<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 8.4 DMZ cannot get to internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908629#M438080</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also this:&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside tcp 172.10.1.150 80 8.8.8.8 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Apr 2012 13:20:04 GMT</pubDate>
    <dc:creator>kpoon</dc:creator>
    <dc:date>2012-04-25T13:20:04Z</dc:date>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908620#M438065</link>
      <description>&lt;P&gt;WE have a DMZ on ASA5510 8.4, it can access anything internal&amp;nbsp; interface but cannot get out to internet or outside interface. &lt;/P&gt;&lt;P&gt;I try to ping from a host in the DMZ to 8.8.8.8 and get this in the log&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Apr 25 2012&lt;/TD&gt;&lt;TD&gt;08:24:43&lt;/TD&gt;&lt;TD&gt;110003&lt;/TD&gt;&lt;TD&gt;8.8.8.8&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;172.10.1.150&lt;/TD&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;TD&gt;Routing failed to locate next hop for ICMP from outside:8.8.8.8/0 to inside:172.10.1.150/1&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Please help. &lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here's the config:&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2)8 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;multicast-routing&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description xxxx shopInternet Connection&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 99.99.99.130 255.255.255.224 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description xxxx internal connection from firewall to switch&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description xxxx DMZ&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.10.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description Management Service-EEEE-40&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif E-40&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.40.86.248 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description management&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.199.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa842-8-k8.bin&lt;/P&gt;&lt;P&gt;boot system disk0:/asa824-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup DMZ&lt;/P&gt;&lt;P&gt;dns domain-lookup management&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; name-server 8.8.4.4&lt;/P&gt;&lt;P&gt; name-server 208.67.222.222&lt;/P&gt;&lt;P&gt; name-server 208.67.220.220&lt;/P&gt;&lt;P&gt; name-server 66.28.0.45&lt;/P&gt;&lt;P&gt; name-server 66.28.0.61&lt;/P&gt;&lt;P&gt; domain-name xxxxshop.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.0&lt;/P&gt;&lt;P&gt; subnet 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-10.40.86.0&lt;/P&gt;&lt;P&gt; subnet 10.40.86.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.99.0&lt;/P&gt;&lt;P&gt; subnet 192.168.99.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.13&lt;/P&gt;&lt;P&gt; host 192.168.1.13&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.13-01&lt;/P&gt;&lt;P&gt; host 192.168.1.13&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.13-02&lt;/P&gt;&lt;P&gt; host 192.168.1.13&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.70&lt;/P&gt;&lt;P&gt; host 172.30.1.70&lt;/P&gt;&lt;P&gt;object network obj-192.168.106.144&lt;/P&gt;&lt;P&gt; host 192.168.106.144&lt;/P&gt;&lt;P&gt;object network obj-192.168.106.144-01&lt;/P&gt;&lt;P&gt; host 192.168.106.144&lt;/P&gt;&lt;P&gt;object network obj-192.168.106.144-02&lt;/P&gt;&lt;P&gt; host 192.168.106.144&lt;/P&gt;&lt;P&gt;object network obj-192.168.10.2&lt;/P&gt;&lt;P&gt; host 192.168.10.2&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.50&lt;/P&gt;&lt;P&gt; host 172.30.1.50&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.40&lt;/P&gt;&lt;P&gt; host 172.30.1.40&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.10&lt;/P&gt;&lt;P&gt; host 192.168.1.10&lt;/P&gt;&lt;P&gt;object network obj-192.168.106.99&lt;/P&gt;&lt;P&gt; host 192.168.106.99&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.102&lt;/P&gt;&lt;P&gt; host 172.30.1.102&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.31&lt;/P&gt;&lt;P&gt; host 172.30.1.31&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.40-01&lt;/P&gt;&lt;P&gt; host 172.30.1.40&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.50-01&lt;/P&gt;&lt;P&gt; host 172.30.1.50&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.101&lt;/P&gt;&lt;P&gt; host 172.30.1.101&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-01&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj-0.0.0.0&lt;/P&gt;&lt;P&gt; host 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-02&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-03&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-04&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-05&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-06&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.0.0&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object service ftp&lt;/P&gt;&lt;P&gt; service tcp source range ftp-data ftp destination range ftp-data ftp &lt;/P&gt;&lt;P&gt;object network obj-192.168.1.15&lt;/P&gt;&lt;P&gt; host 192.168.1.15&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.15-01&lt;/P&gt;&lt;P&gt; host 192.168.1.15&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_172.30.1.0_24&lt;/P&gt;&lt;P&gt; subnet 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_172.31.2.0_24&lt;/P&gt;&lt;P&gt; subnet 172.31.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-172.10.1.136&lt;/P&gt;&lt;P&gt; host 172.10.1.136&lt;/P&gt;&lt;P&gt; description VCS Express 01 NIC 01&lt;/P&gt;&lt;P&gt;object network obj-172.10.1.0&lt;/P&gt;&lt;P&gt; subnet 172.