<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is http://www.adhocdata.nl in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521232#M237808</link>
    <description>&lt;P&gt;Is &lt;A href="http://www.adhocdata.nl" target="_blank"&gt;http://www.adhocdata.nl&lt;/A&gt; your company website? if so is this server located behind your ASA in a DMZ?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rememebr to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Thu, 05 Jun 2014 10:43:12 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-06-05T10:43:12Z</dc:date>
    <item>
      <title>ASA5510 is blocking one specific website</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521231#M237806</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Hello everybody,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;At the customer site, we have a ASA5510 (ASA version 9.1.2 &amp;nbsp;- ASDM 7.2.1).&lt;/P&gt;&lt;P&gt;&lt;U&gt;The problem is that there is &lt;STRONG&gt;only one&lt;/STRONG&gt; particular website blocked&lt;/U&gt;, without any logic reason&lt;IMG alt="angry" height="23" src="https://supportforums.cisco.com/profiles/commons/libraries/ckeditor/plugins/smiley/images/angry_smile.png" title="angry" width="23" /&gt;.&amp;nbsp;According to the configuration we close no specific traffic. In fact; all traffic from that interface (higher security level) can go to the (WAN) interface with a lower security level.&lt;/P&gt;&lt;P&gt;ASA interface settings:&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;inside: 192.168.1.254/24 (local lan)&lt;/LI&gt;&lt;LI&gt;ts-data: 172.19.4.240/24 (another local LAN interface, used for traffic acrossing private WAN)&lt;/LI&gt;&lt;LI&gt;ts-inet: 83.167.X.X (this is the public internet connection&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;example:&lt;/STRONG&gt;&lt;BR /&gt;From host 192.168.1.51(inside), the website &lt;A href="http://www.adhocdata.nl" target="_blank"&gt;http://www.adhocdata.nl&lt;/A&gt; could not be reached and is blocked by the ASA.&amp;nbsp;The strange thing is, it seems to be blocked by the wrong interface/access-list (ts-data). This interface has nothing to do with it...because the traffic is initiated from the&lt;EM&gt; &lt;/EM&gt;&lt;STRONG&gt;&lt;U&gt;inside &lt;/U&gt;&lt;/STRONG&gt;interface to the &lt;STRONG&gt;&lt;U&gt;TS-inet&lt;/U&gt;&lt;/STRONG&gt;&amp;nbsp;(WAN)interface. So why is the wrong access list blocking only this specific website. All the other web traffic runs smoothly.&lt;/P&gt;&lt;P&gt;See attachment for log information.&lt;/P&gt;&lt;P&gt;Hopefully someone can help me.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Thanks in advance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521231#M237806</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2019-03-12T04:17:50Z</dc:date>
    </item>
    <item>
      <title>Is http://www.adhocdata.nl</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521232#M237808</link>
      <description>&lt;P&gt;Is &lt;A href="http://www.adhocdata.nl" target="_blank"&gt;http://www.adhocdata.nl&lt;/A&gt; your company website? if so is this server located behind your ASA in a DMZ?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rememebr to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 10:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521232#M237808</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-05T10:43:12Z</dc:date>
    </item>
    <item>
      <title>No, that's a website that our</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521233#M237810</link>
      <description>&lt;P&gt;No, that's a website that our customer wants to visit.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 11:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521233#M237810</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2014-06-05T11:03:59Z</dc:date>
    </item>
    <item>
      <title>So your customer located off</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521234#M237811</link>
      <description>&lt;P&gt;So your customer located off TS-inet interface and the webserver is located off TS-data..correct?&lt;/P&gt;&lt;P&gt;Would you be able to post a full running config (sanitised)?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rememebr to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 11:07:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521234#M237811</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-05T11:07:57Z</dc:date>
    </item>
    <item>
      <title>The customer host 192.168.1</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521235#M237812</link>
      <description>&lt;P&gt;No not at all.&lt;/P&gt;&lt;P&gt;The customer host 192.168.1.51 (the host that wants to visit the website) is located behind the "inside" interface. Traffic to the web server goes through the interface "ts-inet" (the ts-inet interface is used as outside interface).&lt;/P&gt;&lt;P&gt;In short; the customer wants to visit that website. It's just an external website.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll see if I can post a config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 11:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521235#M237812</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2014-06-05T11:24:32Z</dc:date>
    </item>
    <item>
      <title>Here, the (stripped)</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521236#M237813</link>
      <description>&lt;P&gt;Here, the (stripped) configuration.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 12:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521236#M237813</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2014-06-05T12:21:19Z</dc:date>
    </item>
    <item>
      <title>at first glance there is</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521237#M237814</link>
      <description>&lt;P&gt;at first glance there is nothing wrong with the configuration.&lt;/P&gt;&lt;P&gt;If you do an nslookup adhocdata.nl from a local PC does it resolve to the correct IP (I got 217.119.236.139)&lt;/P&gt;&lt;P&gt;if you do a packet tracer on the ASA is the packet allowed through the ASA?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.1.2 12345 217.119.236.139 80 det&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Please post the output here.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rememebr to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 13:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521237#M237814</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-05T13:17:19Z</dc:date>
