<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Routing out through default Gateway in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257849#M346116</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark. You have no access-list on the Private interface in the inbound direction. All the traffic from Private towards Public is allowed, as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should change this:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group Private_access_out &lt;STRONG&gt;out&lt;/STRONG&gt; interface Private&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to this:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group Private_access_out&lt;STRONG&gt; in&lt;/STRONG&gt; interface Private&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that's it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 20 Jul 2013 12:45:32 GMT</pubDate>
    <dc:creator>Andrew Phirsov</dc:creator>
    <dc:date>2013-07-20T12:45:32Z</dc:date>
    <item>
      <title>Routing out through default Gateway</title>
      <link>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257844#M346099</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have our ASA 5540 in our hosting site and it has just been made the default gateway from our network out to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside hosts translate to the Outside cards Public IP address as you would expect when you route out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yet my problem is all inside hosts can route out to the Internet and have full rights to all services such as HTTP, HTTPS and FTP etc etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see any rules allowing this and there is only rules for the Proxy Server and certain servers etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our NAT rule covering this is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-10.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (Private,DMZ) static 10.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj_any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (Private,Public) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj_any-01&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (DMZ,Public) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried to create deny rules, but hosts can still route out fully. Can someone point me in the right direction on what I can do to block these hosts fully unless they are specifally granted access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:14:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257844#M346099</guid>
      <dc:creator>Mark Cavendish</dc:creator>
      <dc:date>2019-03-12T02:14:35Z</dc:date>
    </item>
    <item>
      <title>Routing out through default Gateway</title>
      <link>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257845#M346100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Judging by your &lt;STRONG&gt;"object network"&lt;/STRONG&gt; names, they are meant to do Dynamic PAT for &lt;STRONG&gt;"any"&lt;/STRONG&gt; source address behind the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; or &lt;STRONG&gt;"Private"&lt;/STRONG&gt; interfaces. So it would seem that any host behind the ASA can be NATed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ACLs also play a role on what traffic is allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a default ASA there is only &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value which defines which traffic is allowed. And usually the interfaces which connect to your LAN and DMZ have higher &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; and therefore all traffic is allowed by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You say though that you have configured rules but they are not working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you post your ACLs and also the output of the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should tells us what kind of ACLs are configured and how they are attached to the interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jul 2013 15:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257845#M346100</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-19T15:27:19Z</dc:date>
    </item>
    <item>
      <title>Routing out through default Gateway</title>
