<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 internal network cannot connect to internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924375#M437101</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please run a packet-tracer and respond to this thread with the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer in Internal_Network tcp 10.153.111.50 http 8.8.8.8 http det&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards, &lt;BR /&gt; &lt;BR /&gt;Kevin &lt;BR /&gt; &lt;BR /&gt;**Please remember to rate helpful posts as well as mark the question as 'answered' once your issue is resolved. This will help others to find your solution faster.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 May 2012 20:05:30 GMT</pubDate>
    <dc:creator>Kevin P Sheahan</dc:creator>
    <dc:date>2012-05-14T20:05:30Z</dc:date>
    <item>
      <title>ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924372#M437098</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been scratching my head trying to figure this one out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA 5510 configured 3 interface Internet_AAPT, Internal_Network and Server_Network. The server network works fine as is able to connect to the internet and services like port 80 work from the internet in. But from the Internal_Network can only get to the server network but not internet (&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;May 13 2012&lt;/TD&gt;&lt;TD&gt;14:17:40&lt;/TD&gt;&lt;TD&gt;302013&lt;/TD&gt;&lt;TD&gt;10.153.111.212&lt;/TD&gt;&lt;TD&gt;53663&lt;/TD&gt;&lt;TD&gt;199.47.216.148&lt;/TD&gt;&lt;TD&gt;80&lt;/TD&gt;&lt;TD&gt;Built outbound TCP connection 42508 for Internet_AAPT:199.47.216.148/80 (199.47.216.148/80) to Server_Network:10.153.111.212/53663 (10.153.111.212/53663)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;. The weird thing in logs i see a connection being made but for some reason its referring to the Server_Network interface?? below is my current config...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA01&lt;/P&gt;&lt;P&gt;domain-name names&lt;/P&gt;&lt;P&gt;name 10.153.11.184 QNAP&lt;/P&gt;&lt;P&gt;name 10.153.11.192 exc2010&lt;/P&gt;&lt;P&gt;name 10.153.11.133 zeacom&lt;/P&gt;&lt;P&gt;name 10.153.11.183 helpdesk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;nameif Internet_AAPT&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address xxx.xxx.xxx.222 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;nameif Server_Network&lt;/P&gt;&lt;P&gt;security-level 90&lt;/P&gt;&lt;P&gt;ip address 10.153.11.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;nameif Internal_Network&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.153.111.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.153.100.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST 10&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring last Sun Oct 2:00 last Sun Mar 3:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name prosum.local&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group service proxy tcp&lt;/P&gt;&lt;P&gt;description port 8080&lt;/P&gt;&lt;P&gt;port-object eq 8080&lt;/P&gt;&lt;P&gt;object-group service OWA tcp&lt;/P&gt;&lt;P&gt;description Outlook Web Access Port&lt;/P&gt;&lt;P&gt;port-object eq 987&lt;/P&gt;&lt;P&gt;object-group service FTP_ports_QNAP tcp&lt;/P&gt;&lt;P&gt;port-object range 55536 55550&lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit tcp any host xxx.xx.xxx.96 eq ftp &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit tcp any host xxx.xx.xxx.96 eq https &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit tcp any host xxx.xx.xxx.96 object-group FTP_ports_QNAP &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit tcp any interface Internet_AAPT object-group proxy &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit tcp any interface Internet_AAPT eq https &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit tcp any interface Internet_AAPT object-group OWA &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit tcp any interface Internet_AAPT eq smtp &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit tcp any interface Internet_AAPT eq pop3 &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit tcp any host xxx.xx.xxx.97 eq www &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit tcp any host xxx.xx.xxx.97 eq https &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_access_in extended permit ip any any inactive &lt;/P&gt;&lt;P&gt;access-list easyvpn_splitTunnelAcl standard permit 10.153.111.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list easyvpn_splitTunnelAcl standard permit 10.153.11.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internet_AAPT_1_cryptomap extended permit ip 10.153.111.0 255.255.255.0 Aecom_Melbourne 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;level errors&lt;/P&gt;&lt;P&gt;mtu Internet_AAPT 1500&lt;/P&gt;&lt;P&gt;mtu Server_Network 1500&lt;/P&gt;&lt;P&gt;mtu Internal_Network 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN_Pool 172.153.111.1-172.153.111.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.97 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.98 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.99 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.100 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.101 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.102 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.103 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.104 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.105 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.106 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.107 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.108 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.109 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp Internet_AAPT xxx.xxx.xxx.110 44d3.cafd.96fe alias&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Internet_AAPT) 1 interface&lt;/P&gt;&lt;P&gt;nat (Server_Network) 1 10.153.