P&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; o - ODR, P - periodic downloaded static route, + - replicated route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 7.x.x.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S*&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 7.x.x.1, outside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;L&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.254 255.255.255.255 is directly connected, inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;home-fw-1# sh run dhcpd&lt;BR /&gt;dhcpd dns 7.x.x.1&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.0.2-192.168.0.33 inside. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;I'm using static ips&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;home-fw-1# sh dhcpd state&lt;BR /&gt;Context&amp;nbsp; Not Configured for DHCP&lt;BR /&gt;Interface inside, Not Configured for DHCP&lt;BR /&gt;Interface outside, Configured for DHCP CLIENT&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems no outbound connection is permitted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same output with NAT_ALL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 21:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628333#M197239</guid>
      <dc:creator>Bighead81</dc:creator>
      <dc:date>2015-02-08T21:06:59Z</dc:date>
    </item>
    <item>
      <title>Hi,Can you ping 8.8.8.8 from</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628334#M197240</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can you ping 8.8.8.8 from the FW itself?&lt;/P&gt;&lt;P&gt;Some ISP's bind the MAC address to devices and only those devices are allowed to communicate to outside world. If that is the case, you need to ask them to clear the arp and give them the ASA FW mac address to register. ( are you getting IP&amp;nbsp;address for outside interface? looks like DHCP client is enabled on outside from the above)&lt;/P&gt;&lt;P&gt;If you manually configure primary DNS on the PC to 8.8.8.8, Can you reach internet from internet explorer?&lt;/P&gt;&lt;P&gt;Can you use packet trace from ASDM and select the interface as inside and protocol as tcp source port as 2005 ( or any random port) and destination ip : 216.58.208.46 and destination port as: 80 and post the result here?&lt;/P&gt;&lt;P&gt;Also please post the results of &amp;gt;&lt;/P&gt;&lt;P&gt;show xlate&lt;/P&gt;&lt;P&gt;show nat&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;show run object&lt;/P&gt;&lt;P&gt;show conn&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 22:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628334#M197240</guid>
      <dc:creator>APPIREDDY</dc:creator>
      <dc:date>2015-02-08T22:04:16Z</dc:date>
    </item>
    <item>
      <title>Hi, I will have to contact</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628335#M197241</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do have is ip address bound to my mac address, which has given me the same ip address and will continue to do so which is 7.x.x.239&amp;nbsp; (default gateway is .1 of this) but I have applied dhcp setroute because of&amp;nbsp;ISP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Outputs&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;home-fw-1# packet-tracer input inside tcp 192.168.0.254 2005 216.58.208.46 80 $&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc9bca08, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; via 7.x.x.1, outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc28f3d8, priority=500, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.0.254, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;home-fw-1# sh access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;BR /&gt;access-list outside_in; 2 elements; name hash: 0xc5896c24&lt;BR /&gt;access-list outside_in line 1 extended permit icmp any any echo (hitcnt=0) 0x80a148e1&lt;BR /&gt;access-list outside_in line 2 extended deny ip any any log informational interval 300 (hitcnt=0) 0x4cc7a6a3&lt;BR /&gt;access-list inside_in; 3 elements; name hash: 0xd3a8690b&lt;BR /&gt;access-list inside_in line 1 extended permit udp any any eq bootpc (hitcnt=0) 0x8352f743&lt;BR /&gt;access-list inside_in line 2 extended permit udp any any eq bootps (hitcnt=0) 0xa1bb4ef7&lt;BR /&gt;access-list inside_in line 3 extended deny ip any any log informational interval 300 (hitcnt=0) 0x14c87690&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;home-fw-1# show xlate&lt;BR /&gt;1 in use, 1 most used&lt;BR /&gt;Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; s - static, T - twice, N - net-to-net&lt;BR /&gt;NAT from outside:0.0.0.0/0 to inside:0.0.0.0/0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sIT idle 0:03:53 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;home-fw-1# show nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source dynamic NAT_ALL interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;home-fw-1# show run nat&lt;BR /&gt;nat (inside,outside) source dynamic NAT_ALL interface&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;home-fw-1# sh run object&lt;BR /&gt;object network NAT_ALL&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;home-fw-1# show conn&lt;BR /&gt;1 in use, 1 most used&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 22:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628335#M197241</guid>
      <dc:creator>Bighead81</dc:creator>
      <dc:date>2015-02-08T22:40:53Z</dc:date>
    </item>
    <item>
