<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can't access certain websites in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235925#M357550</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'm testing from a physical machine (192.168.5.11), inside the network. Opening up Internet Explorer, and putting in the link in the address bar.&amp;nbsp; It just times out everytime.&amp;nbsp;&amp;nbsp; I'm not using packet tracer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a customer's site, and this is the instructions they gave us to connect to their VPN, on port 10443.&amp;nbsp; It works when I try the link from home, or even from another office.&amp;nbsp; Just in this specific office, it won't work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 May 2013 17:18:43 GMT</pubDate>
    <dc:creator>ematelyan</dc:creator>
    <dc:date>2013-05-28T17:18:43Z</dc:date>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235915#M357540</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having an issue with my firewall, and I absolutely can't figure it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can access the internet fine.&amp;nbsp; However, a few select websites are not working (&lt;A href="http://www.yahoo.com" target="_blank"&gt;www.yahoo.com&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;I can ping google.com, but I can't ping yahoo.com.&lt;/P&gt;&lt;P&gt;This wouldn't be a big deal, but another site popped up that isn't working, and it's a site we need for work.&amp;nbsp; What am I missing on here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.5.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 98.101.139.210 255.0.0.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 24.25.5.60&lt;BR /&gt;name-server 24.25.5.61&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;access-list Wayne_Access extended permit ip 192.168.5.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list Wayne_Access extended permit ip 192.168.5.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list Shelton_Access extended permit ip 192.168.5.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq www &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq ftp &lt;BR /&gt;access-list out_access_in extended permit udp any host 98.101.139.210 eq tftp &lt;BR /&gt;access-list out_access_in extended permit udp any host 98.101.139.210 eq sip &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq 5090 &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq 2001 &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq 5080 &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq ssh &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq 81 &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq 56774 &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq 5000 &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq 902 &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq netbios-ssn &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq 445 &lt;BR /&gt;access-list out_access_in extended permit tcp any host 98.101.139.210 eq https &lt;BR /&gt;access-list out_access_in extended permit object-group TCPUDP any host 98.101.139.210 eq 3389 &lt;BR /&gt;access-list out_access_in extended permit object-group TCPUDP any host 98.101.139.210 range 5480 5487 &lt;BR /&gt;access-list out_access_in extended permit udp any host 98.101.139.210 range 9000 9050 &lt;BR /&gt;access-list inside_nat0 extended permit ip 192.168.5.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0 extended permit ip 192.168.5.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0 extended permit ip 192.168.5.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface www 192.168.5.52 8080 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ftp 192.168.5.10 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface tftp 192.168.5.10 tftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface sip 192.168.5.11 sip netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5090 192.168.5.11 5090 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 2001 192.168.5.10 2001 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5080 192.168.5.11 5080 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ssh 192.168.5.200 ssh netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 81 192.168.5.20 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 56774 192.168.5.10 1823 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5000 192.168.5.11 5000 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 902 192.168.5.12 902 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface netbios-ssn 192.168.5.12 netbios-ssn netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 445 192.168.5.12 445 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface https 192.168.5.12 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 3389 192.168.5.10 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.5.10 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5480 192.168.5.11 5480 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5481 192.168.5.11 5481 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5482 192.168.5.11 5482 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5483 192.168.5.11 5483 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5484 192.168.5.11 5484 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5485 192.168.5.11 5485 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5486 192.168.5.11 5486 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 5487 192.168.5.11 5487 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 5480 192.168.5.11 5480 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 5481 192.168.5.11 5481 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 5482 192.168.5.11 5482 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 5483 192.168.5.11 5483 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 5484 192.168.5.11 5484 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 5485 192.168.5.11 5485 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 5486 192.168.5.11 5486 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 5487 