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Internal_Network) 1 10.153.111.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp interface smtp exc2010 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp interface pop3 exc2010 pop3 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 ftp QNAP ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 https QNAP https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp interface https exc2010 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp interface 8080 zeacom 8080 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp interface 987 exc2010 987 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55536 QNAP 55536 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55537 QNAP 55537 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55538 QNAP 55538 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55539 QNAP 55539 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55540 QNAP 55540 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55541 QNAP 55541 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55542 QNAP 55542 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55543 QNAP 55543 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55544 QNAP 55544 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55545 QNAP 55545 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55546 QNAP 55546 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55547 QNAP 55547 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55548 QNAP 55548 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55549 QNAP 55549 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 55550 QNAP 55550 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.97 www helpdesk www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.97 https helpdesk https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Server_Network,Internet_AAPT) tcp xxx.xxx.xxx.96 ftp-data QNAP ftp-data netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group Internet_AAPT_access_in in interface Internet_AAPT&lt;/P&gt;&lt;P&gt;route Internet_AAPT 0.0.0.0 0.0.0.0 203.174.178.221 1&lt;/P&gt;&lt;P&gt;route management 10.153.11.0 255.255.255.0 10.153.100.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server ADAuth protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server ADAuth (Server_Network) host 10.153.11.190&lt;/P&gt;&lt;P&gt;ldap-base-dn DC=prosum,DC=local&lt;/P&gt;&lt;P&gt;ldap-scope subtree&lt;/P&gt;&lt;P&gt;ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt;ldap-login-password *****&lt;/P&gt;&lt;P&gt;ldap-login-dn CN=Administrator,CN=Users,DC=prosum,DC=local&lt;/P&gt;&lt;P&gt;server-type microsoft&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.153.0.0 255.255.0.0 management&lt;/P&gt;&lt;P&gt;http 10.153.111.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.153.0.0 255.255.0.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map Internet_AAPT_map 1 match address Internet_AAPT_1_cryptomap&lt;/P&gt;&lt;P&gt;crypto map Internet_AAPT_map 1 set pfs group1&lt;/P&gt;&lt;P&gt;crypto map Internet_AAPT_map 1 set peer&amp;nbsp; &lt;/P&gt;&lt;P&gt;crypto map Internet_AAPT_map 1 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map Internet_AAPT_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map Internet_AAPT_map interface Internet_AAPT&lt;/P&gt;&lt;P&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;/P&gt;&lt;P&gt;crl configure&lt;/P&gt;&lt;P&gt;crypto isakmp enable Internet_AAPT&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication crack&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt;authentication rsa-sig&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 40&lt;/P&gt;&lt;P&gt;authentication crack&lt;/P&gt;&lt;P&gt;encryption aes-192&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 50&lt;/P&gt;&lt;P&gt;authentication rsa-sig&lt;/P&gt;&lt;P&gt;encryption aes-192&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 60&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption aes-192&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 70&lt;/P&gt;&lt;P&gt;authentication crack&lt;/P&gt;&lt;P&gt;encryption aes&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 80&lt;/P&gt;&lt;P&gt;authentication rsa-sig&lt;/P&gt;&lt;P&gt;encryption aes&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 90&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption aes&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 100&lt;/P&gt;&lt;P&gt;authentication crack&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 110&lt;/P&gt;&lt;P&gt;authentication rsa-sig&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 120&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 130&lt;/P&gt;&lt;P&gt;authentication crack&lt;/P&gt;&lt;P&gt;encryption des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 140&lt;/P&gt;&lt;P&gt;authentication rsa-sig&lt;/P&gt;&lt;P&gt;encryption des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 150&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 10.153.0.0 255.255.0.0 Internal_Network&lt;/P&gt;&lt;P&gt;telnet 10.153.100.