<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 Unable to Get To Internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815453#M489853</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct this is an outbound connection, but, do any inbound ports need to be opened for the Cisco van client to work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Jan 2012 00:44:00 GMT</pubDate>
    <dc:creator>marcbilyou</dc:creator>
    <dc:date>2012-01-02T00:44:00Z</dc:date>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815442#M489838</link>
      <description>&lt;P&gt;First time attempting to set up a 5505.&amp;nbsp; Trying to replace a snapgear firewall and replicate the settings to the 5505.&amp;nbsp; The config is below...thanks in advance !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switchport access vlan 12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address 71.x.x.x 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;description Test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif Test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address 192.8.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name-server 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name-server 8.8.4.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq lpd &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 9100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq pcanywhere-data &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 5632 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 563 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 1658 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2462 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2463 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2464 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2466 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2470 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2474 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2459 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2460 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2475 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2471 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2484 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2485 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2458 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2465 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2473 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2476 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2490 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2491 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2472 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2467 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2468 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 5555 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2493 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2461 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2494 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq ftp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 2469 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu Test 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool Root_Address_Pool 192.168.1.250-192.168.1.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface lpd 192.168.1.75 lpd netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 9100 192.168.1.75 9100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface pcanywhere-data 192.168.1.77 pcanywhere-data netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5632 192.168.1.77 5632 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 563 192.168.1.207 563 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 1658 192.168.1.207 1658 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2462 192.168.1.67 2462 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2463 192.168.1.105 2463 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2464 192.168.1.98 2464 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2466 192.168.1.96 2466 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2470 192.168.1.70 2470 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2474 192.168.1.97 2474 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2459 192.168.1.102 2459 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2460 192.168.1.104 2460 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2475 192.168.1.90 2475 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2471 192.168.1.76 2471 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2484 192.168.1.77 2484 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2485 192.168.1.108 2485 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2458 192.168.1.153 2458 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2465 192.168.1.156 2465 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2473 192.168.1.247 2473 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2476 192.168.1.71 2476 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2490 192.168.1.174 2490 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2491 192.168.1.90 2491 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2472 192.168.1.171 2472 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2467 192.168.1.110 2467 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2468 192.168.1.121 2468 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5555 192.168.1.109 5555 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2493 192.168.1.133 2493 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2461 192.168.1.185 2461 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.1.133 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2494 192.168.1.143 2494 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp 192.168.1.133 ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2469 192.168.1.161 2469 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 71.x.x.x 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.160-192.168.1.170 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;svc enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy root internal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy root attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol svc &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username marc password SOoNa5RWkx5P2AUX encrypted privilege 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username marc attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpn-group-policy root&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group SSL_VPN type remote-access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group SSL_VPN general-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;address-pool Root_Address_Pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;default-group-policy root&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cryptochecksum:af8a84dd9c2857610b44de42ce9d056e&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815442#M489838</guid>
      <dc:creator>marcbilyou</dc:creator>
      <dc:date>2019-03-11T22:07:49Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815443#M489839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Marc,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are unable to go to the internet from witch interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface vlan 1 seems to have all the configuration required to go out, now regarding vlan 12 you are missing the nat configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (test) 1 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should do it,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 01:58:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815443#M489839</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-29T01:58:34Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815444#M489840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sorry I didnt specify, I cannot get out when directly connected to vlan 1 on port 6.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 02:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815444#M489840</guid>
      <dc:creator>marcbilyou</dc:creator>
      <dc:date>2011-12-29T02:20:36Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815445#M489841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Marc,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok lets do some troubleshooting questions on this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Can you ping from the ASA to the default gateway DSL&lt;/P&gt;&lt;P&gt;2-Can you ping from the ASA to 4.2.2.2&lt;/P&gt;&lt;P&gt;3-Can you ping from the computer conected to port 6 to the ASA inside interface&lt;/P&gt;&lt;P&gt;4- Provide the following output&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.1.15 1025 4.2.2.2 80&lt;/P&gt;&lt;P&gt;5-What dns are you using ( If local please use 4.2.2.2 and try it one more time)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be more than glad to help, so please provide the answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 06:28:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815445#M489841</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-29T06:28:40Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815446#M489842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I took the unit offsite, changed the outside address, and all worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The site that doesnt work uses an Actiontec Modem from Fios, is there any configuration which would need to be done on that end?&amp;nbsp; Or how would I troubleshoot this new scenario?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much for all of your help with this.......&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 14:25:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815446#M489842</guid>
      <dc:creator>marcbilyou</dc:creator>
      <dc:date>2011-12-29T14:25:20Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815447#M489843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Have you tried rebooting the Actiontec Modem and any other devices in the path after connecting ASA5505 inplace of snapgear firewall? The clears the ARP on the provider modem. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 14:52:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815447#M489843</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2011-12-29T14:52:34Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815448#M489844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately I did already.&amp;nbsp; No luck.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 15:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815448#M489844</guid>
      <dc:creator>marcbilyou</dc:creator>
      <dc:date>2011-12-29T15:05:59Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815449#M489845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Marc,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good thing is that as I told you previously the configuration on the ASA is good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now regarding the new issue as MS suggested its looks like an arp issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 2&lt;/P&gt;&lt;P&gt;ip address 2.2.2.2 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address 71.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will generate a gratitiuos arp, the Modem will got to learn that the ip address 71.x.x.x.x has the mac address of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Dec 2011 16:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815449#M489845</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-29T16:01:20Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815450#M489846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so i took the actiontek out of the equation and all is working.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The only problem I have left that I found so far is that when I try to connect to someones remote VPN from inside our network, I am unable to establish a connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Cisco VPN client is set to use the default port 10000.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I open the firewall up so that it will allow this outgoing connection?&amp;nbsp; Thanks again !!!!!!!!!!!!!!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jan 2012 18:57:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815450#M489846</guid>
      <dc:creator>marcbilyou</dc:creator>
      <dc:date>2012-01-01T18:57:42Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815451#M489847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your Inside address range and Remote access ip pool are in the same range..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool Root_Address_Pool 192.168.1.250-192.168.1.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will cause access issues. cTry changing the remote access pool range to diff. range ..192.168.20.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jan 2012 20:33:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815451#M489847</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2012-01-01T20:33:58Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815452#M489849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Marc,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this is an outbound connection, you do not have any ACL&amp;nbsp; to te inside interface of the ASA, so all the communication being started on this side should&amp;nbsp; be accepted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2012 00:10:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815452#M489849</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-02T00:10:22Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815453#M489853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct this is an outbound connection, but, do any inbound ports need to be opened for the Cisco van client to work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2012 00:44:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815453#M489853</guid>
      <dc:creator>marcbilyou</dc:creator>
      <dc:date>2012-01-02T00:44:00Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Unable to Get To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815454#M489854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Marc,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This seems to be a problem on the other side, You can create captures on your asa so you can confirm the packets are being delivered properly but you do not need to open something for the return traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jan 2012 17:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-unable-to-get-to-internet/m-p/1815454#M489854</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-02T17:51:46Z</dc:date>
    </item>
  </channel>
</rss>