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description DMZ&lt;/P&gt;&lt;P&gt;object network obj_any-08&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj-172.10.1.150&lt;/P&gt;&lt;P&gt; host 172.10.1.150&lt;/P&gt;&lt;P&gt;object-group service ExchangeOWA tcp&lt;/P&gt;&lt;P&gt; description Exchange Web and Mobile Access&lt;/P&gt;&lt;P&gt; port-object eq smtp&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt;object-group network admin-ip&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.199&lt;/P&gt;&lt;P&gt; network-object 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object host 192.168.106.99&lt;/P&gt;&lt;P&gt; network-object host Snapstream_ott&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.251&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.190&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.193&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.10&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.11&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.14&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.15&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.6&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.7&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.8&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.9&lt;/P&gt;&lt;P&gt; network-object host 192.168.2.199&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.13&lt;/P&gt;&lt;P&gt; network-object 192.168.99.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 172.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network approved-ip&lt;/P&gt;&lt;P&gt; network-object host 99.99.99.141&lt;/P&gt;&lt;P&gt; network-object 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network tms-ip&lt;/P&gt;&lt;P&gt;object-group service VNC tcp&lt;/P&gt;&lt;P&gt; description VNC&lt;/P&gt;&lt;P&gt; port-object eq 5900&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object-group service VNC-Listen tcp&lt;/P&gt;&lt;P&gt; description VNC-Listen Ports&lt;/P&gt;&lt;P&gt; port-object eq 5500&lt;/P&gt;&lt;P&gt;object-group service Streaming-ASF tcp-udp&lt;/P&gt;&lt;P&gt; description Streaming-ASF&lt;/P&gt;&lt;P&gt; port-object eq 1755&lt;/P&gt;&lt;P&gt;object-group service Streaming-ASF-TCP tcp&lt;/P&gt;&lt;P&gt; description Streaming-ASF-TCP&lt;/P&gt;&lt;P&gt; port-object eq 1755&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; group-object Streaming-ASF&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; group-object Streaming-ASF-TCP&lt;/P&gt;&lt;P&gt; port-object eq rtsp&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_5&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_4&lt;/P&gt;&lt;P&gt; network-object host 172.19.4.50&lt;/P&gt;&lt;P&gt; network-object 192.168.123.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_6&lt;/P&gt;&lt;P&gt; network-object host 172.19.4.50&lt;/P&gt;&lt;P&gt; network-object 192.168.123.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_7&lt;/P&gt;&lt;P&gt; network-object host 172.19.4.50&lt;/P&gt;&lt;P&gt; network-object 192.168.123.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_8&lt;/P&gt;&lt;P&gt; network-object host 99.99.99.141&lt;/P&gt;&lt;P&gt; network-object host 99.99.99.144&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt; port-object eq 8129&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_9&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_3 tcp&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq ftp-data&lt;/P&gt;&lt;P&gt;object-group network BypassFacebook&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.182&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.183&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.184&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.188&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.189&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.190&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.193&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.194&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.195&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.196&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.199&lt;/P&gt;&lt;P&gt; network-object host 192.168.1.200&lt;/P&gt;&lt;P&gt;object-group network Facebook&lt;/P&gt;&lt;P&gt; network-object 69.63.176.0 255.255.240.0&lt;/P&gt;&lt;P&gt; network-object 66.220.144.0 255.255.240.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host 10.40.86.102&lt;/P&gt;&lt;P&gt; network-object host 10.40.86.31&lt;/P&gt;&lt;P&gt; network-object host 10.40.86.40&lt;/P&gt;&lt;P&gt; network-object host 10.40.86.50&lt;/P&gt;&lt;P&gt; network-object host 10.40.86.101&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_3&lt;/P&gt;&lt;P&gt; network-object object obj-172.30.1.0&lt;/P&gt;&lt;P&gt; network-object object obj-192.168.0.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_12&lt;/P&gt;&lt;P&gt; network-object 10.4.86.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.40.86.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.70.86.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.96.86.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object ip &lt;/P&gt;&lt;P&gt; service-object tcp-udp destination eq sip &lt;/P&gt;&lt;P&gt; service-object tcp destination eq 1721 &lt;/P&gt;&lt;P&gt; service-object tcp destination eq h323 &lt;/P&gt;&lt;P&gt; service-object udp destination eq 1719 &lt;/P&gt;&lt;P&gt; service-object tcp-udp destination eq www &lt;/P&gt;&lt;P&gt; service-object tcp destination eq https &lt;/P&gt;&lt;P&gt; service-object udp destination eq www &lt;/P&gt;&lt;P&gt; service-object udp destination eq ntp &lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1_2&lt;/P&gt;&lt;P&gt; network-object host 172.30.1.102&lt;/P&gt;&lt;P&gt; network-object host 172.30.1.31&lt;/P&gt;&lt;P&gt; network-object host 172.30.1.40&lt;/P&gt;&lt;P&gt; network-object host 172.30.1.50&lt;/P&gt;&lt;P&gt; network-object host 172.30.1.101&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_1 extended permit ip 172.30.1.0 255.255.255.0 10.40.86.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_1 extended permit ip object-group DM_INLINE_NETWORK_3 192.168.99.