<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 5510 5520 internet problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977881#M401588</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This was one strange night. After talking to our monitoring company for several hours, Cisco TAC for several more hours, then our ISP for a few more hours into the early morning it looks like &lt;/P&gt;&lt;P&gt;1) I had a management interface that had an IP from the inside network so the ASA tried to divert inside traffic through that management interface&lt;/P&gt;&lt;P&gt;2) There was something wrong with the ISP's arp cache that wasn't resolving our static mapped addresses correctly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Jul 2012 20:31:42 GMT</pubDate>
    <dc:creator>Adam Hudson</dc:creator>
    <dc:date>2012-07-27T20:31:42Z</dc:date>
    <item>
      <title>5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977868#M401569</link>
      <description>&lt;P&gt;Switching out a 5510 as our primary firewall with a 5520. I've essentially copied the working config from the 5510, and put it on to the 5520, making small changes where necessary. Plug everything. I cannot get out to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Facts: &lt;/P&gt;&lt;P&gt;-All interfaces have no shut on them&lt;/P&gt;&lt;P&gt;-No machine can ping out to the internet gateway&lt;/P&gt;&lt;P&gt;-All machines can ping out to the inside interface of the firewall&lt;/P&gt;&lt;P&gt;-It's not a problem with the internet because I can take a laptop, enter in our outside interface information, plug it into the internet gateway, and I can get out to the internet just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's going on with my device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is a sanitized config.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977868#M401569</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2019-03-11T23:35:10Z</dc:date>
    </item>
    <item>
      <title>5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977869#M401571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've also attempted to power cycle the internet gateway eventhough it's working. Pinging on the local LAN works fine by name (not even to my 2 remote sites who communicate with this site via other means) so DNS is not an issue. Just attempted to shut the outside interface off for a minute or two, then bring it back up. Not hopeful for that "fix" to work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 23:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977869#M401571</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-26T23:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977870#M401573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Packet Tracer statements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OUTSIDE INT TO INTERNET GATEWAY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteA-Firewall# packet-tracer input outside icmp 73.13.198.210 0 0 73.13.198.209&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 73.13.198.208&amp;nbsp;&amp;nbsp; 255.255.255.240 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INSIDE INT TO INSIDE NETWORK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteA-Firewall# packet-tracer input inside icmp 11.255.1.1 0 0 11.2.1.29&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 11.2.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: management&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mini-rant: This is why I don't trust packet tracer statements by themselves because I know for a fact the inside interface can ping to that computer's IP address. Proof:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;SiteA-Firewall# ping 11.2.1.29&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 11.2.1.29, timeout is 2 seconds:&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So unless I misunderstand how to word them, I'm not sure why the packet-tracer command is even in the hardware.&lt;/P&gt;&lt;P&gt;/Mini-rant over&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 23:21:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977870#M401573</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-26T23:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977871#M401575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All relevant interfaces are up and up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tried pulling the ACL attached to the outside interface completely off. Pings still did not go through. Tried just putting in the line that permits pings. Pings still did not go through. So I'm guessing from that it's not a ACL issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 23:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977871#M401575</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-26T23:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977872#M401577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Started pinging the internet gateway from a normal network PC, the email server, and the RDP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ran these commands for a capture:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture cap1 access-list captest1 interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list captest1 extended permit ip host 73.13.198.209 host 73.13.198.210&lt;/P&gt;&lt;P&gt;access-list captest1 extended permit ip host 73.13.198.210 host 73.13.198.209&lt;/P&gt;&lt;P&gt;access-list captest1 extended permit icmp host 73.13.198.210 host 73.13.198.209&lt;/P&gt;&lt;P&gt;access-list captest1 extended permit icmp host 73.13.198.209 host 73.13.198.210&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteA-Firewall# sh capture cap1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 20:51:23.284958 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 20:51:28.292755 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 20:51:33.284958 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 20:51:38.295227 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 20:51:43.284988 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 20:51:48.292801 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 20:51:53.285080 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 20:51:58.292862 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 20:52:04.349225 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 20:52:09.291351 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 20:52:14.283569 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 20:52:19.291336 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 20:52:24.283600 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 20:52:29.291504 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15: 20:52:34.283691 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 16: 20:52:39.291473 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 17: 20:52:44.299300 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 18: 20:52:49.291504 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 19: 20:52:54.299300 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Killed all pings. Started pinging from the normal network PC:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;20: 20:53:18.764746 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 21: 20:53:23.300948 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22: 20:53:28.293212 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 23: 20:53:33.301025 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 24: 20:53:38.293258 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 25: 20:53:43.301116 73.13.198.210 &amp;gt; 73.13.198.209: icmp: echo request&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Killed the normal PC ping, started pinging from Email server: nothing&lt;/P&gt;&lt;P&gt;Killed the email server ping, started pinging from RDP server: nothing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does this tell me? Pings seem to be going through in some form. And that I'm going to have problems getting the E-Mail and RDP servers working even if I get the internet working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 01:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977872#M401577</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-27T01:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977873#M401579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pulled the access-list off the inside interface. Pulled off nat-control. No change.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 01:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977873#M401579</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-27T01:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977874#M401580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Trace routes from PC, Email server, and RDP server all stop at the router. But again, they can all ping the inside interface of the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 01:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977874#M401580</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-27T01:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977875#M401581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm going to try switching the outside interface to another port on the firewall. If no one else has any suggestions by then and it doesn't work, I need to switch out to the old firewall and get it working for tomorrow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 02:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977875#M401581</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-27T02:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977876#M401582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Applied "permit icmp any any" ACLs to both interfaces. No change, definately not the ACLs then.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 02:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977876#M401582</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-27T02:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977877#M401583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Attempting to put the old one back in place now. No luck with the new one.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 03:17:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977877#M401583</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-27T03:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977878#M401584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Old Firewall back in. Internet working. RDP and Email aren't working now though.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 03:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977878#M401584</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-27T03:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977879#M401585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; When you replace the Firewall, do 'clear arp' (or reload) on both upstream &amp;amp; downstream neighbors connected to firewall. As long as your config is fine- that should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 09:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977879#M401585</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2012-07-27T09:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977880#M401587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your inside interface is having the below configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 11.255.1.1 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;which has the /30 subnet. If this is the case the you will be having the core switch which will be your default gateway for your enduser machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I do see your SMTP/RDP in inside segment which needs to be routed locally. If this comes in to firewall then we need to do hairpinning. But you local address of smtp and rdp sits in 11.2.1.0/24 where you have your management vlan. You need to have the routes for inside zone as well specific to the subnets. So we need to shape it in such a way to work it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best thing you can do a compare configuration using compare it tool which is a free ware available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate for the helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 10:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977880#M401587</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-27T10:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977881#M401588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This was one strange night. After talking to our monitoring company for several hours, Cisco TAC for several more hours, then our ISP for a few more hours into the early morning it looks like &lt;/P&gt;&lt;P&gt;1) I had a management interface that had an IP from the inside network so the ASA tried to divert inside traffic through that management interface&lt;/P&gt;&lt;P&gt;2) There was something wrong with the ISP's arp cache that wasn't resolving our static mapped addresses correctly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 20:31:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977881#M401588</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-27T20:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: 5510 5520 internet problems</title>
      <link>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977882#M401590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mark this one closed, however that happens.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 20:32:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5510-5520-internet-problems/m-p/1977882#M401590</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-27T20:32:51Z</dc:date>
    </item>
  </channel>
</rss>

