<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5520 nat access-list query for internet access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751914#M530611</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Deepak,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After going through the configuration I see that your statement &lt;STRONG&gt;nat (inside) 1 access-list internet-inside&lt;/STRONG&gt; should never really work, because the access-list internet-inside doesnt include your internal network at all, have a look:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit tcp object-group inside-subnets any object-group allow &lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit udp object-group inside-subnets any object-group allow-udp &lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit tcp object-group allowed-ip-addresses any object-group allow &lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit udp object-group allowed-ip-addresses any object-group allow-udp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network allowed-ip-addresses&lt;/P&gt;&lt;P&gt;network-object 192.168.91.31 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So all the users in the 192.168.88.0 subnet don't fall in it, you woudl definitely need the statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 192.168.88.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If you want restrict access to internet for a few machines, lets taske for example, you want to block 192.168.88.10 and 192.168.88.59 machines, then you would need this:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list in-out deny ip host 192.168.88.10 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list in-out deny ip host 192.168.88.59 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list in-out permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group in-out in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.88.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how you should do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Sep 2011 15:32:39 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-09-16T15:32:39Z</dc:date>
    <item>
      <title>ASA 5520 nat access-list query for internet access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751913#M530609</link>
      <description>&lt;P&gt;Hello experts,&lt;/P&gt;&lt;P&gt;I am not an expert in security and network so please help me with my below query.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ASA 5520 V 7.0(4), the Inernet link is terminated on a router --&amp;gt; switch---&amp;gt; ASA G0/2. The ASA 5520 is connected to the L3 i.e. G0/1---&amp;gt;L3.&lt;/P&gt;&lt;P&gt;Normally user access the internet using the Proxy server. However I have created natted an access-list for direct internet access for client who frequently visit in our office. Below is the config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;nat (inside) 1 access-list internet-inside &lt;/STRONG&gt;works perfectly fine if &lt;STRONG&gt;Nat (inside) 1 192.168.88.0 25.255.255.0&lt;/STRONG&gt; is applied, but the problem is If i remove the nat entry &lt;STRONG&gt;Nat (inside) 1 192.168.88.0 25.255.255.0&lt;/STRONG&gt; the users cannot access the internet through the access-list internet-inside.&lt;/P&gt;&lt;P&gt;Is the nat compulsary ? what can I do to make the &lt;STRONG&gt;nat (inside) 1 access-list internet-inside &lt;/STRONG&gt;make work with out &lt;STRONG&gt;Nat (inside) 1 192.168.88.0 25.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I want to remove the nat so that I can restrict the users of 192.168.88.0 subnet from accessing direct internet and restrict them through the internet-inside accesslist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;BR /&gt;duplex full&lt;BR /&gt;nameif internet&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.X.242 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.88.2 255.255.255.0 &lt;BR /&gt;! &lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; width: 1px; height: 1px; overflow: hidden; top: 0px; left: -10000px;"&gt;﻿&lt;/DIV&gt;&lt;P&gt;dns domain-lookup internet&lt;BR /&gt;dns name-server X.X.96.2&lt;BR /&gt;dns name-server X.X.103.100&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object-group network inside-subnets&lt;BR /&gt;network-object 192.168.94.0 255.255.255.0&lt;BR /&gt;network-object 192.168.92.0 255.255.255.0&lt;BR /&gt;network-object 192.168.93.0 255.255.255.0&lt;BR /&gt;network-object 192.168.95.0 255.255.255.0&lt;BR /&gt;network-object 192.168.90.0 255.255.255.0&lt;BR /&gt;object-group service allow