<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Network systems cannot access internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808208#M493151</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not very confortable with cli commands. I use adsm to configure my firewall. Everything is working fine on my firewall. All my rules are working fine. The only thing missing is any of my PCs or laptops which are in the same network are not able to browse internet with the default gateway of my firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default route on outside interface is 0.0.0.0 0.0.0.0 124.153.85.235&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Nov 2011 08:53:09 GMT</pubDate>
    <dc:creator>naushad_khan</dc:creator>
    <dc:date>2011-11-16T08:53:09Z</dc:date>
    <item>
      <title>Network systems cannot access internet</title>
      <link>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808206#M493144</link>
      <description>&lt;P&gt;What should i do on my Cisco ASA 5505 firewall to grant access to my network systems to access internet via gateway. I use ASDM to configure the firewall.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:51:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808206#M493144</guid>
      <dc:creator>naushad_khan</dc:creator>
      <dc:date>2019-03-11T21:51:28Z</dc:date>
    </item>
    <item>
      <title>Network systems cannot access internet</title>
      <link>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808207#M493148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)configure a default route on Outside interface. the CLI command is route outside&amp;nbsp; 0.0.0.0 0.0.0.0 x.x.x.x&amp;nbsp; where x.x.x.x is the next-hop IP.&lt;/P&gt;&lt;P&gt;2) configure NAT but the syntax differs since 8.3 OS&lt;/P&gt;&lt;P&gt;3) configure ICMP inspection if you want&amp;nbsp; ping replies from outside to get to inside hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think It's better you post your config: show run and we will tell you what's missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Nov 2011 08:41:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808207#M493148</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-16T08:41:07Z</dc:date>
    </item>
    <item>
      <title>Network systems cannot access internet</title>
      <link>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808208#M493151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not very confortable with cli commands. I use adsm to configure my firewall. Everything is working fine on my firewall. All my rules are working fine. The only thing missing is any of my PCs or laptops which are in the same network are not able to browse internet with the default gateway of my firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default route on outside interface is 0.0.0.0 0.0.0.0 124.153.85.235&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Nov 2011 08:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808208#M493151</guid>
      <dc:creator>naushad_khan</dc:creator>
      <dc:date>2011-11-16T08:53:09Z</dc:date>
    </item>
    <item>
      <title>Network systems cannot access internet</title>
      <link>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808209#M493154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm not a big fan of GUIs&amp;nbsp; but you can paste CLI configs into the ASDM if my memory is good.&lt;/P&gt;&lt;P&gt;So pasting show run would give us the config and we could look at it to see if it's ok.&lt;/P&gt;&lt;P&gt;Second step would be to perform a packet-tracer and post result here.&lt;/P&gt;&lt;P&gt;here's a video that demonstrates the feature: &lt;A href="http://www.youtube.com/watch?v=T9G5FKItoyw"&gt;http://www.youtube.com/watch?v=T9G5FKItoyw&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Nov 2011 08:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808209#M493154</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-16T08:59:57Z</dc:date>
    </item>
    <item>
      <title>Network systems cannot access internet</title>
      <link>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808210#M493156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname OCTOPUS-FIREWALL&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;description "***Connection on Inside port ETH 0/1***"&lt;/P&gt;&lt;P&gt;nameif Inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.100.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;description "***Uplink connection on Outside Port ETH0/0***"&lt;/P&gt;&lt;P&gt;nameif Outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 124.153.82.50 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;description "connected_on_192.168.1.x"&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone IST 5 30&lt;/P&gt;&lt;P&gt;dns domain-lookup Inside&lt;/P&gt;&lt;P&gt;dns domain-lookup Outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;name-server 124.153.69.80&lt;/P&gt;&lt;P&gt;name-server 124.153.69.15&lt;/P&gt;&lt;P&gt;object-group network Netmagic_Monitor_Group&lt;/P&gt;&lt;P&gt;network-object host 124.153.69.124&lt;/P&gt;&lt;P&gt;network-object host 124.153.69.121&lt;/P&gt;&lt;P&gt;network-object host 124.153.69.123&lt;/P&gt;&lt;P&gt;network-object host 123.108.39.124&lt;/P&gt;&lt;P&gt;network-object host 124.153.99.124&lt;/P&gt;&lt;P&gt;network-object host 180.179.39.124&lt;/P&gt;&lt;P&gt;network-object host 124.153.69.203&lt;/P&gt;&lt;P&gt;network-object host 124.153.69.204&lt;/P&gt;&lt;P&gt;object-group network Netmagic_Network_Group&lt;/P&gt;&lt;P&gt;network-object host 124.153.99.242&lt;/P&gt;&lt;P&gt;network-object host 123.108.39.242&lt;/P&gt;&lt;P&gt;network-object host 124.153.69.242&lt;/P&gt;&lt;P&gt;network-object host 180.179.39.242&lt;/P&gt;&lt;P&gt;network-object host 202.87.39.242&lt;/P&gt;&lt;P&gt;object-group service 7070 tcp&lt;/P&gt;&lt;P&gt;port-object eq 7070&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.175 eq 8085 &lt;/P&gt;&lt;P&gt;access-list 101 extended deny ip host 204.152.184.139 any &lt;/P&gt;&lt;P&gt;access-list 101 extended deny ip host 58.63.237.42 any &lt;/P&gt;&lt;P&gt;access-list 101 extended deny ip host 58.252.208.131 any &lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip object-group Netmagic_Network_Group any &lt;/P&gt;&lt;P&gt;access-list 101 extended deny ip host 60.250.122.226 any &lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip object-group Netmagic_Monitor_Group any &lt;/P&gt;&lt;P&gt;access-list 101 extended deny ip host 121.254.71.105 any &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.232 eq ftp &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.232 eq 8085 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.235 eq 8081 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.233 eq www &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.233 eq 1433 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.233 eq https &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.233 eq ftp &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.233 eq ssh &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.233 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.233 eq 59001 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.172 eq 8085 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.172 eq ftp &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.173 eq 8085 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.173 