<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA can't get to the internet HTTP but can ICMP. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169625#M359111</link>
    <description>&lt;P&gt;I have to have lost my mind.&amp;nbsp; I had a firewall setup with the wizard defaults and it worked just fine.&amp;nbsp; Late a co-worker tried to get a ste to site vpn working and the internet access has been gone since.&amp;nbsp; I just can't fine the problem.&amp;nbsp; Can someone look at my config and see what is wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.6(1)2 &lt;BR /&gt;!&lt;BR /&gt;hostname OCFASA01&lt;BR /&gt;enable password yz8p/OLZUxxi0WVC encrypted&lt;BR /&gt;passwd j/IegePBFbt/dIRI encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address XXX.XXX.XXX.XXX 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.62.1.9 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 99&lt;BR /&gt;ip address 10.62.250.42 255.255.255.0 &lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa861-2-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network AllInside&lt;BR /&gt;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host inside 10.60.54.78&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-66114.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 174.77.235.33 1&lt;BR /&gt;route inside 10.0.0.0 255.0.0.0 10.62.1.10 1&lt;BR /&gt;route management 10.60.6.31 255.255.255.255 10.62.250.1 1&lt;BR /&gt;route management 10.60.54.0 255.255.255.0 10.62.250.1 1&lt;BR /&gt;route management 10.60.90.100 255.255.255.255 10.62.250.1 1&lt;BR /&gt;route management 10.60.182.0 255.255.255.0 10.62.250.1 1&lt;BR /&gt;route management 10.61.90.100 255.255.255.255 10.62.250.1 1&lt;BR /&gt;route management 10.62.54.0 255.255.255.0 10.62.250.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server ACS protocol tacacs+&lt;BR /&gt;aaa-server ACS (management) host 10.60.90.100&lt;BR /&gt;timeout 3&lt;BR /&gt;key *****&lt;BR /&gt;aaa-server ACS (management) host 10.61.90.100&lt;BR /&gt;key *****&lt;BR /&gt;no user-identity enable&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console ACS LOCAL&lt;BR /&gt;aaa authentication http console ACS LOCAL&lt;BR /&gt;aaa authentication ssh console ACS LOCAL&lt;BR /&gt;aaa accounting enable console ACS&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.60.54.0 255.255.255.0 inside&lt;BR /&gt;http 10.60.54.0 255.255.255.0 management&lt;BR /&gt;http 10.62.54.0 255.255.255.0 inside&lt;BR /&gt;http 10.62.54.0 255.255.255.0 management&lt;BR /&gt;http 10.60.182.0 255.255.255.0 management&lt;BR /&gt;http 10.60.6.31 255.255.255.255 management&lt;BR /&gt;http 10.61.54.0 255.255.255.0 management&lt;BR /&gt;snmp-server host inside 10.60.6.136 community *****&lt;BR /&gt;snmp-server host inside 10.60.6.31 community *****&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;no sysopt connection permit-vpn&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;telnet timeout 3&lt;BR /&gt;ssh 10.62.54.0 255.255.255.0 management&lt;BR /&gt;ssh 10.60.54.0 255.255.255.0 management&lt;BR /&gt;ssh 10.61.54.0 255.255.255.0 management&lt;BR /&gt;ssh 10.60.182.0 255.255.255.0 management&lt;BR /&gt;ssh 10.60.6.31 255.255.255.255 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 30&lt;BR /&gt;management-access management&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption rc4-md5&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:1b40776e13f77a4a6e287d8209f7e5ea&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Pings go through and you get a reply.&amp;nbsp; Thanks for you help! &lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:22:27 GMT</pubDate>
    <dc:creator>kevin.cooke</dc:creator>
    <dc:date>2019-03-12T01:22:27Z</dc:date>
    <item>
      <title>ASA can't get to the internet HTTP but can ICMP.</title>
      <link>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169625#M359111</link>
      <description>&lt;P&gt;I have to have lost my mind.&amp;nbsp; I had a firewall setup with the wizard defaults and it worked just fine.&amp;nbsp; Late a co-worker tried to get a ste to site vpn working and the internet access has been gone since.&amp;nbsp; I just can't fine the problem.&amp;nbsp; Can someone look at my config and see what is wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.6(1)2 &lt;BR /&gt;!&lt;BR /&gt;hostname OCFASA01&lt;BR /&gt;enable password yz8p/OLZUxxi0WVC encrypted&lt;BR /&gt;passwd j/IegePBFbt/dIRI encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address XXX.XXX.XXX.XXX 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.62.1.9 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 99&lt;BR /&gt;ip address 10.62.250.42 255.255.255.0 &lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa861-2-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network AllInside&lt;BR /&gt;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host inside 10.60.54.78&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-66114.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 174.77.235.33 1&lt;BR /&gt;route inside 10.0.0.0 255.0.0.0 10.62.1.10 1&lt;BR /&gt;route management 10.60.6.31 255.255.255.255 10.62.250.1 1&lt;BR /&gt;route management 10.60.54.0 255.255.255.0 10.62.250.1 1&lt;BR /&gt;route management 10.60.90.100 255.255.255.255 10.62.250.1 1&lt;BR /&gt;route management 10.60.182.0 255.255.255.0 10.62.250.1 1&lt;BR /&gt;route management 10.61.90.100 255.255.255.255 10.62.250.1 1&lt;BR /&gt;route management 10.62.54.0 255.255.255.0 10.62.250.