192.168.5.11 5487 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9000 192.168.5.11 9000 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9001 192.168.5.11 9001 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9002 192.168.5.11 9002 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9003 192.168.5.11 9003 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9004 192.168.5.11 9004 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9005 192.168.5.11 9005 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9006 192.168.5.11 9006 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9007 192.168.5.11 9007 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9008 192.168.5.11 9008 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9009 192.168.5.11 9009 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9010 192.168.5.11 9010 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9011 192.168.5.11 9011 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9012 192.168.5.11 9012 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9013 192.168.5.11 9013 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9014 192.168.5.11 9014 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9015 192.168.5.11 9015 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9016 192.168.5.11 9016 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9017 192.168.5.11 9017 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9018 192.168.5.11 9018 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9019 192.168.5.11 9019 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9020 192.168.5.11 9020 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9021 192.168.5.11 9021 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9022 192.168.5.11 9022 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9023 192.168.5.11 9023 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9024 192.168.5.11 9024 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9025 192.168.5.11 9025 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9026 192.168.5.11 9026 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9027 192.168.5.11 9027 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9028 192.168.5.11 9028 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9029 192.168.5.11 9029 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9030 192.168.5.11 9030 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9031 192.168.5.11 9031 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9032 192.168.5.11 9032 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9033 192.168.5.11 9033 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9034 192.168.5.11 9034 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9035 192.168.5.11 9035 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9036 192.168.5.11 9036 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9037 192.168.5.11 9037 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9038 192.168.5.11 9038 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9039 192.168.5.11 9039 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9040 192.168.5.11 9040 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9041 192.168.5.11 9041 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9042 192.168.5.11 9042 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9043 192.168.5.11 9043 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9044 192.168.5.11 9044 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9045 192.168.5.11 9045 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9046 192.168.5.11 9046 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9047 192.168.5.11 9047 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9048 192.168.5.11 9048 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9049 192.168.5.11 9049 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp interface 9050 192.168.5.11 9050 netmask 255.255.255.255 &lt;BR /&gt;access-group out_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 98.101.139.209 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set WayneTransform esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set SheltonTransform esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map IPSec_map 1 match address Wayne_Access&lt;BR /&gt;crypto map IPSec_map 1 set pfs group1&lt;BR /&gt;crypto map IPSec_map 1 set peer 70.91.18.205 &lt;BR /&gt;crypto map IPSec_map 1 set transform-set WayneTransform&lt;BR /&gt;crypto map IPSec_map 2 match address Shelton_Access&lt;BR /&gt;crypto map IPSec_map 2 set pfs group1&lt;BR /&gt;crypto map IPSec_map 2 set peer 50.199.234.229 &lt;BR /&gt;crypto map IPSec_map 2 set transform-set SheltonTransform&lt;BR /&gt;crypto map IPSec_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 43200&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.5.100-192.168.5.199 inside&lt;BR /&gt;dhcpd dns 24.25.5.60 24.25.5.61 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username eric password 0vcSd5J/TLsFy7nU encrypted privilege 15&lt;BR /&gt;tunnel-group 50.199.234.229 type ipsec-l2l&lt;BR /&gt;tunnel-group 50.199.234.229 ipsec-attributes&lt;BR /&gt;pre-shared-key *****&lt;BR /&gt;tunnel-group 70.91.18.205 type ipsec-l2l&lt;BR /&gt;tunnel-group 70.91.18.205 ipsec-attributes&lt;BR /&gt;pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:3d770ba9647ffdc22b3637e1e5b9a955&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235915#M357540</guid>
      <dc:creator>ematelyan</dc:creator>
