<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Internet access and a question... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/internet-access-and-a-question/m-p/1830609#M491499</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; wow... that was quick and it works!!!! thank you Julio...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;did you see the other question?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I inherited this firewall from a previous admin who was dismissed... but something I noticed that does not make sense... and it has to do with a rule on the inside interface located right above my any - any implicit deny... and that is.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;doesn't this negate the implicit deny? is this safe to allow any-any ip?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Dec 2011 20:22:38 GMT</pubDate>
    <dc:creator>David Hunt</dc:creator>
    <dc:date>2011-12-07T20:22:38Z</dc:date>
    <item>
      <title>Internet access and a question...</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-and-a-question/m-p/1830607#M491496</link>
      <description>&lt;P&gt;Hello Friends...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having issues with PC's in my DMZ to gain access to the internet...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I saw a post about a week ago with a simular issue, I added the rule that was recommended... and no change... so..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a PC with an IP address of 10.1.1.50/24 and a gateway address of 10.1.1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From this DMZ... I can ping the gateway and also 10.11.144.3 which is my DNS \ AD server...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below is the config.... any ideas on what is stopping the PC in the DMZ to gain access to the internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I inherited this firewall from a previous admin who was dismissed... but something I noticed that does not make sense... and it has to do with a rule on the inside interface located right about my any - any implicit deny... and that is..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;doesn't this negate the implicit deny? is this safe to allow any-any ip?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname XXXX&lt;BR /&gt;domain-name XXXX.org&lt;BR /&gt;enable password wZJefsykk8VmlkFg encrypted&lt;BR /&gt;passwd wZJefsykk8VmlkFg encrypted&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 66.x.x.70 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;speed 100&lt;BR /&gt;duplex full&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.11.144.253 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;speed 100&lt;BR /&gt;duplex full&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 10&lt;BR /&gt;ip address 10.1.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;time-range Always&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/disk0asa727-k8.bin&lt;BR /&gt;boot system disk0:/asa824-k8.bin&lt;BR /&gt;boot system disk0:/asa824-k8,bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name xxxx.org&lt;BR /&gt;object-group service DM_INLINE_TCP_0 tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq 2534&lt;BR /&gt;port-object eq 2533&lt;BR /&gt;port-object range 2701 2750&lt;BR /&gt;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt;network-object host 66.x.x.77&lt;BR /&gt;network-object host 66.x.x.78&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt;network-object host 60.x.x.77&lt;BR /&gt;network-object host 66.x.x.78&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;access-list 120 extended permit ip 10.11.144.0 255.255.255.0 10.11.145.0 255.255.255.0 &lt;BR /&gt;access-list 130 extended permit ip 10.11.144.0 255.255.255.0 10.11.146.0 255.255.255.0 &lt;BR /&gt;access-list 140 extended permit ip 10.11.144.0 255.255.255.0 10.11.147.0 255.255.255.0 &lt;BR /&gt;access-list 150 extended permit ip 10.11.144.0 255.255.255.0 10.11.148.0 255.255.255.0 &lt;BR /&gt;access-list 160 extended permit ip 10.11.144.0 255.255.255.0 10.11.149.0 255.255.255.0 &lt;BR /&gt;access-list 170 extended permit ip 10.11.144.0 255.255.255.0 10.11.150.0 255.255.255.0 &lt;BR /&gt;access-list 180 extended permit ip 10.11.144.0 255.255.255.0 10.11.151.0 255.255.255.0 &lt;BR /&gt;access-list nonat extended permit ip 10.11.0.0 255.255.0.0 10.1.1.0 