<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5520 cannot access Internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325107#M345005</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No worries Jouni.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 10.0.201.x can't hit 8.8.8.8 whereas 10.0.202.y can. I am trying to find out why this is happening. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you go:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2013.08.09 15:53:37 =~=~=~=~=~=~=~=~=~=~=~=&lt;/P&gt;&lt;P&gt;PC2ZFW# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW# packet-tracer input ins_cli tcp 10.0.202.100 12345 8.8.8.8 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group ins_cli_access_in in interface ins_cli&lt;/P&gt;&lt;P&gt;access-list ins_cli_access_in extended permit ip 10.0.202.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: CONN-SETTINGS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map class-default&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt; set connection decrement-ttl&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FILTER&lt;/P&gt;&lt;P&gt;Subtype: filter-java&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FILTER&lt;/P&gt;&lt;P&gt;Subtype: filter-activex&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IDS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (ins_cli) 1 10.0.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt; match ip ins_cli 10.0.202.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.132.105 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; translate_hits = 134750, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 10.0.202.100/12345 to 192.168.132.105/34539 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (ins_cli) 1 10.0.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt; match ip ins_cli 10.0.202.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.132.105 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; translate_hits = 134750, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: IDS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 13&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 3844340, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: ins_cli&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW# packet-tracer input ins_srv tcp 10.0.201.100 12345 8.8.8.8 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;input-interface: ins_srv&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Logoff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Aug 2013 20:01:25 GMT</pubDate>
    <dc:creator>stavroskalamat</dc:creator>
    <dc:date>2013-08-09T20:01:25Z</dc:date>
    <item>
      <title>ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325099#M344997</link>
      <description>&lt;P&gt;A few months ago I wasn't able to spell Cisco's name and here I am trying to configure an ASA 5520 on a small network I was tasked to put together. I saw this as a great learning opportunity, especially becoming familiar with Cisco's networking philosophy, so I went for it. I'm at a point though I need an expert's eye to give me a lead on the following issue:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have VLANs 201, 202 and 203 physical and virtual machines on inside and dmz access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The guest network router has already configured with static routes to go from the non-routable 192.168.132.y to a public ip address. The laptop on the guest network (please see network.jpg) has internet access to confirm the aforementioned. &lt;/P&gt;&lt;P&gt;Also, the ASA 5520, with its config as shown on the log attached, can ping the laptop on 192.168.132.32, all 10.0.x.y interfaces (10.0.201.1, 10.0.202.1 and the 10.0.200.1), the outside FW interface (currently at 192.168.132.105) and the guest network router's public ip address. That, and a lot of packet tracing, led me to believe I'm missing something on my ACLs or my config is wrong somewhere I can't see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although the CLI is more convenient to me I attached a few screen-shots for clarification purposes.&lt;/P&gt;&lt;P&gt;The files attached carry self-explanatory names, however, if they miss pieces of info that'll expedite your assistance comments I'll be glad to follow up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way, can somebody recommend a book (or books) on switching &amp;amp; routing that&amp;nbsp; gradually introduce the concepts, (it's more than intutive that design exercises and hands-on experience are an absolute MUST to gain further knowledge) so a novice in the field will work slowly on building a theoretical foundation as a start?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate your help.&lt;/P&gt;&lt;P&gt;sk&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325099#M344997</guid>
      <dc:creator>stavroskalamat</dc:creator>
      <dc:date>2019-03-12T02:23:16Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325100#M344998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So are you saying that you cant reach the Internet from the networks that are located behind the ASA firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whit what are you trying to test Internet connectivity?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Incase you are trying to test with ICMP try adding these configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try ICMP again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest doing the following changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove all the interface ACLs that are attached in the Outbound direction (out)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group outout out interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group ins_srv_access_out out interface ins_srv&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its usually best to control the traffic entering an interface of the ASA and not the traffic leaving it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To clarify&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;access-group &lt;ACL name=""&gt; out interface &lt;INTERFACE name=""&gt;&lt;/INTERFACE&gt;&lt;/ACL&gt;&lt;/STRONG&gt;&lt;UL&gt;&lt;LI&gt;This would attach an ACL to an interface in the outbound direction. It would control traffic heading out from this interface. In other words, the traffic has already come from behind some other ASA interface and is now heading out of this interface.