<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic restricted inside users of asa 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707009#M536466</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Goran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA5505 does not support spanning tree. Your unmanaged switches most likely do not support spanning tree. With both cables plugged into the ASA you most likely have a loop configured.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 10 Jul 2011 17:51:53 GMT</pubDate>
    <dc:creator>r-reed</dc:creator>
    <dc:date>2011-07-10T17:51:53Z</dc:date>
    <item>
      <title>restricted inside users of asa 5505</title>
      <link>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707004#M536461</link>
      <description>&lt;P&gt;i have an asa 5505 firewall with asa version 8.2(1). my asa connected on wan port over isp router on internet.inside users connected over dlink switch and the allied telesis 24 ports switch on this asa. the inside users are blocked and they can't communicate. all inside ports of asa 5505 are in one vlan and all ports are switch ports. the configuration of my firewall is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;: Saved&lt;BR /&gt; : Written by xxxxxx at 11:26:22.109 CEDT Thu Jul 7 2011&lt;BR /&gt; !&lt;BR /&gt; ASA Version 8.2(1) &lt;BR /&gt; !&lt;BR /&gt; hostname asa5505&lt;BR /&gt; domain-name dri.local&lt;BR /&gt; enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt; passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt; names&lt;BR /&gt; !&lt;BR /&gt; interface Vlan1&lt;BR /&gt; no forward interface Vlan3&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.10 255.255.255.0 &lt;BR /&gt; !&lt;BR /&gt; interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address x.x.x.x 255.255.255.248 &lt;BR /&gt; !&lt;BR /&gt; interface Vlan3&lt;BR /&gt; nameif administracija&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.100.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt; !&lt;BR /&gt; interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt; !&lt;BR /&gt; interface Ethernet0/1&lt;BR /&gt; !&lt;BR /&gt; interface Ethernet0/2&lt;BR /&gt; !&lt;BR /&gt; interface Ethernet0/3&lt;BR /&gt; !&lt;BR /&gt; interface Ethernet0/4&lt;BR /&gt; !&lt;BR /&gt; interface Ethernet0/5&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt; !&lt;BR /&gt; interface Ethernet0/6&lt;BR /&gt; !&lt;BR /&gt; interface Ethernet0/7&lt;BR /&gt; !&lt;BR /&gt; ftp mode passive&lt;BR /&gt; clock timezone CEST 1&lt;BR /&gt; clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt; dns server-group DefaultDNS&lt;BR /&gt; domain-name dri.local&lt;BR /&gt; access-list inside_nat0_outbound extended permit ip any 192.168.50.0 255.255.255.128 &lt;BR /&gt; pager lines 24&lt;BR /&gt; logging enable&lt;BR /&gt; logging trap informational&lt;BR /&gt;&lt;SPAN&gt; logging from-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:xxxxx@gmail.com" target="_blank"&gt;xxxxx@gmail.com&lt;/A&gt;&lt;BR /&gt; logging host administracija 192.168.100.2 format emblem&lt;BR /&gt; mtu inside 1500&lt;BR /&gt; mtu outside 1500&lt;BR /&gt; mtu administracija 1500&lt;BR /&gt; ip local pool vpnadrese 192.168.50.1-192.168.50.100 mask 255.255.255.0&lt;BR /&gt; icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt; no asdm history enable&lt;BR /&gt; arp timeout 14400&lt;BR /&gt; global (outside) 1 interface&lt;BR /&gt; nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt; nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt; route outside 0.0.0.0 0.0.0.0 178.254.133.177 1&lt;BR /&gt; timeout xlate 3:00:00&lt;BR /&gt; timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt; timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt; timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt; timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt; timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt; dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt; action terminate&lt;BR /&gt; dynamic-access-policy-record dripolisa&lt;BR /&gt; aaa-server DRI protocol ldap&lt;BR /&gt; aaa-server DRI (inside) host 192.168.0.20&lt;BR /&gt; ldap-base-dn DC=xx,DC=xxxx&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password xxxxxxxxx&lt;BR /&gt; ldap-login-dn CN=xxxxxxxx,OU=xxxxx,OU=xxxxx,OU=xxxxxx,DC=xxx,DC=xxxx&lt;BR /&gt; server-type microsoft&lt;BR /&gt; aaa authentication enable console LOCAL &lt;BR /&gt; aaa authentication http console LOCAL &lt;BR /&gt; aaa authentication serial console LOCAL &lt;BR /&gt; aaa authorization command LOCAL &lt;BR /&gt; http server enable&lt;BR /&gt; http 192.168.100.0 255.255.255.0 administracija&lt;BR /&gt; no snmp-server location&lt;BR /&gt; no snmp-server contact&lt;BR /&gt; snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt; crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt; crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt; crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt; crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt; crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt; crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt; crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt; crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt; crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt; crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt; crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt; crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt; crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt; crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt; crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt; crypto map outside_map interface outside&lt;BR /&gt; crypto isakmp enable outside&lt;BR /&gt; crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt; telnet timeout 5&lt;BR /&gt; ssh timeout 5&lt;BR /&gt; console timeout 0&lt;BR /&gt; management-access administracija&lt;BR /&gt; dhcpd auto_config outside&lt;BR /&gt; !