<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access to internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-to-internet/m-p/1911915#M458425</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HiEduardo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try to explain it via an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INSIDE(172.16.0.0/24) ----- (172.16.0.1) ASA (1.1.1.1) ----- Internet ----- Google(200.200.200.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If users from INSIDE wants to hit internet they will be going through the a PAT on the interface. I am right?&lt;/P&gt;&lt;P&gt;So if you are adding access-list in OUT direction:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUT extended permit ip 172.16.x.x 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-group OUT out interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; then their is an implicit deny which will deny your natted IP 1.1.1.1. So thats why you cannot reach to internet. &lt;/P&gt;&lt;P&gt;Use packet-tracer to confirm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the best option will be allow specfic private addresses on INSIDE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regard,&lt;/P&gt;&lt;P&gt;Adesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Mar 2012 19:43:08 GMT</pubDate>
    <dc:creator>Adesh Gairola</dc:creator>
    <dc:date>2012-03-07T19:43:08Z</dc:date>
    <item>
      <title>Access to internet</title>
      <link>https://community.cisco.com/t5/network-security/access-to-internet/m-p/1911913#M458423</link>
      <description>&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been configuring a cisco ASA 5520, everything is working fine but when i create an ACL: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUT extended permit ip 172.16.x.x 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-group OUT out interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i added ports like www or 443 and it is not working to Internet access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a router is before to my firewall connected to my headquater, i can see my private networks but i cannot able to reach Internet access,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could you please help me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-internet/m-p/1911913#M458423</guid>
      <dc:creator>Julio E. Moisa</dc:creator>
      <dc:date>2019-03-11T22:39:12Z</dc:date>
    </item>
    <item>
      <title>Access to internet</title>
      <link>https://community.cisco.com/t5/network-security/access-to-internet/m-p/1911914#M458424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eduardo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What about the Nat statements, can you provide your Configuration so we can check it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2012 17:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-internet/m-p/1911914#M458424</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-03-07T17:37:02Z</dc:date>
    </item>
    <item>
      <title>Access to internet</title>
      <link>https://community.cisco.com/t5/network-security/access-to-internet/m-p/1911915#M458425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HiEduardo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try to explain it via an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INSIDE(172.16.0.0/24) ----- (172.16.0.1) ASA (1.1.1.1) ----- Internet ----- Google(200.200.200.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If users from INSIDE wants to hit internet they will be going through the a PAT on the interface. I am right?&lt;/P&gt;&lt;P&gt;So if you are adding access-list in OUT direction:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUT extended permit ip 172.16.x.x 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-group OUT out interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; then their is an implicit deny which will deny your natted IP 1.1.1.1. So thats why you cannot reach to internet. &lt;/P&gt;&lt;P&gt;Use packet-tracer to confirm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the best option will be allow specfic private addresses on INSIDE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regard,&lt;/P&gt;&lt;P&gt;Adesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2012 19:43:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-internet/m-p/1911915#M458425</guid>
      <dc:creator>Adesh Gairola</dc:creator>
      <dc:date>2012-03-07T19:43:08Z</dc:date>
    </item>
    <item>
      <title>Access to internet</title>
      <link>https://community.cisco.com/t5/network-security/access-to-internet/m-p/1911916#M458430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hope it is same as below,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside----ASA----router---internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allow DNS with http and 443 and it is better to apply access-list on the inside interface IN direction rather than applying on outside interface out direction&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnaks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2012 19:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-internet/m-p/1911916#M458430</guid>
      <dc:creator>jack samuel</dc:creator>
      <dc:date>2012-03-07T19:58:06Z</dc:date>
    </item>
  </channel>
</rss>

