<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I can ping, but not browse the internet.. ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395545#M309896</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reason why you might have needed to add a static NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; You had to run a static NAT mapping with an IP that was routable for your ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The layer 3 device that connects to the ASA had an interface within the same IP scheme thus needed to be able to see an ARP entry and NAT exemption does not ARP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Identity NAT, mapping the IP address of the server on the DMZ to itself will produce ARP entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA is able to ARP for static NAT entries with the sysopt noproxyarp&lt;/P&gt;&lt;P&gt;When a host sends IP traffic to another device on the same Ethernet network, the host needs to know the MAC address of the device. ARP is a Layer 2 protocol that resolves an IP address to a MAC address. A host sends an ARP request asking "Who is this IP address?" The device owning the IP address replies, "I own that IP address; here is my MAC address." &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Proxy ARP is when a device responds to an ARP request with its own MAC address, even though the device does not own the IP address. The adaptive security appliance uses proxy ARP when you configure NAT and specify a global address that is on the same network as the adaptive security appliance interface. The only way traffic can reach the hosts is if the adaptive security appliance uses proxy ARP to claim that the adaptive security appliance MAC address is assigned to destination global addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/s8.html#wp1517975"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/s8.html#wp1517975&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate our answers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 04 Nov 2013 19:24:39 GMT</pubDate>
    <dc:creator>jumora</dc:creator>
    <dc:date>2013-11-04T19:24:39Z</dc:date>
    <item>
      <title>I can ping, but not browse the internet.. ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395536#M309874</link>
      <description>&lt;P&gt;Hey Folks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to setup a DMZ on a 5505 (Security plus license)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Interface DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Security level 50&lt;/P&gt;&lt;P&gt;Vlan 43&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using the DMZ with public ip x.x.x.x 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And there is a server configured with a static ip (Public address) x.x.x.x subnet:255.255.255.224 gw: the DMZ interface..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything seems to work fine i can ping the gw from the server, i can ping 8.8.8.8 &lt;A href="https://community.cisco.com/www.google.se" target="_blank"&gt;www.google.se&lt;/A&gt; etc..&lt;/P&gt;&lt;P&gt;Ping and Dns resolutions seems to work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;But that is the only thing working.&lt;/SPAN&gt;&lt;STRONG style="font-size: 14pt; "&gt; I can't browse the internet &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt; any ideas?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;sh run | in DMZ&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;nameif DMZ&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;access-list DMZ_nat0_outbound extended permit ip x.x.x.x 255.255.255.224 any &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;access-list DMZ_nat0_outbound_1 extended permit ip x.x.x.x 255.255.255.224 any &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;access-list DMZ_access_in extended permit ip any any &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;access-list DMZ_nat0_outbound_2 extended permit ip x.x.x.x 255.255.255.224 any &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;access-list DMZ_access_in_1 extended permit ip 1 x.x.x.x 255.255.255.224 any log debugging &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;mtu DMZ 1500&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;nat (DMZ) 0 access-list DMZ_nat0_outbound_2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;access-group DMZ_access_in_1 in interface DMZ&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sh nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;NAT policies on Interface DMZ:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; match ip DMZ x.x.x.x 255.255.255.224 outside any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 13562, untranslate_hits = 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp; match ip DMZ x.x.x.x 255.255.255.224 DMZ any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;What is the issue? Any ideas? &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate your help&lt;/P&gt;&lt;P&gt;/Shane&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395536#M309874</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2019-03-12T02:58:48Z</dc:date>
    </item>
    <item>
      <title>I can ping, but not browse the internet.. ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395537#M309877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, what is the gateway of the ASA and does that gateway know how to route the DMZ network that you have configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the gateway of the ASA (ISP) knows how to route for this network then we need to confirm if they can ARP or see packets coming from the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Put this IP on your browser:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 98.139.183.24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you can reach it, is so it could be related to DNS, try to change DNS server setting from the TCP/IP setting on the NIC of the server to 4.2.2.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another way to test this out is opening up an ACL to permit ICMP to the IP address of the server on the outside or interface that is facing the ASA gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this, it would be checking ASA logs and captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;logging buffer-size 1048576&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show log | in server_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture permit IP host server_ip any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture permit IP any host server_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture in interface dmz access-list capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture out interface outside access-list capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show cap out&lt;/P&gt;&lt;P&gt;show cap in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can downlaod the captures through http if you have defined ASDM access:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://ASA_interface_ip/capture/in/pcap"&gt;https://ASA_interface_ip/capture/in/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://ASA_interface_ip/capture/out/pcap"&gt;https://ASA_interface_ip/capture/out/pcap&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 18:09:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395537#M309877</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-31T18:09:06Z</dc:date>
    </item>
    <item>
      <title>I can ping, but not browse the internet.. ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395538#M309880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with jumora as this does sound like a DNS issue.&amp;nbsp; Though I would do a packet tracer before doing any of the other suggestions he made as it will save you a lot of time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input DMZ tcp &lt;IP of="" dmz="" server=""&gt; 12345 8.8.8.8 80 detail&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the packet tracer completes successfully the traffic is allowed though the firewall and the issue most likely lies elsewhere.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 18:49:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395538#M309880</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-10-31T18:49:06Z</dc:date>
    </item>
    <item>