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 1&lt;/P&gt;&lt;P&gt;dhcp-client client-id interface Internet_AAPT&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp server 192.189.54.17 source management prefer&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy easyvpn internal&lt;/P&gt;&lt;P&gt;group-policy easyvpn attributes&lt;/P&gt;&lt;P&gt;dns-server value 10.153.11.190&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value easyvpn_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value prosum.local&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy2 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy2 attributes&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec l2tp-ipsec &lt;/P&gt;&lt;P&gt;group-policy GroupPolicy1 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy1 attributes&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec l2tp-ipsec &lt;/P&gt;&lt;P&gt;split-dns value prosum.local &lt;/P&gt;&lt;P&gt;tunnel-group "IPSEC VPN Client" type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group "IPSEC VPN Client" general-attributes&lt;/P&gt;&lt;P&gt;address-pool (Internet_AAPT) VPN_Pool&lt;/P&gt;&lt;P&gt;authentication-server-group ADAuth LOCAL&lt;/P&gt;&lt;P&gt;authentication-server-group (Server_Network) ADAuth LOCAL&lt;/P&gt;&lt;P&gt;authorization-server-group ADAuth&lt;/P&gt;&lt;P&gt;authorization-server-group (Server_Network) ADAuth&lt;/P&gt;&lt;P&gt;default-group-policy GroupPolicy1&lt;/P&gt;&lt;P&gt;password-management password-expire-in-days 5&lt;/P&gt;&lt;P&gt;tunnel-group "IPSEC VPN Client" ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group "IPSEC VPN Client" ppp-attributes&lt;/P&gt;&lt;P&gt;authentication pap&lt;/P&gt;&lt;P&gt;authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;authentication eap-proxy&lt;/P&gt;&lt;P&gt;tunnel-group TunnelGroup1 type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group TunnelGroup1 general-attributes&lt;/P&gt;&lt;P&gt;default-group-policy GroupPolicy2&lt;/P&gt;&lt;P&gt;tunnel-group TunnelGroup1 ppp-attributes&lt;/P&gt;&lt;P&gt;authentication pap&lt;/P&gt;&lt;P&gt;no authentication chap&lt;/P&gt;&lt;P&gt;no authentication ms-chap-v1&lt;/P&gt;&lt;P&gt;tunnel-group easyvpn type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group easyvpn general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPN_Pool&lt;/P&gt;&lt;P&gt;authentication-server-group ADAuth&lt;/P&gt;&lt;P&gt;default-group-policy easyvpn&lt;/P&gt;&lt;P&gt;tunnel-group easyvpn ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptoc&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:06:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924372#M437098</guid>
      <dc:creator>dino-chirico</dc:creator>
      <dc:date>2019-03-11T23:06:15Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924373#M437099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dino,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check the IP addressing in your internal lan, and verify if there are any IP address conflicts due to which it is showing the log, the configuration looks good to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2012 08:13:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924373#M437099</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-05-14T08:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924374#M437100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi varun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have check and I have 10.153.11.0/24 and 10.153.12.0/24 definately not the 10.153.111.0/24 range. When I send a packet from say 10.153.11.190 the log shows about the server LAN. Does make sense. Anything else? I can't use this internal LAN at all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2012 09:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924374#M437100</guid>
      <dc:creator>dino-chirico</dc:creator>
      <dc:date>2012-05-14T09:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924375#M437101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please run a packet-tracer and respond to this thread with the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer in Internal_Network tcp 10.153.111.50 http 8.8.8.8 http det&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards, &lt;BR /&gt; &lt;BR /&gt;Kevin &lt;BR /&gt; &lt;BR /&gt;**Please remember to rate helpful posts as well as mark the question as 'answered' once your issue is resolved. This will help others to find your solution faster.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2012 20:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924375#M437101</guid>
      <dc:creator>Kevin P Sheahan</dc:creator>
      <dc:date>2012-05-14T20:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924376#M437102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kevin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the packet trace&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA01# packet-tracer in Internal_Network tcp 10.153.111.50 http 8.8.8.8 http d$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in   0.0.0.0         0.0.0.0         Internet_AAPT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;in  id=0xab95e6d0, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;        hits=236, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;in  id=0xab8c7848, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;        hits=75711, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 77767, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Module information for forward flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Internal_Network&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: Internet_AAPT&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dino Chirico | IT Manager&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;T: 03 9697 2222 | F: 03 9697 2200 | M: 04 0745 4600&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;W: Prosum.com.au | E: Dino.Chirico@prosum.com.au&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A: 6 Ross Street , South Melbourne 3205&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="cid:logo29.gif"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="cid:company24823.jpg"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Disclaimer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This