<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5505 DNS issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229906#M357583</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Regarding the output you posted after inserting the commands I suggest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that the ASDM correctly inserted the needed configurations to the ASA running configuration. The DNS Inspection would seem to be in use now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Totally other matter is ofcourse did this help with your DNS problem. I hope it did.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 May 2013 16:40:00 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-23T16:40:00Z</dc:date>
    <item>
      <title>ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229897#M357569</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm kind of stuck here and I'm not sure what I'm supposed to do now.&amp;nbsp; My company wants to switch from copper to fiber internet access.&amp;nbsp; Not a problem, I went through my ASDM and changed all the IP addresses from the old access to the new ones starting in Device Setup | Interfaces | Outside and put the IP address in there, then I went to Routing | Static Routes | Gateway IP and changed that.&amp;nbsp; Everything went haywire.&amp;nbsp; I was told I was getting internet access but was getting DNS errors and I'm not sure why.&amp;nbsp; I double checked and the ISP DNS Servers didn't change.&amp;nbsp; I changed out the Gateway, and my useable IP's just like I did when my company made the first switch the week I got here in March. can anyone help me figure this out?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:48:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229897#M357569</guid>
      <dc:creator>chriswarren972</dc:creator>
      <dc:date>2019-03-12T01:48:07Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229898#M357571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean the ASA is giving you some errors regarding DNS? Can you share the error messages with us?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want us to check the ASA configuraiton I would prefer to see them in the CLI format as I dont use ASDM. Then again it would be a pain to even try to copy/paste here all the different ASDM configuration pages &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 14:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229898#M357571</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T14:26:26Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229899#M357573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How would I give you the CLI version as I only use the ASDM? &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 14:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229899#M357573</guid>
      <dc:creator>chriswarren972</dc:creator>
      <dc:date>2013-05-23T14:55:19Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229900#M357574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASDM, you can follow this path: Tools &amp;gt; Command Line Interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should bring up this window:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG height="549" id="irc_mi" src="http://www.cisco.com/image/gif/paws/112235/asa-disgi-enai-asdm-02.gif" width="468" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type show run under command and click send. The output of this command is the running configuration. You can copy the output and paste it here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If possible, please take the show service-policy output as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 15:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229900#M357574</guid>
      <dc:creator>Eddy Duran</dc:creator>
      <dc:date>2013-05-23T15:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229901#M357576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eddy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's what it says for the show run command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FiveStarASA&lt;/P&gt;&lt;P&gt;enable password LcVWj.mnNFwiBnaT encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 50.84.214.74 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit tcp any host 50.84.214.74 eq 3389 &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit tcp any host 50.84.214.74 eq ftp &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit ip any host 50.84.214.75 &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit ip any host 50.84.214.76 &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit tcp any host 50.84.214.74 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit tcp any host 50.84.214.76 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.0.0 255.255.252.0 10.75.75.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 192.168.0.0 255.255.252.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 10.75.75.1-10.75.75.254&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 192.168.1.11 3389 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.146 192.168.1.201 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.147 192.168.1.202 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 50.84.214.75 192.168.1.203 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.149 192.168.1.204 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 50.84.214.76 192.168.1.205 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.151 192.168.1.206 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.152 192.168.1.207 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.153 192.168.1.208 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.154 192.168.1.209 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.155 192.168.1.210 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;access-group acl_outside in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 50.84.214.73 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;url-server (inside) vendor smartfilter host 69.26.160.9 port 4005 timeout 30 protocol TCP connections 5&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;filter url http 192.168.0.0 255.255.252.0 64.244.22.144 255.255.255.240 proxy-block &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set strongest esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set strongest&lt;/P&gt;&lt;P&gt;crypto map activemap 65535 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map activemap interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 60&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 63.149.142.32 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;ssh 70.42.3.