    </item>
    <item>
      <title>Thanks.. Here's the output</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521238#M237815</link>
      <description>&lt;P&gt;Thanks.. Here's the output:&lt;/P&gt;&lt;DIV&gt;Result of the command: "packet-tracer input inside tcp 192.168.1.2 12345 217.119.236.139 80 det"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xace9dd78, priority=1, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=397248107, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/DIV&gt;&lt;DIV&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;/DIV&gt;&lt;DIV&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/DIV&gt;&lt;DIV&gt;input_ifc=inside, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: ROUTE-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype: input&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ts-inet&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 3&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;object network obj_any-01&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nat (inside,ts-inet) dynamic interface&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;Dynamic translate 192.168.1.2/12345 to 123.45.67.89/12345&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xacbfcf90, priority=6, domain=nat, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=436869, user_data=0xacbfb9c0, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=inside, output_ifc=ts-inet&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 4&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: per-session&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xade28538, priority=1, domain=nat-per-session, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=4006169, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=any, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 5&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xacec54f0, priority=0, domain=inspect-ip-options, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=5013604, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=inside, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 6&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: per-session&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xade28538, priority=1, domain=nat-per-session, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=4006171, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=any, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 7&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xacdf8498, priority=0, domain=inspect-ip-options, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=2507875, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=ts-inet, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 8&lt;/DIV&gt;&lt;DIV&gt;Type: FLOW-CREATION&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;New flow created with id 7467808, packet dispatched to next module&lt;/DIV&gt;&lt;DIV&gt;Module information for forward flow ...&lt;/DIV&gt;&lt;DIV&gt;snp_fp_tracer_drop&lt;/DIV&gt;&lt;DIV&gt;snp_fp_inspect_ip_options&lt;/DIV&gt;&lt;DIV&gt;snp_fp_tcp_normalizer&lt;/DIV&gt;&lt;DIV&gt;snp_fp_translate&lt;/DIV&gt;&lt;DIV&gt;snp_fp_adjacency&lt;/DIV&gt;&lt;DIV&gt;snp_fp_fragment&lt;/DIV&gt;&lt;DIV&gt;snp_ifc_stat&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Module information for reverse flow ...&lt;/DIV&gt;&lt;DIV&gt;snp_fp_tracer_drop&lt;/DIV&gt;&lt;DIV&gt;snp_fp_inspect_ip_options&lt;/DIV&gt;&lt;DIV&gt;snp_fp_translate&lt;/DIV&gt;&lt;DIV&gt;snp_fp_tcp_normalizer&lt;/DIV&gt;&lt;DIV&gt;snp_fp_adjacency&lt;/DIV&gt;&lt;DIV&gt;snp_fp_fragment&lt;/DIV&gt;&lt;DIV&gt;snp_ifc_stat&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: inside&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: ts-inet&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: allow&lt;/DIV&gt;</description>
      <pubDate>Thu, 05 Jun 2014 13:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521238#M237815</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2014-06-05T13:23:03Z</dc:date>
    </item>
    <item>
      <title>As per the packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521239#M237816</link>
      <description>&lt;P&gt;As per the packet tracer traffic should be allowed through the ASA to that IP...This could be DNS resolution issue.&amp;nbsp; Have you confirmed that the URL resolves to the correct IP?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rememebr to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 13:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521239#M237816</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-05T13:25:31Z</dc:date>
    </item>
    <item>
      <title>The packet trace goes well ..</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521240#M237817</link>
      <description>&lt;P&gt;The packet trace goes well ... it's strange that a different interface blocks the traffic to that website (see the previously posted picture).&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 13:26:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521240#M237817</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2014-06-05T13:26:58Z</dc:date>
    </item>
    <item>
      <title>yes, the right IP is the one</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521241#M237818</link>
      <description>&lt;P&gt;yes, the right IP is the one you can see in the attached picture..&lt;IMG alt="crying" height="23" src="https://supportforums.cisco.com/profiles/commons/libraries/ckeditor/plugins/smiley/images/cry_smile.png" title="crying" width="23" /&gt;. Resolving looks good.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 13:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521241#M237818</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2014-06-05T13:39:52Z</dc:date>
    </item>
    <item>
      <title>Are you sure there is no</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521242#M237819</link>
