<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to access website from inside LAN - 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3888974#M27037</link>
    <description>&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.1(7)32&lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;enable password FhRoI.scdBbFcz15 encrypted&lt;BR /&gt;passwd FhRoI.scdBbFcz15 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.168 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;pppoe client vpdn group BTI&lt;BR /&gt;ip address 81.144.xx.xx 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 10&lt;BR /&gt;ip address 172.16.1.168 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa917-32-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT/BST 0&lt;BR /&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 8.8.4.4&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Inside-NAT&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Site1-IP&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Branch&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.50.8_29&lt;BR /&gt;subnet 192.168.50.8 255.255.255.248&lt;BR /&gt;object network Branch1&lt;BR /&gt;subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network ConSett&lt;BR /&gt;subnet 192.168.3.0 255.255.255.0&lt;BR /&gt;object network Branch2&lt;BR /&gt;subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.1.0_24&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network WebServices&lt;BR /&gt;host 192.168.1.140&lt;BR /&gt;description Server&lt;BR /&gt;object network dmz-hst-172.16.1.140&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network dmz-net&lt;BR /&gt;subnet 172.16.0.0 255.255.0.0&lt;BR /&gt;object network STATIC-TCP-1433&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network STATIC-TCP4018&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network STATIC-TCP8080&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network STATIC-TCP8090&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network STATIC-TCP8172&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network STATIC-TCP4343&lt;BR /&gt;object network STATIC-TCP8081&lt;BR /&gt;object network inside-net&lt;BR /&gt;object network inside-hst-192.168.1.140&lt;BR /&gt;host 192.168.1.140&lt;BR /&gt;description Server&lt;BR /&gt;object network HTTPS&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network WWW&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;access-list 102 extended permit ip 192.168.1.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 192.168.1.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list incoming-outside extended permit icmp any any echo&lt;BR /&gt;access-list incoming-outside extended permit icmp any any echo-reply&lt;BR /&gt;access-list incoming-outside extended permit tcp object dmz-hst-172.16.1.140 object inside-hst-192.168.1.140 eq 5555&lt;BR /&gt;access-list incoming-outside extended permit tcp host 84.92.198.2 object STATIC-TCP4018 eq 4018&lt;BR /&gt;access-list incoming-outside extended permit tcp any object WWW eq www&lt;BR /&gt;access-list incoming-outside extended permit tcp any object HTTPS eq https&lt;BR /&gt;access-list incoming-outside extended permit tcp any object WebServices eq 8081&lt;BR /&gt;access-list outside_cryptomap_65535.1 extended permit ip 192.168.1.0 255.255.255.0 object Branch&lt;BR /&gt;access-list outside_cryptomap_65535.2 extended permit ip 192.168.1.0 255.255.255.0 object Branch1&lt;BR /&gt;access-list outside_cryptomap_65535.3 extended permit ip 192.168.1.0 255.255.255.0 object ConSett&lt;BR /&gt;access-list outside_cryptomap extended permit ip 192.168.1.0 255.255.255.0 object Branch2&lt;BR /&gt;access-list Split_Tunnel_List standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list dmz_in extended permit tcp object inside-hst-192.168.1.140 object dmz-hst-172.16.1.140 eq 1433&lt;BR /&gt;access-list dmz_in extended permit tcp object dmz-hst-172.16.1.140 object inside-hst-192.168.1.140 eq 1434&lt;BR /&gt;access-list dmz_in extended permit tcp object dmz-hst-172.16.1.140 object inside-hst-192.168.1.140 eq 5555&lt;BR /&gt;access-list dmz_access_in extended permit ip object dmz-hst-172.16.1.140 any4&lt;BR /&gt;access-list dmz_access_in extended permit tcp object dmz-hst-172.16.1.140 object inside-hst-192.168.1.140 eq 5555&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static Inside-NAT Inside-NAT destination static Site1-IP Site1-IP no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Inside-NAT Inside-NAT destination static Branch Branch no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.50.8_29 NETWORK_OBJ_192.168.50.8_29 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Inside-NAT Inside-NAT destination static Branch1 Branch1 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Inside-NAT Inside-NAT destination static ConSett ConSett no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 destination static Branch2 Brnach2 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network Inside-NAT&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network WebServices&lt;BR /&gt;nat (inside,outside) static interface service tcp 8081 8081&lt;BR /&gt;object network dmz-net&lt;BR /&gt;nat (dmz,outside) dynamic interface&lt;BR /&gt;object network STATIC-TCP4018&lt;BR /&gt;nat (dmz,outside) static interface service tcp 4018 4018&lt;BR /&gt;object network STATIC-TCP8080&lt;BR /&gt;nat (dmz,outside) static interface service tcp 8080 8080&lt;BR /&gt;object network HTTPS&lt;BR /&gt;nat (dmz,outside) static interface service tcp https https&lt;BR /&gt;object network WWW&lt;BR /&gt;nat (dmz,outside) static interface service tcp www www&lt;BR /&gt;access-group incoming-outside in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 81.144.xx.xx 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 0:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable 4433&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group BTI request dialout pppoe&lt;BR /&gt;vpdn group BTI localname D@.btclick.com&lt;BR /&gt;vpdn group BTI ppp authentication chap&lt;BR /&gt;vpdn username D@.btclick.com password ***** store-local&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.220-192.168.1.230 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;BR /&gt;webvpn&lt;BR /&gt;port 4433&lt;BR /&gt;enable outside&lt;BR /&gt;dtls port 4433&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:a6f2ab49c2ef12d8d5d669871856928a&lt;BR /&gt;: end&lt;BR /&gt;no asdm history enable&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jul 2019 07:38:25 GMT</pubDate>
    <dc:creator>Simon.peters1</dc:creator>
    <dc:date>2019-07-12T07:38:25Z</dc:date>
    <item>
      <title>Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3886429#M27013</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We have a DMZ Vlan setup on a 5505 and any pc on the inside network is unable to access the website inside that is hosted on a webserver on the DMZ. They have to use the ip address to browse the site as www or https doesn't work. The log returns the below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Failed to locate egress interface for protocol from src&lt;BR /&gt;interface:src IP/src port to dest IP/dest port&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any pointers would be gratefully received.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 16:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3886429#M27013</guid>
      <dc:creator>Simon.peters1</dc:creator>
      <dc:date>2019-07-08T16:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3886479#M27020</link>
      <description>&lt;P&gt;How is the WebServer configured in DMZ, is this Public IP address ? or Private Address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From Lan are you able to resolve the IP to DNS REsoluton ? check DNS configuration on your side&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nslookup is your tool to test.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 16:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3886479#M27020</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-07-08T16:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3886554#M27026</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The pc is able to resolve the DNS name to the correct IP but it doesn't reply like it does if I do it from&amp;nbsp; a pc on the outside of the lan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 18:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3886554#M27026</guid>
      <dc:creator>Simon.peters1</dc:creator>
      <dc:date>2019-07-08T18:47:08Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3886570#M27029</link>
      <description>&lt;P&gt;check the complete logs in ASA for that request from PC to DMZ, it would be nice if you can post the configuraiton to have look.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 19:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3886570#M27029</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-07-08T19:21:17Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3886856#M27031</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the logs for just that one IP I can see a Teardown for UDP connection 1424951 for outside:8.8.8.8/53 to inside and also a teardown&amp;nbsp; dynamic UDP translation form inside:192.168.xx to outside:81.144.xx.xx/54282 and then the failed to locate engress interface for TCP from inside 192.168.xx.xx to 81.144.xx.xx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 07:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3886856#M27031</guid>
      <dc:creator>Simon.peters1</dc:creator>
      <dc:date>2019-07-09T07:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3887159#M27033</link>
      <description>&lt;P&gt;suggest to post the configuration to have look.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 15:57:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3887159#M27033</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-07-09T15:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3887165#M27035</link>
      <description>&lt;P&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2019 07:37:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3887165#M27035</guid>
      <dc:creator>Simon.peters1</dc:creator>
      <dc:date>2019-07-12T07:37:51Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3888954#M27036</link>
      <description>&lt;P&gt;Anyone have any suggestions? Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2019 07:06:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3888954#M27036</guid>
      <dc:creator>Simon.peters1</dc:creator>
