<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, if you have that option in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-new-install-and-inside-hosts-cannot-access-the-internet/m-p/2503576#M235735</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you have that option then you can do that.... you can have just the nat exempt in fw.... and your vdsl will have the NAT with public ip to equivalent private ip..... you should have the proper routes in router to reach those private segments routed via asa fw.... it purely depends on ip schema and architecture of your network..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
    <pubDate>Sat, 16 Aug 2014 08:31:43 GMT</pubDate>
    <dc:creator>nkarthikeyan</dc:creator>
    <dc:date>2014-08-16T08:31:43Z</dc:date>
    <item>
      <title>ASA 5505 new install and inside hosts cannot access the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-new-install-and-inside-hosts-cannot-access-the-internet/m-p/2503573#M235719</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;Im having a problem with inside hosts access the internet. Setup is&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internet --&amp;gt; VDSL Router 192.168.1.1 --&amp;gt; Cisco ASA 5505 192.168.1.2 = inside network 192.168.200.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hosts on the internet can get to my ftp server located on the inside network = so that works&lt;/P&gt;&lt;P&gt;hosts on the outside network can access hosts on the inside network and vice versa however hosts on the inside cann view/access sites on the internet.&lt;/P&gt;&lt;P&gt;Im seeing a lots of messages on the log view relating to SYN time outs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is my config. if you could help me fix this, that would be great &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd snip encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;description LINK TO VDSL ROUTER&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;description LINK TO TPLINK SWITCH&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.2 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address dhcp&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan200&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa825-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CET 1&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 192.168.1.1&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;object-group service DM_INLINE_UDP_1 udp&lt;BR /&gt;&amp;nbsp;port-object eq bootpc&lt;BR /&gt;&amp;nbsp;port-object eq bootps&lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.200.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit udp any interface inside object-group DM_INLINE_UDP_1&amp;nbsp;&lt;BR /&gt;access-list inside_access_in_1 extended permit ip 192.168.200.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in_1 extended permit ip host 192.168.1.15 any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in_1 extended permit ip host 162.11.173.93 any&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit ip host 192.168.1.15 192.168.200.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group DM_INLINE_NETWORK_1 host 192.168.200.10 object-group DM_INLINE_TCP_1&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp host 192.168.1.1 192.168.200.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended deny ip any any&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit 192.168.1.0 255.255.255.0 outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-731.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;static (inside,outside) 192.168.200.0 192.168.200.0 netmask 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in_1 in interface inside control-plane&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 outside&lt;BR /&gt;http 192.168.200.0 255.255.255.0 inside&lt;BR /&gt;http snip 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=192.168.1.2,CN=ASA&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;&amp;nbsp;certificate c270e553&lt;BR /&gt;snip&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.15 255.255.255.255 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd dns 192.168.1.1 8.8.8.8&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.200.200-192.168.200.254 inside&lt;BR /&gt;dhcpd dns 192.168.1.1 8.8.8.8 interface inside&lt;BR /&gt;dhcpd lease 999999 interface inside&lt;BR /&gt;dhcpd update dns interface inside&lt;BR /&gt;dhcpd option 3 ip 192.168.200.1 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 213.171.220.65 source outside prefer&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 outside&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 outside vpnlb-ip&lt;BR /&gt;webvpn&lt;BR /&gt;username admin password snip encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:d95abed5ffe822e624a00e46e16846bb&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-731.bin&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;log entry&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Aug 10 2014&lt;/TD&gt;&lt;TD&gt;12:12:56&lt;/TD&gt;&lt;TD&gt;302014&lt;/TD&gt;&lt;TD&gt;173.194.41.128&lt;/TD&gt;&lt;TD&gt;80&lt;/TD&gt;&lt;TD&gt;192.168.200.11&lt;/TD&gt;&lt;TD&gt;50613&lt;/TD&gt;&lt;TD&gt;Teardown TCP connection 12785 for outside:173.194.41.128/80 to inside:192.168.200.11/50613 duration 0:00:30 bytes 0 SYN Timeout&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:36:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-new-install-and-inside-hosts-cannot-access-the-internet/m-p/2503573#M235719</guid>
      <dc:creator>Click Click</dc:creator>
      <dc:date>2019-03-12T04:36:31Z</dc:date>
    </item>
    <item>
      <title>Hi,you do not have any PAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-new-install-and-inside-hosts-cannot-access-the-internet/m-p/2503574#M235725</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;you do not have any PAT configured on your FW for internet access&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;nat (inside) 1 &amp;lt;local lan&amp;gt; &amp;lt;netmask&amp;gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also you do not have any public interface on the outside and so your NAT is controlled by your vdsl router?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Aug 2014 11:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-new-install-and-inside-hosts-cannot-access-the-internet/m-p/2503574#M235725</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-10T11:57:23Z</dc:date>
    </item>
    <item>
      <title>thank you for the reply and</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-new-install-and-inside-hosts-cannot-access-the-internet/m-p/2503575#M235731</link>
      <description>&lt;P&gt;thank you for the reply and it was a nat issue. is it possibler to nat on the vdsl router for networks that are a hop or 2 away? is that a way to avoid natting on the asa in this senario?&lt;/P&gt;</description>
      <pubDate>Sat, 16 Aug 2014 08:24:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-new-install-and-inside-hosts-cannot-access-the-internet/m-p/2503575#M235731</guid>
      <dc:creator>Click Click</dc:creator>
      <dc:date>2014-08-16T08:24:45Z</dc:date>
    </item>
    <item>
      <title>Hi, if you have that option</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-new-install-and-inside-hosts-cannot-access-the-internet/m-p/2503576#M235735</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you have that option then you can do that.... you can have just the nat exempt in fw.... and your vdsl will have the NAT with public ip to equivalent private ip..... you should have the proper routes in router to reach those private segments routed via asa fw.... it purely depends on ip schema and architecture of your network..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Sat, 16 Aug 2014 08:31:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-new-install-and-inside-hosts-cannot-access-the-internet/m-p/2503576#M235735</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-16T08:31:43Z</dc:date>
    </item>
  </channel>
</rss>