      <title>Hi,Can you not apply the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628336#M197242</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can you not apply the inside ACL and see what happens?&lt;/P&gt;&lt;P&gt;also can you change&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;nat (inside,outside) source dynamic NAT_ALL interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;to&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;nat (inside,outside) source dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;you don't need to say NAT_ALL in nat statement.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 22:40:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628336#M197242</guid>
      <dc:creator>APPIREDDY</dc:creator>
      <dc:date>2015-02-08T22:40:54Z</dc:date>
    </item>
    <item>
      <title>So you're showing NO ip</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628337#M197243</link>
      <description>&lt;P&gt;So you're showing NO ip traffic entering your ASA.&lt;/P&gt;&lt;P&gt;And you're showing ip traffic leaving your ASA from 0.0.0.0 destined to 255.255.255.255.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Clearly your NAT is not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2015 04:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628337#M197243</guid>
      <dc:creator>David paull</dc:creator>
      <dc:date>2015-02-09T04:22:30Z</dc:date>
    </item>
    <item>
      <title>i have same problem~~~!!! ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628338#M197244</link>
      <description>&lt;P&gt;i have same problem~~~!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.1(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.101 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.3.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network inside_to_outside&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source dynamic inside_to_outside interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous prompt 2&lt;BR /&gt;Cryptochecksum:07bc1ae9495d68bfec29ef67ce1f30e9&lt;BR /&gt;: end&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i can using console to ping 8.8.8.8&lt;/P&gt;&lt;P&gt;but my inside network cannot access internet~~~~~~~&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;anyone can help me~~~&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2015 07:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628338#M197244</guid>
      <dc:creator>Raymond Kwok</dc:creator>
      <dc:date>2015-02-09T07:24:10Z</dc:date>
    </item>
    <item>
      <title>did you make the NAT changes</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628339#M197245</link>
      <description>&lt;P&gt;did you make the NAT changes as suggested? is it working? pls let us know.&lt;/P&gt;&lt;P style="font-size: 14.399998664856px;"&gt;change it from&lt;/P&gt;&lt;P style="font-size: 14.399998664856px;"&gt;nat (inside,outside) source dynamic NAT_ALL interface&lt;/P&gt;&lt;P style="font-size: 14.399998664856px;"&gt;to&lt;/P&gt;&lt;P style="font-size: 14.399998664856px;"&gt;&lt;SPAN style="color:#008000;"&gt;&lt;EM&gt;&lt;STRONG&gt;nat (inside,outside) source dynamic interface&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14.399998664856px;"&gt;you don't need to say NAT_ALL in nat statement.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2015 18:18:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628339#M197245</guid>
      <dc:creator>APPIREDDY</dc:creator>
      <dc:date>2015-02-09T18:18:29Z</dc:date>
    </item>
    <item>
      <title>hi i following your step i</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628340#M197246</link>
      <description>&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i following your step i can access internet a few mins...............&lt;/P&gt;&lt;P&gt;do you have other solution??&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Raymond&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2015 03:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628340#M197246</guid>
      <dc:creator>Raymond Kwok</dc:creator>
      <dc:date>2015-02-10T03:49:33Z</dc:date>
    </item>
    <item>
      <title>Ive troubleshooted -ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628341#M197247</link>
      <description>&lt;P&gt;Ive troubleshooted the following&amp;nbsp;-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Erase all / fresh config&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ACL any4.&amp;nbsp; You now have to specify ipv4 or ipv6 for any&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;inspect traffic dns, http&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Reapplying DHCPD config for inside&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Permiting ICMP traffic [echo, unreachable, time]&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Recommended nat statements&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE&gt;
object network obj_any
&amp;nbsp;&amp;nbsp; subnet 0.0.0.0 0.0.0.0
&amp;nbsp;&amp;nbsp; nat (inside,outside) dynamic interface&lt;/PRE&gt;

&lt;P&gt;Cisco recommends the above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have attached latest config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I do a packet trace for internal source ip to isp default gateway with dhcp ports it says ok- same for internal to google.com OK again&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;home-fw-1# packet-tracer input inside udp 192.168.0.2 68 7.X.X.1 67 detail&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; via 7.X.X.239, outside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_in in interface inside&lt;BR /&gt;access-list inside_in extended permit ip object-group ALL-SUBNET-INT object-group ALL-SUBNET-EXT&lt;BR /&gt;object-group network ALL-SUBNET-INT&lt;BR /&gt;&amp;nbsp;network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group network ALL-SUBNET-EXT&lt;BR /&gt;&amp;nbsp;network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc4920b8, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=184, user_data=0xca9962c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network 192.168.0.0_net&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.0.2/68 to 0.0.0.0/306&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc5fee38, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=107, user_data=0xcca768b8, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.0.0, mask=255.255.255.