      <description>&lt;P&gt;Are you sure there is no backdoor into the ts-data network?&amp;nbsp; Without knowing the in's and out's of your network, could there be a routing issue that is sending that traffic to the ts-data interface?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rememebr to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 13:43:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521242#M237819</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-05T13:43:43Z</dc:date>
    </item>
    <item>
      <title>yes I'm sure of it...</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521243#M237820</link>
      <description>&lt;P&gt;yes I'm sure of it...&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 13:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521243#M237820</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2014-06-05T13:52:51Z</dc:date>
    </item>
    <item>
      <title>I suggest opening a support</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521244#M237821</link>
      <description>&lt;P&gt;I suggest opening a support case with TAC.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rememebr to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 14:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521244#M237821</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-05T14:48:56Z</dc:date>
    </item>
    <item>
      <title>I'd suggest trying a packet</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521245#M237822</link>
      <description>&lt;P&gt;I'd suggest trying a packet capture to show the outbound traffic going into and leaving the ASA and watching for any return traffic.&lt;/P&gt;&lt;P&gt;Please refer to this&amp;nbsp;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/110117-asa-capture-asdm-config.html"&gt;Step-By-Step Procedure to Configure Packet Capture in ASA/PIX using CLI&lt;/A&gt;&amp;nbsp;and run the following while trying to access the website from 192.168.1.51:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;CODE&gt;access-list asdm_cap_selector_inside extended permit ip host 192.168.1.51 host 217.119.236.139&lt;BR /&gt;access-list asdm_cap_selector_inside extended permit ip host 217.119.236.139 host 192.168.1.51&lt;BR /&gt;access-list asdm_cap_selector_outside extended permit ip host 217.119.236.139 host 192.168.1.51&lt;BR /&gt;access-list asdm_cap_selector_outside extended permit ip host 192.168.1.51 host 217.119.236.139&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;capture capin interface inside access-list asdm_cap_selector_inside&lt;BR /&gt;capture capout interface outside access-list asdm_cap_selector_outside&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;show capture capin&lt;BR /&gt;show capture capout&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That should definitively show whether the ASA is operating as intended.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 14:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521245#M237822</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-06-05T14:55:22Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin! This is the result</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521246#M237823</link>
      <description>&lt;P&gt;Hi Marvin!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the result:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RSB-W-ASA# sh cap capin&amp;nbsp;&lt;/P&gt;&lt;P&gt;12 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;1: 16:19:53.285660 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.63.62575 &amp;gt; 217.119.236.139.80: S 2890204037:2890204037(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;2: 16:19:53.289429 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.63.62576 &amp;gt; 217.119.236.139.80: S 3819549090:3819549090(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;3: 16:19:53.301253 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.63.62575: R 59869520:59869520(0) ack 2890204038 win 8192&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;4: 16:19:53.304809 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.63.62576: R 1539803214:1539803214(0) ack 3819549091 win 8192&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;5: 16:19:53.796620 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.63.62575 &amp;gt; 217.119.236.139.80: S 2890204037:2890204037(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;6: 16:19:53.796925 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.63.62576 &amp;gt; 217.119.236.139.80: S 3819549090:3819549090(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;7: 16:19:53.804813 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.63.62576: R 1133326952:1133326952(0) ack 3819549091 win 8192&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;8: 16:19:53.804890 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.63.62575: R 555211610:555211610(0) ack 2890204038 win 8192&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;9: 16:19:54.296768 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.63.62575 &amp;gt; 217.119.236.139.80: S 2890204037:2890204037(0) win 8192 &amp;lt;mss 1460,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; 10: 16:19:54.297195 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.63.62576 &amp;gt; 217.119.236.139.80: S 3819549090:3819549090(0) win 8192 &amp;lt;mss 1460,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; 11: 16:19:54.334775 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.63.62575: R 786977574:786977574(0) ack 2890204038 win 8192&amp;nbsp;&lt;BR /&gt;&amp;nbsp; 12: 16:19:54.334867 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.63.62576: R 1027018004:1027018004(0) ack 3819549091 win 8192&amp;nbsp;&lt;BR /&gt;12 packets shown&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA# sh cap capout&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;I've used this captures:&lt;/P&gt;&lt;P&gt;RSB-W-ASA# show capture&amp;nbsp;&lt;BR /&gt;capture capin type raw-data access-list asdm_cap_selector_inside interface &lt;STRONG&gt;inside&lt;/STRONG&gt; [Capturing - 952 bytes]&amp;nbsp;&lt;BR /&gt;capture capout type raw-data access-list asdm_cap_selector_outside interface &lt;STRONG&gt;ts-inet&lt;/STRONG&gt; [Capturing - 0 bytes]&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 15:17:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521246#M237823</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2014-06-05T15:17:13Z</dc:date>