      <dc:date>2019-07-12T07:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3888974#M27037</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.1(7)32&lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;enable password FhRoI.scdBbFcz15 encrypted&lt;BR /&gt;passwd FhRoI.scdBbFcz15 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.168 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;pppoe client vpdn group BTI&lt;BR /&gt;ip address 81.144.xx.xx 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 10&lt;BR /&gt;ip address 172.16.1.168 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa917-32-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT/BST 0&lt;BR /&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 8.8.4.4&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Inside-NAT&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Site1-IP&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Branch&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.50.8_29&lt;BR /&gt;subnet 192.168.50.8 255.255.255.248&lt;BR /&gt;object network Branch1&lt;BR /&gt;subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network ConSett&lt;BR /&gt;subnet 192.168.3.0 255.255.255.0&lt;BR /&gt;object network Branch2&lt;BR /&gt;subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.1.0_24&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network WebServices&lt;BR /&gt;host 192.168.1.140&lt;BR /&gt;description Server&lt;BR /&gt;object network dmz-hst-172.16.1.140&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network dmz-net&lt;BR /&gt;subnet 172.16.0.0 255.255.0.0&lt;BR /&gt;object network STATIC-TCP-1433&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network STATIC-TCP4018&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network STATIC-TCP8080&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network STATIC-TCP8090&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network STATIC-TCP8172&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network STATIC-TCP4343&lt;BR /&gt;object network STATIC-TCP8081&lt;BR /&gt;object network inside-net&lt;BR /&gt;object network inside-hst-192.168.1.140&lt;BR /&gt;host 192.168.1.140&lt;BR /&gt;description Server&lt;BR /&gt;object network HTTPS&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;object network WWW&lt;BR /&gt;host 172.16.1.140&lt;BR /&gt;access-list 102 extended permit ip 192.168.1.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 192.168.1.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list incoming-outside extended permit icmp any any echo&lt;BR /&gt;access-list incoming-outside extended permit icmp any any echo-reply&lt;BR /&gt;access-list incoming-outside extended permit tcp object dmz-hst-172.16.1.140 object inside-hst-192.168.1.140 eq 5555&lt;BR /&gt;access-list incoming-outside extended permit tcp host 84.92.198.2 object STATIC-TCP4018 eq 4018&lt;BR /&gt;access-list incoming-outside extended permit tcp any object WWW eq www&lt;BR /&gt;access-list incoming-outside extended permit tcp any object HTTPS eq https&lt;BR /&gt;access-list incoming-outside extended permit tcp any object WebServices eq 8081&lt;BR /&gt;access-list outside_cryptomap_65535.1 extended permit ip 192.168.1.0 255.255.255.0 object Branch&lt;BR /&gt;access-list outside_cryptomap_65535.2 extended permit ip 192.168.1.0 255.255.255.0 object Branch1&lt;BR /&gt;access-list outside_cryptomap_65535.3 extended permit ip 192.168.1.0 255.255.255.0 object ConSett&lt;BR /&gt;access-list outside_cryptomap extended permit ip 192.168.1.0 255.255.255.0 object Branch2&lt;BR /&gt;access-list Split_Tunnel_List standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list dmz_in extended permit tcp object inside-hst-192.168.1.140 object dmz-hst-172.16.1.140 eq 1433&lt;BR /&gt;access-list dmz_in extended permit tcp object dmz-hst-172.16.1.140 object inside-hst-192.168.1.140 eq 1434&lt;BR /&gt;access-list dmz_in extended permit tcp object dmz-hst-172.16.1.140 object inside-hst-192.168.1.140 eq 5555&lt;BR /&gt;access-list dmz_access_in extended permit ip object dmz-hst-172.16.1.140 any4&lt;BR /&gt;access-list dmz_access_in extended permit tcp object dmz-hst-172.16.1.140 object inside-hst-192.168.1.140 eq 5555&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static Inside-NAT Inside-NAT destination static Site1-IP Site1-IP no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Inside-NAT Inside-NAT destination static Branch Branch no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.50.8_29 NETWORK_OBJ_192.168.50.8_29 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Inside-NAT Inside-NAT destination static Branch1 Branch1 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static Inside-NAT Inside-NAT destination static ConSett ConSett no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 destination static Branch2 Brnach2 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network Inside-NAT&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network WebServices&lt;BR /&gt;nat (inside,outside) static interface service tcp 8081 8081&lt;BR /&gt;object network dmz-net&lt;BR /&gt;nat (dmz,outside) dynamic interface&lt;BR /&gt;object network STATIC-TCP4018&lt;BR /&gt;nat (dmz,outside) static interface service tcp 4018 4018&lt;BR /&gt;object network STATIC-TCP8080&lt;BR /&gt;nat (dmz,outside) static interface service tcp 8080 8080&lt;BR /&gt;object network HTTPS&lt;BR /&gt;nat (dmz,outside) static interface service tcp https https&lt;BR /&gt;object network WWW&lt;BR /&gt;nat (dmz,outside) static interface service tcp www www&lt;BR /&gt;access-group incoming-outside in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 81.144.xx.xx 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 0:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable 4433&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group BTI request dialout pppoe&lt;BR /&gt;vpdn group BTI localname D@.btclick.com&lt;BR /&gt;vpdn group BTI ppp authentication chap&lt;BR /&gt;vpdn username D@.btclick.com password ***** store-local&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.220-192.168.1.230 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;BR /&gt;webvpn&lt;BR /&gt;port 4433&lt;BR /&gt;enable outside&lt;BR /&gt;dtls port 4433&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:a6f2ab49c2ef12d8d5d669871856928a&lt;BR /&gt;: end&lt;BR /&gt;no asdm history enable&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2019 07:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3888974#M27037</guid>
