<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic No Internet access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321675#M310569</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I forgot to indicate, you have a static NAT configuration that maps the inside network to the internal_LAN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,Internal_LAN) Inside_Subnet Inside_Subnet netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 192.168.1.0 Inside_Subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need the Internal_LAN network to be able to access anything on the inside I would rather configure the NAT exemption that states that you will not require NAT from the inside interface network to the internal_LAN network but that is all up to you if you want to configure it or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip any 172.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE: The line above is part of the next configuration that applies the NAT exemption on the inside interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the configuration would like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security-level 90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Internal_LAN) 8 172.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 8 12.18.13.X&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Oct 2013 22:04:18 GMT</pubDate>
    <dc:creator>jumora</dc:creator>
    <dc:date>2013-10-22T22:04:18Z</dc:date>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321667#M310556</link>
      <description>&lt;P&gt;Hi everybody,&lt;/P&gt;&lt;P&gt;I am unable to access internet with one of the vlan. i have two vlans&lt;/P&gt;&lt;P&gt;VLAN 2&amp;nbsp;&amp;nbsp; 192.168.1.0&lt;/P&gt;&lt;P&gt;VLAN 8&amp;nbsp;&amp;nbsp; 172.168.1.0&lt;/P&gt;&lt;P&gt;When i am on vlan 2 i can access to internet. when i work with vlan 8, i cannot access to internet. As a matter of fact VLAN 8 (172.168.1.0) is new. I need to know what else i need to configure to get access. the following is the configuration of my cisco ASA firewall. Any help will be apprieciated.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname abcASA1&lt;/P&gt;&lt;P&gt;domain-name abc.com&lt;/P&gt;&lt;P&gt;enable password .4rNnGSuheRe encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2K encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.1.3 Email_DNS&lt;/P&gt;&lt;P&gt;name 192.168.1.4 SQLServer&lt;/P&gt;&lt;P&gt;name 192.168.2.2 VPN_3005&lt;/P&gt;&lt;P&gt;name 192.168.2.0 DMZ_Subnet&lt;/P&gt;&lt;P&gt;name 192.168.3.0 VPN_Subnet&lt;/P&gt;&lt;P&gt;name 192.168.1.0 Inside_Subnet&lt;/P&gt;&lt;P&gt;name 192.168.3.5 VPNNET_DNS&lt;/P&gt;&lt;P&gt;name 128.8.10.90 D_Root&lt;/P&gt;&lt;P&gt;name 192.5.5.241 F_Root&lt;/P&gt;&lt;P&gt;name 198.41.0.10 J_Root&lt;/P&gt;&lt;P&gt;name 192.33.4.12 C_Root&lt;/P&gt;&lt;P&gt;name 193.0.14.129 K_Root&lt;/P&gt;&lt;P&gt;name 198.32.64.12 L_Root&lt;/P&gt;&lt;P&gt;name 192.36.148.17 I_Root&lt;/P&gt;&lt;P&gt;name 192.112.36.4 G_Root&lt;/P&gt;&lt;P&gt;name 128.63.2.53 H_Root&lt;/P&gt;&lt;P&gt;name 128.9.0.107 B_Root&lt;/P&gt;&lt;P&gt;name 198.41.0.4 A_Root&lt;/P&gt;&lt;P&gt;name 202.12.27.33 M_Root&lt;/P&gt;&lt;P&gt;name 192.203.230.10 E_Root&lt;/P&gt;&lt;P&gt;name 12.183.68.51 ATT_DNS_2&lt;/P&gt;&lt;P&gt;name 12.183.68.50 ATT_DNS_1&lt;/P&gt;&lt;P&gt;name 192.168.1.6 FileServer_NAS&lt;/P&gt;&lt;P&gt;name 192.168.2.6 abc_WEB&lt;/P&gt;&lt;P&gt;name 199.130.197.153 CA_Mgmt_USDA&lt;/P&gt;&lt;P&gt;name 199.130.197.19 CA_Roaming_USDA&lt;/P&gt;&lt;P&gt;name 199.130.214.49 CA_CRLChk_USDA&lt;/P&gt;&lt;P&gt;name 199.134.134.133 CA_Mgmt_USDA_&lt;/P&gt;&lt;P&gt;name 199.134.134.135 CA_Roaming_USDA2&lt;/P&gt;&lt;P&gt;name 192.168.2.9 PublicDNS2&lt;/P&gt;&lt;P&gt;name 192.168.2.8 PublicDNS&lt;/P&gt;&lt;P&gt;name 192.168.1.11 abc02EX2&lt;/P&gt;&lt;P&gt;name 162.140.109.7 GPO_PKI_DIR&lt;/P&gt;&lt;P&gt;name 162.140.9.10 GPO_PKI&lt;/P&gt;&lt;P&gt;name 192.168.1.12 Patchlink&lt;/P&gt;&lt;P&gt;name 192.168.1.10 abcSLIMPS1&lt;/P&gt;&lt;P&gt;name 192.168.1.7 FileServer_DNS&lt;/P&gt;&lt;P&gt;name 192.168.1.15 abc06ex2&lt;/P&gt;&lt;P&gt;name 192.168.101.0 NEW_VPN_SUBNET&lt;/P&gt;&lt;P&gt;name 192.168.77.0 NEW_VPN_POOL description NEW_VPN_POOL&lt;/P&gt;&lt;P&gt;name 192.168.1.16 VTC description LifeSize VTC&lt;/P&gt;&lt;P&gt;name 12.18.13.16 VTC_Outside&lt;/P&gt;&lt;P&gt;name 192.168.2.50 Email_Gateway&lt;/P&gt;&lt;P&gt;name 192.168.1.20 Exch10&lt;/P&gt;&lt;P&gt;name 192.168.1.8 SharePoint&lt;/P&gt;&lt;P&gt;name 192.168.1.19 abc09ic description Web Servr&lt;/P&gt;&lt;P&gt;name 192.168.1.180 ExternalDNS&lt;/P&gt;&lt;P&gt;name 192.168.2.223 abc11ids&lt;/P&gt;&lt;P&gt;name 192.168.50.0 inside_new_Network&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 12.18.13.20 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan4&lt;/P&gt;&lt;P&gt; nameif vpnnet&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 192.168.3.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; nameif asainside&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.4.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan6&lt;/P&gt;&lt;P&gt; nameif testinside&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; ipv6 address 2001:ab1:5::/64 eui-64&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan7&lt;/P&gt;&lt;P&gt; description New Local Area Network for Server&lt;/P&gt;&lt;P&gt; nameif inside_new&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.50.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan8&lt;/P&gt;&lt;P&gt; description abcdone Server VLAN&lt;/P&gt;&lt;P&gt; nameif Internal_LAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.168.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan16&lt;/P&gt;&lt;P&gt; description out of band&lt;/P&gt;&lt;P&gt; nameif oobnet&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1-10&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;boot system disk0:/asa802-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup vpnnet&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 192.168.1.2&lt;/P&gt;&lt;P&gt; name-server Email_DNS&lt;/P&gt;&lt;P&gt; domain-name abc.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network Inside_Server_Group&lt;/P&gt;&lt;P&gt; description EmailServer, FileServer, SQLServer&lt;/P&gt;&lt;P&gt; network-object Email_DNS 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object SQLServer 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.1.2 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object FileServer_NAS 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object host abc02EX2&lt;/P&gt;&lt;P&gt; network-object host abc06ex2&lt;/P&gt;&lt;P&gt;object-group network Inside_Server_Group_ref&lt;/P&gt;&lt;P&gt; network-object 192.168.3.73 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.3.74 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.3.72 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.3.76 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group service DNS tcp-udp&lt;/P&gt;&lt;P&gt; description DNS Service both TCP/UDP&lt;/P&gt;&lt;P&gt; port-object eq domain&lt;/P&gt;&lt;P&gt;object-group network InternetDNS&lt;/P&gt;&lt;P&gt; network-object A_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object B_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object C_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object D_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object E_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object F_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object G_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object H_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object I_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object J_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object K_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object