<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Not able to access Internet or Internal network via SSL AnyConne in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/not-able-to-access-internet-or-internal-network-via-ssl/m-p/2442716#M270305</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like you are missing the nonat statement.&amp;nbsp; Try adding the following and test (adjust the source subnet to match your needs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network VPN_range&lt;/P&gt;&lt;P&gt;range 172.16.253.100 172.16.253&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Branches,publicWAN) source static obj-10.0.0.0 obj-10.0.0.0 destination static VPN_range VPN_range&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 10 Feb 2014 14:09:52 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-02-10T14:09:52Z</dc:date>
    <item>
      <title>Not able to access Internet or Internal network via SSL AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-internet-or-internal-network-via-ssl/m-p/2442715#M270300</link>
      <description>&lt;P&gt;After connecting succesfully with Cisco AnyConnect version 3.0.05152 I am unable to access internal resources. Below is the configuration of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any input on the below would be appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2014.02.04 16:15:58 =~=~=~=~=~=~=~=~=~=~=~=&lt;BR /&gt;sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(4) &lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;domain-name hb.local&lt;BR /&gt;enable password pEuUQweb2zEldXkE encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd pEuUQweb2zEldXkE encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool Remote_VPN_DHCP_Pool 172.16.253.100-172.16.253.150 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description *** Internet ***&lt;BR /&gt;nameif publicWAN&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.X.X X.X.X.X.&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;description *** Guest Wireless Network ***&lt;BR /&gt;nameif guest&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.0.254.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;description *** Uplink to Branches ***&lt;BR /&gt;nameif Branches&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.254.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;description *** Uplink to JHA ***&lt;BR /&gt;nameif JHA&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.0.8.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;description *** Managemnet Interface - NOT USED ***&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa914-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup publicWAN&lt;BR /&gt;dns domain-lookup guest&lt;BR /&gt;dns domain-lookup Branches&lt;BR /&gt;dns domain-lookup JHA&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 172.16.1.2&lt;BR /&gt;domain-name hb.local&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-10.0.0.0&lt;BR /&gt;subnet 10.0.0.0 255.255.255.0&lt;BR /&gt;object network obj_guest&lt;BR /&gt;subnet 10.0.254.0 255.255.255.0&lt;BR /&gt;object network obj-172.16.1.0&lt;BR /&gt;subnet 172.16.1.0 255.255.255.0&lt;BR /&gt;object network obj-172.16.1.5&lt;BR /&gt;host 172.16.1.5&lt;BR /&gt;object network obj-172.16.1.5-01&lt;BR /&gt;host 172.16.1.5&lt;BR /&gt;access-list Branches extended permit icmp any4 any4 &lt;BR /&gt;access-list Branches extended permit ip any4 any4 &lt;BR /&gt;access-list JHA extended permit ip any4 any4 &lt;BR /&gt;access-list JHA extended permit icmp any4 any4 &lt;BR /&gt;access-list guest extended deny ip any4 10.0.1.0 255.255.255.0 &lt;BR /&gt;access-list guest extended deny ip any4 10.0.2.0 255.255.255.0 &lt;BR /&gt;access-list guest extended deny ip any4 10.0.3.0 255.255.255.0 &lt;BR /&gt;access-list guest extended deny ip any4 10.0.4.0 255.255.255.0 &lt;BR /&gt;access-list guest extended deny ip any4 10.0.5.0 255.255.255.0 &lt;BR /&gt;access-list guest extended deny ip any4 10.0.6.0 255.255.255.0 &lt;BR /&gt;access-list guest extended deny ip any4 10.0.7.0 255.255.255.0 &lt;BR /&gt;access-list guest extended deny ip any4 10.0.8.0 255.255.255.0 &lt;BR /&gt;access-list guest extended deny