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=outside&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc350dd8, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=268, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc9c2650, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=201, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcca0ded8, priority=0, domain=host-limit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc350dd8, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=270, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc9eca40, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=189, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 212, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;When I ping to either 8.8.8.8 or default gw&amp;nbsp;it fails and capture gives this output.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;home-fw-1# sh capture CAPIN&lt;/P&gt;
&lt;P&gt;0 packet captured&lt;/P&gt;
&lt;P&gt;0 packet shown&lt;BR /&gt;home-fw-1# sh capture CAPOUT&lt;/P&gt;
&lt;P&gt;17 packets captured&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 15:01:08.320036&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 15:01:18.319975&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 15:01:21.319975&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 15:01:25.319975&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 15:01:30.319975&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 15:01:36.319990&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 15:01:43.319975&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 15:01:51.319975&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 15:02:00.319975&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 10: 15:02:10.319990&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 11: 15:02:13.319929&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 12: 15:02:17.319975&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 13: 15:02:22.319990&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 14: 15:02:28.319990&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 15: 15:02:35.319975&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 16: 15:02:43.320006&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 17: 15:02:52.319975&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Im going to leave the firewall on in the mean time and leave it on for 24 hours.&amp;nbsp; ISP clear their ARP in the early hours&lt;BR /&gt;My mac address is bound to the same ip, which i have assigned both to FW and PC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also bypass the switch and the computer can king default gateway but nothing on the isp interface or default gateway.&lt;/P&gt;
&lt;P&gt;Any other ideas?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2015 17:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628341#M197247</guid>
      <dc:creator>Bighead81</dc:creator>
      <dc:date>2015-02-10T17:11:44Z</dc:date>
    </item>
    <item>
      <title>It's still not natting.  You</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628342#M197248</link>
      <description>&lt;P&gt;It's still not natting.&amp;nbsp; You have packets leaving from 0.0.0.0 to 255.255.255.255&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE&gt;
object network 192.168.0.0_net
 nat (inside,outside) dynamic interface&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to define what is INCLUDED in the object network NAMED 192.168.0.0_net&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object-group network 192.168.0.0_net&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;network-object 192.168.0.0 255.255.255.0 !or whatever your subnet is&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;nat (inside,outside) source dynamic 192.168.0.0_net interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That WILL nat your traffic to the external interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know you think you created a range, and you did with your range statement but you never called it with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;network-object object NAMEHERE&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2015 17:11:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628342#M197248</guid>
      <dc:creator>David paull</dc:creator>
      <dc:date>2015-02-10T17:11:45Z</dc:date>
    </item>
    <item>
      <title>I have tried that nat</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628343#M197249</link>
      <description>&lt;P&gt;I have tried that nat statement (quite a few times)&amp;nbsp;and&amp;nbsp;its still not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Object group contains 192.168.0.0 / 24 and 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I connect desktop I have been assigned the correct 192.168.x.x&amp;nbsp;internal ip with&amp;nbsp;gateway but cannot ping or surf web.&amp;nbsp; From computer I can ping inside default gateway and nothing else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2015 18:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628343#M197249</guid>
      <dc:creator>Bighead81</dc:creator>
      <dc:date>2015-02-10T18:29:05Z</dc:date>
    </item>
    <item>
      <title>I won't be back until tonight</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628344#M197250</link>