message may contain confidential, proprietary or legally privileged information and is intended only for the individual named. No confidentiality or privilege is waived or lost by mistaken transmission. If you are not the named addressee you should not disseminate, distribute, copy or disclose its contents to anyone. Please notify the sender immediately by e-mail if you have received this e-mail in error and delete all copies and destroy any hard copies from your system. PABX Sales and Service Pty Ltd Trading as Prosum of 6 Ross Street South Melbourne ABN 53 087 133 702 and any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. Any views expressed in this message are those of the individual sender, except where the message states otherwise and the sender is authorized to state them to be the views of any such entity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="cid:company218be.jpg"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2012 20:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924376#M437102</guid>
      <dc:creator>dino-chirico</dc:creator>
      <dc:date>2012-05-14T20:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924377#M437103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Asa is not your problem. What other devices are in play here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2012 20:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924377#M437103</guid>
      <dc:creator>Kevin P Sheahan</dc:creator>
      <dc:date>2012-05-14T20:40:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924378#M437104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a HP switch that is doing the routing for the different subnets and is the default gateway&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2012 21:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924378#M437104</guid>
      <dc:creator>dino-chirico</dc:creator>
      <dc:date>2012-05-14T21:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924379#M437105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Setup a capture to see if the packets are even getting to the ASA, because I think if they do they will go out as desired. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list cap extended permit ip 10.53.111.0  255.255.255.0 any &lt;/P&gt;&lt;P&gt;Capture cap cap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Initiate traffic with the capture running and then check it out by issuing the following command....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sho cap cap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If nothing is there then the packets are not making it to your Asa and you need too look at your switch as the offending device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let us know how it goes!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2012 23:24:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924379#M437105</guid>
      <dc:creator>Kevin P Sheahan</dc:creator>
      <dc:date>2012-05-14T23:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924380#M437106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok so I did below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Capture cap access-list cap right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result after trying to browse from 10.153.111.0 subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA01# sh cap cap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did another capture for the 10.153.111.0 network and also got 0 packets as above, I did the commands below???? I know the ASA is passing through traffic… is what I did above right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap2 extended permit ip 10.53.11.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;capture cap2 access-list cap2&lt;/P&gt;&lt;P&gt;ASA01# sh capture cap2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the HP switch config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HP_SWITCH_2650# sh run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Running configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;; J8165A Configuration Editor; Created on release #H.10.38&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname "HP_SWITCH_2650"&lt;/P&gt;&lt;P&gt;max-vlans 253&lt;/P&gt;&lt;P&gt;ip routing&lt;/P&gt;&lt;P&gt;snmp-server community "public" Unrestricted&lt;/P&gt;&lt;P&gt;vlan 1&lt;/P&gt;&lt;P&gt;   name "DEFAULT_VLAN"&lt;/P&gt;&lt;P&gt;   ip address dhcp-bootp&lt;/P&gt;&lt;P&gt;   no untagged 1-50&lt;/P&gt;&lt;P&gt;   exit&lt;/P&gt;&lt;P&gt;vlan 11&lt;/P&gt;&lt;P&gt;   name "Servers"&lt;/P&gt;&lt;P&gt;   untagged 7,10,15-16,42,47-48&lt;/P&gt;&lt;P&gt;   ip address 10.153.11.1 255.255.255.0&lt;/P&gt;&lt;P&gt;   tagged 44,50&lt;/P&gt;&lt;P&gt;   exit&lt;/P&gt;&lt;P&gt;vlan 12&lt;/P&gt;&lt;P&gt;   name "Voice"&lt;/P&gt;&lt;P&gt;   untagged 1-2,25&lt;/P&gt;&lt;P&gt;   ip address 10.153.12.1 255.255.255.0&lt;/P&gt;&lt;P&gt;   ip helper-address 10.153.11.190&lt;/P&gt;&lt;P&gt;   tagged 3-24,26-50&lt;/P&gt;&lt;P&gt;   exit&lt;/P&gt;&lt;P&gt;vlan 13&lt;/P&gt;&lt;P&gt;   name "1801 VLAN 1"&lt;/P&gt;&lt;P&gt;   untagged 17-18&lt;/P&gt;&lt;P&gt;   ip address 10.153.13.1 255.255.255.0&lt;/P&gt;&lt;P&gt;   exit&lt;/P&gt;&lt;P&gt;vlan 15&lt;/P&gt;&lt;P&gt;   name "Cisco Voice"&lt;/P&gt;&lt;P&gt;   untagged 6&lt;/P&gt;&lt;P&gt;   ip address 10.153.15.5 255.255.255.0&lt;/P&gt;&lt;P&gt;   exit&lt;/P&gt;&lt;P&gt;vlan 30&lt;/P&gt;&lt;P&gt;   name "Lab Network"&lt;/P&gt;&lt;P&gt;   ip address 10.153.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt;   ip helper-address 10.153.11.191&lt;/P&gt;&lt;P&gt;   exit&lt;/P&gt;&lt;P&gt;vlan 40&lt;/P&gt;&lt;P&gt;   name "Lync"&lt;/P&gt;&lt;P&gt;   untagged 49&lt;/P&gt;&lt;P&gt;   ip address 10.153.40.1 255.255.255.0&lt;/P&gt;&lt;P&gt;   ip helper-address 10.153.11.190&lt;/P&gt;&lt;P&gt;   exit&lt;/P&gt;&lt;P&gt;vlan 100&lt;/P&gt;&lt;P&gt;   name "Management"&lt;/P&gt;&lt;P&gt;   untagged 44,46&lt;/P&gt;&lt;P&gt;   ip address 10.153.