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;url-block url-mempool 2&lt;/P&gt;&lt;P&gt;url-block url-size 2&lt;/P&gt;&lt;P&gt;url-block block 10&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy ClientGroup internal&lt;/P&gt;&lt;P&gt;group-policy ClientGroup attributes&lt;/P&gt;&lt;P&gt; dns-server value 4.2.2.1 4.2.2.2&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value splittunnel&lt;/P&gt;&lt;P&gt;username admin password rwgfG5L5VZ6zHtCh encrypted&lt;/P&gt;&lt;P&gt;username synchadmin password .GsHHIUoDv8rcdPN encrypted&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAdmin type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAdmin general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpnpool&lt;/P&gt;&lt;P&gt; default-group-policy ClientGroup&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAdmin ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt; isakmp ikev1-user-authentication none&lt;/P&gt;&lt;P&gt;tunnel-group Remote type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group Remote general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpnpool&lt;/P&gt;&lt;P&gt; default-group-policy ClientGroup&lt;/P&gt;&lt;P&gt;tunnel-group Remote ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:7827720577eab30f70efc6e68bf1f419&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the Output as well:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FiveStarASA&lt;/P&gt;&lt;P&gt;enable password LcVWj.mnNFwiBnaT encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 50.84.214.74 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit tcp any host 50.84.214.74 eq 3389 &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit tcp any host 50.84.214.74 eq ftp &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit ip any host 50.84.214.75 &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit ip any host 50.84.214.76 &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit tcp any host 50.84.214.74 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit tcp any host 50.84.214.76 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.0.0 255.255.252.0 10.75.75.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 192.168.0.0 255.255.252.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 10.75.75.1-10.75.75.254&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 192.168.1.11 3389 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.146 192.168.1.201 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.147 192.168.1.202 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 50.84.214.75 192.168.1.203 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.149 192.168.1.204 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 50.84.214.76 192.168.1.205 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.151 192.168.1.206 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.152 192.168.1.207 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.153 192.168.1.208 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.154 192.168.1.209 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.244.22.155 192.168.1.210 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;access-group acl_outside in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 50.84.214.73 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;url-server (inside) vendor smartfilter host 69.26.160.9 port 4005 timeout 30 protocol TCP connections 5&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;filter url http 192.168.0.0 255.255.252.0 64.244.22.144 255.255.255.240 proxy-block &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set strongest esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set strongest&lt;/P&gt;&lt;P&gt;crypto map activemap 65535 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map activemap interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 60&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 63.149.142.32 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;ssh 70.42.3.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;url-block url-mempool 2&lt;/P&gt;&lt;P&gt;url-block url-size 2&lt;/P&gt;&lt;P&gt;url-block block 10&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy ClientGroup internal&lt;/P&gt;&lt;P&gt;group-policy ClientGroup attributes&lt;/P&gt;&lt;P&gt; dns-server value 4.2.2.1 4.2.2.2&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value splittunnel&lt;/P&gt;&lt;P&gt;username admin password rwgfG5L5VZ6zHtCh encrypted&lt;/P&gt;&lt;P&gt;username synchadmin password .GsHHIUoDv8rcdPN encrypted&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAdmin type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAdmin general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpnpool&lt;/P&gt;&lt;P&gt; default-group-policy ClientGroup&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAdmin ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt; isakmp ikev1-user-authentication none&lt;/P&gt;&lt;P&gt;tunnel-group Remote type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group Remote general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpnpool&lt;/P&gt;&lt;P&gt; default-group-policy ClientGroup&lt;/P&gt;&lt;P&gt;tunnel-group Remote ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:7827720577eab30f70efc6e68bf1f419&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show service-policy output"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show service-policy output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/P&gt;&lt;P&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:20:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229901#M357576</guid>
      <dc:creator>chriswarren972</dc:creator>
      <dc:date>2013-05-23T16:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229902#M357578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont seem to have DNS inspection enabled atleast&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can drop the commands through the ASDM through the same CLI interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to choose the "Multiple Line" checkbox&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; inspect dns&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:23:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229902#M357578</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T16:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229903#M357579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eddy, I also have another question, because I'm seeing something from another issue we had a few weeks ago...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;group-policy ClientGroup attributes&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;dns-server value 4.2.2.1 4.2.2.2 &amp;lt;&lt;WHERE would="" i="" change="" these="" values="" at=""&gt;&lt;/WHERE&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229903#M357579</guid>