      <description>&lt;P&gt;I won't be back until tonight.&amp;nbsp; Can you post:&lt;/P&gt;&lt;P&gt;1) Your updated, newest, current configuration?&lt;/P&gt;&lt;P&gt;2) clear cap capin&lt;/P&gt;&lt;P&gt;3) clear cap capout&lt;/P&gt;&lt;P&gt;4) Ping from an inside device to 8.8.8.8.&lt;/P&gt;&lt;P&gt;5) and then also put up your newest captures (capin and capout)&lt;/P&gt;&lt;P&gt;If you change your config between posting and tonight, back it up so that any changes I can help you make can be put in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2015 18:35:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628344#M197250</guid>
      <dc:creator>David paull</dc:creator>
      <dc:date>2015-02-10T18:35:53Z</dc:date>
    </item>
    <item>
      <title>:ASA Version 9.2(3)! xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628345#M197251</link>
      <description>&lt;P&gt;:&lt;BR /&gt;ASA Version 9.2(3)&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;description -OUTSIDE CONNECTION TO ISP-&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;no switchport protected&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;delay 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;switchport protected&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;&amp;nbsp;description -INSIDE CONNNECTION TO SWITCH-&lt;BR /&gt;&amp;nbsp;switchport access vlan 1&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;no switchport protected&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;delay 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.254 255.255.255.0&lt;BR /&gt;&amp;nbsp;delay 10&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;BR /&gt;&amp;nbsp;delay 10&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;boot system disk0:/asa923-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT 0&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name home-fw-1.com&lt;BR /&gt;object-group network ALL-SUBNET-INT&lt;BR /&gt;&amp;nbsp;network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group network ALL-SUBNET-EXT&lt;BR /&gt;&amp;nbsp;network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group icmp-type DefaultICMP&lt;BR /&gt;&amp;nbsp;description Default ICMP Types permitted&lt;BR /&gt;&amp;nbsp;icmp-object echo-reply&lt;BR /&gt;&amp;nbsp;icmp-object unreachable&lt;BR /&gt;&amp;nbsp;icmp-object time-exceeded&lt;BR /&gt;object-group network INSIDE_NET&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any4 any4 object-group DefaultICMP&lt;BR /&gt;access-list outside_in extended deny ip object-group ALL-SUBNET-EXT object-group ALL-SUBNET-INT&lt;BR /&gt;access-list inside_in extended permit icmp any4 any4 object-group DefaultICMP&lt;BR /&gt;access-list inside_in extended permit ip object-group ALL-SUBNET-INT object-group ALL-SUBNET-EXT&lt;BR /&gt;access-list inside_in extended deny ip object-group ALL-SUBNET-INT object-group ALL-SUBNET-EXT&lt;BR /&gt;access-list CAPNAME extended permit ip any4 any4&lt;/P&gt;&lt;P&gt;pager lines 24&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;BR /&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 240&lt;BR /&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic INSIDE_NET interface&lt;BR /&gt;access-group inside_in in interface inside&lt;BR /&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 7.X.X.1 1&amp;nbsp;&amp;nbsp; &amp;lt;default gw of ISP&amp;gt;&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 7.X.X.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;default gw of ISP&amp;gt;&lt;BR /&gt;dhcpd lease 691200&lt;BR /&gt;dhcpd ping_timeout 750&lt;BR /&gt;dhcpd domain XXXX.com&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.0.2-192.168.0.33 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:5ebe606760ff455d1efc1e486c33e687&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;From computer.&amp;nbsp; I am assigned 192.168.X.X ip address with correct default gw but not able to ping 7.X.X.1 (ISP Default GW) or 7.X.X.239 (FW outside interface ip).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;home-fw-1# sh capture CAPIN&lt;/P&gt;&lt;P&gt;38 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 19:27:44.698389&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.54818 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 35&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 19:27:45.686640&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.54818 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 35&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 19:27:46.686381&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.54818 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 35&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 19:27:47.695352&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.62864 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 36&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 19:27:48.687830&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.62864 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 36&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 19:27:48.687906&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.54818 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 35&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 19:27:50.687342&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.62864 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 36&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 19:27:52.689951&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.54818 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 35&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 19:27:54.990305&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 10: 19:27:55.739417&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 11: 19:27:56.488805&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 12: 19:27:56.781530&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.56883 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 