<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: http traffic issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544232#M579041</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;when i use local ip it works without any issues, it also works when I am outside of the network getting in via external IP, but it doesn't work when I use external IP within the house. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I want to avoid using two different source IP and use only one based on our external IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Patrick&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Nov 2010 16:52:30 GMT</pubDate>
    <dc:creator>patrifick</dc:creator>
    <dc:date>2010-11-30T16:52:30Z</dc:date>
    <item>
      <title>http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544227#M579036</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder whether somebody can help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have internal webserver 10.1.4.10 which helds some information which try to access from our external website 62.253.196.182.&lt;/P&gt;&lt;P&gt;However when I try to access it from outside of our network I can connect it without any issue. If I want to access it internally it times out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;internal server name: unicornsvr / 10.1.4.10&lt;/P&gt;&lt;P&gt;external ip: 62.253.196.182&lt;/P&gt;&lt;P&gt;port: 80 / http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you in advance&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544227#M579036</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2019-03-11T19:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544228#M579037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;forgot the config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ch-asa&lt;BR /&gt;domain-name chathamhouse.org.uk&lt;BR /&gt;names&lt;BR /&gt;name 10.1.4.4 ctxsvr01&lt;BR /&gt;name 10.1.4.5 itsvr&lt;BR /&gt;name 10.1.4.10 unicornsvr&lt;BR /&gt;name 10.1.4.12 blbsvr&lt;BR /&gt;name 10.1.4.13 exchsvr&lt;BR /&gt;name 10.1.5.4 barracuda&lt;BR /&gt;name 10.1.5.15 video-conferencing-unit&lt;BR /&gt;name 192.168.1.5 ctxdmz&lt;BR /&gt;name 62.253.196.178 outside&lt;BR /&gt;name 62.253.196.179 remote-outside-179&lt;BR /&gt;name 62.253.196.180 webmail-outside-180&lt;BR /&gt;name 62.253.196.181 connect-outside-181&lt;BR /&gt;name 62.253.196.182 unicorn-outside-182&lt;BR /&gt;name 62.253.196.184 sirsi-outside-184&lt;BR /&gt;name 62.253.196.185 blb-outside-185&lt;BR /&gt;name 62.253.196.188 streaming-outside-188&lt;BR /&gt;name 62.253.196.189 video-conferencing-outside-189&lt;BR /&gt;name 82.111.186.146 sdt-rdc&lt;BR /&gt;name 150.147.68.20 sirsi-1&lt;BR /&gt;name 193.110.143.20 sirsi-2&lt;BR /&gt;name 10.1.5.16 streaming-unit&lt;BR /&gt;name 192.168.1.1 dmz&lt;BR /&gt;name 62.253.196.187 Logmein-outside-187&lt;BR /&gt;name 10.3.3.10 VPN0&lt;BR /&gt;name 10.3.3.11 VPN1&lt;BR /&gt;name 10.3.3.12 VPN2&lt;BR /&gt;name 10.3.3.13 VPN3&lt;BR /&gt;name 10.3.3.14 VPN4&lt;BR /&gt;name 10.3.3.15 VPN5&lt;BR /&gt;name 90.208.247.40 keats-rdp&lt;BR /&gt;name 10.1.4.2 docsvr&lt;BR /&gt;name 62.253.196.186 keats-outside-186&lt;BR /&gt;name 192.206.158.10 sirsi-3&lt;BR /&gt;name 10.1.5.2 webfilter&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.5.1 255.255.0.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address dmz 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt; nameif wifi&lt;BR /&gt; security-level 49&lt;BR /&gt; ip address 172.16.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan6&lt;BR /&gt; nameif chit&lt;BR /&gt; security-level 48&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address outside 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT 0&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name chathamhouse.org.uk&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network sirsi-support&lt;BR /&gt; network-object host sirsi-1&lt;BR /&gt; network-object host sirsi-2&lt;BR /&gt; network-object host sirsi-3&lt;BR /&gt;object-group service backup-exec tcp&lt;BR /&gt; port-object eq 10000&lt;BR /&gt; port-object eq 3106&lt;BR /&gt; port-object eq 3527&lt;BR /&gt; port-object eq 6101&lt;BR /&gt; port-object eq 6103&lt;BR /&gt; port-object eq 6106&lt;BR /&gt;object-group service barracuda-8000 tcp&lt;BR /&gt; port-object eq 8000&lt;BR /&gt;object-group service blackberry-3101 tcp&lt;BR /&gt; port-object eq 3101&lt;BR /&gt;object-group service citrix-session-reliability-2598 tcp&lt;BR /&gt; port-object eq 2598&lt;BR /&gt;object-group service rdc-3389 tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group service sql-1433 tcp&lt;BR /&gt; port-object eq 1433&lt;BR /&gt;object-group service streaming-1935 tcp&lt;BR /&gt; port-object eq 1935&lt;BR /&gt;object-group service video-streaming-tcp-udp tcp&lt;BR /&gt; port-object eq 3230&lt;BR /&gt; port-object eq 3231&lt;BR /&gt; port-object eq 3232&lt;BR /&gt; port-object eq 3233&lt;BR /&gt; port-object eq 3234&lt;BR /&gt; port-object eq 3235&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object host remote-outside-179&lt;BR /&gt; network-object host webmail-outside-180&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq h323&lt;BR /&gt; group-object video-streaming-tcp-udp&lt;BR /&gt; group-object streaming-1935&lt;BR /&gt;object-group service Reuters udp&lt;BR /&gt; port-object eq 10202&lt;BR /&gt; port-object eq 10302&lt;BR /&gt; port-object eq 9876&lt;BR /&gt;object-group network VPN-IP&lt;BR /&gt; network-object host VPN0&lt;BR /&gt; network-object host VPN1&lt;BR /&gt; network-object host VPN2&lt;BR /&gt; network-object host VPN3&lt;BR /&gt; network-object host VPN4&lt;BR /&gt; network-object host VPN5&lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group rdc-3389 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host blbsvr object-group blackberry-3101 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq ssh &lt;BR /&gt;access-list outside_access_in extended permit tcp any host ctxdmz eq ftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any