tcp-udp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq 443&lt;BR /&gt;port-object eq 21&lt;BR /&gt;port-object eq 1352&lt;BR /&gt;port-object eq 445&lt;BR /&gt;port-object eq 1720&lt;BR /&gt;port-object range 3230 3270&lt;BR /&gt;port-object eq 444&lt;BR /&gt;port-object eq 17515&lt;BR /&gt;port-object eq 6057&lt;BR /&gt;port-object eq 2598&lt;BR /&gt;object-group service allow-udp udp&lt;BR /&gt;port-object eq 10000&lt;BR /&gt;port-object eq isakmp&lt;BR /&gt;port-object eq 2598&lt;BR /&gt;object-group network allowed-ip-addresses&lt;BR /&gt;network-object 192.168.91.31 255.255.255.255&lt;BR /&gt;access-list internet_cryptomap_40 extended permit ip host 192.168.88.253 host 10.64.4.94 &lt;BR /&gt;access-list internet_cryptomap_dyn_20 extended permit ip 192.168.88.0 255.255.255.0 172.16.16.0 255.255.255.0 &lt;BR /&gt;access-list internet-inside extended permit tcp object-group inside-subnets any object-group allow &lt;BR /&gt;access-list internet-inside extended permit udp object-group inside-subnets any object-group allow-udp &lt;BR /&gt;access-list internet-inside extended permit tcp object-group allowed-ip-addresses any object-group allow &lt;BR /&gt;access-list internet-inside extended permit udp object-group allowed-ip-addresses any object-group allow-udp &lt;BR /&gt;access-list Client5_nat0_outbound extended permit ip 192.168.94.0 255.255.255.0 host 10.64.4.94 &lt;BR /&gt;access-list no-nat extended permit ip 192.168.89.0 255.255.255.0 172.16.16.0 255.255.255.0 &lt;BR /&gt;access-list no-nat extended permit ip 192.168.88.0 255.255.255.0 172.16.16.0 255.255.255.0 &lt;BR /&gt;access-list no-nat extended permit ip host 192.168.88.253 host 10.64.4.94 &lt;BR /&gt;access-list no-nat extended permit ip 10.66.254.0 255.255.255.240 10.0.0.0 255.0.0.0 &lt;BR /&gt;access-list no-nat extended permit ip 192.168.88.0 255.255.255.0 host 10.124.31.13 &lt;BR /&gt;access-list internet-out extended permit tcp any host X.X.X.243 eq smtp &lt;BR /&gt;access-list internet-out extended permit tcp any host X.X.X.244 eq ftp &lt;BR /&gt;access-list internet-out extended permit ip any host X.X.X.245 &lt;BR /&gt;access-list internet_cryptomap_60 extended permit ip 10.66.254.0 255.255.255.240 host 10.124.31.13 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging device-id string asa5520&lt;BR /&gt;logging host inside 192.168.88.3 17/1514&lt;BR /&gt;mtu internet 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu IPS 1500&lt;BR /&gt;ip local pool vpnpool 10.10.8.1-10.10.8.254&lt;BR /&gt;ip local pool VPN_POOL 10.10.10.1-10.10.10.254&lt;BR /&gt;ip local pool rsapool 172.16.16.1-172.16.16.254 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any management&lt;BR /&gt;asdm image disk0:/asdm504.bin&lt;BR /&gt;asdm location X.X.X.X 255.255.255.255 internet&lt;BR /&gt;asdm location X.X.X.X&amp;nbsp; 255.255.255.255 internet&lt;BR /&gt;asdm location X.X.X.X&amp;nbsp; 255.255.255.255 internet&lt;BR /&gt;asdm location X.X.X.X 255.255.255.0 inside&lt;BR /&gt;asdm location X.X.X.X 255.255.255.255 internet&lt;BR /&gt;asdm location X.X.X.X 255.255.255.255 inside&lt;BR /&gt;asdm location X.X.X.X&amp;nbsp; 255.255.255.0 internet&lt;BR /&gt;asdm location X.X.X.X&amp;nbsp; 255.255.255.255 internet&lt;BR /&gt;asdm location X.X.X.X&amp;nbsp; 255.255.255.255 internet&lt;BR /&gt;asdm location 192.168.88.33 255.255.255.255 inside&lt;BR /&gt;asdm location X.X.X.X&amp;nbsp; 255.255.255.255 internet&lt;BR /&gt;asdm location 192.168.88.12 255.255.255.255 inside&lt;BR /&gt;asdm location X.X.X.X 255.255.255.240 inside&lt;BR /&gt;asdm location 192.168.90.240 255.255.255.240 inside&lt;BR /&gt;asdm group inside-subnets inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (internet) 1 interface&lt;BR /&gt;&lt;STRONG&gt;nat (inside) 1 access-list internet-inside&lt;BR /&gt;nat (inside) 1 192.168.88.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;static (inside,internet) X.X.X.243 192.168.89.5 netmask 255.255.255.255 &lt;BR /&gt;static (inside,internet) X.X.X.244 192.168.88.6 netmask 255.255.255.255 &lt;BR /&gt;static (inside,internet) 10.66.254.0 192.168.90.240 netmask 255.255.255.240 &lt;BR /&gt;access-group internet-out in interface internet&lt;BR /&gt;route internet 0.0.0.0 0.0.0.0 X.X.X.241 1&lt;BR /&gt;route inside 192.168.91.0 255.255.255.0 192.168.88.1 1&lt;BR /&gt;route inside 192.168.94.0 255.255.255.0 192.168.88.1 1&lt;BR /&gt;route inside 192.168.90.0 255.255.255.0 192.168.88.1 1&lt;BR /&gt;route inside 192.168.89.0 255.255.255.0 192.168.88.1 1&lt;BR /&gt;route inside 192.168.87.0 255.255.255.0 192.168.88.1 1&lt;BR /&gt;route inside 192.168.95.0 255.255.255.0 