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dzm extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list dzm extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list ouside extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list cont_in extended permit ip host 99.99.99.135 any &lt;/P&gt;&lt;P&gt;access-list Split_tunnel_ACL standard permit 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list Split_tunnel_ACL standard permit 172.30.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside extended permit tcp host 192.168.1.13 any eq smtp &lt;/P&gt;&lt;P&gt;access-list inside extended permit tcp any object-group DM_INLINE_NETWORK_9 eq smtp &lt;/P&gt;&lt;P&gt;access-list inside extended deny tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list inside extended deny tcp any any eq pop3 &lt;/P&gt;&lt;P&gt;access-list inside extended permit tcp any object-group DM_INLINE_NETWORK_5 eq pptp &lt;/P&gt;&lt;P&gt;access-list inside extended deny tcp any any eq pptp &lt;/P&gt;&lt;P&gt;access-list inside extended permit tcp object-group BypassFacebook object-group Facebook eq https &lt;/P&gt;&lt;P&gt;access-list inside extended deny tcp any object-group Facebook eq https &lt;/P&gt;&lt;P&gt;access-list inside extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_2 192.168.99.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.123.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 host 172.19.4.50 &lt;/P&gt;&lt;P&gt;access-list E-40_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside-out-acl extended permit ip object-group DM_INLINE_NETWORK_12 172.30.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside-out-acl extended permit ip object-group DM_INLINE_NETWORK_4 host 192.168.1.18 inactive &lt;/P&gt;&lt;P&gt;access-list inside-out-acl extended permit ip object-group DM_INLINE_NETWORK_6 host 192.168.1.19 inactive &lt;/P&gt;&lt;P&gt;access-list inside-out-acl extended deny ip object-group DM_INLINE_NETWORK_7 any inactive &lt;/P&gt;&lt;P&gt;access-list inside-out-acl extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list throttle_frontline extended permit ip host 74.213.162.33 any inactive &lt;/P&gt;&lt;P&gt;access-list throttle_frontline extended permit ip any host 74.213.162.33 inactive &lt;/P&gt;&lt;P&gt;access-list outside remark Migration, ACE (line 3) expanded: permit tcp any object-group DM_INLINE_NETWORK_8&lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 99.99.99.141 eq 8129 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 172.30.1.70 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 99.99.99.141 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 192.168.106.144 eq 8129 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 192.168.106.144 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 192.168.106.144 eq https &lt;/P&gt;&lt;P&gt;access-list outside remark Migration: End of expansion&lt;/P&gt;&lt;P&gt;access-list outside remark Migration, ACE (line 4) expanded: permit tcp any host 99.99.99.133 object-group ExchangeOWA&lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 192.168.1.13 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 192.168.1.13 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 192.168.1.13 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp object-group DM_INLINE_NETWORK_10 host 192.168.1.15 object-group DM_INLINE_TCP_3 &lt;/P&gt;&lt;P&gt;access-list outside remark Migration: End of expansion&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host 192.168.106.99 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 192.168.1.10 eq pptp &lt;/P&gt;&lt;P&gt;access-list outside extended permit gre any host 192.168.1.10 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 192.168.10.2 eq telnet inactive &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 172.30.1.40 object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip object-group tms-ip host 172.30.1.50 &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host 172.10.1.150 &lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip 172.30.1.0 255.255.255.0 172.31.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in_1 extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging facility 19&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.15 format emblem&lt;/P&gt;&lt;P&gt;logging permit-hostdown&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu E-40 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool xxxx-pool 192.168.99.1-192.168.99.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645-206.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-172.30.1.0 obj-172.30.1.0 destination static obj-10.40.86.0 obj-10.40.86.0 no-proxy-arp&lt;/P&gt;&lt;P&gt;nat&amp;nbsp; (inside,outside) source static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_3&amp;nbsp; destination static obj-192.168.99.0 obj-192.168.99.0 no-proxy-arp&amp;nbsp; route-lookup&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static&amp;nbsp; NETWORK_OBJ_172.30.1.0_24 NETWORK_OBJ_172.30.1.0_24 destination static&amp;nbsp; NETWORK_OBJ_172.31.2.0_24 NETWORK_OBJ_172.31.2.0_24 no-proxy-arp&amp;nbsp; route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.13&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.133 service tcp smtp smtp &lt;/P&gt;&lt;P&gt;object network obj-192.168.1.13-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.133 service tcp www www &lt;/P&gt;&lt;P&gt;object network obj-192.168.1.13-02&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.133 service tcp https https &lt;/P&gt;&lt;P&gt;object network obj-172.30.1.70&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.141 service tcp www www &lt;/P&gt;&lt;P&gt;object network obj-192.168.106.144&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.144 service tcp www www &lt;/P&gt;&lt;P&gt;object network obj-192.168.106.144-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.144 service tcp https https &lt;/P&gt;&lt;P&gt;object