<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic First off I would suggest in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532089#M234922</link>
    <description>&lt;P&gt;First off I would suggest removing the Deny any any statement on the outside interface (this is not needed as there is an implicit deny at the end of all ACLs.) Also the deny statement on the inside interface is not needed unless you intend to log this.&lt;/P&gt;&lt;P&gt;Also the permit ICMP statements on the inside interface should be moved to the top of the ACL list.&lt;/P&gt;&lt;P&gt;The following statements can be removed for the sake of cleaning up uneeded entries:&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit udp 192.168.10.0 255.255.255.0 host 8.8.4.4 eq domain (hitcnt=0) 0x4eec758c&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit udp 192.168.10.0 255.255.255.0 host "ISP DNS" eq domain (hitcnt=0) 0x29de795b&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit tcp 192.168.10.0 255.255.255.0 host 8.8.8.8 eq domain (hitcnt=0) 0xa2b2b070&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit tcp 192.168.10.0 255.255.255.0 host 8.8.4.4 eq domain (hitcnt=0) 0xb92c3a21&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit tcp 192.168.10.0 255.255.255.0 host "ISP DNS" eq domain (hitcnt=0) 0x31c37630&lt;/P&gt;&lt;P&gt;But without seeing your full configuration we can not determine if there might be any other configuration issues that might cause problems.&amp;nbsp; As per your access lists your hosts should be able to browse the web using HTTP and HTTPS, and us google 8.8.8.8 &amp;amp; 8.8.4.4 as dns servers.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Fri, 12 Sep 2014 06:09:04 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-09-12T06:09:04Z</dc:date>
    <item>
      <title>Access list to just allow internet for my inside interface</title>
      <link>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532085#M234917</link>
      <description>&lt;P&gt;I am very new to firewall but really want to understand it on depth so after searching for couple of site I am here to get help from the expert.&lt;/P&gt;&lt;P&gt;I am trying to build ASA 5510 firewall and want to make sure everything is correct..&lt;/P&gt;&lt;P&gt;I want to setup Access list just to allow my internal user to access internet . For that I created a access group with the services Https/http/dns/ all the traffic outside . But by this rule internet doesn't work till i include IP protocol on it .&lt;/P&gt;&lt;P&gt;How can I achieve this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532085#M234917</guid>
      <dc:creator>nmandal01</dc:creator>
      <dc:date>2019-03-12T04:44:28Z</dc:date>
    </item>
    <item>
      <title>Hi nmandal01,  Can you please</title>
      <link>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532086#M234918</link>
      <description>&lt;P&gt;Hi &lt;SPAN class="fullname" itemprop="author"&gt;&lt;A class="username" href="https://supportforums.cisco.com/users/nmandal01" title="View user profile."&gt;nmandal01, &lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="fullname" itemprop="author"&gt;Can you please paste the configuration of your ACL ,looks like they're misconfigured&amp;nbsp; or the group is improperly applied.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="fullname" itemprop="author"&gt;- Randy - &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2014 01:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532086#M234918</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2014-09-11T01:46:33Z</dc:date>
    </item>
    <item>
      <title>Yes, would help to see your</title>
      <link>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532087#M234919</link>
      <description>&lt;P&gt;Yes, would help to see your configuration.&amp;nbsp; I am assuming you are allowing DNS through the firewall because you are using a DNS server on the internet or provided by your ISP? your configuration should look something like the following, just change IPs and naming convention as needed.&lt;/P&gt;&lt;P&gt;int gig0/1&lt;BR /&gt;security-level 0&lt;BR /&gt;nameif outside&lt;BR /&gt;ip add 1.1.1.1 255.255.255.252&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;int gig0/2&lt;BR /&gt;security-level 100&lt;BR /&gt;nameif inside&lt;BR /&gt;ip add 192.168.1.1 255.255.255.0&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;access-list INTERNET permit tcp 192.168.1.0 255.255.255.0 any eq http&lt;BR /&gt;access-list INTERNET permit tcp 192.168.1.0 255.255.255.0 any eq https&lt;BR /&gt;access-list INTERNET permit tcp 192.168.1.0 255.255.255.0 any eq dns&lt;BR /&gt;access-group INTERNET in interface inside&lt;BR /&gt;object network LAN&lt;BR /&gt;&amp;nbsp; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;route outside 0 0 1.1.1.2 &amp;lt;---IP of ISP router&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2014 13:28:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532087#M234919</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-11T13:28:27Z</dc:date>
    </item>
    <item>
      <title>Thanks you all for your</title>
      <link>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532088#M234920</link>