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-group &lt;ACL name=""&gt; in interface &lt;INTERFACE name=""&gt;&lt;/INTERFACE&gt;&lt;/ACL&gt;&lt;/STRONG&gt;&lt;UL&gt;&lt;LI&gt;This would attach an ACL to an inteface in the inbound direction. It would control traffic heading towards this interface. In other words, the traffic would just be entering the ASA through this interface&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is why using Inbound interface ACL would make the most sense. You very rarely need to apply Outbound ACLs. Most of the time they cause more problems and add complexity to the setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the NAT configurations, you seem to have a basic Dynamic PAT configuration for all the 3 LAN/DMZ networks. The PAT IP address seems to be from the network 192.168.132.0/24 which is directly connected to the Internet router also. This should already mean that there should be no problem with routing between the ASA and the Internet router. I would presume also that the Internet router is doing NAT for the ASAs &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you clarify a bit what the situation is at the moment?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Aug 2013 03:38:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325100#M344998</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-08T03:38:52Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325101#M344999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all I appreciate your prompt resourceful response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answers to your Qs follow:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Q&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; So are you saying that you cant reach the Internet from the networks that are located behind the ASA firewall?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer: That is correct. In other words all machines (phys. &amp;amp; virtual) in 10.0.0.0/16 (covering 10.0.201.0, 10.0.202.0, and 10.0.200.0) can NOT access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Q&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; what are you trying to test Internet connectivity?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; Incase you are trying to test with ICMP try adding these configurations&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer: My attempt to go out was by using icmp packets (ping), if I'm using the right terms. So, I go to various machines in 10.0.0.0/16 and try to ping beyond the gateway. For example, from machine with ip 10.0.201.215 I ping 10.0.201.1 successfully BUT when i try to ping 192.168.132.105 (outside interf. on the ASA5520) I get a "request timed out".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, from 10.0.201.215 machine, after a changing the ACL Rules (see latest copy of ASA5520 config) based upon the advice of your response, I can successfully ping the following in the guest network.&lt;/P&gt;&lt;P&gt;192.168.132.32 (laptop)&lt;/P&gt;&lt;P&gt;192.168.132.1 (gateway)&lt;/P&gt;&lt;P&gt;192.168.132.11 (switch)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From an ssh session on ASA5520 I can successfully ping all the above and more:&lt;/P&gt;&lt;P&gt;10.0.201.1&lt;/P&gt;&lt;P&gt;192.168.132.105 (outside interf. of ASA5520)&lt;/P&gt;&lt;P&gt;192.168.132.1&lt;/P&gt;&lt;P&gt;192.168.132.32&lt;/P&gt;&lt;P&gt;192.168.132.11&lt;/P&gt;&lt;P&gt;and the routable ip address on the outside interf. of the guest network router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Q&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Trying&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect icmp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect icmp error&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer: the above 4 icmp lines and the ACL Rule changes you recommended together, I presume, changed the response from the machines in the 10.0.0.0/16, in other words I can ping IP address in the 192.168.132.0/24 from 10.0.201.215 for example, as mentioned up above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still can NOT ping ASA's outside interf. from a machine located in a inside VLAN but according to the following thread&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.sadikhov.com/forum/index.php?/topic/150887-cant-ping-from-inside-to-outside-interface-with-asa5505/"&gt;http://www.sadikhov.com/forum/index.php?/topic/150887-cant-ping-from-inside-to-outside-interface-with-asa5505/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I am not supposed to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Q&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Remove all the interface ACLs that are attached in the Outbound direction (out)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no access-group outout out interface outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no access-group ins_srv_access_out out interface ins_srv&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This comment makes absolute sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is why using Inbound interface ACL would make the most sense. You&amp;nbsp; very rarely need to apply Outbound ACLs. Most of the time they cause&amp;nbsp; more problems and add complexity to the setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should have thought of that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Q&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;With regards to the NAT configurations, you seem to have a basic Dynamic&amp;nbsp; PAT configuration for all the 3 LAN/DMZ networks. The PAT IP address&amp;nbsp; seems to be from the network 192.168.132.0/24 which is directly&amp;nbsp; connected to the Internet router also.