255.255.255.0 &lt;BR /&gt;access-list nonat extended permit ip 10.11.144.0 255.255.255.0 10.1.1.0 255.255.255.0 &lt;BR /&gt;access-list nonat extended permit ip any 10.11.0.0 255.255.0.0 &lt;BR /&gt;access-list nonat extended permit ip any 172.16.10.0 255.255.255.0 &lt;BR /&gt;access-list outside_acl extended permit tcp any host 66.x.x.73 object-group DM_INLINE_TCP_0 &lt;BR /&gt;access-list outside_acl extended permit icmp any any time-range Always &lt;BR /&gt;access-list outside_acl extended permit tcp any host 66.x.x.77 eq www time-range Always &lt;BR /&gt;access-list outside_acl extended permit tcp any host 66.x.x.78 object-group DM_INLINE_TCP_1 time-range Always &lt;BR /&gt;access-list outside_acl extended permit tcp any object-group DM_INLINE_NETWORK_5 eq smtp time-range Always &lt;BR /&gt;access-list outside_acl extended permit tcp any object-group DM_INLINE_NETWORK_4 eq pop3 time-range Always &lt;BR /&gt;access-list dmz_acl extended permit udp 10.1.1.0 255.255.255.0 host 10.11.144.3 eq domain time-range Always &lt;BR /&gt;access-list dmz_acl extended permit ip 10.1.1.0 255.255.255.0 host 10.11.144.3 time-range Always &lt;BR /&gt;access-list dmz_acl extended permit tcp any any &lt;BR /&gt;access-list XXXVPN_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0 &lt;BR /&gt;access-list XXXVPN_splitTunnelAcl standard permit 192.168.0.0 255.255.0.0 &lt;BR /&gt;access-list inside_access_in extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm warnings&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool XXXVPN_IP_POOL 172.16.10.1-172.16.10.10&lt;BR /&gt;ip verify reverse-path interface inside&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-635.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 66.x.x.71 netmask 255.255.255.255&lt;BR /&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 1 10.11.144.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.11.145.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.11.146.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.11.147.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.11.148.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.11.149.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.11.150.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 10.11.151.0 255.255.255.0&lt;BR /&gt;static (inside,outside) 66.x.x.72 10.11.144.8 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) 66.x.x.78 10.11.144.12 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) 66.x.x.77 10.11.144.2 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) 66.x.x.85 10.11.144.25 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) 66.x.x.73 10.11.144.7 netmask 255.255.255.255 &lt;BR /&gt;access-group outside_acl in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_acl in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 66.x.x.67 1&lt;BR /&gt;route inside 10.11.145.0 255.255.255.0 10.11.144.254 1&lt;BR /&gt;route inside 10.11.146.0 255.255.255.0 10.11.144.254 1&lt;BR /&gt;route inside 10.11.147.0 255.255.255.0 10.11.144.254 1&lt;BR /&gt;route inside 10.11.148.0 255.255.255.0 10.11.144.254 1&lt;BR /&gt;route inside 10.11.149.0 255.255.255.0 10.11.144.254 1&lt;BR /&gt;route inside 10.11.150.0 255.255.255.0 10.11.144.254 1&lt;BR /&gt;route inside 10.11.151.0 255.255.255.0 10.11.144.254 1&lt;BR /&gt;route inside 192.168.100.0 255.255.255.0 10.11.144.254 1&lt;BR /&gt;timeout xlate 1:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server DOMAIN protocol nt&lt;BR /&gt;aaa-server DOMAIN (inside) host 10.11.144.3&lt;BR /&gt;nt-auth-domain-controller XXXdc1&lt;BR /&gt;nac-policy DfltGrpPolicy-nac-framework-create nac-framework&lt;BR /&gt;reval-period 36000&lt;BR /&gt;sq-period 300&lt;BR /&gt;url-server (inside) vendor websense host 10.11.144.9 timeout 30 protocol TCP version 1 connections 50&lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication secure-http-client&lt;BR /&gt;filter url except 10.1.1.1 255.255.255.255 0.0.0.0 0.0.0.0 allow &lt;BR /&gt;filter url except 0.0.0.0 0.0.0.0 10.1.1.3 255.255.255.255 &lt;BR /&gt;filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow longurl-truncate &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.11.144.0 255.255.255.0 inside&lt;BR /&gt;http 10.11.0.0 255.255.0.0 inside&lt;BR /&gt;http 0.0.0.0 255.255.255.255 outside&lt;BR /&gt;snmp-server location Weber&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set 20 