network obj-192.168.106.144-02&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.144 service tcp 8129 8129 &lt;/P&gt;&lt;P&gt;object network obj-192.168.10.2&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.132 service tcp telnet telnet &lt;/P&gt;&lt;P&gt;object network obj-172.30.1.50&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.134&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.40&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.139&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.10&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.137&lt;/P&gt;&lt;P&gt;object network obj-192.168.106.99&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.140&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.102&lt;/P&gt;&lt;P&gt; nat (inside,E-40) static 10.40.86.102&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.31&lt;/P&gt;&lt;P&gt; nat (inside,E-40) static 10.40.86.31&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.40-01&lt;/P&gt;&lt;P&gt; nat (inside,E-40) static 10.40.86.40&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.50-01&lt;/P&gt;&lt;P&gt; nat (inside,E-40) static 10.40.86.50&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.101&lt;/P&gt;&lt;P&gt; nat (inside,E-40) static 10.40.86.101&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj_any-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-02&lt;/P&gt;&lt;P&gt; nat (inside,DMZ) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-03&lt;/P&gt;&lt;P&gt; nat (inside,E-40) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-04&lt;/P&gt;&lt;P&gt; nat (management,outside) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-05&lt;/P&gt;&lt;P&gt; nat (management,DMZ) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-06&lt;/P&gt;&lt;P&gt; nat (management,E-40) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.15&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.138 service tcp ftp ftp &lt;/P&gt;&lt;P&gt;object network obj-192.168.1.15-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.138 service tcp ftp-data ftp-data &lt;/P&gt;&lt;P&gt;object network obj_any-08&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;access-group inside-out-acl out interface inside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in_1 in interface DMZ control-plane&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;access-group DMZ_access_out out interface DMZ&lt;/P&gt;&lt;P&gt;access-group 40_access_in in interface E-40&lt;/P&gt;&lt;P&gt;access-group E-40_access_out out interface E-40&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 99.99.99.129 1&lt;/P&gt;&lt;P&gt;route E-40 10.4.86.0 255.255.255.0 10.40.86.249 1&lt;/P&gt;&lt;P&gt;route E-40 10.70.86.0 255.255.255.0 10.40.86.249 1&lt;/P&gt;&lt;P&gt;route E-40 10.96.86.0 255.255.255.0 10.40.86.249 1&lt;/P&gt;&lt;P&gt;route inside 172.20.20.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 172.30.1.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.6.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.99.0 255.255.255.0 192.168.10.2 255&lt;/P&gt;&lt;P&gt;route inside 192.168.101.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.102.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.103.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.106.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.201.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 192.168.10.2 tunneled&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;http 172.10.1.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;http 192.168.199.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http redirect outside 80&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet 172.10.1.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;telnet 192.168.199.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;telnet timeout 15&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 172.10.1.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;ssh 192.168.199.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 10&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;vpn-sessiondb max-anyconnect-premium-or-essentials-limit 10&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.199.101-192.168.199.109 management&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.1.10 192.168.1.11 interface management&lt;/P&gt;&lt;P&gt;dhcpd &lt;/P&gt;&lt;P&gt; &lt;A href="http://www.tek-tips.com/viewthread.cfm?qid=1681413#" id="itxthook0" rel="nofollow" style="font-weight: normal; font-size: 100%; text-decoration: underline; border-bottom: 0.075em solid darkgreen; padding-bottom: 1px; color: darkgreen;" target="_blank"&gt;domain&lt;/A&gt;&lt;/P&gt;&lt;P&gt; xxxxshop.com interface management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;priority-queue outside&lt;/P&gt;&lt;P&gt;priority-queue inside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp server 192.168.1.10 source inside&lt;/P&gt;&lt;P&gt;ntp server 129.6.15.29 source outside prefer&lt;/P&gt;&lt;P&gt;ntp server 129.6.15.28 source outside preferEEEE&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-2.4.0202-k9.pkg 18&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-macosx-i386-2.4.0196-k9.pkg 20 regex "Intel Mac OS X"&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-linux-2.4.0202-k9.pkg 21 regex "Linux"&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; cache&lt;/P&gt;&lt;P&gt;&amp;nbsp; disable&lt;/P&gt;&lt;P&gt;group-policy xxxxIPsec internal&lt;/P&gt;&lt;P&gt;group-policy xxxxIPsec attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.13&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Split_tunnel_ACL&lt;/P&gt;&lt;P&gt; default-domain value xxxxshop.com&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.10 192.168.1.11&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 10&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Split_tunnel_ACL&lt;/P&gt;&lt;P&gt; default-domain value xxxxshop.com&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list value