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer: the above statement is correct&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Q&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;This should already mean that&amp;nbsp; there should be no problem with routing between the ASA and the Internet&amp;nbsp; router. I would presume also that the Internet router is doing NAT for&amp;nbsp; the ASAs "outside" interface IP address.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer: You are correct there's no problem routing between the ASA and the guest network router since I can ping the outside routable IP on the router from an ssh session on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Indeed, the internet route is doing NAT for the ASAs outside interf. IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm attaching the latest &amp;amp; greatest ASA5520 config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please ask me more Qs that'll clarify the env'nt and will expedite troubleshooting. Meanwhile, I'm thinking about this day and night and I am reading about Staic.Dynamic NAT/PAT, etc on cisco's web site continuously to educate myself so I figure out I'm doing wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stavros &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot attach a doc so I'm copying &amp;amp; pasting the latest (Aug. 9th) ASA's config down below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.132.105 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif ins_srv&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.201.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; nameif ins_cli&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.202.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.0.200.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 10.0.203.10 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns domain-lookup ins_srv&lt;/P&gt;&lt;P&gt;dns domain-lookup ins_cli&lt;/P&gt;&lt;P&gt;dns domain-lookup dmz&lt;/P&gt;&lt;P&gt;dns domain-lookup management&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service IBM_TivoliEndPointMngr tcp-udp&lt;/P&gt;&lt;P&gt; description Patch Mngt SW&lt;/P&gt;&lt;P&gt; port-object eq 52311&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group service KiwiSyslog&lt;/P&gt;&lt;P&gt; description Solarwinds Kiwi&lt;/P&gt;&lt;P&gt; service-object udp eq syslog &lt;/P&gt;&lt;P&gt;object-group service TeredoPackets udp&lt;/P&gt;&lt;P&gt; description Blocks UDP port 3544 traffic inbound and outbound&lt;/P&gt;&lt;P&gt; port-object eq 3544&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object ip &lt;/P&gt;&lt;P&gt; service-object tcp eq echo &lt;/P&gt;&lt;P&gt; service-object tcp eq www &lt;/P&gt;&lt;P&gt; service-object udp eq www &lt;/P&gt;&lt;P&gt; service-object icmp &lt;/P&gt;&lt;P&gt; service-object icmp6 &lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;/P&gt;&lt;P&gt;protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_4&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_5&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list ins_srv_nat0_outbound extended permit ip 10.0.202.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list ins_srv_nat0_outbound extended permit ip 10.0.200.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list outside_nat_outbound extended permit tcp 192.168.132.0 255.255.255.0 eq www 10.0.201.0 255.255.255.0 eq www &lt;/P&gt;&lt;P&gt;access-list ins_cli_access_in extended permit ip 10.0.202.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list ins_cli_nat0_outbound extended permit ip 10.0.202.0 255.255.255.0 10.0.201.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ins_srv_access_in extended permit object-group DM_INLINE_PROTOCOL_2 10.0.201.0 255.255.255.0 10.0.202.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ins_srv_access_in extended permit object-group DM_INLINE_PROTOCOL_2 10.0.201.0 255.255.255.0 10.0.200.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ins_srv_access_in extended permit object-group DM_INLINE_PROTOCOL_2 10.0.201.0 255.255.255.0 192.168.132.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz extended permit object-group KiwiSyslog host 10.0.200.100 host 10.0.201.215 &lt;/P&gt;&lt;P&gt;access-list dmz extended permit object-group TCPUDP host 10.0.200.100 host 10.0.201.215 object-group IBM_TivoliEndPointMngr &lt;/P&gt;&lt;P&gt;access-list dmz extended deny ip 10.0.200.0 255.255.255.0 10.0.201.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz extended deny ip 10.0.200.0 255.255.255.0 10.0.202.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz extended permit ip 10.0.200.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list ins_srv_mpc extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_mpc extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list ins_cli_mpc extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list dmz_mpc extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 192.168.132.0 255.255.255.0 10.0.201.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ins_srvnat0_outbound extended permit ip 10.0.201.0 255.255.255.0 10.0.201.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging mail emergencies&lt;/P&gt;&lt;P&gt;logging host ins_srv 10.0.201.215&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu ins_srv 1500&lt;/P&gt;&lt;P&gt;mtu ins_cli 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 10 burst-size 5&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (ins_srv) 0 access-list ins_srv_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (ins_srv) 1 10.0.201.