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server ACS protocol tacacs+&lt;BR /&gt;aaa-server ACS (management) host 10.60.90.100&lt;BR /&gt;timeout 3&lt;BR /&gt;key *****&lt;BR /&gt;aaa-server ACS (management) host 10.61.90.100&lt;BR /&gt;key *****&lt;BR /&gt;no user-identity enable&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console ACS LOCAL&lt;BR /&gt;aaa authentication http console ACS LOCAL&lt;BR /&gt;aaa authentication ssh console ACS LOCAL&lt;BR /&gt;aaa accounting enable console ACS&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.60.54.0 255.255.255.0 inside&lt;BR /&gt;http 10.60.54.0 255.255.255.0 management&lt;BR /&gt;http 10.62.54.0 255.255.255.0 inside&lt;BR /&gt;http 10.62.54.0 255.255.255.0 management&lt;BR /&gt;http 10.60.182.0 255.255.255.0 management&lt;BR /&gt;http 10.60.6.31 255.255.255.255 management&lt;BR /&gt;http 10.61.54.0 255.255.255.0 management&lt;BR /&gt;snmp-server host inside 10.60.6.136 community *****&lt;BR /&gt;snmp-server host inside 10.60.6.31 community *****&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;no sysopt connection permit-vpn&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;telnet timeout 3&lt;BR /&gt;ssh 10.62.54.0 255.255.255.0 management&lt;BR /&gt;ssh 10.60.54.0 255.255.255.0 management&lt;BR /&gt;ssh 10.61.54.0 255.255.255.0 management&lt;BR /&gt;ssh 10.60.182.0 255.255.255.0 management&lt;BR /&gt;ssh 10.60.6.31 255.255.255.255 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 30&lt;BR /&gt;management-access management&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption rc4-md5&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:1b40776e13f77a4a6e287d8209f7e5ea&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Pings go through and you get a reply.&amp;nbsp; Thanks for you help! &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:22:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169625#M359111</guid>
      <dc:creator>kevin.cooke</dc:creator>
      <dc:date>2019-03-12T01:22:27Z</dc:date>
    </item>
    <item>
      <title>ASA can't get to the internet HTTP but can ICMP.</title>
      <link>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169626#M359112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a quick look I cant find any specific problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provided that all your hosts are behind the "inside" interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You seem to have a lot of networks behind the "management" interface. Though your Management interface is configured with the "management-only" setting so it wont pass any traffic through it. It will only allow management connections to the actual interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though it doesnt really make sense if you can ping hosts on the Internet but cant connect to them?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a chance that there is some problem with DNS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give an example IP address of a host that cant connect to Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also test firewall rules with command "packet-tracer"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp &lt;SOURCE ip=""&gt; 12345 1.2.3.4 80&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just as an example command. It will tell what the firewall would do to the above HTTP connection to IP 1.2.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Apr 2013 13:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169626#M359112</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-02T13:59:52Z</dc:date>
    </item>
    <item>
      <title>ASA can't get to the internet HTTP but can ICMP.</title>
      <link>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169627#M359113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thats the wierd part the packet trace is good.&amp;nbsp; DNS is fine that was the first thing I checked.&amp;nbsp; Its all just very odd. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I ping it resolves to 8.8.8.8.&amp;nbsp; All I'm trying to get to on the web is &lt;A href="http://www.google.com"&gt;www.google.com&lt;/A&gt; or ipchicken.com.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is baffling!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Apr 2013 14:59:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169627#M359113</guid>
      <dc:creator>kevin.cooke</dc:creator>
      <dc:date>2013-04-02T14:59:23Z</dc:date>
    </item>
    <item>
      <title>ASA can't get to the internet HTTP but can ICMP.</title>
      <link>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169628#M359114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you take the output of a "packet-tracer" command using some source and destination IP address related to what you are actually testing and copy/paste the output here just to confirm that the ASA configuration isnt problematic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also remove the "inspect http" if you want to test that but to be honest I have never run into problem with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Apr 2013 15:09:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169628#M359114</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-02T15:09:26Z</dc:date>
    </item>
    <item>
      <title>ASA can't get to the internet HTTP but can ICMP.</title>
      <link>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169629#M359115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; OK problem found!! Obviously when Cox Cable shuts off service for billing the just shut off HTTP/HTTPS and leave ICMP and DNS working.&amp;nbsp; This was the strangest problem ever.&amp;nbsp; Thanks for all the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Apr 2013 16:53:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-can-t-get-to-the-internet-http-but-can-icmp/m-p/2169629#M359115</guid>
      <dc:creator>kevin.cooke</dc:creator>
      <dc:date>2013-04-02T16:53:11Z</dc:date>
    </item>
  </channel>
</rss>