L_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object M_Root 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object ATT_DNS_2 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object ATT_DNS_1 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group network USDA-PKI-Users&lt;/P&gt;&lt;P&gt; description GAO PKI User Group&lt;/P&gt;&lt;P&gt; network-object 192.168.1.51 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.1.52 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.1.53 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.1.54 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.1.55 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.1.56 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.1.57 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.1.58 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.1.59 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.1.60 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.61&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.62&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.63&lt;/P&gt;&lt;P&gt;object-group network CITABCDAS&lt;/P&gt;&lt;P&gt; network-object 192.168.3.241 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.3.242 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.3.243 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.3.244 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object 192.168.3.245 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object VPNNET_DNS 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group service Virginia.edu tcp&lt;/P&gt;&lt;P&gt; description blackboard java classroom&lt;/P&gt;&lt;P&gt; port-object range 8010 8012&lt;/P&gt;&lt;P&gt;object-group network PDASB1-VPN-Inside&lt;/P&gt;&lt;P&gt; network-object host abcPLIasd1&lt;/P&gt;&lt;P&gt; network-object host 192.168.3.10&lt;/P&gt;&lt;P&gt;object-group service http-https tcp&lt;/P&gt;&lt;P&gt; port-object range https https&lt;/P&gt;&lt;P&gt; port-object range www www&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group service VTC tcp-udp&lt;/P&gt;&lt;P&gt; description LifeSize&lt;/P&gt;&lt;P&gt; port-object range 60000 64999&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq 3268&lt;/P&gt;&lt;P&gt; port-object eq ldap&lt;/P&gt;&lt;P&gt;object-group service EmailGateway udp&lt;/P&gt;&lt;P&gt; description TrustManager&lt;/P&gt;&lt;P&gt; port-object eq 19200&lt;/P&gt;&lt;P&gt; port-object eq 8007&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt; port-object eq 990&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object range 2000 5000&lt;/P&gt;&lt;P&gt;object-group service Barracuda tcp&lt;/P&gt;&lt;P&gt; port-object eq 5124&lt;/P&gt;&lt;P&gt; port-object eq 5126&lt;/P&gt;&lt;P&gt;object-group service barracuda udp&lt;/P&gt;&lt;P&gt; port-object eq 5124&lt;/P&gt;&lt;P&gt; port-object eq 5126&lt;/P&gt;&lt;P&gt;object-group service IMAP tcp&lt;/P&gt;&lt;P&gt; port-object eq 993&lt;/P&gt;&lt;P&gt; port-object eq imap4&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_0&lt;/P&gt;&lt;P&gt; service-object tcp eq domain &lt;/P&gt;&lt;P&gt; service-object udp eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group TCPUDP any object-group InternetDNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_0 any host 12.18.13.222 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Website&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 12.18.13.19 eq 8090 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Allow ICMP replies to inside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any host 12.18.13.21 echo-reply &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VTC&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host VTC_Outside eq h323 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VTC&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group TCPUDP any host VTC_Outside eq sip &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any host VTC_Outside &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Barracuda&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.1.25 object-group Barracuda &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Barracuda&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any host 192.168.1.25 object-group barracuda &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VTC&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any host VTC_Outside range 60000 64999 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VTC&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host VTC_Outside range 60000 64999 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark for Public DNS2&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any host 12.18.13.223 eq domain &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark for Public DNS2&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 12.18.13.223 eq domain &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.224 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark NTP from Router to DMZ&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp host 12.18.13.1 host 12.18.13.15 eq ntp &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Syslog from Router&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp host 12.18.13.1 gt 1023 host 12.18.13.13 eq syslog &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound Email SMTP to DMZ Host 192.168.2.50&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.13 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VPNNET IPSec ESP&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit esp any host 12.18.13.31 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VPNNET IPSec AH&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ah any host 12.18.13.31 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VPNNET IPSec Port 4500&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any eq 4500 host 12.18.13.31 eq 4500 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VPNNET IPSec ISAKMP&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any eq isakmp host 12.18.13.31 eq isakmp &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VPNNET IPSec over UDP port 10000&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any eq 10000 host 12.18.13.31 eq 10000 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Sharepoint1&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.42 eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.31 eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Access Rule to Webmail&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.32 eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark SLIMPSdev&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.33 object-group http-https &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound Website&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.19 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound SharePoint&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.42 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound WEb Traffic to ISA server-SLIMPS&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.41 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound Secure Web Traffic to ISA server-SLIMPS&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any gt 1023 host 12.18.13.41 eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound FTP abc_web&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 12.18.13.14 object-group DM_INLINE_TCP_2 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark DNS1&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark for Public DNS2&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark for Public DNS2&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark NTP from Router to DMZ&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Syslog from Router&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound Email SMTP to DMZ Host 192.168.2.5&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VPNNET IPSec ESP&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VPNNET IPSec AH&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VPNNET IPSec Port 4500&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VPNNET IPSec ISAKMP&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark VPNNET IPSec over UDP port 10000&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound WEb Traffic to Facilitate Web Server in DMZ&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound Secure Web Traffic to Facilitate Web Server in DMZ&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Access Rule to FE Server&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark SLIMPSdev&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound WEb Traffic to ISA server-SLIMPS&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound Secure Web Traffic to ISA server-SLIMPS&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Inbound port 93 to ISA server-SLIMPS&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Explicit Deny All&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark Patrica RDP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.53 eq 3389 &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark Berry RDP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.51 eq 3389 &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark John Tsai RDP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.156 eq 3389 &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark Chopper RDP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.128 eq 3389 &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark Ms Ballard RDP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.58 eq 3389 &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark Wakita&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.153 eq 3389 &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark Amy RDP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.124 eq 3389 &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark KC RDP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.57 eq 3389 &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark Eyang RDP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.161 eq 3389 &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark SLIMPS doc&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended permit tcp VPN_Subnet 255.255.255.0 host 192.168.1.13 eq 3389 &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark for SLIMPS APP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark for SLIMPS APP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark for SLIMPS APP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark FOR SLIMPS Application&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark SLIMPS Production Workflow&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark SLIMPS&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark FOR SLIMPS Application&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark SLIMPS VPN access to SLIMPSTEST2 Alpha website&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark SLIMPS VPN access to abc02SLIMPS1&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark SLIMPS VPN access to abc02SLIMPS2&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark for abc06SLIMPS1&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark for abc06SLIMPS1&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 135 Netbios&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 137 Netbios Name Service&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 138 Netbios Datagram&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 139 Netbios Session Service&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 445 Server Message Block&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 389 Lightweight Directory Access Protocol&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 389 Lightweight Directory Access Protocol&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 88 Kerberos&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 88 Kerberos&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 1433 Windows Sql Server&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 9000 Static RPC Port&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 9000 Static RPC Port&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 9001 Static RPC Port&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 9001 Static RPC Port&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows Port 4000 Status NTDS Port&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows TCP Domain Name Service&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Windows UDP Domain Name Service&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET DNS Forwarding to DMZ DNS&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET DNS Forwarding to DMZ DNS&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET DNS Forwarding to DMZ DNS&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET DNS Forwarding to DMZ DNS&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Outbound Web&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Outbound Secure Web&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET Outbound FTP&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET ICMP Echo&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark VPNNET ICMP Echo-Reply&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark RDP for ISA&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark Allow access after Exemption from nat to inside network&lt;/P&gt;&lt;P&gt;access-list vpnnet_access_in remark talin test&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark isa to SLIMPS1 vote portal&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host 192.168.2.20 host 192.168.2.10 eq 8200 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host 192.168.2.101 host 12.18.13.1 eq ntp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark ISA to SLIMPS Dev&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host 192.168.2.14 host 12.18.13.33 eq www inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark ClearSwift TRUSTmanager Reputations server &amp;amp;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Broadcasting of greylisting data to peer Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host Email_Gateway any eq 8007 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark ClearSwift TRUSTmanager Reputations server &amp;amp;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Broadcasting of greylisting data to peer Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host Email_Gateway any eq 19200 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark NTP Email Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host Email_Gateway gt 1023 host FileServer_DNS eq ntp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark FTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway host FileServer_DNS eq ftp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark ldap&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host Email_Gateway gt 1023 host 192.168.2.78 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark ldap&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host SharePoint gt 1023 host 192.168.2.78 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark HTTP for Email_Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit object-group TCPUDP host Email_Gateway host FileServer_DNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark HTTP for Email_Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway host FileServer_DNS eq ldap &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark HTTP for Email_Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 host 