<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configure internet access - ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134719#M394365</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, Wireless is one area of networking where I sadly have no expirience in. Other people in my company handle it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Was the current Modem/router the device/AP which would handle the wireless customers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so I guess we could go about this matter so that we check your firewall configuration with your orignal setup. That is, with the modem/router in routed mode and getting the public IP address from ISP. Unless you can think of some solution yourself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide the current configuration of the ASA if it needs to be gone through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 10 Dec 2012 16:07:40 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2012-12-10T16:07:40Z</dc:date>
    <item>
      <title>Configure internet access - ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134716#M394352</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am a newbie and i have to configure a default-factory firewall (ASA 5510) in a simple scenário like this image represents:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/7/8/1/118187-rede.png" alt="rede.png" class="jive-image" style="display: block; margin-left: auto; margin-right: auto;" /&gt;At this moment i have configured the interfaces as represented above and at this moment what i want is grant access from a LAN computer (10.10.0.0/24) to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion?&lt;/P&gt;&lt;P&gt;Should i configure some acl? I read that all traffic from an interface with a superior security level to other interface is allowed, so since my inside interface has a security level of 100 and the outside 0, it should be possible access to internet from an inside computer?!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From all configurations and examples i have seen around, they all contemplate a fixed IP address from the ISP, but in my scenário i have a dynamic one. This fact matter for the configuration i want to do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another thing, taking my scenário, i should configure the firewall in routed mode, not in transparent. Am i correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notes:&lt;/P&gt;&lt;P&gt;My firewall is running the software version 8.2(5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards ant thanks for any tip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JL&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:35:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134716#M394352</guid>
      <dc:creator>jneves100</dc:creator>
      <dc:date>2019-03-12T00:35:23Z</dc:date>
    </item>
    <item>
      <title>Configure internet access - ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134717#M394356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before we get started,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems you have an router infront of the ASA Firewall and its getting the public IP address with DHCP. Would it be possible to make this router/modem bridged so it doesnt do any NAT/Routing in between and ASA would get the IP address from the ISP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Considering the future this might save you from a lot of headaches and in general it would be clearer if the device infront of the ASA wouldnt do anything else but provide the DSL to Ethernet connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you could confirm the above we could forward with the actual configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Dec 2012 14:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134717#M394356</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-10T14:05:14Z</dc:date>
    </item>
    <item>
      <title>Configure internet access - ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134718#M394359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;Yes, i have a router in front of ASA firewall and it is getting an dynamic public IP address (DHCP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Considering my needs, it is possible configure the router in bridged mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I haven't represented here (in the image) but i want to enable a guest wifi network that only gives access to the internet, and i was thinking configure it in the network 192.168.15.0/24 (the network that connects ASA to router).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is your suggestion to this issue considering that i would configure the router in bridged mode?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you once again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Dec 2012 15:09:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134718#M394359</guid>
      <dc:creator>jneves100</dc:creator>
      <dc:date>2012-12-10T15:09:25Z</dc:date>
    </item>
    <item>
      <title>Configure internet access - ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134719#M394365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, Wireless is one area of networking where I sadly have no expirience in. Other people in my company handle it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Was the current Modem/router the device/AP which would handle the wireless customers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so I guess we could go about this matter so that we check your firewall configuration with your orignal setup. That is, with the modem/router in routed mode and getting the public IP address from ISP. Unless you can think of some solution yourself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide the current configuration of the ASA if it needs to be gone through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Dec 2012 16:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134719#M394365</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-10T16:07:40Z</dc:date>
    </item>
    <item>
      <title>Configure internet access - ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134720#M394371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The actual running configuration is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password 5C22.c6gSPFnC4aq encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.15.230 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.0.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.15.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:e47a966eec06717af1463367fb5142d5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as i refered previously, the only thing i want to do is access the internet from a computer on the inside network (10.10.0.xx/24).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;JL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 16:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134720#M394371</guid>
      <dc:creator>jneves100</dc:creator>
      <dc:date>2012-12-12T16:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: Configure internet access - ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134721#M394379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mask on your &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface is wrong compared to the picture and also regarding the gateway IP address of the default route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking above the picture says your ASA outside network is 192.168.15.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "outside" interface is configured with mask /30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 16:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134721#M394379</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-12T16:49:54Z</dc:date>
    </item>
    <item>
      <title>Configure internet access - ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134722#M394385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Regarding the use of ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have no real need to configure ACL on any interfaces UNLESS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You need to limit connectivity between networks behind different interfaces&lt;/LI&gt;&lt;LI&gt;You need to open some service from the Internet to a LAN server (which has Static NAT configuration)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do notice also that as soon as you define an ACL to any interface, the "security-level" will not matter anymore, in the same way atleast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You have &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface with &lt;STRONG&gt;"security-level 100"&lt;/STRONG&gt; and &lt;STRONG&gt;no ACL&lt;/STRONG&gt; attached to the interface&lt;UL&gt;&lt;LI&gt;All traffic can go through the firewall to any interface PROVIDED that the destination interfaces &lt;STRONG&gt;"security-level" &lt;/STRONG&gt;is &lt;STRONG&gt;below&lt;/STRONG&gt; the source interfaces &lt;STRONG&gt;"security-level"&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;You add &lt;STRONG&gt;"access-list INSIDE-IN permit tcp any any"&lt;/STRONG&gt; and attach it to &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface with &lt;STRONG&gt;"access-group INSIDE-IN in interface inside"&lt;/STRONG&gt;&lt;UL&gt;&lt;LI&gt;While all TCP traffic from behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface will go through the firewall, &lt;STRONG&gt;no UDP&lt;/STRONG&gt; connections will be permitted from networks behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface. It would need an addtional rule.&lt;/LI&gt;&lt;LI&gt;If your connection attempt doesnt match some rule in the ACL attached to the interface, it will be denied.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 16:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134722#M394385</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-12T16:58:51Z</dc:date>
    </item>
    <item>
      <title>Configure internet access - ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134723#M394391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jose,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Should i configure some acl? I read that all traffic from an interface with a superior security level to other interface is allowed, so since my inside interface has a security level of 100 and the outside 0, it should be possible access to internet from an inside computer?!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should if you want it to restrict the inside traffic but if you just want to allow the inside users to go to the internet there is no need for thas because as you read traffic from a higher security level to a higher is allowed by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;From all configurations and examples i have seen around, they all contemplate a fixed IP address from the ISP, but in my scenário i have a dynamic one. This fact matter for the configuration i want to do?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, not at all as you will not use that on your ASA, the dynamic IP will be used on your outside router so nothing to worry in your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Another thing, taking my scenário, i should configure the firewall in routed mode, not in transparent. Am i correct?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routed mode is more than fine for you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now based on your configuration and you been unable to access the internet, can you check the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change the netmask on the outsie interface to 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip address 192.168.15.230 255.255.255.252&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;What is the DNS server on your PC,&lt;/P&gt;&lt;P&gt;Add the following command: " &lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt; "&lt;/P&gt;&lt;P&gt;Can you ping 192.168.15.254 from your PC?&lt;/P&gt;&lt;P&gt;Can you ping 4.2.2.2 from the ASA&lt;/P&gt;&lt;P&gt;Can you ping 4.2.2.2&amp;nbsp; from the pc?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 21:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-internet-access-asa-5510/m-p/2134723#M394391</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-12T21:07:17Z</dc:date>
    </item>
  </channel>
</rss>