36&lt;BR /&gt;&amp;nbsp; 13: 19:27:57.250383&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.59240 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 42&lt;BR /&gt;&amp;nbsp; 14: 19:27:57.771551&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.56883 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 36&lt;BR /&gt;&amp;nbsp; 15: 19:27:58.241381&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.59240 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 42&lt;BR /&gt;&amp;nbsp; 16: 19:27:59.241152&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.59240 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 42&lt;BR /&gt;&amp;nbsp; 17: 19:27:59.770742&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.56883 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 36&lt;BR /&gt;&amp;nbsp; 18: 19:28:01.240618&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.59240 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 42&lt;BR /&gt;&amp;nbsp; 19: 19:28:04.073986&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 20: 19:28:04.823047&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 21: 19:28:05.242632&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.59240 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 42&lt;BR /&gt;&amp;nbsp; 22: 19:28:05.572464&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 23: 19:28:06.416085&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 300&lt;BR /&gt;&amp;nbsp; 24: 19:28:06.416375&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.254.67 &amp;gt; 192.168.0.2.68:&amp;nbsp; udp 286&lt;BR /&gt;&amp;nbsp; 25: 19:28:06.440239&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.64070 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 36&lt;BR /&gt;&amp;nbsp; 26: 19:28:07.432030&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.64070 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 36&lt;BR /&gt;&amp;nbsp; 27: 19:28:09.440330&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.64070 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 36&lt;BR /&gt;&amp;nbsp; 28: 19:28:13.743537&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 29: 19:28:14.492299&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 30: 19:28:14.498875&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2 &amp;gt; 86.27.251.53: icmp: echo request&lt;BR /&gt;&amp;nbsp; 31: 19:28:15.241976&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 32: 19:28:16.005584&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.58142 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 35&lt;BR /&gt;&amp;nbsp; 33: 19:28:16.991495&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.58142 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 35&lt;BR /&gt;&amp;nbsp; 34: 19:28:17.994196&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.58142 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 35&lt;BR /&gt;&amp;nbsp; 35: 19:28:19.064724&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2 &amp;gt; 86.27.251.53: icmp: echo request&lt;BR /&gt;&amp;nbsp; 36: 19:28:19.993494&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.58142 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 35&lt;BR /&gt;&amp;nbsp; 37: 19:28:23.994623&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.58142 &amp;gt; 86.27.251.1.53:&amp;nbsp; udp 35&lt;BR /&gt;&amp;nbsp; 38: 19:28:24.065456&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2 &amp;gt; 86.27.251.53: icmp: echo request&lt;BR /&gt;38 packets shown&lt;BR /&gt;home-fw-1# sh capture CAPout&lt;/P&gt;&lt;P&gt;14 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 19:27:14.940060&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 19:27:17.940060&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 19:27:21.941510&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 19:27:26.941479&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 19:27:32.940075&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 19:27:39.940075&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 19:27:47.940045&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 19:27:56.940060&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 19:28:06.940045&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 10: 19:28:09.940045&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 11: 19:28:13.940060&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 12: 19:28:18.940045&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 13: 19:28:24.940045&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;&amp;nbsp; 14: 19:28:31.940075&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 0.0.0.0.68 &amp;gt; 255.255.255.255.67:&amp;nbsp; udp 548&lt;BR /&gt;14 packets shown&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2015 19:30:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628345#M197251</guid>
      <dc:creator>Bighead81</dc:creator>
      <dc:date>2015-02-10T19:30:15Z</dc:date>
    </item>
    <item>
      <title>Hi,again you got the NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628346#M197252</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;again you got the NAT statement wrong&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;nat (inside,outside) source dynamic INSIDE_NET interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;this should be&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;nat (inside,outside) source dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;and the above should be with in the object group/object as shown below, please add them one below the other, but remove the old one's before you put the following&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;object-group network INSIDE_NET&lt;BR /&gt;&amp;nbsp; &amp;nbsp;network-object 192.168.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp;nat (inside,outside) source dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2015 23:19:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628346#M197252</guid>