192.168.88.1 1&lt;BR /&gt;route management 192.168.1.100 255.255.255.255 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;BR /&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server sdi protocol sdi&lt;BR /&gt;aaa-server sdi host 192.168.88.12&lt;BR /&gt;aaa-server radius protocol radius&lt;BR /&gt;aaa-server radius host 192.168.88.7&lt;BR /&gt;key cisco&lt;BR /&gt;group-policy RSA_POLICY internal&lt;BR /&gt;group-policy RSA_POLICY attributes&lt;BR /&gt;banner value Welcome to **** RSA Networks! &lt;BR /&gt;vpn-idle-timeout none&lt;BR /&gt;vpn-session-timeout none&lt;BR /&gt;vpn-tunnel-protocol IPSec &lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;banner value Welcome to *** VPN.&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server none&lt;BR /&gt;dhcp-network-scope none&lt;BR /&gt;vpn-access-hours none&lt;BR /&gt;vpn-simultaneous-logins 3&lt;BR /&gt;vpn-idle-timeout 30&lt;BR /&gt;vpn-session-timeout none&lt;BR /&gt;vpn-filter none&lt;BR /&gt;vpn-tunnel-protocol IPSec webvpn&lt;BR /&gt;password-storage disable&lt;BR /&gt;ip-comp disable&lt;BR /&gt;re-xauth disable&lt;BR /&gt;group-lock none&lt;BR /&gt;pfs disable&lt;BR /&gt;ipsec-udp disable&lt;BR /&gt;ipsec-udp-port 10000&lt;BR /&gt;split-tunnel-policy tunnelall&lt;BR /&gt;split-tunnel-network-list none&lt;BR /&gt;default-domain none&lt;BR /&gt;split-dns none&lt;BR /&gt;secure-unit-authentication disable&lt;BR /&gt;user-authentication disable&lt;BR /&gt;user-authentication-idle-timeout 30&lt;BR /&gt;ip-phone-bypass disable&lt;BR /&gt;leap-bypass disable&lt;BR /&gt;nem disable&lt;BR /&gt;backup-servers keep-client-config&lt;BR /&gt;client-firewall none&lt;BR /&gt;client-access-rule none&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp; functions url-entry&lt;BR /&gt;&amp;nbsp; port-forward-name value Application Access&lt;BR /&gt;group-policy VPN_POLICY internal&lt;BR /&gt;group-policy VPN_POLICY attributes&lt;BR /&gt;&amp;nbsp; vpn-idle-timeout none&lt;BR /&gt;vpn-session-timeout none&lt;BR /&gt;vpn-tunnel-protocol IPSec &lt;BR /&gt;pfs disable&lt;BR /&gt;ipsec-udp enable&lt;BR /&gt;split-tunnel-policy tunnelall&lt;BR /&gt;webvpn&lt;BR /&gt;username ********password 2dYqgmUa9wXbpdNS encrypted privilege 15&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.88.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;crypto ipsec transform-set ****_SET esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto map VPN_CRY_MAP 40 match address internet_cryptomap_40&lt;BR /&gt;crypto map VPN_CRY_MAP 40 set peer X.X.X.174 &lt;BR /&gt;crypto map VPN_CRY_MAP 40 set transform-set ****_SET&lt;BR /&gt;crypto map VPN_CRY_MAP 60 match address internet_cryptomap_60&lt;BR /&gt;crypto map VPN_CRY_MAP 60 set peer X.X.X.234 &lt;BR /&gt;crypto map VPN_CRY_MAP 60 set transform-set ****_SET&lt;BR /&gt;crypto map VPN_CRY_MAP interface internet&lt;BR /&gt;isakmp identity auto &lt;BR /&gt;isakmp enable internet&lt;BR /&gt;isakmp enable inside&lt;BR /&gt;isakmp policy 2 authentication pre-share&lt;BR /&gt;isakmp policy 2 encryption des&lt;BR /&gt;isakmp policy 2 hash md5&lt;BR /&gt;isakmp policy 2 group 2&lt;BR /&gt;isakmp policy 2 lifetime 86400&lt;BR /&gt;isakmp policy 10 authentication pre-share&lt;BR /&gt;isakmp policy 10 encryption 3des&lt;BR /&gt;isakmp policy 10 hash sha&lt;BR /&gt;isakmp policy 10 group 2&lt;BR /&gt;isakmp policy 10 lifetime 86400&lt;BR /&gt;isakmp policy 30 authentication pre-share&lt;BR /&gt;isakmp policy 30 encryption 3des&lt;BR /&gt;isakmp policy 30 hash md5&lt;BR /&gt;isakmp policy 30 group 2&lt;BR /&gt;isakmp policy 30 lifetime 86400&lt;BR /&gt;isakmp nat-traversal&amp;nbsp; 20&lt;BR /&gt;tunnel-group ipsec1 type ipsec-ra&lt;BR /&gt;tunnel-group ipsec1 general-attributes&lt;BR /&gt;address-pool rsapool&lt;BR /&gt;tunnel-group ipsec1 ipsec-attributes&lt;BR /&gt;pre-shared-key password&lt;BR /&gt;tunnel-group X.X.X.6 type ipsec-l2l&lt;BR /&gt;tunnel-group X.X.X.6 ipsec-attributes&lt;BR /&gt;pre-shared-key passw0rd&lt;BR /&gt;peer-id-validate nocheck&lt;BR /&gt;tunnel-group X.X.X.174 type ipsec-l2l&lt;BR /&gt;tunnel-group X.X.X.174 ipsec-attributes&lt;BR /&gt;pre-shared-key Passw0rd&lt;BR /&gt;tunnel-group X.X.X.234 type ipsec-l2l&lt;BR /&gt;tunnel-group X.X.X.234 ipsec-attributes&lt;BR /&gt;pre-shared-key &lt;A href="mailto:123456789****@##*SOL" target="_blank"&gt;1XXXXX&lt;/A&gt;&lt;/P&gt;&lt;P&gt;telnet 192.168.88.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 1440&lt;BR /&gt;ssh 192.168.88.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 10&lt;BR /&gt;dhcpd lease 3600&lt;BR /&gt;dhcpd ping_timeout 50&lt;BR /&gt;dhcprelay server 192.168.88.7 inside&lt;BR /&gt;dhcprelay timeout 60&lt;BR /&gt;!