<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks josh but its not in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613064#M205484</link>
    <description>&lt;P&gt;Thanks josh but its not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also different acl. can u verfied that its not create the prob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;bject-group network DMZ-BLOCKED-LAN-NETWORKS&lt;BR /&gt;&amp;nbsp;network-object 172.16.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.20.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.30.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.40.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.50.0 255.255.255.0&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq www&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit ip 5.5.5.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq 8888&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq https&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq telnet&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq pop3&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq smtp&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.20.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.30.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.40.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.10.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.10.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 10.1.1.0 255.255.255.0 117.102.8.90 255.255.255.248&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 5.5.5.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.10.0 255.255.255.0 5.5.5.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.50.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Allow ICMP from DMZ server to INSIDE server&lt;BR /&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.18 echo&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.10 echo&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Block connections from DMZ to INSIDE networks&lt;BR /&gt;access-list DMZ-IN extended deny ip any object-group DMZ-BLOCKED-LAN-NETWORKS&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Allow all other traffic&lt;BR /&gt;access-list DMZ-IN extended permit ip 10.1.1.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list ICMP extended permit icmp any any&amp;nbsp;&lt;BR /&gt;access-list SPLIT standard permit 192.168.0.0 255.255.0.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 06 Nov 2014 11:13:59 GMT</pubDate>
    <dc:creator>Navaz Wattoo</dc:creator>
    <dc:date>2014-11-06T11:13:59Z</dc:date>
    <item>
      <title>Internet access for LAN user through inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613052#M205472</link>
      <description>&lt;P&gt;Here are i want o access internet of my lan users having subnet 172.16.20.0/24&lt;/P&gt;&lt;P&gt;and inside firewall ip is 192.168.11.249/24&lt;/P&gt;&lt;P&gt;outside ip is 125.209.70.88/24&lt;BR /&gt;and i also attached a diagram with the ip,s&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613052#M205472</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2019-03-12T05:01:53Z</dc:date>
    </item>
    <item>
      <title>Hi, Below is the required</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613053#M205473</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the required configuration on ASA:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route inside 172.16.20.0 255.255.255.0 192.168.11.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nat&amp;nbsp; 8.2&lt;/P&gt;&lt;P&gt;===========&lt;/P&gt;&lt;P&gt;nat(inside) 1 0 0&lt;/P&gt;&lt;P&gt;global(outside) 1 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nat 8.3 +&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="outline: none; margin: 0px 0px 10px; color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255);"&gt;object network internal_net&lt;BR style="outline: none;" /&gt;&amp;nbsp; subnet 172.16.20.0 255.255.255.0&lt;/P&gt;&lt;P style="outline: none; margin: 0px 0px 10px; color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255);"&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; background-color: rgb(255, 255, 255);"&gt;object network internal_net&lt;/SPAN&gt;&lt;BR style="outline: none; color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: rgb(255, 255, 255);" /&gt;&lt;SPAN style="color: rgb(51, 51, 51); font-family: Arial, sans-serif; font-size: 14px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 20px; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; background-color: rgb(255, 255, 255);"&gt;nat (inside,outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 11:25:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613053#M205473</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-05T11:25:57Z</dc:date>
    </item>
    <item>
      <title> I have Cisco Adaptive</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613054#M205474</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have Cisco Adaptive Security Appliance Software Version 8.2(5)&amp;nbsp;&lt;BR /&gt;Device Manager Version 6.4(5)&lt;/P&gt;&lt;P&gt;But its not working. Below is my configuration and I&amp;nbsp;only now need my LAN user to allow internet through Inside to Outside. One thing is that 172.16.20.0/24 users gateway is 172.16.20.254 similarly 172.16.30.X/24 users gateway is 172.16.30.254 and 172.16.40.X/24 users gateway is 172.16.40.254, 172.16.50.X/24 users gateway is 172.16.50.254. Thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Version of ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname ACTIVE&lt;/P&gt;&lt;P&gt;domain-name dhalahore.org&lt;/P&gt;&lt;P&gt;enable password vXH3rdHwVuRbxQ3j encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;INTERFACE DETAILS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;description Inside to the Core Switches 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;duplex full&lt;/P&gt;&lt;P&gt;&amp;nbsp;no nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;description Inside to the Core Switches 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;duplex full&lt;/P&gt;&lt;P&gt;&amp;nbsp;no nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;description Public Server - DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;duplex full&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif DMZ&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 50&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 10.1.1.1 255.255.255.0 standby 10.1.1.2&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;description Outside to the Internet via router&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;duplex full&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-leLvel 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 117.102.8.90 255.255.255.248 standby 117.102.8.91&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;description LAN/STATE Failover Interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Redundant1&lt;/P&gt;&lt;P&gt;&amp;nbsp;member-interface Ethernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;member-interface Ethernet0/1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;INSIDE INTERFACE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.11.249 255.255.255.0 standby 192.168.11.250&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE OBJECT FOR LAN NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object-group network DMZ-BLOCKED-LAN-NETWORKS&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 172.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 172.16.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 172.16.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 172.16.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 172.16.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE ACL FOR OUTSIDE TO INSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq www&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq 8888&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq https&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq telnet&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq pop3&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq smtp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE ACL FOR THE LAN NETWORK TO ACCESS DMZ SERVERS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.20.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.30.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.40.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.10.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.10.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 10.1.1.0 255.255.255.0 125.209.70.88 255.255.255.248&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 5.5.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.10.0 255.255.255.0 5.5.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.50.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE ACL FOR THE DB SERVERS TO DMZ MEMBER AREA SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Allow ICMP from DMZ server to INSIDE server&lt;/P&gt;&lt;P&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.18 echo&lt;/P&gt;&lt;P&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.10 echo&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Block connections from DMZ to INSIDE networks&lt;/P&gt;&lt;P&gt;access-list DMZ-IN extended deny ip any object-group DMZ-BLOCKED-LAN-NETWORKS&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Allow all other traffic&lt;/P&gt;&lt;P&gt;access-list DMZ-IN extended permit ip 10.1.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list ICMP extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list SPLIT standard permit 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT CONFIGURATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat-control&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE NAT FOR THE INSIDE USER TO ACCESS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE NAT FROM OUTSIDE TO DMZ SERVER(FOR SPECIFIC PORTS OPEN)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,Outside) tcp interface www 10.1.1.254 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,Outside) tcp interface https 10.1.1.254 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,Outside) tcp interface 8888 10.1.1.245 8888 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,Outside) tcp interface pop3 10.1.1.254 pop3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE NAT DMZ TO INSIDE(TO ACCESS THE LAN SPECIFIC USERS)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.1.1.0 192.168.11.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ALLOW THE ACL 102 TO OUTSIDE INTERFACE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-group 102 in interface Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE ROUTE TO THE ACCESS FROM THE OUTSIDE INTERFACE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 125.209.70.89 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CREATE ROUTE TO ACCESS FROM THE INSIDE INTERFACE (ALL VLAN,S INCLUDING APPLICATION,DB,LAN)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 192.168.11.254 2&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 192.168.10.254 2&lt;/P&gt;&lt;P&gt;route inside 172.16.10.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.20.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.30.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.40.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.50.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;route inside 192.168.10.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TO ACCESS INSIDE THROUGH ASDM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.11.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.11.249 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TO TELNET INSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.11.254 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.10.254 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.11.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 12:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613054#M205474</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-05T12:38:33Z</dc:date>