192.168.2.78 eq www inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark HTTPS access to the Clearswift Update Server&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp Inside_Subnet 255.255.255.0 gt 1023 host Email_Gateway eq https inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark HTTP for SharePoint&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint host FileServer_DNS eq ldap &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark LDAP Communication for Email Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 host 192.168.2.78 object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark LDAP Communication&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint gt 1023 host 192.168.2.78 eq 3268 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host PublicDNS object-group InternetDNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to Outside for Email Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host Email_Gateway gt 1023 object-group InternetDNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ ISA DNS Forwarding to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host 192.168.2.15 gt 1023 object-group InternetDNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host SharePoint gt 1023 object-group InternetDNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host abc_WEB gt 1023 object-group InternetDNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to Outside for Email Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 object-group InternetDNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint gt 1023 object-group InternetDNS object-group DNS inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host PublicDNS gt 1023 any eq https &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host PublicDNS2 gt 1023 any eq https &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound https Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host abc_WEB gt 1023 object-group InternetDNS object-group DNS inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host PublicDNS gt 1023 object-group InternetDNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Public DNS server.&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host PublicDNS2 gt 1023 object-group InternetDNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Public DNS Server&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host PublicDNS gt 1023 any eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Public DNS Server&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host PublicDNS2 gt 1023 any eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ Public DNS Outbound Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ Public DNS Outbound Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ Public&amp;nbsp; DNS to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ Public DNS Outbound Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny tcp host SharePoint gt 1023 host 192.168.2.73 eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny tcp host abc_WEB gt 1023 host 192.168.2.73 eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Web Shield Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny tcp host SharePoint gt 1023 host 192.168.2.75 eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Web Shield Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny tcp host abc_WEB gt 1023 host 192.168.2.75 eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS FTP for Email Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 any eq ftp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound Web for Email Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 any eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ ISA DNS Outbound Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host 192.168.2.15 gt 1023 any eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint gt 1023 any eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark For Email&amp;nbsp; Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit icmp host Email_Gateway host 12.18.13.1 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark ISA&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit icmp host 192.168.2.15 host 12.18.13.1 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit icmp host SharePoint host 12.18.13.1 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host abc_WEB gt 1023 any eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host 192.168.2.7 gt 1023 any eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny tcp host SharePoint gt 1023 host 192.168.2.73 eq ftp inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny tcp host abc_WEB gt 1023 host 192.168.2.73 eq ftp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound FTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint gt 1023 any eq ftp inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound FTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host abc_WEB gt 1023 any eq ftp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Inbound Email Relay SMTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint host 192.168.2.73 eq smtp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Inbound Email Gateway SMTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway host 192.168.2.77 eq smtp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Inbound Email Gateway SMTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway host Exch10 eq smtp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Inbound Email Gateway SMTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway host abc06ex2 eq smtp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Inbound Email Relay SMTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint host abc06ex2 eq smtp inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Inbound Web Shield Relay SMTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint gt 1023 host 192.168.2.75 eq smtp inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Mailsweeper access to FE Server&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint gt 1023 host 192.168.2.11 eq smtp inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host 192.168.2.7 gt 1023 host 192.168.2.73 eq smtp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host 192.168.2.7 gt 1023 host 192.168.2.75 eq smtp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ EMail Gateway outbound delivery&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway any eq smtp &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ Mail Sweeper outbound delivery&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint any eq smtp inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny tcp host SharePoint gt 1023 host 192.168.2.73 eq https inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny tcp host abc_WEB gt 1023 host 192.168.2.73 eq https &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound HTTPS for Email Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit udp host Email_Gateway object-group EmailGateway any eq 8007 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound HTTPS for Email Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host Email_Gateway gt 1023 any eq https &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound HTTPS&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint gt 1023 any eq https &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound HTTPS&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host abc_WEB gt 1023 any eq https inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host 192.168.2.7 gt 1023 any eq https inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound SMTP to Internet&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host SharePoint gt 1023 any eq smtp inactive &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark for ISA&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host 192.168.2.20 gt 1023 any eq www &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark for ISA&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp host 192.168.2.20 gt 1023 any eq https &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit object-group TCPUDP host SharePoint Inside_Subnet 255.255.255.0 eq domain &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit icmp host SharePoint Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip host abc11ids any &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip Inside_Subnet 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Explicit Rule&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark isa to SLIMPS1 vote portal&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark ISA to SLIMPS Dev&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark ldap&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark LDAP Communication&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Forwarding to UUNET DNS (Zone Tranfer)&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound https Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Public DNS server.