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set 30 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set 50 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set 60 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set 70 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ENCRYPT esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map OUTSIDEMAP 10 set transform-set ENCRYPT&lt;BR /&gt;crypto dynamic-map OUTSIDEMAP 30 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map Outside_dyn_map 10 set reverse-route&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map VPN 20 match address 120&lt;BR /&gt;crypto map VPN 20 set peer 206.166.36.122 &lt;BR /&gt;crypto map VPN 20 set transform-set 20&lt;BR /&gt;crypto map VPN 30 set peer 206.166.36.154 &lt;BR /&gt;crypto map VPN 30 set transform-set 30&lt;BR /&gt;crypto map VPN 50 set peer 206.166.36.146 &lt;BR /&gt;crypto map VPN 50 set transform-set 50&lt;BR /&gt;crypto map VPN 60 set peer 206.166.36.150 &lt;BR /&gt;crypto map VPN 60 set transform-set 60&lt;BR /&gt;crypto map VPN 70 set peer 206.166.36.126 &lt;BR /&gt;crypto map VPN 70 set transform-set 70&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;enrollment self&lt;BR /&gt;fqdn sslvpnspd.XXX.org&lt;BR /&gt;subject-name CN=sslvpnspd&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt;certificate 50d23f4d&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308201e9 30820152 a0030201 02020450 d23f4d30 0d06092a 864886f7 0d010105 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05003039 31123010 06035504 03130973 736c7670 6e737064 31233021 06092a86 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4886f70d 01090216 1473736c 76706e73 70642e73 6b6f6b69 652e6f72 67301e17 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0d313130 31323631 37323930 355a170d 32313031 32333137 32393035 5a303931 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12301006 03550403 13097373 6c76706e 73706431 23302106 092a8648 86f70d01 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 09021614 73736c76 706e7370 642e736b 6f6b6965 2e6f7267 30819f30 0d06092a &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 864886f7 0d010101 05000381 8d003081 89028181 00b7ec4e 59cbac48 0887a91f &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6a093ce6 96b98eff 5276cb30 5d7831a3 d1fec4ae a6ecdd56 d64e3140 b3acb7b0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a6c77aa5 732e5e28 6dae291f f0af8af9 d0b8d245 8351879b e2d7d36a 8890ee3a &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6c873537 98a30ca1 9ec5efae 5866656b 278573f0 be1990d7 0f9dfc67 dbc8d63d &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 33bce9af b786a396 d695be7a 12dcecdc 61b54119 31020301 0001300d 06092a86 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4886f70d 01010505 00038181 001de265 7c0d1343 b15718e6 9e7fd220 12f17499 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; d72a723b bd5841a8 d4d30ef3 dab4e858 f078089b 0602b3da 76dad4b7 9eb47466 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 44914b5a f30f11f9 7ad3f2f5 9cdc027b db32f06a 9f548a68 6a0ca0a6 623833ee &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; d4b2f7f2 75602be6 927d3b3e 1def6021 1bd71e18 c9e2a4fe cc7bc65d 6c7b608a &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cfdbd3d7 421a40c6 b7472323 d8&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto isakmp identity address &lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 43200&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash md5&lt;BR /&gt;group 1&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet 10.11.0.0 255.255.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh 10.11.0.0 255.255.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;url-block url-mempool 1500&lt;BR /&gt;url-block url-size 4&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;svc image disk0:/anyconnect-win-2.5.2001-k9.pkg 1&lt;BR /&gt;svc enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;wins-server value 10.11.144.3 10.11.144.8&lt;BR /&gt;dns-server value 10.11.144.3 10.11.144.8&lt;BR /&gt;vpn-tunnel-protocol IPSec &lt;BR /&gt;backup-servers clear-client-config&lt;BR /&gt;nac-settings value DfltGrpPolicy-nac-framework-create&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp; svc keepalive none&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc compression deflate&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;group-policy