    </item>
    <item>
      <title> You need to configure a PAT</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613055#M205475</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to configure a PAT policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;General PAT and will be used by all inside users.&lt;/P&gt;&lt;P&gt;nat(inside) 1 0 0&lt;/P&gt;&lt;P&gt;global(outside) 1 interface&lt;/P&gt;&lt;P&gt;However, if you need to be specific&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat(inside) 1 72.16.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global(outside) 1 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat(inside) 1 72.16.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global(outside) 1 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat(inside) 1 72.16.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global(outside) 1 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If still it didn't work, provide me below output :&lt;/P&gt;&lt;P&gt;&amp;nbsp;packet-tracer input inside tcp 172.16.20.10 5656 4.2.2.2 80 det&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 13:09:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613055#M205475</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-05T13:09:13Z</dc:date>
    </item>
    <item>
      <title>Its didnt work. I attached a</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613056#M205476</link>
      <description>&lt;P&gt;Its didnt work. I attached a files that you are required.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 13:41:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613056#M205476</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-05T13:41:09Z</dc:date>
    </item>
    <item>
      <title>configuration seems to be</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613057#M205477</link>
      <description>&lt;P&gt;configuration seems to be fine with ASA, packet tracer showing correct outputs.I&lt;/P&gt;&lt;P&gt;believe packets are not reaching the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly provide me below captures.&lt;/P&gt;&lt;P&gt;cap capin interface inside match tcp ho &amp;lt;host ip&amp;gt; any&lt;/P&gt;&lt;P&gt;cap capout interface outside match tcp any any&lt;/P&gt;&lt;P&gt;sh cap capout&lt;/P&gt;&lt;P&gt;sh cap capin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 13:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613057#M205477</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-05T13:47:28Z</dc:date>
    </item>
    <item>
      <title>Please find the attached file</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613058#M205478</link>
      <description>&lt;P&gt;Please find the attached file . But in Inside interface of ASA&amp;nbsp;a core switch 3750 exist and after that layer 2 switch 2960 exist where the LAN exist.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 13:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613058#M205478</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-05T13:57:09Z</dc:date>
    </item>
    <item>
      <title>As expected internet traffic</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613059#M205479</link>
      <description>&lt;P&gt;As expected internet traffic is not reaching the ASA, we can see only telnet traffic&lt;BR /&gt;( to ASA inside interface).&lt;/P&gt;&lt;P&gt;Have you configured a default route pointing to ASA on your 3750 switch ?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 14:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613059#M205479</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-05T14:57:29Z</dc:date>
    </item>
    <item>
      <title>These are the routs add for</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613060#M205480</link>
      <description>&lt;P&gt;These are the routs add for at the core switch 3750&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip classless&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 221.120.216.153&lt;BR /&gt;ip route 5.5.5.0 255.255.255.0 192.168.11.249&lt;BR /&gt;ip route 10.1.1.0 255.255.255.0 192.168.10.249&lt;BR /&gt;ip route 10.1.1.0 255.255.255.0 192.168.11.249&lt;BR /&gt;ip route 172.16.20.0 255.255.255.0 192.168.10.249&lt;BR /&gt;ip http server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DC-Core1(config)# &amp;nbsp;do sh ip route&lt;BR /&gt;Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;E1 - OSPF external type 1, E2 - OSPF external type 2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;o - ODR, P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is not set&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;5.0.0.0/24 is subnetted, 1 subnets&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; 5.5.5.0 [1/0] via 192.168.11.249&lt;BR /&gt;C &amp;nbsp; &amp;nbsp;192.168.10.0/24 is directly connected, Vlan10&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;172.16.0.0/24 is subnetted, 5 subnets&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; 172.16.50.0 is directly connected, Vlan80&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; 172.16.40.0 is directly connected, Vlan70&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; 172.16.30.0 is directly connected, Vlan60&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; 172.16.20.0 is directly connected, Vlan50&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; 172.16.10.0 is directly connected, Vlan10&lt;BR /&gt;C &amp;nbsp; &amp;nbsp;192.168.11.0/24 is directly connected, Vlan11&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.0.0/24 is subnetted, 1 subnets&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.1.1.0 [1/0] via 192.168.11.249&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[1/0] via 192.168.10.249&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 03:56:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613060#M205480</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-06T03:56:06Z</dc:date>