      <link>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257846#M346103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni for your help, we need Servers to be able to route out to the Internet without a Proxy specified, but want to permit what can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the first command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="line-height: 21px; color: #444444; font-family: Calibri, sans-serif; font-size: 15px; text-align: -webkit-auto; background-color: #ffffff;"&gt;&lt;STRONG&gt;ASA#&lt;/STRONG&gt; sh run access-group&lt;BR /&gt;access-group Private_access_out out interface Private&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-group DMZ_access_out out interface DMZ&lt;BR /&gt;access-group Public_access in interface Public&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="line-height: 21px; color: #444444; font-family: Calibri, sans-serif; font-size: 15px; text-align: -webkit-auto; background-color: #ffffff;"&gt;Then these are the ACL's we have: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="line-height: 21px; color: #444444; font-family: Calibri, sans-serif; font-size: 15px; text-align: -webkit-auto; background-color: #ffffff;"&gt;&lt;STRONG&gt;ACLS:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="line-height: 21px; color: #444444; font-family: Calibri, sans-serif; font-size: 15px; text-align: -webkit-auto; background-color: #ffffff;"&gt;access-list Public_access remark Public Inbound Learning Live&lt;BR /&gt;access-list Public_access extended permit tcp any object LearningLIVE object-group DM_INLINE_TCP_0 &lt;BR /&gt;access-list Public_access remark Public Inbound DEMSexernal Live&lt;BR /&gt;access-list Public_access extended permit tcp any object DEMSexternalLIVE eq https &lt;BR /&gt;access-list Public_access remark BT VPN Access (Self Managed)&lt;BR /&gt;access-list Public_access extended permit ip any object BT-VPN &lt;BR /&gt;access-list Public_access remark Public Inbound Web External Development&lt;BR /&gt;access-list Public_access extended permit tcp any object WebExDev object-group DM_INLINE_TCP_4 &lt;BR /&gt;access-list Public_access remark Public Inbound Learning&lt;BR /&gt;access-list Public_access extended permit tcp any object LearningTest object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list Public_access remark Public Inbound DEMS External&lt;BR /&gt;access-list Public_access extended permit tcp any object DEMSexternalTest eq https &lt;BR /&gt;access-list Public_access remark Public Inbound HTTP Webaccess&lt;BR /&gt;access-list Public_access extended permit tcp any object Gwava eq www &lt;BR /&gt;access-list Public_access remark Public Inbound E-Mail SMTP Trusted IP's&lt;BR /&gt;access-list Public_access extended permit tcp object-group DM_INLINE_NETWORK_1 object Gwava eq smtp &lt;BR /&gt;access-list Public_access remark Kineo Source Control Inbound&lt;BR /&gt;access-list Public_access extended permit tcp object-group DM_INLINE_NETWORK_8 object-group DM_INLINE_NETWORK_9 object-group TEST2222 &lt;BR /&gt;access-list DMZ_access_out extended permit tcp object FSGGS3 object Gwava object-group DM_INLINE_TCP_9 &lt;BR /&gt;access-list DMZ_access_out remark Internal Network to Gwava Mail Scanner&lt;BR /&gt;access-list DMZ_access_out extended permit tcp object Internal-Network object Gwava object-group DM_INLINE_TCP_7 &lt;BR /&gt;access-list DMZ_access_out extended permit ip any object-group PCC-Ext-Servers &lt;BR /&gt;access-list DMZ_access_out remark Internal Network to PCC Servers&lt;BR /&gt;access-list DMZ_access_out extended permit ip object Internal-Network object-group PCC-Ext-Servers &lt;BR /&gt;access-list DMZ_access_out extended permit ip any object BT-VPN &lt;BR /&gt;access-list DMZ_access_out remark FSGGS3 E-Mail and Webaccess return traffic&lt;BR /&gt;access-list DMZ_access_out extended permit tcp any object Gwava eq www &lt;BR /&gt;access-list DMZ_access_out extended permit tcp any object Gwava eq smtp &lt;BR /&gt;access-list DMZ_access_in remark Ping/ICMP Testing with new GGS Setup&lt;BR /&gt;access-list DMZ_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1 &lt;BR /&gt;access-list DMZ_access_in remark Outgoing Ports/Services to Internet&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object Gwava any object-group DM_INLINE_TCP_2 &lt;BR /&gt;access-list DMZ_access_in remark Incoming Ports/Services to Internal Network&lt;BR /&gt;access-list DMZ_access_in extended permit ip object-group PCC-Ext-Servers object Internal-Network &lt;BR /&gt;access-list DMZ_access_in remark Outgoing Ports/Services to Internet&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group PCC-Ext-Servers any object-group DM_INLINE_TCP_3 &lt;BR /&gt;access-list DMZ_access_in remark BT VPN Concentrator Outbound Full Access&lt;BR /&gt;access-list DMZ_access_in extended permit ip object BT-VPN any &lt;BR /&gt;access-list DMZ_access_in remark Gwava SMTP to