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;   tagged 50&lt;/P&gt;&lt;P&gt;   exit&lt;/P&gt;&lt;P&gt;vlan 111&lt;/P&gt;&lt;P&gt;   name "Data"&lt;/P&gt;&lt;P&gt;   untagged 3-5,8-9,11-14,19-24,26-35,37-41,43,45,50&lt;/P&gt;&lt;P&gt;   ip address 10.153.111.1 255.255.255.0&lt;/P&gt;&lt;P&gt;   ip helper-address 10.153.11.190&lt;/P&gt;&lt;P&gt;   exit&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.153.11.254&lt;/P&gt;&lt;P&gt;spanning-tree&lt;/P&gt;&lt;P&gt;password manager&lt;/P&gt;&lt;P&gt;password operator&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dino Chirico | IT Manager&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;T: 03 9697 2222 | F: 03 9697 2200 | M: 04 0745 4600&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;W: Prosum.com.au | E: Dino.Chirico@prosum.com.au&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A: 6 Ross Street , South Melbourne 3205&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="cid:logo5953.gif"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="cid:company212e0.jpg"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Disclaimer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This message may contain confidential, proprietary or legally privileged information and is intended only for the individual named. No confidentiality or privilege is waived or lost by mistaken transmission. If you are not the named addressee you should not disseminate, distribute, copy or disclose its contents to anyone. Please notify the sender immediately by e-mail if you have received this e-mail in error and delete all copies and destroy any hard copies from your system. PABX Sales and Service Pty Ltd Trading as Prosum of 6 Ross Street South Melbourne ABN 53 087 133 702 and any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. Any views expressed in this message are those of the individual sender, except where the message states otherwise and the sender is authorized to state them to be the views of any such entity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="cid:company2697e.jpg"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2012 00:48:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924380#M437106</guid>
      <dc:creator>dino-chirico</dc:creator>
      <dc:date>2012-05-15T00:48:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924381#M437107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Your log message indicates that the packets are being received on the Server_Network interface which leads me to believe that they are being sent out by the HP switch on the default route, which is to the server_network interface on your ASA. So that makes sense, and I'll bet that if you change your default route to hit the ASA on the internal_network interface (10.153.111.254) your internal_network will function properly but your server_network will suffer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not so familiar with HP switches that I can recommend a fix for this, perhaps someone who is also HP savvy will come along to offer some help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**Please remember to rate helpful posts as well as mark the question as 'answered' once your issue is resolved. This will help others to find your solution faster.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2012 01:16:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924381#M437107</guid>
      <dc:creator>Kevin P Sheahan</dc:creator>
      <dc:date>2012-05-15T01:16:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 internal network cannot connect to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924382#M437108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;It was due to the HP switch. I removed the IP’s for the switch making it Layer 2 and used the ASA as the gateway for each VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dino Chirico | IT Manager&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;T: 03 9697 2222 | F: 03 9697 2200 | M: +61 (407) 454600&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;W: Prosum.com.au | E: Dino.Chirico@prosum.com.au&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A: 6 Ross Street , South Melbourne 3205&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="cid:logo10f1.gif"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="cid:company24cb9.jpg"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Disclaimer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This message may contain confidential, proprietary or legally privileged information and is intended only for the individual named. No confidentiality or privilege is waived or lost by mistaken transmission. If you are not the named addressee you should not disseminate, distribute, copy or disclose its contents to anyone. Please notify the sender immediately by e-mail if you have received this e-mail in error and delete all copies and destroy any hard copies from your system. PABX Sales and Service Pty Ltd Trading as Prosum of 6 Ross Street South Melbourne ABN 53 087 133 702 and any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. Any views expressed in this message are those of the individual sender, except where the message states otherwise and the sender is authorized to state them to be the views of any such entity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="cid:company2167.jpg"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 04:08:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-network-cannot-connect-to-internet/m-p/1924382#M437108</guid>
      <dc:creator>dino-chirico</dc:creator>
      <dc:date>2012-05-24T04:08:47Z</dc:date>
    </item>
  </channel>
</rss>