ip any4 10.0.9.0 255.255.255.0 &lt;BR /&gt;access-list guest extended deny ip any4 10.0.10.0 255.255.255.0 &lt;BR /&gt;access-list guest extended deny ip any4 172.16.0.0 255.255.0.0 &lt;BR /&gt;access-list guest extended permit ip any4 any4 &lt;BR /&gt;access-list guest extended permit icmp any4 any4 &lt;BR /&gt;access-list traffic_send_ips_module extended permit ip any4 any4 &lt;BR /&gt;access-list outside extended permit tcp any4 host 172.16.1.5 eq https &lt;BR /&gt;access-list outside extended permit tcp X.X.X.X 255.255.255.0 host 172.16.1.5 eq smtp &lt;BR /&gt;access-list outside extended permit tcp X.X.X.X. 255.255.255.0 host 172.16.1.5 eq smtp &lt;BR /&gt;access-list outside extended deny ip any4 any4 log interval 30 &lt;BR /&gt;pager lines 50&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging monitor warnings&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;BR /&gt;logging trap warnings&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging queue 2048&lt;BR /&gt;logging device-id hostname&lt;BR /&gt;logging host Branches 172.16.1.80&lt;BR /&gt;flow-export destination Branches 172.16.1.80 2055&lt;BR /&gt;flow-export template timeout-rate 15&lt;BR /&gt;mtu publicWAN 1500&lt;BR /&gt;mtu guest 1500&lt;BR /&gt;mtu Branches 1500&lt;BR /&gt;mtu JHA 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp deny any publicWAN&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (any,publicWAN) dynamic interface&lt;BR /&gt;object network obj-10.0.0.0&lt;BR /&gt;nat (Branches,JHA) static 10.0.0.0&lt;BR /&gt;object network obj_guest&lt;BR /&gt;nat (guest,publicWAN) dynamic interface&lt;BR /&gt;object network obj-172.16.1.0&lt;BR /&gt;nat (Branches,JHA) static 172.16.1.0&lt;BR /&gt;object network obj-172.16.1.5&lt;BR /&gt;nat (Branches,publicWAN) static interface service tcp smtp smtp &lt;BR /&gt;object network obj-172.16.1.5-01&lt;BR /&gt;nat (Branches,publicWAN) static interface service tcp https https &lt;BR /&gt;access-group outside in interface publicWAN&lt;BR /&gt;access-group guest in interface guest&lt;BR /&gt;access-group Branches in interface Branches&lt;BR /&gt;access-group JHA in interface JHA&lt;BR /&gt;route publicWAN 0.0.0.0 0.0.0.0 X.X.X.X. 1 &lt;BR /&gt;route Branches 10.0.0.0 255.255.0.0 192.168.254.2 1 &lt;BR /&gt;route Branches 10.0.5.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 10.28.11.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 10.55.4.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 10.55.6.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 10.57.4.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 10.57.6.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 10.71.4.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 10.71.6.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route JHA 10.150.0.0 255.255.0.0 10.0.8.254 1 &lt;BR /&gt;route JHA 10.251.4.0 255.255.255.0 10.0.8.254 1 &lt;BR /&gt;route Branches 172.16.0.0 255.255.0.0 192.168.254.2 1 &lt;BR /&gt;route Branches 172.28.0.0 255.255.0.0 192.168.254.2 1 &lt;/P&gt;&lt;P&gt;route Branches 172.28.250.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 192.9.200.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 192.9.201.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 192.9.220.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;route Branches 200.0.0.0 255.255.0.0 192.168.254.2 1 &lt;BR /&gt;route Branches 200.0.11.0 255.255.255.0 192.168.254.2 1 &lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp; always-on-vpn profile-setting&lt;BR /&gt;aaa-server HB_LDAP_Group protocol ldap&lt;BR /&gt;aaa-server HB_LDAP_Group (Branches) host 172.16.1.2&lt;BR /&gt;server-port 636&lt;BR /&gt;ldap-base-dn CN=VPN LDAP,OU=HB Users,DC=hb,DC=local&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;ldap-naming-attribute sAMAccountName&lt;BR /&gt;ldap-login-password *****&lt;BR /&gt;ldap-login-dn VPN LDAP&lt;BR /&gt;ldap-over-ssl enable&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.0.0.0 255.255.0.0 Branches&lt;BR /&gt;http 172.16.0.0 255.255.0.0 Branches&lt;BR /&gt;snmp-server host Branches 172.16.1.80 community *****&lt;BR /&gt;snmp-server location Seagoville&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;snmp-server