&lt;BR /&gt;class-map class_ftp&lt;BR /&gt;match port tcp eq ftp-data&lt;BR /&gt;class-map IPSclass&lt;BR /&gt;match any&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map class_smtp&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map IPSpolicy&lt;BR /&gt;class IPSclass&lt;BR /&gt;&amp;nbsp; ips promiscuous fail-open&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;class class_smtp&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class_ftp&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;class inspection_default&lt;BR /&gt;class class_smtp&lt;BR /&gt;policy-map test&lt;BR /&gt;!&lt;BR /&gt;service-policy IPSpolicy global&lt;BR /&gt;ntp server 192.168.88.7 source inside prefer&lt;BR /&gt;Cryptochecksum:df2f0d0aa79aead88d0c5e275555c1dd&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:25:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751913#M530609</guid>
      <dc:creator>Deepak Suryavanshi</dc:creator>
      <dc:date>2019-03-11T21:25:53Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 nat access-list query for internet access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751914#M530611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Deepak,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After going through the configuration I see that your statement &lt;STRONG&gt;nat (inside) 1 access-list internet-inside&lt;/STRONG&gt; should never really work, because the access-list internet-inside doesnt include your internal network at all, have a look:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit tcp object-group inside-subnets any object-group allow &lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit udp object-group inside-subnets any object-group allow-udp &lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit tcp object-group allowed-ip-addresses any object-group allow &lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit udp object-group allowed-ip-addresses any object-group allow-udp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network allowed-ip-addresses&lt;/P&gt;&lt;P&gt;network-object 192.168.91.31 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So all the users in the 192.168.88.0 subnet don't fall in it, you woudl definitely need the statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 192.168.88.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If you want restrict access to internet for a few machines, lets taske for example, you want to block 192.168.88.10 and 192.168.88.59 machines, then you would need this:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list in-out deny ip host 192.168.88.10 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list in-out deny ip host 192.168.88.59 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list in-out permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group in-out in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.88.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how you should do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2011 15:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751914#M530611</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-16T15:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 nat access-list query for internet access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751915#M530612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you quick reply.&lt;/P&gt;&lt;P&gt;Even if I add 192.168.88.0 in the below object group, the users in 192.168.88.0 cant access internet, I have already tried it.&lt;/P&gt;&lt;P&gt;object-group network inside-subnets&lt;/P&gt;&lt;P&gt;network-object 192.168.94.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 192.168.92.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 192.168.93.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 192.168.95.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 192.168.90.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit tcp object-group inside-subnets any object-group allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit udp object-group inside-subnets any object-group allow-udp&lt;/P&gt;&lt;P&gt;Access list internet-inside works fine for rest of the segments but only if nat (inside) 1 192.168.88.0 255.255.255.0 is applied.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2011 04:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751915#M530612</guid>
      <dc:creator>Deepak Suryavanshi</dc:creator>