      <dc:creator>APPIREDDY</dc:creator>
      <dc:date>2015-02-10T23:19:22Z</dc:date>
    </item>
    <item>
      <title>I fully concur with what</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628347#M197253</link>
      <description>&lt;P&gt;I fully concur with what Appireddy is saying.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I feel like your nat command is just floating in your configs and not under that object-group...but his fixes that also.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please try that and report back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, I see no pings coming from 192.168.0.2 to 8.8.8.8 on your inside interface.&amp;nbsp; Why?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2015 04:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628347#M197253</guid>
      <dc:creator>David paull</dc:creator>
      <dc:date>2015-02-11T04:31:28Z</dc:date>
    </item>
    <item>
      <title>I have tried various NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628348#M197254</link>
      <description>&lt;P&gt;Downloaded a fresh&amp;nbsp;IOS and&amp;nbsp;I now see&amp;nbsp;tangible data.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;home-fw-1# sh capture CAPIN&lt;/P&gt;&lt;P&gt;346 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 21:48:55.966853&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.138 &amp;gt; 192.168.0.255.138:&amp;nbsp; udp 212&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 21:49:12.089457&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.53698 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 32&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 21:49:12.147300&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.56480 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 43&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 21:49:13.086604&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.53698 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 32&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 21:49:13.146553&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.56480 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 43&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 21:49:14.086528&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.53698 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 32&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 21:49:14.146507&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.56480 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 43&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 21:49:16.087474&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.53698 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 32&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 21:49:16.147468&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.56480 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 43&lt;BR /&gt;&amp;nbsp; 10: 21:49:20.087413&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.53698 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 32&lt;BR /&gt;&amp;nbsp; 11: 21:49:20.147361&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.56480 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 43&lt;BR /&gt;&amp;nbsp; 12: 21:49:24.087809&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 13: 21:49:24.837221&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 14: 21:49:25.588211&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 15: 21:49:35.751700&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.62640 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 40&lt;BR /&gt;&amp;nbsp; 16: 21:49:36.049313&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 17: 21:49:36.748832&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.62640 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 40&lt;BR /&gt;&amp;nbsp; 18: 21:49:36.798817&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 19: 21:49:37.548830&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.137 &amp;gt; 192.168.0.255.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp; 20: 21:49:37.748801&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.62640 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 40&lt;BR /&gt;&amp;nbsp; 21: 21:49:39.748771&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.62640 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 40&lt;BR /&gt;&amp;nbsp; 22: 21:49:43.748649&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#1 P0 192.168.0.2.62640 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 40&lt;BR /&gt;home-fw-1# sh capture CAPOUT&lt;/P&gt;&lt;P&gt;3 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 21:50:36.833620&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 10.X.X.1.67 &amp;gt; 255.255.255.255.68:&amp;nbsp; udp 312&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 21:55:52.483175&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 10.X.X.1.67 &amp;gt; 255.255.255.255.68:&amp;nbsp; udp 301&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 21:55:52.516300&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#2 P0 10.X.X.1.67 &amp;gt; 255.255.255.255.68:&amp;nbsp; udp 301&lt;BR /&gt;3 packets&lt;/P&gt;&lt;P&gt;I have inputted recommended NAT but it allows only "source dynamic any interface" under object-group.&amp;nbsp; I have translated hits with sh nat but still no working ping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2015 22:23:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-no-internet-access/m-p/2628348#M197254</guid>
      <dc:creator>Bighead81</dc:creator>
      <dc:date>2015-02-11T22:23:47Z</dc:date>
    </item>
  </channel>
</rss>