      <description>&lt;P&gt;Thanks you all for your answer really appreciate .&lt;BR /&gt;I realize the problem was with my DNS service which I have created. I have created DNS object by service type TCP and des and source port as 53.&lt;BR /&gt;After change it to TCP-UDP and source port as 1-65535 and des port 53 it worked.&lt;BR /&gt;-----However I still want you to verify my access list as I don't want any mistake before I put it in my production environment--- Below is my access list detail,&lt;/P&gt;&lt;P&gt;-----------------&lt;/P&gt;&lt;P&gt;ASA# show access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;BR /&gt;access-list Outside_access_in; 1 elements; name hash: 0xe796c137&lt;BR /&gt;access-list Outside_access_in line 1 extended deny ip any any (hitcnt=121) 0xde833d65&lt;BR /&gt;access-list Inside_access_in; 11 elements; name hash: 0xa231c4d3&lt;BR /&gt;access-list Inside_access_in line 1 extended permit object-group DM_INLINE_SERVICE_1 192.168.10.0 255.255.255.0 any (hitcnt=616) 0x4e62a006&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 1 extended permit tcp 192.168.10.0 255.255.255.0 any eq www (hitcnt=432) 0x86f0eeae&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 1 extended permit udp 192.168.10.0 255.255.255.0 any eq www (hitcnt=0) 0xee7036b8&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 1 extended permit tcp 192.168.10.0 255.255.255.0 any eq https (hitcnt=184) 0x7fb7fc68&lt;BR /&gt;access-list Inside_access_in line 2 extended permit object-group TCPUDP 192.168.10.0 255.255.255.0 object-group DNShost eq domain 0x936d8b0a&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit udp 192.168.10.0 255.255.255.0 host 8.8.8.8 eq domain (hitcnt=41) 0x8cc0baaa&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit udp 192.168.10.0 255.255.255.0 host 8.8.4.4 eq domain (hitcnt=0) 0x4eec758c&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit udp 192.168.10.0 255.255.255.0 host "ISP DNS" eq domain (hitcnt=0) 0x29de795b&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit tcp 192.168.10.0 255.255.255.0 host 8.8.8.8 eq domain (hitcnt=0) 0xa2b2b070&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit tcp 192.168.10.0 255.255.255.0 host 8.8.4.4 eq domain (hitcnt=0) 0xb92c3a21&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit tcp 192.168.10.0 255.255.255.0 host "ISP DNS" eq domain (hitcnt=0) 0x31c37630&lt;BR /&gt;access-list Inside_access_in line 3 extended permit icmp object Admin any (hitcnt=0) 0xe5422aa2&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 3 extended permit icmp host 192.168.10.2 any (hitcnt=62) 0xe5422aa2&lt;BR /&gt;access-list Inside_access_in line 4 extended deny ip any any (hitcnt=0) 0x51fd3ce2&lt;BR /&gt;ASA#&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I simply want my internet network to access internet http/https . and DNS for specific host eg google DNS/ISP dns / and my PC which is 192.168.10.2 to do ICMP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for help in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2014 22:20:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532088#M234920</guid>
      <dc:creator>nmandal01</dc:creator>
      <dc:date>2014-09-11T22:20:27Z</dc:date>
    </item>
    <item>
      <title>First off I would suggest</title>
      <link>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532089#M234922</link>
      <description>&lt;P&gt;First off I would suggest removing the Deny any any statement on the outside interface (this is not needed as there is an implicit deny at the end of all ACLs.) Also the deny statement on the inside interface is not needed unless you intend to log this.&lt;/P&gt;&lt;P&gt;Also the permit ICMP statements on the inside interface should be moved to the top of the ACL list.&lt;/P&gt;&lt;P&gt;The following statements can be removed for the sake of cleaning up uneeded entries:&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit udp 192.168.10.0 255.255.255.0 host 8.8.4.4 eq domain (hitcnt=0) 0x4eec758c&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit udp 192.168.10.0 255.255.255.0 host "ISP DNS" eq domain (hitcnt=0) 0x29de795b&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit tcp 192.168.10.0 255.255.255.0 host 8.8.8.8 eq domain (hitcnt=0) 0xa2b2b070&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit tcp 192.168.10.0 255.255.255.0 host 8.8.4.4 eq domain (hitcnt=0) 0xb92c3a21&lt;BR /&gt;&amp;nbsp; access-list Inside_access_in line 2 extended permit tcp 192.168.10.0 255.255.255.0 host "ISP DNS" eq domain (hitcnt=0) 0x31c37630&lt;/P&gt;&lt;P&gt;But without seeing your full configuration we can not determine if there might be any other configuration issues that might cause problems.&amp;nbsp; As per your access lists your hosts should be able to browse the web using HTTP and HTTPS, and us google 8.8.8.8 &amp;amp; 8.8.4.4 as dns servers.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2014 06:09:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532089#M234922</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-12T06:09:04Z</dc:date>
    </item>
    <item>
      <title>Thanks for your help , I have</title>
      <link>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532090#M234923</link>
      <description>&lt;P&gt;Thanks for your help , I have done the changes and its seems to work fine . This is still in testing environment . Till I get everything check I will not put it in production.&lt;/P&gt;&lt;P&gt;Next task is to add Domain detail and I will need your expertise if I ran into any issue.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2014 22:22:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-to-just-allow-internet-for-my-inside-interface/m-p/2532090#M234923</guid>
      <dc:creator>nmandal01</dc:creator>
      <dc:date>2014-09-12T22:22:40Z</dc:date>
    </item>
  </channel>
</rss>