xxxxApps&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect ask enable default webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; hidden-shares visible&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_198.103.180.120 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_198.103.180.120 attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt;tunnel-groupppp DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool xxxx-pool&lt;/P&gt;&lt;P&gt; authentication-server-group radius LOCAL&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias DefaultRA enable&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool xxxx-pool&lt;/P&gt;&lt;P&gt; authentication-server-group radius LOCAL&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias DefaultWeb enable&lt;/P&gt;&lt;P&gt;tunnel-group xxxxIPsec type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group xxxxIPsec general-attributes&lt;/P&gt;&lt;P&gt; address-pool xxxx-pool&lt;/P&gt;&lt;P&gt; authentication-server-group radius LOCAL&lt;/P&gt;&lt;P&gt; default-group-policy xxxxIPsec&lt;/P&gt;&lt;P&gt;tunnel-group xxxxIPsec webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias xxxxIPSec enable&lt;/P&gt;&lt;P&gt; group-alias IPSec disable&lt;/P&gt;&lt;P&gt;tunnel-group xxxxIPsec ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group xxxxSSL type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group xxxxSSL general-attributes&lt;/P&gt;&lt;P&gt; address-pool xxxx-pool&lt;/P&gt;&lt;P&gt; authentication-server-group radius LOCAL&lt;/P&gt;&lt;P&gt;tunnel-group xxxxSSL webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias xxxxSSL enable&lt;/P&gt;&lt;P&gt; group-url &lt;/P&gt;&lt;P&gt; &lt;A href="https://99.99.99.130/xxxxSSL" rel="nofollow" target="_blank"&gt;https://99.99.99.130/xxxxSSL&lt;/A&gt;&lt;/P&gt;&lt;P&gt; enable&lt;/P&gt;&lt;P&gt;tunnel-group 1.1.1.120 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 1.1.1.120 general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_1.1.1.120&lt;/P&gt;&lt;P&gt;tunnel-group 1.1.1.120 ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map csc-class&lt;/P&gt;&lt;P&gt; match access-list cscTraffic&lt;/P&gt;&lt;P&gt;class-map throttle_frontline&lt;/P&gt;&lt;P&gt; match access-list throttle_frontline&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect sip DefaultSIP&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; max-forwards-validation action drop log&lt;/P&gt;&lt;P&gt;policy-map throttle-policy&lt;/P&gt;&lt;P&gt; class throttle_frontline&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 600000 2000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 600000 2000&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ipsec-pass-thru &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt; class csc-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; csc fail-open&lt;/P&gt;&lt;P&gt;policy-map type inspect h323 DefaultH323&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global-policy global&lt;/P&gt;&lt;P&gt;service-policy throttle-policy interface outside&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;/P&gt;&lt;P&gt; &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email &lt;/P&gt;&lt;P&gt; &lt;A href="mailto:callhome@cisco.com" rel="nofollow" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645-206.bin&lt;/P&gt;&lt;P&gt;asdm location 192.168.100.0 255.255.255.192 outside&lt;/P&gt;&lt;P&gt;asdm location 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;asdm location 192.168.123.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;asdm location 192.168.123.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;asdm location 192.168.111.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;asdm location 192.168.10.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;asdm location 192.168.10.254 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;asdm location 99.99.99.133 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;asdm location 192.168.1.16 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;asdm location 172.30.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;asdm location 172.30.1.50 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;asdm location 192.168.1.13 255.255.255.255 insideEEEE&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908620#M438065</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2019-03-11T22:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908621#M438067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems the traffic gets forwarded to totally wrong interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The destination network for the ICMP reply is directly connected to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still it gets forwarded to INSIDE instead of DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i guess you have some NAT configuration wrong. It also seems you have alot of strange NAT configurations. (0.0.0.0 objects)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 12:49:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908621#M438067</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-04-25T12:49:04Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908622#M438069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't this statement work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj_any-08&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't seem to pinpoint the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 12:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908622#M438069</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2012-04-25T12:54:16Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908623#M438071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess that should handle it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another configuration that you seem to have is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj_any-02&lt;/P&gt;&lt;P&gt; nat (inside,DMZ) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I'm