SPDVPN internal&lt;BR /&gt;group-policy SPDVPN attributes&lt;BR /&gt;wins-server value 10.11.144.3 10.11.144.8&lt;BR /&gt;dns-server value 10.11.144.3 10.11.144.8&lt;BR /&gt;vpn-tunnel-protocol IPSec svc webvpn&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value SPDVPN_splitTunnelAcl&lt;BR /&gt;default-domain value xxx.org&lt;BR /&gt;username xxx password sE2H9HubIXI75SNz encrypted privilege 15&lt;BR /&gt;username xxx attributes&lt;BR /&gt;vpn-group-policy SPDVPN&lt;BR /&gt;username admin password 6YI.p7lD7uzHZBBs encrypted privilege 15&lt;BR /&gt;tunnel-group SPDVPN type remote-access&lt;BR /&gt;tunnel-group SPDVPN general-attributes&lt;BR /&gt;authentication-server-group DOMAIN&lt;BR /&gt;default-group-policy SPDVPN&lt;BR /&gt;dhcp-server 10.11.144.3&lt;BR /&gt;tunnel-group SPDVPN webvpn-attributes&lt;BR /&gt;group-alias SPD enable&lt;BR /&gt;tunnel-group SPDVPN ipsec-attributes&lt;BR /&gt;pre-shared-key *****&lt;BR /&gt;tunnel-group 206.x.x.126 type ipsec-l2l&lt;BR /&gt;tunnel-group 206.x.x.126 ipsec-attributes&lt;BR /&gt;pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;&amp;nbsp; inspect mgcp &lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:de6cc013b7f352d3ae23801e154d8a3b&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:00:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-and-a-question/m-p/1830607#M491496</guid>
      <dc:creator>David Hunt</dc:creator>
      <dc:date>2019-03-11T22:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: Internet access and a question...</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-and-a-question/m-p/1830608#M491498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All you are missing is the Nat statement for the DMZ to be able to get to th outside.&lt;/P&gt;&lt;P&gt;Please add the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat (dmz 1 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now regarding your ACL question, of course if you add a permit ip any any, the implicit deny is&amp;nbsp; going to do nothing, but remember you will be allowing all trafffic from the DMZ to any other interface, so it will be just outbound traffic not inbound traffic to that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Dec 2011 20:16:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-and-a-question/m-p/1830608#M491498</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-07T20:16:29Z</dc:date>
    </item>
    <item>
      <title>Internet access and a question...</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-and-a-question/m-p/1830609#M491499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; wow... that was quick and it works!!!! thank you Julio...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;did you see the other question?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I inherited this firewall from a previous admin who was dismissed... but something I noticed that does not make sense... and it has to do with a rule on the inside interface located right above my any - any implicit deny... and that is.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;doesn't this negate the implicit deny? is this safe to allow any-any ip?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Dec 2011 20:22:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-and-a-question/m-p/1830609#M491499</guid>
      <dc:creator>David Hunt</dc:creator>
      <dc:date>2011-12-07T20:22:38Z</dc:date>
    </item>
    <item>
      <title>Internet access and a question...</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-and-a-question/m-p/1830610#M491500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I saw it, actually I answered to that one on the previous response as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the answer just in case,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now regarding your ACL question, of course if you add a permit ip any&amp;nbsp; any, the implicit deny is&amp;nbsp; going to do nothing, but remember you will be&amp;nbsp; allowing all trafffic from the inside to any other interface, so it will&amp;nbsp; be just outbound traffic not inbound traffic to that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Dec 2011 20:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-and-a-question/m-p/1830610#M491500</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-07T20:28:30Z</dc:date>
    </item>
  </channel>
</rss>