      <dc:creator>Simon.peters1</dc:creator>
      <dc:date>2019-07-12T07:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3889713#M27038</link>
      <description>&lt;P&gt;Does this 5505 have the Base license or the Plus license?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jul 2019 17:40:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3889713#M27038</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-07-13T17:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3889715#M27039</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;Plus.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Simon&lt;BR /&gt;</description>
      <pubDate>Sat, 13 Jul 2019 17:43:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3889715#M27039</guid>
      <dc:creator>Simon.peters1</dc:creator>
      <dc:date>2019-07-13T17:43:51Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3889716#M27040</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It has the plus license.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jul 2019 17:45:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3889716#M27040</guid>
      <dc:creator>Simon.peters1</dc:creator>
      <dc:date>2019-07-13T17:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3889733#M27041</link>
      <description>&lt;P&gt;Thanks for the information. Knowing that the 5505 has the Plus license does eliminate one potential problem. The error message says that the ASA is not able to identify which interface to use to send this traffic. It might help us understand the issue better if you could post the actual text of one of the error messages so that we can see exactly what it is trying to do. It might also help if you would post the output of show route from the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jul 2019 19:21:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3889733#M27041</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-07-13T19:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3890389#M27042</link>
      <description>&lt;P&gt;Hi Rick,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The exact error is attached.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;S&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2019 15:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3890389#M27042</guid>
      <dc:creator>Simon.peters1</dc:creator>
      <dc:date>2019-07-15T15:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3890452#M27043</link>
      <description>&lt;P&gt;You didn't answer how the server is actually configured - if it's using the private address then we would not expect clients to try to connect using the NATted address of 81.144.xxx.xxx.&lt;/P&gt;
&lt;P&gt;You might try telling the ASA to translate DNS replies (i.e. use the "dns" parameter in your relevant NAT rule)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/n.html#pgfId-1778544" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/n.html#pgfId-1778544&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2019 17:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3890452#M27043</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-15T17:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3890665#M27044</link>
      <description>&lt;P&gt;I am a bit puzzled. The original post mentions an error message about being unable to identify the egress interface.&amp;#16; We have asked for details and the recent post shows messages about tearing down translation table entries. How did the discussion change focus? The translation table entries show that the duration was zero, which sort of confirms that there was a problem but does not shed any light on what the problem was. So are we looking for issues about translation table entries or are we looking for issues about egress interface? Some clarification would be appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 00:20:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3890665#M27044</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2019-07-16T00:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to access website from inside LAN - 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3890830#M27045</link>
      <description>Hi Rick,&lt;BR /&gt;&lt;BR /&gt;Sorry for the confusion. The engress errors appear to have stopped. The issue is when any IP on the inside interface tries to access www. which is hosted behind the DMZ on 172.16.1.xx they are unable to and when looking through the live logging the errors in my screen shot are what's being logged.&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Tue, 16 Jul 2019 07:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-website-from-inside-lan-5505/m-p/3890830#M27045</guid>
      <dc:creator>Simon.peters1</dc:creator>
      <dc:date>2019-07-16T07:09:35Z</dc:date>
    </item>
  </channel>
</rss>