&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Public DNS Server&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Public DNS Server&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ Public DNS Outbound Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ Public&amp;nbsp; DNS to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS to Outside&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ Public DNS Outbound Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Web Shield Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS to DMZ Inside Web Shield Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound Web&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Web Shield Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Web Shield Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound FTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound FTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Inbound Email Relay SMTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Inbound Email Relay SMTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Inbound Web Shield Relay SMTP&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Mailsweeper access to FE Server&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ Mail Sweeper outbound delivery&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Email Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Web Shield Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark (DENY) DMZ DNS Outbound to DMZ Inside Web Shield Static Address&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound HTTPS&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound HTTPS&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark DMZ DNS Outbound SMTP to Internet&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark for ISA&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark for ISA&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Explicit Deny All&lt;/P&gt;&lt;P&gt;access-list testinside_access_in remark Deny IP Traffic from Test to Production DMZ&lt;/P&gt;&lt;P&gt;access-list testinside_access_in remark Allow all other Traffic to Outside&lt;/P&gt;&lt;P&gt;access-list testinside_access_in remark Deny IP Traffic from Test to Production DMZ&lt;/P&gt;&lt;P&gt;access-list testinside_access_in remark Allow all other Traffic to Outside&lt;/P&gt;&lt;P&gt;access-list vpnnet_nat0_outbound extended permit ip VPN_Subnet 255.255.255.0 Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vpnnet_nat0_outbound extended permit ip VPN_Subnet 255.255.255.0 NEW_VPN_POOL 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip Inside_Subnet 255.255.255.0 host Email_Gateway &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound remark SharePoint&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip Inside_Subnet 255.255.255.0 host SharePoint &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip Inside_Subnet 255.255.255.0 NEW_VPN_POOL 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound remark For Email Gateway&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip host Email_Gateway Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound remark Sharepoint&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip host SharePoint Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip DMZ_Subnet 255.255.255.0 NEW_VPN_SUBNET 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip DMZ_Subnet 255.255.255.0 NEW_VPN_POOL 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list capture_acl extended permit ip host 12.18.13.33 host 12.18.13.180 &lt;/P&gt;&lt;P&gt;access-list capture_acl extended permit ip host 12.18.13.180 host 12.18.13.33 &lt;/P&gt;&lt;P&gt;access-list cap_acl extended permit ip host 192.168.2.14 host 12.18.13.180 &lt;/P&gt;&lt;P&gt;access-list cap_acl extended permit ip host 12.18.13.180 host 192.168.2.14 &lt;/P&gt;&lt;P&gt;access-list 213 extended permit ip host SharePoint host 192.168.2.21 &lt;/P&gt;&lt;P&gt;access-list asainside_access_in remark permit traffic from the new ASA&lt;/P&gt;&lt;P&gt;access-list asainside_access_in extended permit ip 192.168.100.0 255.255.255.0 Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list asainside_access_in extended permit ip 192.168.4.0 255.255.255.0 Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list asainside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list asainside_nat0_outbound extended permit ip 192.168.4.0 255.255.255.0 Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list acl_cap extended permit ip host 192.168.100.1 host 192.168.4.1 &lt;/P&gt;&lt;P&gt;access-list acl_cap extended permit ip host 192.168.4.1 host 192.168.100.1 &lt;/P&gt;&lt;P&gt;access-list abcdONE_splitTunnelAcl standard permit Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list abcdONE_splitTunnelAcl standard permit DMZ_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list abcdONE_splitTunnelAcl standard permit 172.16.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list oobnet_access_in extended permit ip any Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list VMman_nat0_outbound extended permit ip 172.16.1.0 255.255.255.0 Inside_Subnet 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internal_LAN_access_in extended permit object-group TCPUDP any object-group InternetDNS object-group DNS &lt;/P&gt;&lt;P&gt;access-list Internal_LAN_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;snmp-map mysnmpmap&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;pager lines 30&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging monitor informational&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging history warnings&lt;/P&gt;&lt;P&gt;logging asdm debugging&lt;/P&gt;&lt;P&gt;logging mail informational&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;logging from-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:mkaramat@abcdone.com" target="_blank"&gt;mkaramat@abcdone.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;logging recipient-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:mkaramat@abcdone.com" target="_blank"&gt;mkaramat@abcdone.com&lt;/A&gt;&lt;SPAN&gt; level errors&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;logging device-id ipaddress outside&lt;/P&gt;&lt;P&gt;logging host vpnnet VPNNET_DNS&lt;/P&gt;&lt;P&gt;logging host inside abc09ic&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.60&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu vpnnet 1500&lt;/P&gt;&lt;P&gt;mtu asainside 1500&lt;/P&gt;&lt;P&gt;mtu testinside 1500&lt;/P&gt;&lt;P&gt;mtu inside_new 1500&lt;/P&gt;&lt;P&gt;mtu Internal_LAN 1500&lt;/P&gt;&lt;P&gt;mtu oobnet 1500&lt;/P&gt;&lt;P&gt;ip local pool VPNPOOL 192.168.101.1-192.168.101.