      <dc:creator>chriswarren972</dc:creator>
      <dc:date>2013-05-23T16:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229904#M357581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JouniForss,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the result of what you asked me to put in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "policy-map global_policy"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command has been sent to the device&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "class inspection_default"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command has been sent to the device&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "inspect dns"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command has been sent to the device&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229904#M357581</guid>
      <dc:creator>chriswarren972</dc:creator>
      <dc:date>2013-05-23T16:37:58Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229905#M357582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try navigating ASDM to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Configuration (top menu)&amp;nbsp; &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Remote Access VPN (bottom left menu) &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Network (Client) Access (dropdown menu on left)&amp;nbsp; &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Group Policies&amp;nbsp; &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Find the Group Policy named ClientGroup from the main view&amp;nbsp; &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Press Edit &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Go to the section "Servers" in the window&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There you should see the DNS servers configured and you can change them to what you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:38:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229905#M357582</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T16:38:20Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229906#M357583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Regarding the output you posted after inserting the commands I suggest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that the ASDM correctly inserted the needed configurations to the ASA running configuration. The DNS Inspection would seem to be in use now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Totally other matter is ofcourse did this help with your DNS problem. I hope it did.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229906#M357583</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T16:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229907#M357584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you JouniForss!!!&amp;nbsp; So far it's looking good.&amp;nbsp; At 1230 my time here in Dallas, I'm going to attempt the switch over again and I will let you know what happens then.&amp;nbsp; I've got my fingers crossed and I believe now it will work fine.&amp;nbsp; There was also an issue with my ISP's end as well.&amp;nbsp; When I called them they didn't have the same IP addresses on their end active as they gave me.&amp;nbsp; I think that was 99.99% of my problem after looking through the steps that you gave me and there not being any real glaring errors&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:52:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229907#M357584</guid>
      <dc:creator>chriswarren972</dc:creator>
      <dc:date>2013-05-23T16:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229908#M357585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Basic steps you could take when confirming the connectivity&amp;nbsp; are the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Make sure the IP address and mask configured on the WAN interface are correct&lt;/LI&gt;&lt;LI&gt;Make sure the WAN interface IS NOT in "shutdown" state&lt;/LI&gt;&lt;LI&gt;Attempt to PING the ISP gateway &lt;UL&gt;&lt;LI&gt;If you have added some "icmp" commands to the ASA this might fail&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Issue the command "show arp" right after the PING has been issue and confirm that you can see an IP/MAC pair of your ISP gateway&lt;/LI&gt;&lt;LI&gt;Confirm that your default route is pointing to the correct IP address which should be the one showing up with "show arp" command on the WAN/"outside" interface&lt;/LI&gt;&lt;LI&gt;Confirm that the ASA can ping some remote Internet public IP address&lt;UL&gt;&lt;LI&gt;To my understanding the Google DNS servers 8.8.8.8 and 8.8.4.4 should reply to PING for example&lt;/LI&gt;&lt;LI&gt;The CLI command is "ping 8.8.8.8" for example&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;Confirm that you have NAT rules that enabled the LAN users to access Internet&lt;/LI&gt;&lt;LI&gt;Make sure no ACL is blocking any traffic from the LAN to outside&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a very basic, simple ASA configurations there shouldnt be that many things that could prevent normal Internet connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Naturally some of the above things I stated will not be a problem in your case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In some cases its also good to save the current configuration and reboot the device if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229908#M357585</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T16:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DNS issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229909#M357586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And at this point it's very basic &amp;amp; very simple so I'm hoping it's an easy breasy thing &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 17:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dns-issues/m-p/2229909#M357586</guid>
      <dc:creator>chriswarren972</dc:creator>
      <dc:date>2013-05-23T17:13:51Z</dc:date>
    </item>
  </channel>
</rss>