enable traps syslog&lt;BR /&gt;snmp-server enable traps ipsec start stop&lt;BR /&gt;snmp-server enable traps entity config-change fru-insert fru-remove&lt;BR /&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;BR /&gt;sysopt connection timewait&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh scopy enable&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 publicWAN&lt;BR /&gt;ssh 10.0.0.0 255.255.0.0 Branches&lt;BR /&gt;ssh 172.16.0.0 255.255.0.0 Branches&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd domain hb.local&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.0.254.100-10.0.254.200 guest&lt;BR /&gt;dhcpd dns 12.127.17.72 12.127.17.73 interface guest&lt;BR /&gt;dhcpd enable guest&lt;BR /&gt;!&lt;BR /&gt;threat-detection rate acl-drop rate-interval 600 average-rate 5 burst-rate 10&lt;BR /&gt;threat-detection rate acl-drop rate-interval 3600 average-rate 320 burst-rate 640&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 129.6.15.28 source publicWAN&lt;BR /&gt;webvpn&lt;BR /&gt;port 4443&lt;BR /&gt;enable publicWAN&lt;BR /&gt;enable Branches&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-3.1.05152-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-macosx-i386-3.1.05152-k9.pkg 2&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 172.16.1.2&lt;BR /&gt;vpn-tunnel-protocol ikev2 ssl-client &lt;BR /&gt;default-domain value hb.local&lt;BR /&gt;split-tunnel-all-dns enable&lt;BR /&gt;username HBAdmin password azFWMwV/tQh/YjoW encrypted&lt;BR /&gt;tunnel-group Remote_VPN_Users type remote-access&lt;BR /&gt;tunnel-group Remote_VPN_Users general-attributes&lt;BR /&gt;address-pool Remote_VPN_DHCP_Pool&lt;BR /&gt;authentication-server-group HB_LDAP_Group LOCAL&lt;BR /&gt;default-group-policy GroupPolicy1&lt;BR /&gt;dhcp-server 172.16.1.2&lt;BR /&gt;tunnel-group Remote_VPN_Users webvpn-attributes&lt;BR /&gt;group-alias RemoteVPNUsers enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map ips_module_class_map&lt;BR /&gt;match access-list traffic_send_ips_module&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;class ips_module_class_map&lt;BR /&gt;&amp;nbsp; ips inline fail-open&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:1c38a95ce10dab97ac6ad2e99823f5a2&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;ASA#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; exit&lt;/P&gt;&lt;P&gt;Logoff&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:40:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-internet-or-internal-network-via-ssl/m-p/2442715#M270300</guid>
      <dc:creator>Robert Hefner</dc:creator>
      <dc:date>2019-03-12T03:40:23Z</dc:date>
    </item>
    <item>
      <title>Not able to access Internet or Internal network via SSL AnyConne</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-internet-or-internal-network-via-ssl/m-p/2442716#M270305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like you are missing the nonat statement.&amp;nbsp; Try adding the following and test (adjust the source subnet to match your needs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network VPN_range&lt;/P&gt;&lt;P&gt;range 172.16.253.100 172.16.253&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Branches,publicWAN) source static obj-10.0.0.0 obj-10.0.0.0 destination static VPN_range VPN_range&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 14:09:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-internet-or-internal-network-via-ssl/m-p/2442716#M270305</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-10T14:09:52Z</dc:date>
    </item>
    <item>
      <title>Not able to access Internet or Internal network via SSL AnyConne</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-access-internet-or-internal-network-via-ssl/m-p/2442717#M270311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also depending on your requirements you may want to configure split tunneling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 14:10:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-access-internet-or-internal-network-via-ssl/m-p/2442717#M270311</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-10T14:10:28Z</dc:date>
    </item>
  </channel>
</rss>