    </item>
    <item>
      <title>hmm, I'm not sure what's</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521247#M237824</link>
      <description>&lt;P&gt;hmm, I'm not sure what's going on with capout but capin shows the return traffic from the web site headed back to the client PC&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2014 15:41:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521247#M237824</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-06-05T15:41:05Z</dc:date>
    </item>
    <item>
      <title>If you do the same capture</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521248#M237825</link>
      <description>&lt;P&gt;If you do the same capture but instead put the capout on the ts-data interface....&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rememebr to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 07:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521248#M237825</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-06T07:10:16Z</dc:date>
    </item>
    <item>
      <title>Hi,Here's the output. Is</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521249#M237826</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Here's the output. Is looks like the ASA doesn't route the traffic through the ts-inet.. but why..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RSB-W-ASA# sh capture&amp;nbsp;&lt;BR /&gt;capture capin type raw-data access-list asdm_cap_selector_inside interface inside [Capturing - 0 bytes]&amp;nbsp;&lt;BR /&gt;capture capout type raw-data access-list asdm_cap_selector_outside interface ts-inet [Capturing - 0 bytes]&amp;nbsp;&lt;BR /&gt;capture captsdata type raw-data access-list asdm_cap_selector_tsdata interface ts-data [Capturing - 0 bytes]&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA# sh capture&amp;nbsp;&lt;BR /&gt;capture capin type raw-data access-list asdm_cap_selector_inside interface inside [Capturing - 952 bytes]&amp;nbsp;&lt;BR /&gt;capture capout type raw-data access-list asdm_cap_selector_outside interface ts-inet [Capturing - 0 bytes]&amp;nbsp;&lt;BR /&gt;capture captsdata type raw-data access-list asdm_cap_selector_tsdata interface ts-data [Capturing - 0 bytes]&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA# sh cap capin&lt;/P&gt;&lt;P&gt;12 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;1: 14:06:57.274216 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.62.62520 &amp;gt; 217.119.236.139.80: S 2656530156:2656530156(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;2: 14:06:57.274567 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.62.62521 &amp;gt; 217.119.236.139.80: S 3302571231:3302571231(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;3: 14:06:57.280792 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.62.62520: R 907382114:907382114(0) ack 2656530157 win 8192&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;4: 14:06:57.281143 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.62.62521: R 902039472:902039472(0) ack 3302571232 win 8192&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;5: 14:06:57.779714 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.62.62521 &amp;gt; 217.119.236.139.80: S 3302571231:3302571231(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;6: 14:06:57.780004 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.62.62520 &amp;gt; 217.119.236.139.80: S 2656530156:2656530156(0) win 8192 &amp;lt;mss 1460,nop,wscale 2,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;7: 14:06:57.786244 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.62.62521: R 188947886:188947886(0) ack 3302571232 win 8192&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;8: 14:06:57.786488 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.62.62520: R 1985605340:1985605340(0) ack 2656530157 win 8192&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;9: 14:06:58.273942 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.62.62521 &amp;gt; 217.119.236.139.80: S 3302571231:3302571231(0) win 8192 &amp;lt;mss 1460,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; 10: 14:06:58.274262 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 192.168.1.62.62520 &amp;gt; 217.119.236.139.80: S 2656530156:2656530156(0) win 8192 &amp;lt;mss 1460,nop,nop,sackOK&amp;gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; 11: 14:06:58.280609 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.62.62521: R 1470588602:1470588602(0) ack 3302571232 win 8192&amp;nbsp;&lt;BR /&gt;&amp;nbsp; 12: 14:06:58.280792 &amp;nbsp; &amp;nbsp; &amp;nbsp; 802.1Q vlan#99 P0 217.119.236.139.80 &amp;gt; 192.168.1.62.62520: R 1896160456:1896160456(0) ack 2656530157 win 8192&amp;nbsp;&lt;BR /&gt;12 packets shown&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;BR /&gt;RSB-W-ASA# sh cap capout&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;RSB-W-ASA# sh cap captsdata&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;BR /&gt;RSB-W-ASA#&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 13:02:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521249#M237826</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2014-06-06T13:02:25Z</dc:date>
    </item>
    <item>
      <title>It seems that all public IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521250#M237827</link>
      <description>&lt;P&gt;It seems that all public IP addresses that start with 217.119.x.x give problems. IP addresses starting with 217.118.x.x or 217.120 give no problems..&lt;IMG alt="surprise" height="23" src="https://supportforums.cisco.com/profiles/commons/libraries/ckeditor/plugins/smiley/images/omg_smile.png" title="surprise" width="23" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2014 13:38:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-is-blocking-one-specific-website/m-p/2521250#M237827</guid>
      <dc:creator>Daniel Leonard</dc:creator>
      <dc:date>2014-06-06T13:38:56Z</dc:date>
    </item>
  </channel>
</rss>