iCritical SMTP Servers&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object Gwava object-group DM_INLINE_NETWORK_2 eq smtp &lt;BR /&gt;access-list DMZ_access_in remark Gwava DNS and NTP to FSGGS1&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_2 object Gwava object-group DM_INLINE_NETWORK_4 &lt;BR /&gt;access-list DMZ_access_in remark Gwava E-Mail &amp;amp; Webacess to FSGGS3&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object Gwava object FSGGS3 object-group DM_INLINE_TCP_6 &lt;BR /&gt;access-list DMZ_access_in remark Kineo Source Control Outbound&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_7 object-group DM_INLINE_NETWORK_6 object-group Kineo2222 &lt;BR /&gt;access-list throttle_squid extended permit ip host 10.25.1.8 any &lt;BR /&gt;access-list throttle_squid extended permit ip any host 10.25.1.8 &lt;BR /&gt;access-list Private_access_out remark Squid Proxy Server Outbound to Internet&lt;BR /&gt;access-list Private_access_out extended permit object-group DM_INLINE_SERVICE_1 object SquidProxyGGS interface Public &lt;BR /&gt;access-list Private_access_out remark Ping/ICMP Testing with new GGS Setup&lt;BR /&gt;access-list Private_access_out extended permit icmp any any object-group DM_INLINE_ICMP_2 &lt;BR /&gt;access-list Private_access_out remark Gwava Mail Scanner contact Internal Network for comms&lt;BR /&gt;access-list Private_access_out extended permit object-group TCPUDP object Gwava object-group DM_INLINE_NETWORK_3 eq domain &lt;BR /&gt;access-list Private_access_out remark PCC Servers contact Internal Network for GGS testing (temp)&lt;BR /&gt;access-list Private_access_out extended permit ip object-group PCC-Ext-Servers object Internal-Network &lt;BR /&gt;access-list Private_access_out remark FSGGS1 Timesync Public NTP Server&lt;BR /&gt;access-list Private_access_out extended permit udp object FSGGS1 83.170.75.0 255.255.255.0 eq ntp &lt;BR /&gt;access-list Private_access_out remark Team Visio Connection to PCC Servers&lt;BR /&gt;access-list Private_access_out extended permit tcp object WEBDEV host 195.13.14.26 object-group TeamVisio &lt;BR /&gt;access-list Private_access_out remark FSGGS3 E-Mail &amp;amp; Webaccess Return&lt;BR /&gt;access-list Private_access_out extended permit tcp object FSGGS3 object Gwava object-group DM_INLINE_TCP_10 &lt;BR /&gt;access-list Private_access_out remark Gwava E-Mail &amp;amp; Webaccess&lt;BR /&gt;access-list Private_access_out extended permit tcp object Gwava object FSGGS3 object-group DM_INLINE_TCP_11 &lt;BR /&gt;access-list Private_access_out remark Web Access Outbound from GGS Subnet&lt;BR /&gt;access-list Private_access_out extended permit tcp 10.25.0.0 255.255.0.0 interface Public object-group DM_INLINE_TCP_5 &lt;BR /&gt;access-list Private_access_out remark OBS &amp;amp; Learning GGS Moves&lt;BR /&gt;access-list Private_access_out extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_5 interface Public &lt;BR /&gt;access-list Private_access_out remark Learning Data Live SFTP Uploads&lt;BR /&gt;access-list Private_access_out extended permit tcp object LearningDataLive host 215.138.172.187 object-group Kineo2222 &lt;BR /&gt;access-list Private_access_out remark Servers that need access to the Internet without a Proxy.&lt;BR /&gt;access-list Private_access_out extended permit tcp object-group Servers-Internet-Access interface Public object-group DM_INLINE_TCP_8 &lt;BR /&gt;access-list Private_access_out remark PCC manage Web server&lt;BR /&gt;access-list Private_access_out extended permit tcp any host 92.211.133.59 object-group VNC &lt;BR /&gt;access-list Private_access_out remark Citidirect Access for Finance. Legacy rule as exceptions still in Browser Policy.&lt;BR /&gt;access-list Private_access_out extended permit ip any object-group DM_INLINE_NETWORK_10 &lt;BR /&gt;access-list Private_access_out remark PCC Access to their Server.&lt;BR /&gt;access-list Private_access_out extended permit ip any host 181.171.193.155 &lt;BR /&gt;access-list Private_access_out extended permit tcp any host 196.13.14.26 object-group DM_INLINE_TCP_12 &lt;BR /&gt;access-list Private_access_out remark Legacy rule &lt;BR /&gt;access-list Private_access_out extended permit tcp any interface Public object-group CCPulse &lt;BR /&gt;access-list Private_access_out remark Servers RDP Access&lt;BR /&gt;access-list Private_access_out extended permit tcp any object-group DM_INLINE_NETWORK_11 object-group DM_INLINE_TCP_13 &lt;BR /&gt;access-list Private_access_out remark Fire Alarm Setup in Regions.&lt;BR /&gt;access-list Private_access_out extended permit tcp any any object-group DM_INLINE_TCP_14 &lt;BR /&gt;access-list Private_access_out remark&amp;nbsp; Legacy rule address lookup function.