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip local pool NEW_VPN_POOL 192.168.77.10-192.168.77.240 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface dmz&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface vpnnet&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface asainside&lt;/P&gt;&lt;P&gt;ip audit name Outside attack action drop&lt;/P&gt;&lt;P&gt;ip audit interface outside Outside&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-621.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp outside 12.18.13.20 0024.c4e9.4764 &lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 12.18.13.21 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 2 12.18.13.22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 3 12.18.13.23 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 4 12.18.13.24 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 5 12.18.13.25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;global (dmz) 1 192.168.2.21 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (dmz) 3 192.168.2.23 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (dmz) 4 192.168.2.24 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (dmz) 5 192.168.2.25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (vpnnet) 1 192.168.3.21 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (outside) 1 NEW_VPN_POOL 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 Inside_Subnet 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list dmz_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (dmz) 2 DMZ_Subnet 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (vpnnet) 0 access-list vpnnet_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (vpnnet) 3 VPN_Subnet 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (asainside) 0 access-list asainside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (asainside) 1 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (oobnet) 0 access-list VMman_nat0_outbound&lt;/P&gt;&lt;P&gt;static (dmz,outside) 12.18.13.31 VPN_3005 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,vpnnet) 192.168.3.72 FileServer_DNS netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,vpnnet) 192.168.3.74 SQLServer netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,vpnnet) 192.168.3.73 Email_DNS netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,vpnnet) 192.168.3.76 FileServer_NAS netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,vpnnet) 192.168.3.80 abcSLIMPS1 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.2.73 Email_DNS netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.2.77 abc06ex2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) 12.18.13.13 Email_Gateway netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) 12.18.13.14 abc_WEB netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (outside,inside) VTC VTC_Outside netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) 12.18.13.15 192.168.2.101 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 12.18.13.19 abc09ic netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 12.18.13.42 SharePoint netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.2.78 FileServer_DNS netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 12.18.13.32 Exch10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.2.10 abcSLIMPS1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.2.11 abc02EX2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,vpnnet) 192.168.3.11 abc02EX2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,vpnnet) 192.168.3.81 192.168.1.155 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,vpnnet) 192.168.3.82 192.168.1.28 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.2.13 192.168.1.13 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) VTC_Outside VTC netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 12.18.13.33 192.168.1.13 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 12.18.13.41 abcSLIMPS1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 12.18.13.222 ExternalDNS netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,Internal_LAN) Inside_Subnet Inside_Subnet netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (Internal_LAN,inside) 172.168.1.0 172.168.1.0 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;access-group vpnnet_access_in in interface vpnnet&lt;/P&gt;&lt;P&gt;access-group asainside_access_in in interface asainside&lt;/P&gt;&lt;P&gt;access-group Internal_LAN_access_in in interface Internal_LAN&lt;/P&gt;&lt;P&gt;access-group oobnet_access_in in interface oobnet&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 12.18.13.1 1&lt;/P&gt;&lt;P&gt;route asainside 192.168.100.0 255.255.255.0 192.168.4.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 1:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server abc.com protocol nt&lt;/P&gt;&lt;P&gt;aaa-server abc.com (inside) host 192.168.1.2&lt;/P&gt;&lt;P&gt; nt-auth-domain-controller abc12dc1&lt;/P&gt;&lt;P&gt;aaa-server abc.com (inside) host Email_DNS&lt;/P&gt;&lt;P&gt; nt-auth-domain-controller abc12dc2&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;http Inside_Subnet 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;http Inside_Subnet 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http VPN_Subnet 255.255.255.0 vpnnet&lt;/P&gt;&lt;P&gt;snmp-server group Authentication_Only v3 auth &lt;/P&gt;&lt;P&gt;snmp-server group Authentication&amp;amp;Encryption v3 priv &lt;/P&gt;&lt;P&gt;snmp-server user mkaramat Authentication&amp;amp;Encryption v3 encrypted auth md5 25:57:33:8a:86:b0:fc:71:36:5f:de:3d:83:35:eb:d4 priv aes 128 25:57:33:8a:86:b0:fc:71:36:5f:de:3d:83:35:eb:d4 &lt;/P&gt;&lt;P&gt;snmp-server host inside 192.168.1.60 version 3 mkaramat udp-port 161&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no service resetoutbound interface outside&lt;/P&gt;&lt;P&gt;no service resetoutbound interface inside&lt;/P&gt;&lt;P&gt;no service resetoutbound interface dmz&lt;/P&gt;&lt;P&gt;no service resetoutbound interface vpnnet&lt;/P&gt;&lt;P&gt;no service resetoutbound interface asainside&lt;/P&gt;&lt;P&gt;no service resetoutbound interface testinside&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;crypto map oobnet_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map oobnet_map interface oobnet&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable inside&lt;/P&gt;&lt;P&gt;crypto isakmp enable inside_new&lt;/P&gt;&lt;P&gt;crypto isakmp enable oobnet&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet 12.18.13.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh Inside_Subnet 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh VPN_Subnet 255.255.255.0 vpnnet&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;ssh version 1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.1.2 Email_DNS interface oobnet&lt;/P&gt;&lt;P&gt;dhcpd domain abc.com interface oobnet&lt;/P&gt;&lt;P&gt;dhcpd option 3 ip 172.16.0.1 interface oobnet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp server 192.43.244.18 source outside prefer&lt;/P&gt;&lt;P&gt;tftp-server vpnnet 192.168.3.10 /&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 60&lt;/P&gt;&lt;P&gt;group-policy abcdONEVPN internal&lt;/P&gt;&lt;P&gt;group-policy abcdONEVPN attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.7 192.168.1.3&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; default-domain value abc&lt;/P&gt;&lt;P&gt;group-policy abcdONE internal&lt;/P&gt;&lt;P&gt;group-policy abcdONE attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.7 192.168.1.3&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value abcdONE_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value abc.com&lt;/P&gt;&lt;P&gt; service-type remote-access&lt;/P&gt;&lt;P&gt;service-type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group abcdONE