      <dc:date>2019-03-12T01:48:25Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235916#M357541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are those DNS servers okay ( I would say you are also running them on your internal machines )&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;name-server 24.25.5.60&lt;/P&gt;&lt;P&gt;name-server 24.25.5.61&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think the ASA is blocking the traffic as traffic from in to out is allowed on your config but here is my recommendations:&lt;/P&gt;&lt;P&gt;- Get the IP address of the specific site you are trying to access(the one you need to work)&lt;/P&gt;&lt;P&gt;-Create a capture matching http traffic from an internal machine to this website ip address ( capture applied to both the inside and outside interface)&lt;/P&gt;&lt;P&gt;-Download the capture on wireshark and determine what is going on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 23:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235916#M357541</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-23T23:01:44Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235917#M357542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Could you give me a hand with the syntax for doing a packet capture?&amp;nbsp; I see several different ways to do it online, and I want to make sure I'm doing it right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to access this link, &lt;A href="https://vpn.1800packrat.com:10443/remote/login"&gt;https://vpn.1800packrat.com:10443/remote/login&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I'm plugged directly into the ASA, and it's still just timing out when I try to open the link.&lt;/P&gt;&lt;P&gt;This link worked earlier this week, but I put this firewall in on Wednesday, and the link stopped working after that, so I'm pretty sure it's related to the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 14:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235917#M357542</guid>
      <dc:creator>ematelyan</dc:creator>
      <dc:date>2013-05-24T14:26:25Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235918#M357543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;capture inside interface inside match tcp host inside_host ip host Outside_https_server_ip eq 443&lt;/P&gt;&lt;P&gt;capture capout interface outside match tcp host NAT_IP_inside_host host Outside_https_server_ip eq 443 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 17:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235918#M357543</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-24T17:33:18Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235919#M357544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I entered the two commands below,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin interface inside match ip host 192.168.5.11 host 98.101.134.98&lt;/P&gt;&lt;P&gt;capture capout interface outside match ip host 98.101.139.210 host 98.101.134.98&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I tried to access the website, &lt;A href="https://vpn.1800packrat.com:10443/remote/login"&gt;https://vpn.1800packrat.com:10443/remote/login&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I checked the packet capture on the ASA, and got the results below,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show capture capin"&lt;/P&gt;&lt;P&gt;3 packets captured&lt;/P&gt;&lt;P&gt;1: 12:10:01.466604 802.1Q vlan#1 P0 192.168.5.11.1078 &amp;gt; 98.101.134.98.10443: S 3132314592:3132314592(0) win 65535 &lt;MSS 1460=""&gt; &lt;BR /&gt;2: 12:10:04.481023 802.1Q vlan#1 P0 192.168.5.11.1078 &amp;gt; 98.101.134.98.10443: S 3132314592:3132314592(0) win 65535 &lt;MSS 1460=""&gt; &lt;BR /&gt;3: 12:10:10.514682 802.1Q vlan#1 P0 192.168.5.11.1078 &amp;gt; 98.101.134.98.10443: S 3132314592:3132314592(0) win 65535 &lt;MSS 1460=""&gt; &lt;BR /&gt;3 packets shown&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show capture capout"&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it looks like packets are going into the ASA, and not leaving.&amp;nbsp; Could this be caused by one of the Static NAT Rules?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 01:07:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235919#M357544</guid>
      <dc:creator>ematelyan</dc:creator>
      <dc:date>2013-05-28T01:07:59Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235920#M357545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you performig a NAT on the ASA for that particular web-server?&lt;/P&gt;&lt;P&gt; Physically, is the server connected on the outside interface of the ASA? or inside?&lt;/P&gt;&lt;P&gt;Do the following and provide the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp &lt;SPAN style="font-size: 10pt;"&gt;192.168.5.11 1027 &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;98.101.134.98 443&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 02:57:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235920#M357545</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-28T02:57:51Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235921#M357546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I am not performing NAT on this particular webserver, and the server is on the outside interface, out on the internet.&lt;/P&gt;&lt;P&gt;The reason I ask, is that I swapped the previous router with the ASA 5505, and copied all of the NAT rules, as I wasn't sure exactly what they did or did not need.&amp;nbsp; i was thinking maybe I input something that was causing a conflict.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the output,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input inside tcp 192.168.5.11 1027 98.101.134.98 443"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 98.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) udp interface sip 192.168.5.11 sip netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match udp inside host 192.168.5.11 eq 5060 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 98.101.139.210/5060&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 781, untranslate_hits = 34065&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp; match ip inside any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (98.101.139.210 [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 18997, untranslate_hits = 334&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.5.11/1027 to 98.101.139.210/42044 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 122434, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 13:06:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235921#M357546</guid>
      <dc:creator>ematelyan</dc:creator>