&lt;BR /&gt;access-list Private_access_out extended permit tcp any host 195.10.106.20 eq www &lt;BR /&gt;access-list Private_access_out remark&amp;nbsp; Legacy rule Finance order train tickets.&lt;BR /&gt;access-list Private_access_out extended permit tcp any object-group DM_INLINE_NETWORK_12 eq https &lt;BR /&gt;access-list Private_access_out remark MFD Access to Internet for charging purposes.&lt;BR /&gt;access-list Private_access_out extended permit tcp any 208.248.100.0 255.255.255.0 eq https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jul 2013 15:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257846#M346103</guid>
      <dc:creator>Mark Cavendish</dc:creator>
      <dc:date>2013-07-19T15:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: Routing out through default Gateway</title>
      <link>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257847#M346107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are so many &lt;STRONG&gt;"object network" &lt;/STRONG&gt;and &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; configurations that I would suggest you use the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command with some source IP address that IS NOT supposed to be able to access some external resource.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should tell us exactly what rule on the ACL is hit that permits this traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Private tcp &lt;SOURCE ip=""&gt; 12345 &lt;DESTINATION ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only wide rule I noticed so far was this one&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Private_access_out extended permit tcp any any object-group DM_INLINE_TCP_14 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I dont know which ports the &lt;STRONG&gt;DM_INLINE_TCP_14&lt;/STRONG&gt; contains.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jul 2013 16:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257847#M346107</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-19T16:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: Routing out through default Gateway</title>
      <link>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257848#M346111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Jouni, that DM_INLINE_14 is just high end 17000-17049 &amp;amp; 18000-18049 to access the Internet. I disabled it and no difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a packet trace and I have attached the image. It doesn't seem to reference any rule in my ACL table.&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/5/2/146254-Packet-Trace.JPG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Jul 2013 11:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257848#M346111</guid>
      <dc:creator>Mark Cavendish</dc:creator>
      <dc:date>2013-07-20T11:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Routing out through default Gateway</title>
      <link>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257849#M346116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark. You have no access-list on the Private interface in the inbound direction. All the traffic from Private towards Public is allowed, as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should change this:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group Private_access_out &lt;STRONG&gt;out&lt;/STRONG&gt; interface Private&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to this:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group Private_access_out&lt;STRONG&gt; in&lt;/STRONG&gt; interface Private&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that's it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Jul 2013 12:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257849#M346116</guid>
      <dc:creator>Andrew Phirsov</dc:creator>
      <dc:date>2013-07-20T12:45:32Z</dc:date>
    </item>
    <item>
      <title>Routing out through default Gateway</title>
      <link>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257850#M346120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Andrew, that was the problem and it blocked it straight away and I am now much happier! Much appreciated for your help and thanks again to Jouni also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Jul 2013 15:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-out-through-default-gateway/m-p/2257850#M346120</guid>
      <dc:creator>Mark Cavendish</dc:creator>
      <dc:date>2013-07-20T15:01:21Z</dc:date>
    </item>
  </channel>
</rss>