type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group abcdONE general-attributes&lt;/P&gt;&lt;P&gt; address-pool NEW_VPN_POOL&lt;/P&gt;&lt;P&gt; default-group-policy abcdONE&lt;/P&gt;&lt;P&gt;tunnel-group abcdONE ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt; isakmp keepalive disable&lt;/P&gt;&lt;P&gt;tunnel-group abcdONE ppp-attributes&lt;/P&gt;&lt;P&gt; authentication pap&lt;/P&gt;&lt;P&gt; authentication ms-chap-v2&lt;/P&gt;&lt;P&gt; authentication eap-proxy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map type inspect ipsec-pass-thru VPN&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; esp &lt;/P&gt;&lt;P&gt;&amp;nbsp; ah &lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:02e178404b46bb8758b23aea638d2f24&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-621.bin&lt;/P&gt;&lt;P&gt;asdm location NEW_VPN_POOL 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;asdm location abc09ic 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;asdm location VTC 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;asdm location Email_Gateway 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;asdm location Exch10 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;asdm location ExternalDNS 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;asdm location abc11ids 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:54:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321667#M310556</guid>
      <dc:creator>macboy276</dc:creator>
      <dc:date>2019-03-12T02:54:49Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321668#M310559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont see any &lt;STRONG&gt;"nat"&lt;/STRONG&gt; statement for interface &lt;STRONG&gt;"Internal_LAN"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Internal_LAN) &lt;ID number=""&gt; 172.168.1.0 255.255.255.0 &lt;/ID&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ID number mentioned you can choose yourself since you seem to use multiple different public IP addresses for Dynamic PAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above would enable Dynamic PAT for the users behind &lt;STRONG&gt;"Internal_LAN"&lt;/STRONG&gt; interface and therefore enable Internet connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that this network is actually a public network and not one belonging to the private network range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 18:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321668#M310559</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T18:54:40Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321669#M310562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does this nat command will have any issues with vlan 2. There is also no nat for vlan 2 available, how it is getting internet access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 19:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321669#M310562</guid>
      <dc:creator>macboy276</dc:creator>
      <dc:date>2013-10-22T19:46:06Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321670#M310564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above command doesnt really refer to the interface &lt;STRONG&gt;"inside" &lt;/STRONG&gt;at all so it doesnt really have effect on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Internet works from behind&lt;STRONG&gt; "inside"&lt;/STRONG&gt; interface even with the NAT0 configuration because the NAT0 is not configured for every destination address. The NAT0 applies only when the destination networks are those configured in the ACL below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_nat0_outbound extended permit ip Inside_Subnet 255.255.255.0 host Email_Gateway &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_nat0_outbound remark SharePoint&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_nat0_outbound extended permit ip Inside_Subnet 255.255.255.0 host SharePoint &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_nat0_outbound extended permit ip Inside_Subnet 255.255.255.0 NEW_VPN_POOL 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 19:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321670#M310564</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T19:51:13Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321671#M310565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have used the following command&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (Internal_LAN) 8 172.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the above command is giving me the following error and no internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;305006|Email_DNS|53|||portmap translation creation failed for udp src Internal_LAN:172.168.1.72/55035 dst inside:Email_DNS/53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i use &lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;no nat (Internal_LAN) 8 172.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;the following error appears in log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Teardown TCP connection 1307075 for outside:108.59.5.130/443 to Internal_LAN:172.168.1.72/2273 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 20:17:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321671#M310565</guid>
      <dc:creator>macboy276</dc:creator>
      <dc:date>2013-10-22T20:17:29Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321672#M310566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To have a complete Dynamic PAT configuration you would need a &lt;STRONG&gt;"global"&lt;/STRONG&gt; command with ID 8 also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you can replace the ID 8 in the above command with something that already has a &lt;STRONG&gt;"global"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like these&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 12.18.13.21 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 2 12.18.13.22 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 3 12.18.13.23 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 4 12.18.13.24 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 5 12.18.13.25 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first log message you post is a problem between &lt;STRONG&gt;"Internal_LAN"&lt;/STRONG&gt; and &lt;STRONG&gt;"inside"&lt;/STRONG&gt;. That might probably be corrected by adding&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,Internal_LAN) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 20:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321672#M310566</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T20:28:53Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321673#M310567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I was checking your configuration, I understand the security levels are set to 100 on both inside and Internal_LAN, if you change the security level on Internal_LAN to something lower than 100 you should be able to access everything as you were and also add the PAT configuration that your previous collaborator indicated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security-level 90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Internal_LAN) 8 172.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try it out, that way you don't need to add additional NAT configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 20:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321673#M310567</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-22T20:55:16Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321674#M310568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I try using&amp;nbsp; the following config but it is still not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;interface Vlan8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;security-level 90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (Internal_LAN) 8 172.168.1.0 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 22:03:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321674#M310568</guid>