not sure why you have it configured or what its supposed to do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you used the "packet-tracer" command on the ASA to see what happens for example to a TCP/80/http connection taken from DMZ to some random public IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 13:00:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908623#M438071</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-04-25T13:00:21Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908624#M438073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just noticed you have the DMZ network routed towards an IP address on your INSIDE interface? Why is that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description xxxx internal connection from firewall to switch&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description xxxx DMZ&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.10.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route DMZ 172.10.1.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 13:02:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908624#M438073</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-04-25T13:02:34Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908625#M438074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That route was removed last night., we were trying different things to figure out the problem. Sorry forgot to update the config txt file.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 13:05:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908625#M438074</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2012-04-25T13:05:20Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908626#M438075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;object network obj_any-02&lt;/P&gt;&lt;P&gt; nat (inside,DMZ) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was auto translated when we upgrade from 8.2 to 8.4. We hadn't touched anything since we started to deploy a DMZ. Should we remove it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've also done packet tracer and everything shows ok without problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 13:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908626#M438075</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2012-04-25T13:07:09Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908627#M438076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont usually let ASA generate the new 8.4 version configuration so I just write the configurations to my liking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just havent done a similiar configuration yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you post the output of the packet-tracer here when you issue it from the command line interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 13:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908627#M438076</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-04-25T13:10:39Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908628#M438077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure, here it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet-tracer input DMZ tcp 172.10.1.150 80 8.8.8.8 80&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: SSM-DIVERT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: SSM_SERVICE&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network obj_any-09&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) dynamic interface&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 172.10.1.150/80 to 38.103.153.130/434&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: SSM_SERVICE&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 73578100, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: DMZ&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 13:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908628#M438077</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2012-04-25T13:17:53Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908629#M438080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also this:&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside tcp 172.10.1.150 80 8.8.8.8 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 13:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908629#M438080</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2012-04-25T13:20:04Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908630#M438082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't really know why the ASA is saying the network would be behind the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first packet-tracer shows all working normally. The second one will naturally fail as you have source interface outside and the DMZ host isnt located behind it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For ICMP to go through in a normal situation without opening the outside access-lsit for the echo-replys you would need the following configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though in this situation it wont help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure what the tunnel default route is as I havent used it ever myself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 13:58:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908630#M438082</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-04-25T13:58:30Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908631#M438083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni, appreciate your help. Hopefully someone can figure it out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 14:02:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908631#M438083</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2012-04-25T14:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908632#M438085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; If your still getting the same error msg:&lt;/P&gt;&lt;P&gt;"Routing failed to locate next hop for ICMP from outside:8.8.8.8/0 to inside:172.10.1.150/1"&lt;/P&gt;&lt;P&gt;Try the route DMZ xxxx xxxx xxxx 2&lt;/P&gt;&lt;P&gt;as the "2" for metric if routing failed.&lt;/P&gt;&lt;P&gt;Usually you get an error for a route, if you already had a route with a "1" listed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 17:48:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908632#M438085</guid>