      <dc:date>2013-05-28T13:06:33Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235922#M357547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration looks good, packet tracer looks good&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the captures again and add the following capture as well&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then start the connection and share&lt;/P&gt;&lt;P&gt;show cap capin&lt;/P&gt;&lt;P&gt;show cap capout&lt;/P&gt;&lt;P&gt;show cap asp | include x.x.x.x (IP address of the HTTPS server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 16:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235922#M357547</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-28T16:57:58Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235923#M357548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I've entered these 3 commands.&amp;nbsp; The "show cap asp | include 98.101.134.98" command isn't returning anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin interface inside match ip host 192.168.5.11 host 98.101.134.98&lt;/P&gt;&lt;P&gt;capture capout interface outside match ip host 98.101.139.210 host 98.101.134.98&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the results,&lt;/P&gt;&lt;P&gt;Result of the command: "show capture capin"&lt;/P&gt;&lt;P&gt;3 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 12:57:57.319349 802.1Q vlan#1 P0 192.168.5.11.4214 &amp;gt; 98.101.134.98.10443: S 2493633550:2493633550(0) win 65535 &lt;MSS 1460=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 12:58:00.258546 802.1Q vlan#1 P0 192.168.5.11.4214 &amp;gt; 98.101.134.98.10443: S 2493633550:2493633550(0) win 65535 &lt;MSS 1460=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 12:58:06.292205 802.1Q vlan#1 P0 192.168.5.11.4214 &amp;gt; 98.101.134.98.10443: S 2493633550:2493633550(0) win 65535 &lt;MSS 1460=""&gt; &lt;BR /&gt;3 packets shown&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show capture capout"&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show cap asp | include 98.101.134.98"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 17:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235923#M357548</guid>
      <dc:creator>ematelyan</dc:creator>
      <dc:date>2013-05-28T17:08:57Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235924#M357549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The cap asp will show the packets that are being drop by the ASA,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we are not getting any packets drop(at least based on the capture) but traffic is not going out the ASA, HMM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are testing this with a real connection right??? Not with a packet-tracer???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also why are you going on port 10443 to the server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 17:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235924#M357549</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-28T17:13:19Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235925#M357550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'm testing from a physical machine (192.168.5.11), inside the network. Opening up Internet Explorer, and putting in the link in the address bar.&amp;nbsp; It just times out everytime.&amp;nbsp;&amp;nbsp; I'm not using packet tracer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a customer's site, and this is the instructions they gave us to connect to their VPN, on port 10443.&amp;nbsp; It works when I try the link from home, or even from another office.&amp;nbsp; Just in this specific office, it won't work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 17:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235925#M357550</guid>
      <dc:creator>ematelyan</dc:creator>
      <dc:date>2013-05-28T17:18:43Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235926#M357551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure I get it, So this will go over the internet, this does not go through a VPN tunnel right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 May 2013 19:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235926#M357551</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-28T19:12:20Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235927#M357552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Correct, this is a site out on the internet.&amp;nbsp; It's not going through a VPN tunnel.&amp;nbsp; This is a Customer's vpn site, not ours.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 18:53:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235927#M357552</guid>
      <dc:creator>ematelyan</dc:creator>
      <dc:date>2013-05-29T18:53:16Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235928#M357553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I was able to figure out the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had the outside interface configured as&lt;/P&gt;&lt;P&gt;ip address 98.101.139.210 255.0.0.0&lt;/P&gt;&lt;P&gt;It should be&lt;/P&gt;&lt;P&gt;ip address 98.101.139.210 255.255.255.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Coincidentally, the two sites that weren't working both had 98.x.x.x IP addresses, so it was thinking that they were on the connected network.&amp;nbsp; This explains why other websites worked, but those two didn't.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the change, all seems to be working fine.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 15:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235928#M357553</guid>
      <dc:creator>ematelyan</dc:creator>
      <dc:date>2013-05-30T15:48:46Z</dc:date>
    </item>
    <item>
      <title>Can't access certain websites</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235929#M357554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Makes sense,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for sharing that with the community,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 16:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-certain-websites/m-p/2235929#M357554</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-30T16:58:48Z</dc:date>
    </item>
  </channel>
</rss>