      <dc:creator>macboy276</dc:creator>
      <dc:date>2013-10-22T22:03:12Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321675#M310569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I forgot to indicate, you have a static NAT configuration that maps the inside network to the internal_LAN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,Internal_LAN) Inside_Subnet Inside_Subnet netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 192.168.1.0 Inside_Subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need the Internal_LAN network to be able to access anything on the inside I would rather configure the NAT exemption that states that you will not require NAT from the inside interface network to the internal_LAN network but that is all up to you if you want to configure it or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip any 172.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE: The line above is part of the next configuration that applies the NAT exemption on the inside interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the configuration would like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security-level 90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Internal_LAN) 8 172.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 8 12.18.13.X&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 22:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321675#M310569</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-22T22:04:18Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321676#M310570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;follwing error is logged&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;305006&lt;/TD&gt;&lt;TD&gt;95.211.37.197&lt;/TD&gt;&lt;TD&gt;80&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;portmap translation creation failed for tcp src Internal_LAN:172.168.1.72/1807 dst outside:95.211.37.197/80&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 22:04:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321676#M310570</guid>
      <dc:creator>macboy276</dc:creator>
      <dc:date>2013-10-22T22:04:43Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321677#M310571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that&amp;nbsp; means with this new config i will still be able to connect to inside network and have internet access.&lt;/P&gt;&lt;P&gt;global (outside) 8 12.18.13.X&lt;/P&gt;&lt;P&gt;With what X has to be replaced&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 22:12:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321677#M310571</guid>
      <dc:creator>macboy276</dc:creator>
      <dc:date>2013-10-22T22:12:41Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321678#M310572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I put an X meaning an IP of your choice if you still have available IP addresses but if you do not and you do not care if it goes out with the same global IP address as the people on the inside then you can just add the next line but remember to change the security levels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Internal_LAN) 1 172.168.1.0 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 22:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321678#M310572</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-22T22:17:48Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321679#M310573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you let me know if you&amp;nbsp; have tried the configuration I originally suggested. I mean creating a&amp;nbsp; &lt;STRONG&gt;"nat"&lt;/STRONG&gt; statement for the &lt;STRONG&gt;"Internal_LAN"&lt;/STRONG&gt; thats ID number matches one of&amp;nbsp; the existing &lt;STRONG&gt;"global"&lt;/STRONG&gt; or make a new &lt;STRONG&gt;"global"&lt;/STRONG&gt; for&amp;nbsp; it. And also if the &lt;STRONG&gt;"Internal_LAN"&lt;/STRONG&gt; needs to access &lt;STRONG&gt;"inside"&lt;/STRONG&gt; you could&amp;nbsp; have added the &lt;STRONG&gt;"static"&lt;/STRONG&gt; command suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems there has been some&amp;nbsp; other suggestions in between that&amp;nbsp; have again suggested completely&amp;nbsp; different things. I would have been&amp;nbsp; interested to know what the&amp;nbsp; situation is after the suggested changes&amp;nbsp; before going and&amp;nbsp; doing something completely different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are changing a lot of NAT configurations for the new &lt;STRONG&gt;"Internal_LAN"&lt;/STRONG&gt; interface I would suggest checking the output of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show xlate | inc 172.168.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To see if you need to use some&amp;nbsp; variant of the &lt;STRONG&gt;"clear xlate"&lt;/STRONG&gt; command to clear old translations still&amp;nbsp; active on the firewall. You should not use the &lt;STRONG&gt;"clear xlate"&lt;/STRONG&gt; without&amp;nbsp; additional parameters as otherwise it clears all&amp;nbsp; translations on the firewall in the mentioned form of the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;clear xlate ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To view the different optional parameters for the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; - Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 14:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321679#M310573</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-23T14:58:42Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321680#M310574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jumora&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "nat (Internal_LAN) 1 172.168.1.0 255.255.255.0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Duplicate NAT entry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 17:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321680#M310574</guid>
      <dc:creator>macboy276</dc:creator>
      <dc:date>2013-10-23T17:08:24Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321681#M310575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please send me the next: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run nat | in Internal_LAN&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 17:16:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321681#M310575</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-23T17:16:23Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321682#M310576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you remove the "nat (Internal_LAN) 8 172.168.1.0 255.255.255.0", you need to remove it before adding "nat (Internal_LAN) 1 172.168.1.0 255.255.255.0"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 17:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321682#M310576</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-23T17:17:53Z</dc:date>
    </item>
    <item>
      <title>No Internet access</title>
      <link>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321683#M310577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I removed the old nat and add &lt;/P&gt;&lt;P&gt;nat (Internal_LAN) 1 172.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;interface vlan8&lt;/P&gt;&lt;P&gt;security-level 90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It worked. Now i have internet access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 19:31:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-internet-access/m-p/2321683#M310577</guid>
      <dc:creator>macboy276</dc:creator>
      <dc:date>2013-10-23T19:31:49Z</dc:date>
    </item>
  </channel>
</rss>