    </item>
    <item>
      <title>Below route is punting all</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613061#M205481</link>
      <description>&lt;P&gt;Below route is punting all the traffic to&amp;nbsp;&amp;nbsp; 221.120.216.153 , so we need to delete this route ip route 0.0.0.0 0.0.0.0 221.120.216.153&lt;/P&gt;&lt;P&gt;no ip route 0.0.0.0 0.0.0.0 221.120.216.153&lt;/P&gt;&lt;P&gt;We need to punt all the default traffic to ASA, so add below route.&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.11.249&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in addition, if 172.16.20.0/24 is a directly connected network on 3750 we don't need below route&lt;/P&gt;&lt;P&gt;ip route 172.16.20.0 255.255.255.0 192.168.10.249&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 04:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613061#M205481</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-06T04:58:35Z</dc:date>
    </item>
    <item>
      <title>Thanks its working. but now</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613062#M205482</link>
      <description>&lt;P&gt;Thanks its working. but now next step is to only allow outlook traffic from inside LAN&amp;nbsp;to outside.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 05:29:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613062#M205482</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-06T05:29:02Z</dc:date>
    </item>
    <item>
      <title>You need to allow whatever</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613063#M205483</link>
      <description>&lt;P&gt;You need to allow whatever subnets and respective ports you need...for example:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list inside_out per tcp 172.16.20.0 255.255.255.0&amp;nbsp; any eq 25&lt;/P&gt;&lt;P&gt;access-list inside_out per tcp 172.16.20.0 255.255.255.0&amp;nbsp; any eq XY&lt;/P&gt;&lt;P&gt;access-list inside_out per tcp 172.16.20.0 255.255.255.0&amp;nbsp; any eq&amp;nbsp; YZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group inside_out in interface inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 06:55:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613063#M205483</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-06T06:55:29Z</dc:date>
    </item>
    <item>
      <title>Thanks josh but its not</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613064#M205484</link>
      <description>&lt;P&gt;Thanks josh but its not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also different acl. can u verfied that its not create the prob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;bject-group network DMZ-BLOCKED-LAN-NETWORKS&lt;BR /&gt;&amp;nbsp;network-object 172.16.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.20.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.30.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.40.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.50.0 255.255.255.0&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq www&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit ip 5.5.5.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq 8888&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq https&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq telnet&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq pop3&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq smtp&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.20.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.30.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.40.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.10.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.10.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 10.1.1.0 255.255.255.0 117.102.8.90 255.255.255.248&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 5.5.5.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.10.0 255.255.255.0 5.5.5.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.50.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Allow ICMP from DMZ server to INSIDE server&lt;BR /&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.18 echo&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.10 echo&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Block connections from DMZ to INSIDE networks&lt;BR /&gt;access-list DMZ-IN extended deny ip any object-group DMZ-BLOCKED-LAN-NETWORKS&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Allow all other traffic&lt;BR /&gt;access-list DMZ-IN extended permit ip 10.1.1.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list ICMP extended permit icmp any any&amp;nbsp;&lt;BR /&gt;access-list SPLIT standard permit 192.168.0.0 255.255.0.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 11:13:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613064#M205484</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-06T11:13:59Z</dc:date>
    </item>
    <item>
      <title>access-list 102 extended</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613065#M205485</link>