      <dc:date>2011-09-17T04:40:45Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 nat access-list query for internet access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751916#M530613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Deepak,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just add this ACL and you would see it working:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list internet-inside permit ip 192.168.88.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2011 04:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751916#M530613</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-17T04:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 nat access-list query for internet access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751917#M530615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I apply access-list internet-inside permit ip 192.168.88.0 255.255.255.0 any  All works fine&lt;/P&gt;&lt;P&gt;but if I remove the above access list the below stops working, why is it so ?&lt;/P&gt;&lt;P&gt;object-group network inside-subnets&lt;/P&gt;&lt;P&gt;network-object 192.168.94.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 192.168.92.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 192.168.93.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 192.168.95.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 192.168.90.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 192.168.88.0 255.255.255.0   &lt;EVEN if="" i="" add="" this="" entry="" then="" too="" none="" can="" access="" the="" internet=""&gt;&lt;/EVEN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service allow tcp-udp&lt;/P&gt;&lt;P&gt;port-object eq www&lt;/P&gt;&lt;P&gt;port-object eq 443&lt;/P&gt;&lt;P&gt;port-object eq 21&lt;/P&gt;&lt;P&gt;port-object eq 1352&lt;/P&gt;&lt;P&gt;port-object eq 445&lt;/P&gt;&lt;P&gt;port-object eq 1720&lt;/P&gt;&lt;P&gt;port-object range 3230 3270&lt;/P&gt;&lt;P&gt;port-object eq 444&lt;/P&gt;&lt;P&gt;port-object eq 17515&lt;/P&gt;&lt;P&gt;port-object eq 6057&lt;/P&gt;&lt;P&gt;port-object eq 2598&lt;/P&gt;&lt;P&gt;object-group service allow-udp udp&lt;/P&gt;&lt;P&gt;port-object eq 10000&lt;/P&gt;&lt;P&gt;port-object eq isakmp&lt;/P&gt;&lt;P&gt;port-object eq 2598&lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit tcp object-group inside-subnets any object-group allow&lt;/P&gt;&lt;P&gt;access-list internet-inside extended permit udp object-group inside-subnets any object-group allow-udp&lt;/P&gt;&lt;P&gt;global (internet) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list internet-inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Deepak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2011 06:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751917#M530615</guid>
      <dc:creator>Deepak Suryavanshi</dc:creator>
      <dc:date>2011-09-17T06:52:16Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 nat access-list query for internet access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751918#M530617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That because of the object-group ports below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service allow tcp-udp&lt;/P&gt;&lt;P&gt;port-object eq www&lt;/P&gt;&lt;P&gt;port-object eq 443&lt;/P&gt;&lt;P&gt;port-object eq 21&lt;/P&gt;&lt;P&gt;port-object eq 1352&lt;/P&gt;&lt;P&gt;port-object eq 445&lt;/P&gt;&lt;P&gt;port-object eq 1720&lt;/P&gt;&lt;P&gt;port-object range 3230 3270&lt;/P&gt;&lt;P&gt;port-object eq 444&lt;/P&gt;&lt;P&gt;port-object eq 17515&lt;/P&gt;&lt;P&gt;port-object eq 6057&lt;/P&gt;&lt;P&gt;port-object eq 2598&lt;/P&gt;&lt;P&gt;object-group service allow-udp udp&lt;/P&gt;&lt;P&gt;port-object eq 10000&lt;/P&gt;&lt;P&gt;port-object eq isakmp&lt;/P&gt;&lt;P&gt;port-object eq 2598&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you add:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Internet-inside permit tcp 192.168.88.0 255.255.255.0 any object-group allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it wont work, since it includes the source ports defined in the object group, but when a user initiates an internet connection, the request can go from any random source port could be 30000 or 40000 or anything, so those ports cannot be defined in the object -group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might need to put the correct access-list in it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2011 08:03:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-access-list-query-for-internet-access/m-p/1751918#M530617</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-17T08:03:42Z</dc:date>
    </item>
  </channel>
</rss>