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (ins_cli) 0 access-list ins_cli_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (ins_cli) 1 10.0.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 10.0.200.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group ins_srv_access_in in interface ins_srv&lt;/P&gt;&lt;P&gt;access-group ins_cli_access_in in interface ins_cli&lt;/P&gt;&lt;P&gt;access-group dmz in interface dmz&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.132.105 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL &lt;/P&gt;&lt;P&gt;aaa local authentication attempts max-fail 3&lt;/P&gt;&lt;P&gt;aaa authorization exec authentication-server&lt;/P&gt;&lt;P&gt;filter java 80 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;filter activex 80 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 management&lt;/P&gt;&lt;P&gt;http 10.0.201.0 255.255.255.0 ins_srv&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.0.201.0 255.255.255.0 ins_srv&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 5&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp authentication-key 1 md5 *&lt;/P&gt;&lt;P&gt;ntp authenticate&lt;/P&gt;&lt;P&gt;ntp trusted-key 1&lt;/P&gt;&lt;P&gt;ntp server 64.90.182.55 key 1 source outside&lt;/P&gt;&lt;P&gt;ntp server 96.47.67.105 key 1 source outside&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec webvpn&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol svc webvpn&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt; url-list value OtherLinks&lt;/P&gt;&lt;P&gt; svc ask enable default webvpn&lt;/P&gt;&lt;P&gt;class-map ins_cli-class&lt;/P&gt;&lt;P&gt; match access-list ins_cli_mpc&lt;/P&gt;&lt;P&gt;class-map ins_srv-class&lt;/P&gt;&lt;P&gt; match access-list ins_srv_mpc&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map dmz-class&lt;/P&gt;&lt;P&gt; match access-list dmz_mpc&lt;/P&gt;&lt;P&gt;class-map outside-class&lt;/P&gt;&lt;P&gt; match access-list outside_mpc&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt; inspect ftp &lt;/P&gt;&lt;P&gt; inspect h323 h225 &lt;/P&gt;&lt;P&gt; inspect h323 ras &lt;/P&gt;&lt;P&gt; inspect rsh &lt;/P&gt;&lt;P&gt; inspect rtsp &lt;/P&gt;&lt;P&gt; inspect esmtp &lt;/P&gt;&lt;P&gt; inspect sqlnet &lt;/P&gt;&lt;P&gt; inspect skinny &lt;/P&gt;&lt;P&gt; inspect sunrpc &lt;/P&gt;&lt;P&gt; inspect xdmcp &lt;/P&gt;&lt;P&gt; inspect sip &lt;/P&gt;&lt;P&gt; inspect netbios &lt;/P&gt;&lt;P&gt; inspect tftp &lt;/P&gt;&lt;P&gt; inspect icmp &lt;/P&gt;&lt;P&gt; inspect icmp error &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt; set connection decrement-ttl&lt;/P&gt;&lt;P&gt;policy-map outside-policy&lt;/P&gt;&lt;P&gt; class outside-class&lt;/P&gt;&lt;P&gt; ips inline fail-open&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map dmz-policy&lt;/P&gt;&lt;P&gt; class dmz-class&lt;/P&gt;&lt;P&gt; ips inline fail-open&lt;/P&gt;&lt;P&gt;policy-map ins_cli-policy&lt;/P&gt;&lt;P&gt; class ins_cli-class&lt;/P&gt;&lt;P&gt; ips inline fail-open&lt;/P&gt;&lt;P&gt;policy-map ins_srv-policy&lt;/P&gt;&lt;P&gt; class ins_srv-class&lt;/P&gt;&lt;P&gt; ips inline fail-open&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;service-policy outside-policy interface outside&lt;/P&gt;&lt;P&gt;service-policy ins_srv-policy interface ins_srv&lt;/P&gt;&lt;P&gt;service-policy ins_cli-policy interface ins_cli&lt;/P&gt;&lt;P&gt;service-policy dmz-policy interface dmz&lt;/P&gt;&lt;P&gt;smtp-server 173.194.76.108&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 15:49:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325101#M344999</guid>
      <dc:creator>stavroskalamat</dc:creator>
      <dc:date>2013-08-09T15:49:02Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325102#M345000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you clarify if you are still having problems with ICMP from the LAN/DMZ networks to the Internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you said in the above post already, you are NOT able to ICMP an ASA interface behind another interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only hosts located behind an interface can ICMP that interface and receive a reply. Sending ICMP from a host to an ASA interface IP address that is NOT where the host is located at will always fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 16:19:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325102#M345000</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-09T16:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325103#M345001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/4/7/149749-PacketTraceInternal_To_GuestNetwork_Reverse_ACLStopper.jpg" class="jive-image" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/4/7/149748-PacketTraceInternal_To_GuestNetwork_Reverse.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/5/7/149750-PacketTraceInternal_To_GuestNetwork_Reverse_ACLStopper.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Can you clarify if you are still having problems with ICMP from the LAN/DMZ networks to the Internet?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer: I cannot ICMP from the LAN/DMZ networks to the Internet. The way I try to do that is by opening a command prompt on &lt;/P&gt;&lt;P&gt;Windows of an internal host (10.0.201.215 in this case) and try to ping the outside IP address of the guest network router or ping yahoo.com for example. The response I get is "Request timed out".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;As you said in the above post already, you are NOT able to ICMP an ASA interface behind another interface.