<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewall preventing Internet Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-preventing-internet-access/m-p/2191405#M358939</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The information you have given isnt enough to say anything specific about this situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem to me that you are using the Internet Router to do the NAT for all users on the LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you should atleast confirm is that the Internet Router then has routes for the networks behind the ASA pointing towards the "outside" IP address of the ASA. Also you would have to make sure the router has NAT configurations for those networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also suggest not using the ACLs in both directions on the interfaces. Attaching them in the direction "in" is usually enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Apr 2013 11:41:45 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-04-04T11:41:45Z</dc:date>
    <item>
      <title>Firewall preventing Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/firewall-preventing-internet-access/m-p/2191404#M358937</link>
      <description>&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;Hi, I am having one 2800 router&amp;nbsp; where the ISP link is, Another port is for ASA 5520. There are two 4503&amp;nbsp; core switches connected with firewall. When i am connect the ISP, i can&amp;nbsp; ping upto ISP Gateway, but not DNS(8.8.8.8) or any public IP. as a&amp;nbsp; result, from access switches i cant get internet connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When&amp;nbsp; i disconnected Firewall connection from router, i got ping of DNS &amp;amp;&amp;nbsp; Other public IP. so , i think the problem is in Firewall. there is no&amp;nbsp; denial of anything in firewall, but still it is preventing dns.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me in this regard, as it is an urgent issue before migration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some snapshot:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list external-in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list external-in extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list external-in extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list external-in extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list external-in extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list external-in extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list external-in extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list external-in extended permit tcp any any eq telnet &lt;/P&gt;&lt;P&gt;access-list external-in extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list internal-out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list internal-out extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list internal-out extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list internal-out extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list internal-out extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list internal-out extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list internal-out extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list internal-out extended permit tcp any any eq telnet &lt;/P&gt;&lt;P&gt;access-list internal-out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list global_access extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside_1 1500&lt;/P&gt;&lt;P&gt;mtu inside_2 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group internal-out in interface outside&lt;/P&gt;&lt;P&gt;access-group internal-out out interface outside&lt;/P&gt;&lt;P&gt;access-group external-in in interface inside_1&lt;/P&gt;&lt;P&gt;access-group external-in out interface inside_1&lt;/P&gt;&lt;P&gt;access-group external-in in interface inside_2&lt;/P&gt;&lt;P&gt;access-group external-in out interface inside_2&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.251.1 1&lt;/P&gt;&lt;P&gt;route inside_1 172.16.0.0 255.255.0.0 172.16.251.6 1&lt;/P&gt;&lt;P&gt;route inside_2 172.16.0.0 255.255.0.0 172.16.251.10 2&lt;/P&gt;&lt;P&gt;route inside_1 192.168.0.0 255.255.224.0 172.16.251.6 1&lt;/P&gt;&lt;P&gt;route inside_2 192.168.0.0 255.255.224.0 172.16.251.10 2&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 172.16.251.2 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside_1&lt;/P&gt;&lt;P&gt;http 172.16.251.5 255.255.255.255 inside_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside_2&lt;/P&gt;&lt;P&gt;http 172.16.251.9 255.255.255.255 inside_2&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet 172.16.251.0 255.255.255.252 outside&lt;/P&gt;&lt;P&gt;telnet 172.16.251.4 255.255.255.252 inside_1&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside_1&lt;/P&gt;&lt;P&gt;telnet 172.16.251.5 255.255.255.255 inside_1&lt;/P&gt;&lt;P&gt;telnet 172.16.251.8 255.255.255.252 inside_2&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside_2&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.16.251.5 255.255.255.255 inside_1&lt;/P&gt;&lt;P&gt;ssh 172.16.251.9 255.255.255.255 inside_2&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 30&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me as soon as possible....................&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-preventing-internet-access/m-p/2191404#M358937</guid>
      <dc:creator>seclucscon</dc:creator>
      <dc:date>2019-03-12T01:23:25Z</dc:date>
    </item>
    <item>
      <title>Firewall preventing Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/firewall-preventing-internet-access/m-p/2191405#M358939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The information you have given isnt enough to say anything specific about this situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem to me that you are using the Internet Router to do the NAT for all users on the LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you should atleast confirm is that the Internet Router then has routes for the networks behind the ASA pointing towards the "outside" IP address of the ASA. Also you would have to make sure the router has NAT configurations for those networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also suggest not using the ACLs in both directions on the interfaces. Attaching them in the direction "in" is usually enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Apr 2013 11:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-preventing-internet-access/m-p/2191405#M358939</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-04T11:41:45Z</dc:date>
    </item>
  </channel>
</rss>