range ftp-data ftp &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.174 eq www &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.82.53 eq 8085 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.235 eq 8094 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.234 eq 8080 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.85.172 eq 7272 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit icmp any host 124.153.85.173 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 124.153.82.52 eq 8081 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit icmp any host 124.153.85.235 &lt;/P&gt;&lt;P&gt;access-list 108 extended deny tcp any host 58.63.237.42 &lt;/P&gt;&lt;P&gt;access-list 108 extended deny udp any host 58.63.237.42 &lt;/P&gt;&lt;P&gt;access-list 108 extended deny udp any host 121.254.71.105 &lt;/P&gt;&lt;P&gt;access-list 108 extended deny udp any host 60.250.122.226 &lt;/P&gt;&lt;P&gt;access-list 108 extended deny tcp any host 121.254.71.105 &lt;/P&gt;&lt;P&gt;access-list 108 extended deny ip any host 61.157.96.8 &lt;/P&gt;&lt;P&gt;access-list 108 extended deny ip any host 58.252.208.131 &lt;/P&gt;&lt;P&gt;access-list 108 extended deny tcp any host 60.250.122.226 &lt;/P&gt;&lt;P&gt;access-list 108 extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.6 host 213.171.216.50 eq smtp &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.9 host 213.171.216.50 eq smtp &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.220 host 213.171.216.50 eq smtp &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.59 host 213.171.216.50 eq smtp &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.26 host 213.171.216.50 eq smtp &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.15 host 213.171.216.50 eq smtp &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.14 host 213.171.216.50 eq smtp &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.12 host 213.171.216.50 eq smtp &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.7 host 213.171.216.50 eq smtp &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.172 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.9 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.7 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.12 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.14 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.6 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.10 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.15 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.218 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.97 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.25 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.60 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;access-list octopusepat_82_54 extended permit tcp host 10.100.1.59 host 72.14.213.109 eq 465 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap critical&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging facility 18&lt;/P&gt;&lt;P&gt;logging host Outside 202.87.39.89&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-621.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Outside) 1 124.153.82.54&lt;/P&gt;&lt;P&gt;nat (Inside) 1 access-list octopusepat_82_54&lt;/P&gt;&lt;P&gt;static (Inside,Outside) 124.153.85.232 10.100.1.5 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 124.153.85.234 10.100.1.38 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 124.153.85.233 10.100.1.120 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 124.153.85.173 10.100.1.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 124.153.82.53 10.100.1.98 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 124.153.85.174 10.100.1.11 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 124.153.85.172 10.100.1.100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 124.153.85.175 10.100.1.52 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 124.153.85.235 10.100.1.55 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 124.153.82.52 10.100.1.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Outside,Inside) 124.153.82.50 10.100.1.1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group 108 in interface Inside&lt;/P&gt;&lt;P&gt;access-group 101 in interface Outside&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 124.153.82.49 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console TACACS+ LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.100.1.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;http 122.170.115.164 255.255.255.255 Outside&lt;/P&gt;&lt;P&gt;snmp-server host Outside 123.108.39.124 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 123.108.39.39 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 124.153.69.121 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 124.153.69.123 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 124.153.69.124 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 124.153.69.203 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 124.153.69.204 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 124.153.99.124 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 124.153.99.39 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 180.179.39.124 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 202.87.39.39 community chn2000&lt;/P&gt;&lt;P&gt;snmp-server host Outside 202.87.44.69 community chn2000&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 124.153.69.242 255.255.255.255 Outside&lt;/P&gt;&lt;P&gt;ssh 122.170.115.164 255.255.255.255 Outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp authenticate&lt;/P&gt;&lt;P&gt;ntp trusted-key 1&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username cisco password miNpFGsdff.9QSZNEuyO encrypted&lt;/P&gt;&lt;P&gt;username netmagic password VWIMcRsCCdfr7Oc5YO encrypted&lt;/P&gt;&lt;P&gt;username netmagic attributes&lt;/P&gt;&lt;P&gt;service-type nas-prompt&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:a08cd5d128fc909a8122b6d52a9cb19a&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Nov 2011 09:06:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808210#M493156</guid>
      <dc:creator>naushad_khan</dc:creator>
      <dc:date>2011-11-16T09:06:44Z</dc:date>
    </item>
    <item>
      <title>Network systems cannot access internet</title>
      <link>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808211#M493157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) why use policy NAT ?&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;nat (Inside) 1 access-list octopusepat_82_54&lt;/EM&gt;&lt;/P&gt;&lt;P&gt; You're not permitting web traffic and dns traffic in this ACL so you won't be able to browse. you don't even permit icmp so you can't ping outside hosts.&lt;/P&gt;&lt;P&gt; 2) if you do just simple nat: nat(inside) 10.100.1.0 255.255.255.0&amp;nbsp;&amp;nbsp; in addition to policy NAT then you'll have to&lt;/P&gt;&lt;P&gt;&amp;nbsp; -enable icmp inspection or&lt;/P&gt;&lt;P&gt;&amp;nbsp; -apply an ACL inbound on outside to permit icmp replies&lt;/P&gt;&lt;P&gt;Cisco recommends doing the first one like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;inspect icmp &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Nov 2011 09:31:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-systems-cannot-access-internet/m-p/1808211#M493157</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-16T09:31:11Z</dc:date>
    </item>
  </channel>
</rss>