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer:&amp;nbsp; You're correct. I cannot ping 192.168.132.105 (ASA outside interf. IP address) from a windows prompt of an internal host, such as 10.0.201.215&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Only hosts located behind an interface can ICMP that interface and&amp;nbsp; receive a reply. Sending ICMP from a host to an ASA interface IP address&amp;nbsp; that is NOT where the host is located at will always fail.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer: That's correct. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also attached 3 images that show an ASA packet tracer image for IP packets travelling from 10.0.201.215 to 192.168.132.32 (guest network laptop) and back. The forward traffic stops at a NAT Rule and the reverse traffic stops at the impicit Deny any any Rule of the incoming ACL rules of the ins_srv internal. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, a packet tracer monitoring TCP packets from the same source (10.0.201.215) to the same destination (192.168.132.32) goes all the way w/o a problem. The reverse traffic of TCP packets stops also at the impicit Deny any any Rule of the incoming ACL rules of the ins_srv internal. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope I answered your Qs.&lt;/P&gt;&lt;P&gt;Thanks in advance for your time and consultation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 18:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325103#M345001</guid>
      <dc:creator>stavroskalamat</dc:creator>
      <dc:date>2013-08-09T18:48:34Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325104#M345002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have tested with the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; connection from network 192.168.132.0/24 to one of the 10-networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not possible with teh current configurations are you are doing Dynamic PAT from the LAN/DMZ interfaces to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be able to access the 10-network from the 192.168.132.0/24 network directly you would need NAT0 configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that you CANT test return traffic with "packet-tracer". The &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; always tests a incoming first packet for some connection. So if no Dynamic PAT translation is active at the moment on the firewall then you wont be able to test any return traffic for a non existing connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see anything wrong with the firewall configuration at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you can try the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command from the CLI to simulate outbound Internet connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input ins_cli tcp 10.0.201.100 12345 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input ins_srv tcp 10.0.202.100 12345 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the exact above commands and post the output from CLI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 19:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325104#M345002</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-09T19:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325105#M345003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Q&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;are you are doing Dynamic PAT from the LAN/DMZ interfaces to the &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;STRONG&gt;"outside" &lt;/STRONG&gt;interface.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had switched the ASA config to Static PAT. I have assigned the ASA's outside's interf. IP to play that role. &lt;/P&gt;&lt;P&gt;Static PAT mya not be the best choice here so I'll switch the ASA to Dynamic PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm reading on NAT0 to familiarize more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the ASA's response&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2013.08.09 15:14:46 =~=~=~=~=~=~=~=~=~=~=~=&lt;/P&gt;&lt;P&gt;PC2ZFW# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW# packet-tracer input ins_cli tcp 10.0.201.100 12345 8.8.8.8 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: ins_cli&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW#&amp;nbsp;&amp;nbsp;&amp;nbsp; packet-tracer input ins_srv tcp 10.0.202.100 12345 8.8.8.8 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: ins_srv&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Logoff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 19:33:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325105#M345003</guid>
      <dc:creator>stavroskalamat</dc:creator>
      <dc:date>2013-08-09T19:33:44Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325106#M345004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, I misstyped the IP address of the "packet-tracer" commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input ins_cli tcp 10.0.202.100 12345 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input ins_srv tcp 10.0.201.100 12345 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had the address spaces wrong&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 19:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325106#M345004</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-09T19:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325107#M345005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No worries Jouni.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 10.0.201.x can't hit 8.8.8.8 whereas 10.0.202.y can. I am trying to find out why this is happening. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you go:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2013.08.09 15:53:37 =~=~=~=~=~=~=~=~=~=~=~=&lt;/P&gt;&lt;P&gt;PC2ZFW# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW# packet-tracer input ins_cli tcp 10.0.202.100 12345 8.8.8.8 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group ins_cli_access_in in interface ins_cli&lt;/P&gt;&lt;P&gt;access-list ins_cli_access_in extended permit ip 10.0.202.