&lt;BR /&gt; dhcpd address 192.168.0.14-192.168.0.45 inside&lt;BR /&gt; !&lt;BR /&gt; &lt;BR /&gt; threat-detection basic-threat&lt;BR /&gt; threat-detection statistics port&lt;BR /&gt; threat-detection statistics protocol&lt;BR /&gt; threat-detection statistics access-list&lt;BR /&gt; no threat-detection statistics tcp-intercept&lt;BR /&gt; webvpn&lt;BR /&gt; group-policy drivpn internal&lt;BR /&gt; group-policy drivpn attributes&lt;BR /&gt; dns-server value 192.168.0.20 192.168.0.254&lt;BR /&gt; vpn-simultaneous-logins 10&lt;BR /&gt; vpn-idle-timeout 30&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value dri.local&lt;BR /&gt; username driadmin password AojCAMO/soZo8W.W encrypted privilege 15&lt;BR /&gt; tunnel-group drivpn type remote-access&lt;BR /&gt; tunnel-group drivpn general-attributes&lt;BR /&gt; address-pool vpnadrese&lt;BR /&gt; authentication-server-group DRI&lt;BR /&gt; default-group-policy drivpn&lt;BR /&gt; tunnel-group drivpn ipsec-attributes&lt;BR /&gt; pre-shared-key sow00jet!@&lt;BR /&gt; !&lt;BR /&gt; class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum 512&lt;BR /&gt; policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect http &lt;BR /&gt; !&lt;BR /&gt; service-policy global_policy global&lt;BR /&gt; prompt hostname context &lt;BR /&gt; Cryptochecksum:defcf586d2292e6a38e70defda302ad7&lt;BR /&gt; : end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;my allied telesis 24 ports switch when he is connect on asa 5505 is blocking. when i disconnect from asa5505 he work allright.&lt;/P&gt;&lt;P&gt;can you help me? thanks&lt;/P&gt;&lt;P&gt;why this switch block when connect on asa 5505&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707004#M536461</guid>
      <dc:creator>mafija1975</dc:creator>
      <dc:date>2019-03-11T20:55:56Z</dc:date>
    </item>
    <item>
      <title>restricted inside users of asa 5505</title>
      <link>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707005#M536462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Goran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not able to understand your problem description clearly, could you please explain it a bit more, are the inside users not able to access the internet when they go through the firewall????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2011 10:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707005#M536462</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-07T10:06:24Z</dc:date>
    </item>
    <item>
      <title>restricted inside users of asa 5505</title>
      <link>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707006#M536463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;all inside users are over switches connect one part on internet of provider without asa5505 and second part is connect on inside ports asa 5505.i found solution. i have had two cables from isp connect on inside ports asa 5505. when disconnect one cable all is ok. when i connect both cables there's problem. why?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2011 10:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707006#M536463</guid>
      <dc:creator>mafija1975</dc:creator>
      <dc:date>2011-07-07T10:52:45Z</dc:date>
    </item>
    <item>
      <title>restricted inside users of asa 5505</title>
      <link>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707007#M536464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Goran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This looks to me more of a network routing issue than ASA issue, I would suggest you to check the default gateways on the internal users PC's, ip address on the ASA inside and the Ip of the router interface which is connected to the switch should not be same. Is it a L3 switch, if yes, check the default gateway on the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2011 11:13:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707007#M536464</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-07T11:13:34Z</dc:date>
    </item>
    <item>
      <title>Re: restricted inside users of asa 5505</title>
      <link>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707008#M536465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;inside ip address asa 5505 is 192.168.0.10, ip addresses pc's are in range 192.168.0.0-192.168.0.254, ip address isp router from users receive internet 192.168.0.254. i'm not sure but the switch is unmanaged l2. i send picture my configuration&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2011 11:48:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707008#M536465</guid>
      <dc:creator>mafija1975</dc:creator>
      <dc:date>2011-07-07T11:48:44Z</dc:date>
    </item>
    <item>
      <title>restricted inside users of asa 5505</title>
      <link>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707009#M536466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Goran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA5505 does not support spanning tree. Your unmanaged switches most likely do not support spanning tree. With both cables plugged into the ASA you most likely have a loop configured.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jul 2011 17:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/restricted-inside-users-of-asa-5505/m-p/1707009#M536466</guid>
      <dc:creator>r-reed</dc:creator>
      <dc:date>2011-07-10T17:51:53Z</dc:date>
    </item>
  </channel>
</rss>