      <dc:creator>Rick Rowe</dc:creator>
      <dc:date>2012-04-25T17:48:59Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908633#M438087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see on the first packet tracer:&lt;/P&gt;&lt;P&gt;packet-tracer input DMZ tcp 172.10.1.150 80 8.8.8.8 80&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;That everything is good related to the ASA configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want the following outputs:&lt;/P&gt;&lt;P&gt;-Sh run nat&lt;/P&gt;&lt;P&gt;-Sh run route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also create the following captures&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capdmz interface dmz circular-buffer&lt;/P&gt;&lt;P&gt;capture capdmz match ip host 172.10.1.150 host 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capout interface outside circular-buffer&lt;/P&gt;&lt;P&gt;capture capout match ip host&amp;nbsp; 38.103.153.130 host 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then generate real traffic ( Not packet tracer) from 172.10.1.150 to 8.8.8.8 ( A ping would do it)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and post the show cap capout and show cap capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Do rate all the helpful posts,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 17:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908633#M438087</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-04-25T17:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4 DMZ cannot get to internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908634#M438089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's sh run nat:&lt;/P&gt;&lt;P&gt;ciscoasa# sh run nat&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-172.30.1.0 obj-172.30.1.0 destination static obj-10.40.86.0 obj-10.40.86.0 no-proxy-arp&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_3 destination static obj-192.168.99.0 obj-192.168.99.0 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static NETWORK_OBJ_172.30.1.0_24 NETWORK_OBJ_172.30.1.0_24 destination static NETWORK_OBJ_172.31.2.0_24 NETWORK_OBJ_172.31.2.0_24 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.13&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.133 service tcp smtp smtp &lt;/P&gt;&lt;P&gt;object network obj-192.168.1.13-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.133 service tcp www www &lt;/P&gt;&lt;P&gt;object network obj-192.168.1.13-02&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.133 service tcp https https &lt;/P&gt;&lt;P&gt;object network obj-172.30.1.70&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.141 service tcp www www &lt;/P&gt;&lt;P&gt;object network obj-192.168.106.144&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.144 service tcp www www &lt;/P&gt;&lt;P&gt;object network obj-192.168.106.144-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.144 service tcp https https &lt;/P&gt;&lt;P&gt;object network obj-192.168.106.144-02&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.144 service tcp 8129 8129 &lt;/P&gt;&lt;P&gt;object network obj-192.168.10.2&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.132 service tcp telnet telnet &lt;/P&gt;&lt;P&gt;object network obj-172.30.1.50&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.134&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.40&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.139&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.10&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.137&lt;/P&gt;&lt;P&gt;object network obj-192.168.106.99&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.140&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.102&lt;/P&gt;&lt;P&gt; nat (inside,E-40) static 10.40.86.102&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.31&lt;/P&gt;&lt;P&gt; nat (inside,E-40) static 10.40.86.31&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.40-01&lt;/P&gt;&lt;P&gt; nat (inside,E-40) static 10.40.86.40&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.50-01&lt;/P&gt;&lt;P&gt; nat (inside,E-40) static 10.40.86.50&lt;/P&gt;&lt;P&gt;object network obj-172.30.1.101&lt;/P&gt;&lt;P&gt; nat (inside,E-40) static 10.40.86.101&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj_any-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-03&lt;/P&gt;&lt;P&gt; nat (inside,E-40) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-04&lt;/P&gt;&lt;P&gt; nat (management,outside) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-05&lt;/P&gt;&lt;P&gt; nat (management,DMZ) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-06&lt;/P&gt;&lt;P&gt; nat (management,E-40) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.15&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.138 service tcp ftp ftp &lt;/P&gt;&lt;P&gt;object network obj-192.168.1.15-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.138 service tcp ftp-data ftp-data &lt;/P&gt;&lt;P&gt;object network obj_any-09&lt;/P&gt;&lt;P&gt; nat (DMZ,outside) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here's sh run route:&lt;/P&gt;&lt;P&gt;ciscoasa# sh run route&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 38.103.153.129 1&lt;/P&gt;&lt;P&gt;route E-40 10.4.86.0 255.255.255.0 10.40.86.249 1&lt;/P&gt;&lt;P&gt;route E-40 10.70.86.0 255.255.255.0 10.40.86.249 1&lt;/P&gt;&lt;P&gt;route E-40 10.96.86.0 255.255.255.0 10.40.86.249 1&lt;/P&gt;&lt;P&gt;route inside 172.20.20.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 172.30.1.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.6.