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: CONN-SETTINGS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map class-default&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt; set connection decrement-ttl&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FILTER&lt;/P&gt;&lt;P&gt;Subtype: filter-java&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FILTER&lt;/P&gt;&lt;P&gt;Subtype: filter-activex&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IDS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (ins_cli) 1 10.0.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt; match ip ins_cli 10.0.202.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.132.105 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; translate_hits = 134750, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 10.0.202.100/12345 to 192.168.132.105/34539 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (ins_cli) 1 10.0.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt; match ip ins_cli 10.0.202.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.132.105 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; translate_hits = 134750, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: IDS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 13&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 3844340, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: ins_cli&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW# packet-tracer input ins_srv tcp 10.0.201.100 12345 8.8.8.8 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;input-interface: ins_srv&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC2ZFW# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Logoff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 20:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325107#M345005</guid>
      <dc:creator>stavroskalamat</dc:creator>
      <dc:date>2013-08-09T20:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325108#M345006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Confirming I'm hitting google.com from the 10.202 machine. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 20:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325108#M345006</guid>
      <dc:creator>stavroskalamat</dc:creator>
      <dc:date>2013-08-09T20:03:35Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325109#M345007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont have ACL on the INS_SRV interface allowing that traffic. To allow all traffic from INS_SRV you would need the following ACL rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list ins_srv_access_in extended permit ip 10.0.201.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 20:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325109#M345007</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-09T20:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325110#M345008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;just added another ACL from ins_srv to any on incoming rules of ins_srv and I'm hitting google's 8.8.8.8&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 20:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325110#M345008</guid>
      <dc:creator>stavroskalamat</dc:creator>
      <dc:date>2013-08-09T20:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325111#M345009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;see how educational was your input,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just done that and I'm on the web (our responses came in at exactly the same time)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I need to sit down and understand what I did wrong and learn from this mistake so I won't do it again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any recoemmdations for books. Cisco's a great resource but I need to start with a more digestable recommendation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really appreciate your input and the valuable help you provide to all of us.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 20:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325111#M345009</guid>
      <dc:creator>stavroskalamat</dc:creator>
      <dc:date>2013-08-09T20:08:55Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325112#M345010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So is everything working now?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, please remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if you run into some other problems dont hesitate to post here on the CSC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 20:11:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325112#M345010</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-09T20:11:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 cannot access Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325113#M345011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes everything is working fine. I'll pick your reply-recommendation that came closer to solve this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please feel free to leave me some book/web site recommendations for learning to go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The network config items I changed to resolve the issue were in a nutshell:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Static NAT -&amp;gt; Dynamic NAT&lt;/P&gt;&lt;P&gt;2) Removed all outgoing ACLs&lt;/P&gt;&lt;P&gt;3) Added ACL for internal ins_srv -&amp;gt; any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Aug 2013 20:18:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-cannot-access-internet/m-p/2325113#M345011</guid>
      <dc:creator>stavroskalamat</dc:creator>
      <dc:date>2013-08-09T20:18:06Z</dc:date>
    </item>
  </channel>
</rss>