      <description>&lt;P&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq www&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq 8888&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq https&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq telnet&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq pop3&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 117.102.8.90 eq smtp&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Above access-lists are allowing any source to access destination 117.102.8.90 on specific ports, rest all other destinations are restricted. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.20.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.30.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.40.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.10.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.10.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 10.1.1.0 255.255.255.0 117.102.8.90 255.255.255.248&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 5.5.5.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.10.0 255.255.255.0 5.5.5.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.50.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;All these access-lists are used in NAT Exempt from specific source to destination.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Allow ICMP from DMZ server to INSIDE server&lt;BR /&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.18 echo&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.10 echo&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Block connections from DMZ to INSIDE networks&lt;BR /&gt;access-list DMZ-IN extended deny ip any object-group DMZ-BLOCKED-LAN-NETWORKS&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Allow all other traffic&lt;BR /&gt;access-list DMZ-IN extended permit ip 10.1.1.0 255.255.255.0 any&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DMZ access-lists blocking connection to DMZ-BLOCKED and allowing 10.1.1.0 /24 to access anything.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You need to apply these access-lists on interface as well.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list&lt;/STRONG&gt; &amp;lt;access-list name &amp;gt; &lt;STRONG&gt;in interface&lt;/STRONG&gt; &amp;lt;interface name&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Prashant Joshi:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 11:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613065#M205485</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-06T11:40:48Z</dc:date>
    </item>
    <item>
      <title>After these applying, then i</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613066#M205486</link>
      <description>&lt;P&gt;After these applying, then i can allow only outlook traffic and my outlook port are configured at SSL port 995 and 465&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 11:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613066#M205486</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-06T11:45:19Z</dc:date>
    </item>
    <item>
      <title>Add below access lists with</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613067#M205487</link>
      <description>&lt;P&gt;Add below access lists with whatever source and destination you need to restrict&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp &amp;lt;source&amp;gt;&amp;nbsp; &amp;lt;destination&amp;gt;&amp;nbsp; eq 995&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp &amp;lt;source&amp;gt;&amp;nbsp; &amp;lt;destination&amp;gt;&amp;nbsp; eq 465&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 12:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613067#M205487</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-06T12:09:16Z</dc:date>
    </item>
    <item>
      <title>access-list 102 extended</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613068#M205488</link>
      <description>&lt;P style="font-size: 14px;"&gt;access-list 102 extended permit tcp 172.16.20.0 &amp;nbsp;117.102.8.90 &amp;nbsp;eq 995&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;access-list 102 extended permit tcp &lt;SPAN style="font-size: 14px;"&gt;172.16.20.0 &amp;nbsp;117.102.8.90&lt;/SPAN&gt;&amp;nbsp; eq 465&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;i need to run outlook of lan users having subnet 172.16.20.0/24 and after that is apply&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;access-group 102 in interface inside ?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 12:26:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613068#M205488</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-06T12:26:13Z</dc:date>
    </item>
    <item>
      <title>access-list 102 extended</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613069#M205489</link>
      <description>&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;&lt;DIV class="field-items"&gt;&lt;DIV class="field-item even"&gt;&lt;P style="font-size:14px"&gt;access-list 102 extended permit tcp 172.16.20.0&amp;nbsp; 255.255.255.0&amp;nbsp; 117.102.8.90 &amp;nbsp;eq 995&lt;/P&gt;&lt;P style="font-size:14px"&gt;access-list 102 extended permit tcp &lt;SPAN style="font-size:14px"&gt;172.16.20.0 &amp;nbsp;&lt;/SPAN&gt;255.255.255.0 &lt;SPAN style="font-size:14px"&gt;117.102.8.90&lt;/SPAN&gt;&amp;nbsp; eq 465&lt;/P&gt;&lt;P style="font-size:14px"&gt;access-group 102 in interface inside&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 06 Nov 2014 14:08:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613069#M205489</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-06T14:08:10Z</dc:date>
    </item>
    <item>
      <title>Thanks JoshiI applied this</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613070#M205490</link>
      <description>&lt;P&gt;Thanks Joshi&lt;/P&gt;&lt;P&gt;I applied this but outlook is not working.&lt;/P&gt;&lt;P&gt;i attached outlook setting.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2014 04:51:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613070#M205490</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-07T04:51:33Z</dc:date>
    </item>
    <item>
      <title>I can only see the ports in</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613071#M205491</link>
      <description>&lt;P&gt;I can only see the ports in your configuration ,what is the incoming and outgoing mailserver name/IP configured in your outlook, If its name and not an IP then how the name resolution will happen, do you have an inside DNS server ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Nov 2014 06:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-for-lan-user-through-inside-to-outside/m-p/2613071#M205491</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-09T06:43:10Z</dc:date>
    </item>
  </channel>
</rss>