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.99.0 255.255.255.0 192.168.10.2 255&lt;/P&gt;&lt;P&gt;route inside 192.168.101.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.102.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.103.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.106.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 192.168.201.0 255.255.255.0 192.168.10.2 1&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 192.168.10.2 tunneled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here's sh cap capout:&lt;/P&gt;&lt;P&gt;1988: 14:11:01.895659 38.103.153.130 &amp;gt; 8.8.8.8: icmp: echo request &lt;/P&gt;&lt;P&gt;1989: 14:11:01.921567 8.8.8.8.53 &amp;gt; 38.103.153.130.23510:&amp;nbsp; udp 183 &lt;/P&gt;&lt;P&gt;1990: 14:11:01.922117 38.103.153.130.29404 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 46 &lt;/P&gt;&lt;P&gt;1991: 14:11:01.922971 8.8.8.8.53 &amp;gt; 38.103.153.130.42987:&amp;nbsp; udp 183 &lt;/P&gt;&lt;P&gt;1992: 14:11:01.923551 38.103.153.130.4473 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 46 &lt;/P&gt;&lt;P&gt;1993: 14:11:01.932141 8.8.8.8 &amp;gt; 38.103.153.130: icmp: echo reply &lt;/P&gt;&lt;P&gt;1994: 14:11:01.952129 8.8.8.8.53 &amp;gt; 38.103.153.130.29404:&amp;nbsp; udp 157 &lt;/P&gt;&lt;P&gt;1995: 14:11:01.963084 38.103.153.130.8335 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 46 &lt;/P&gt;&lt;P&gt;1996: 14:11:01.963634 8.8.8.8.53 &amp;gt; 38.103.153.130.4473:&amp;nbsp; udp 157 &lt;/P&gt;&lt;P&gt;1997: 14:11:01.965236 38.103.153.130.58306 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 46 &lt;/P&gt;&lt;P&gt;1998: 14:11:01.966334 38.103.153.130.48999 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 46 &lt;/P&gt;&lt;P&gt;1999: 14:11:01.992578 8.8.8.8.53 &amp;gt; 38.103.153.130.8335:&amp;nbsp; udp 183 &lt;/P&gt;&lt;P&gt;2000: 14:11:01.993463 38.103.153.130.64168 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 46 &lt;/P&gt;&lt;P&gt;2001: 14:11:01.995615 8.8.8.8.53 &amp;gt; 38.103.153.130.58306:&amp;nbsp; udp 183 &lt;/P&gt;&lt;P&gt;2002: 14:11:01.995981 8.8.8.8.53 &amp;gt; 38.103.153.130.48999:&amp;nbsp; udp 183 &lt;/P&gt;&lt;P&gt;2003: 14:11:01.996271 38.103.153.130.26453 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 46 &lt;/P&gt;&lt;P&gt;2004: 14:11:01.996576 38.103.153.130.45822 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 46 &lt;/P&gt;&lt;P&gt;2005: 14:11:02.026777 8.8.8.8.53 &amp;gt; 38.103.153.130.26453:&amp;nbsp; udp 157 &lt;/P&gt;&lt;P&gt;2006: 14:11:02.035978 8.8.8.8.53 &amp;gt; 38.103.153.130.64168:&amp;nbsp; udp 157 &lt;/P&gt;&lt;P&gt;2007: 14:11:02.044370 8.8.8.8.53 &amp;gt; 38.103.153.130.45822:&amp;nbsp; udp 157 &lt;/P&gt;&lt;P&gt;2008: 14:11:02.443595 38.103.153.130.2912 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 59 &lt;/P&gt;&lt;P&gt;2009: 14:11:02.505634 8.8.8.8.53 &amp;gt; 38.103.153.130.2912:&amp;nbsp; udp 123 &lt;/P&gt;&lt;P&gt;2010: 14:11:02.517536 38.103.153.130.5549 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 57 &lt;/P&gt;&lt;P&gt;2011: 14:11:02.546923 8.8.8.8.53 &amp;gt; 38.103.153.130.5549:&amp;nbsp; udp 104 &lt;/P&gt;&lt;P&gt;2012: 14:11:02.548372 38.103.153.130.23158 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 65 &lt;/P&gt;&lt;P&gt;2013: 14:11:02.612334 8.8.8.8.53 &amp;gt; 38.103.153.130.23158:&amp;nbsp; udp 65 &lt;/P&gt;&lt;P&gt;2014: 14:11:02.624143 38.103.153.130.38857 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 57 &lt;/P&gt;&lt;P&gt;2015: 14:11:02.761099 8.8.8.8.53 &amp;gt; 38.103.153.130.38857:&amp;nbsp; udp 110 &lt;/P&gt;&lt;P&gt;2016: 14:11:02.762518 38.103.153.130.5218 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 59 &lt;/P&gt;&lt;P&gt;2017: 14:11:02.844911 8.8.8.8.53 &amp;gt; 38.103.153.130.5218:&amp;nbsp; udp 108 &lt;/P&gt;&lt;P&gt;2018: 14:11:02.846910 38.103.153.130.16398 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 80 &lt;/P&gt;&lt;P&gt;2019: 14:11:02.899321 8.8.8.8.53 &amp;gt; 38.103.153.130.16398:&amp;nbsp; udp 143 &lt;/P&gt;&lt;P&gt;2020: 14:11:03.353405 38.103.153.130.22221 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 44 &lt;/P&gt;&lt;P&gt;2021: 14:11:03.392191 8.8.8.8.53 &amp;gt; 38.103.153.130.22221:&amp;nbsp; udp 77 &lt;/P&gt;&lt;P&gt;2022: 14:11:03.393656 38.103.153.130.43410 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 44 &lt;/P&gt;&lt;P&gt;2023: 14:11:03.429985 8.8.8.8.53 &amp;gt; 38.103.153.130.43410:&amp;nbsp; udp 60 &lt;/P&gt;&lt;P&gt;2024: 14:11:05.213291 38.103.153.130.16398 &amp;gt; 8.8.8.8.53:&amp;nbsp; udp 79 &lt;/P&gt;&lt;P&gt;2025: 14:11:05.257310 8.8.8.8.53 &amp;gt; 38.103.153.130.16398:&amp;nbsp; udp 95 &lt;/P&gt;&lt;P&gt;2026: 14:11:06.903212 38.103.153.130 &amp;gt; 8.8.8.8: icmp: echo request &lt;/P&gt;&lt;P&gt;2027: 14:11:06.932126 8.8.8.8 &amp;gt; 38.103.153.130: icmp: echo reply &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here's sh cap capdmz:&lt;/P&gt;&lt;P&gt;ciscoasa# sh cap capdmz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 14:06:02.022352 802.3 encap packet &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 14:06:03.163001 802.3 encap packet &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 14:06:03.163077 802.3 encap packet &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 14:06:04.027143 802.3 encap packet &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 14:06:06.032133 802.3 encap packet &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 14:06:08.038755 802.3 encap packet &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 14:06:10.042127 802.3 encap packet &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 14:06:12.046719 802.3 encap packet &lt;/P&gt;&lt;P&gt;8 packets shown&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 18:08:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-dmz-cannot-get-to-internet/m-p/1908634#M438089</guid>
      <dc:creator>kpoon</dc:creator>
      <dc:date>2012-04-25T18:08:43Z</dc:date>
    </item>
  </channel>
</rss>