      <title>I can ping, but not browse the internet.. ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395539#M309884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah he is right&lt;SPAN __jive_emoticon_name="cry" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;, it would even give us the rpf check well everything we need at the ASA level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Marius!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 18:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395539#M309884</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-31T18:52:35Z</dc:date>
    </item>
    <item>
      <title>I can ping, but not browse the internet.. ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395540#M309887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The packet is allowed..&lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Packet-tracer input DMZ tcp 188.122.147.113 12345 8.8.8.8 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in_1 in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in_1 extended permit ip x.x.x.x 255.255.255.224 any log debugging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in&amp;nbsp; id=0xccf518f8, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=40614, user_data=0xc78e4090, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=x.x.x.x, mask=255.255.255.224, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in&amp;nbsp; id=0xccdecd48, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=46609, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip DMZ x.x.x.x 255.255.255.224 outside any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 46685, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in&amp;nbsp; id=0xc9773d98, priority=6, domain=nat-exempt, deny=false&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=46592, user_data=0xccddd970, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=x.x.x.x, mask=255.255.255.224, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in&amp;nbsp; id=0xccda3f80, priority=0, domain=host-limit, deny=false&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=46593, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in&amp;nbsp; id=0xc96b6558, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1524730, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New flow created with id 1608324, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for forward flow ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;input-interface: DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Nov 2013 08:47:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395540#M309887</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2013-11-01T08:47:22Z</dc:date>
    </item>
    <item>
      <title>I can ping, but not browse the internet.. ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395541#M309889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;Here is the capture from the host server ip (Out) to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://192.241.216.107"&gt;http://192.241.216.107&lt;/A&gt;&lt;SPAN&gt;..&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;A bunch of RST packets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Broken TCP, The acknowledge field is nonzero while the ACk flas is not set etc..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/8/0/164084-capture.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;And here is ping from the same server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/8/0/164085-ping.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sh route &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is x.x.x.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.17.100.0 255.255.255.0 is directly connected, inside&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; x.x.x.0 255.255.255.128 is directly connected, outside&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; x.x.x.128 255.255.255.224 is directly connected, DMZ&lt;/P&gt;&lt;P&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via x.x.x.x.1, outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/shane&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Nov 2013 12:09:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395541#M309889</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2013-11-01T12:09:30Z</dc:date>
    </item>
    <item>
      <title>I can ping, but not browse the internet.. ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395542#M309891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please answer the questions that I also posted on the request to run the wireshark on the server that was on the dmz?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the gateway of the ASA (ISP) knows how to route for this network that is behind the DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do a track down of the MAC address that shows on the reply with RST.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have never seen this newlexengine but did read on it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.corrupteddatarecovery.com/Port/2075tcp-Port-Type-newlixengine-newlixengine.asp"&gt;http://www.corrupteddatarecovery.com/Port/2075tcp-Port-Type-newlixengine-newlixengine.asp&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 02:31:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395542#M309891</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-03T02:31:52Z</dc:date>
    </item>
    <item>
      <title>I can ping, but not browse the internet.. ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395543#M309893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well i got it to work finally, just needed a static Nat entry, and everything went fine &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;But i learned alot from this, thank u all for your help! &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Shane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 02:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395543#M309893</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2013-11-03T02:47:19Z</dc:date>
    </item>
    <item>
      <title>I can ping, but not browse the internet.. ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395544#M309894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;Ok, great to know, please rate the assistance or the knowledge that you experienced from our assistance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 02:50:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395544#M309894</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-03T02:50:06Z</dc:date>
    </item>
    <item>
      <title>I can ping, but not browse the internet.. ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395545#M309896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reason why you might have needed to add a static NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; You had to run a static NAT mapping with an IP that was routable for your ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The layer 3 device that connects to the ASA had an interface within the same IP scheme thus needed to be able to see an ARP entry and NAT exemption does not ARP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;•3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Identity NAT, mapping the IP address of the server on the DMZ to itself will produce ARP entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA is able to ARP for static NAT entries with the sysopt noproxyarp&lt;/P&gt;&lt;P&gt;When a host sends IP traffic to another device on the same Ethernet network, the host needs to know the MAC address of the device. ARP is a Layer 2 protocol that resolves an IP address to a MAC address. A host sends an ARP request asking "Who is this IP address?" The device owning the IP address replies, "I own that IP address; here is my MAC address." &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Proxy ARP is when a device responds to an ARP request with its own MAC address, even though the device does not own the IP address. The adaptive security appliance uses proxy ARP when you configure NAT and specify a global address that is on the same network as the adaptive security appliance interface. The only way traffic can reach the hosts is if the adaptive security appliance uses proxy ARP to claim that the adaptive security appliance MAC address is assigned to destination global addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/s8.html#wp1517975"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/s8.html#wp1517975&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate our answers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Nov 2013 19:24:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-can-ping-but-not-browse-the-internet-asa-5505/m-p/2395545#M309896</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-04T19:24:39Z</dc:date>
    </item>
  </channel>
</rss>