host unicorn-outside-182 eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any host outside eq smtp &lt;BR /&gt;access-list outside_access_in remark SQL&lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group sql-1433 inactive &lt;BR /&gt;access-list outside_access_in extended permit tcp any host video-conferencing-outside-189 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group backup-exec &lt;BR /&gt;access-list outside_access_in extended permit udp any any object-group Reuters &lt;BR /&gt;access-list outside_access_in extended permit tcp any host streaming-unit eq nntp &lt;BR /&gt;access-list outside_access_in extended permit tcp host unicornsvr object-group sirsi-support object-group rdc-3389 &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 object-group rdp &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 eq www &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 eq citrix-ica &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 object-group citrix-session-reliability-2598 &lt;BR /&gt;access-list dmz_access_in extended permit object-group TCPUDP host ctxdmz 10.1.0.0 255.255.0.0 eq domain &lt;BR /&gt;access-list inside_access_in extended permit tcp host barracuda any eq smtp &lt;BR /&gt;access-list inside_access_in extended deny tcp any any eq smtp &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.0.0 255.255.0.0 host ctxdmz &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.1.0.0 255.255.0.0 object-group VPN-IP &lt;BR /&gt;access-list split-acl standard permit 10.1.0.0 255.255.0.0 &lt;BR /&gt;access-list wifi_access_in extended permit ip any any &lt;BR /&gt;access-list chit_access_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu wifi 1500&lt;BR /&gt;mtu chit 1500&lt;BR /&gt;ip local pool CH-VPN-IP VPN0-10.3.3.20 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any dmz&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 1 interface&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (wifi) 1 172.16.1.0 255.255.255.0&lt;BR /&gt;nat (wifi) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (chit) 1 192.168.10.0 255.255.255.0&lt;BR /&gt;nat (chit) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp connect-outside-181 3389 itsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface smtp barracuda smtp netmask 255.255.255.255 &lt;BR /&gt;static (dmz,outside) tcp remote-outside-179 https ctxdmz https netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (inside,outside) tcp interface ssh webfilter ssh netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp blb-outside-185 3101 blbsvr 3101 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp unicorn-outside-182 www unicornsvr www netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (inside,outside) tcp streaming-outside-188 1935 streaming-unit 1935 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Logmein-outside-187 nntp streaming-unit nntp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp sirsi-outside-184 3389 unicornsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp video-conferencing-outside-189 h323 video-conferencing-unit h323 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp webmail-outside-180 https exchsvr https netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (inside,outside) tcp keats-outside-186 3389 docsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (dmz,inside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;BR /&gt;static (dmz,inside) remote-outside-179 ctxdmz netmask 255.255.255.255 &lt;BR /&gt;static (inside,dmz) 10.1.0.0 10.1.0.0 netmask 255.255.0.0 &lt;BR /&gt;static (inside,outside) video-conferencing-outside-189 video-conferencing-unit netmask 255.255.255.255 &lt;BR /&gt;static (inside,inside) webmail-outside-180 exchsvr netmask 255.255.255.255 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group wifi_access_in in interface wifi&lt;BR /&gt;access-group chit_access_in in interface chit&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 62.253.196.177 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;http sdt-rdc 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd address 192.168.10.200-192.168.10.225 chit&lt;BR /&gt;dhcpd dns 194.168.4.100 194.168.8.100 interface chit&lt;BR /&gt;dhcpd lease 86400 interface chit&lt;BR /&gt;dhcpd enable chit&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; svc image disk0:/anyconnect-dart-win-2.5.0217-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt;group-policy CH-VPN internal&lt;BR /&gt;group-policy CH-VPN attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value split-acl&lt;BR /&gt;group-policy CH-VPN-IP internal&lt;BR /&gt;group-policy CH-VPN-IP attributes&lt;BR /&gt; dns-server value 10.1.4.9 10.1.4.5&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value split-acl&lt;BR /&gt; default-domain value riia.local&lt;BR /&gt;username sdt.support password cdUOkKYGfsyZgwTx encrypted privilege 0&lt;BR /&gt;username sdt.support attributes&lt;BR /&gt; vpn-group-policy CH-VPN&lt;BR /&gt;username leet password 1fJc82CICO2zAFcfTW47KQ== nt-encrypted privilege 0&lt;BR /&gt;username leet attributes&lt;BR /&gt; vpn-group-policy CH-VPN&lt;BR /&gt;tunnel-group CH-VPN type remote-access&lt;BR /&gt;tunnel-group CH-VPN general-attributes&lt;BR /&gt; address-pool CH-VPN-IP&lt;BR /&gt; authentication-server-group (inside) LOCAL&lt;BR /&gt; authorization-server-group LOCAL&lt;BR /&gt; authorization-server-group (inside) LOCAL&lt;BR /&gt; default-group-policy CH-VPN&lt;BR /&gt;tunnel-group CH-VPN-IP type remote-access&lt;BR /&gt;tunnel-group CH-VPN-IP general-attributes&lt;BR /&gt; address-pool CH-VPN-IP&lt;BR /&gt; default-group-policy CH-VPN-IP&lt;BR /&gt;tunnel-group CH-VPN-IP ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt; radius-sdi-xauth&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 10.1.4.13&lt;BR /&gt;prompt hostname context &lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 15:30:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544228#M579037</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-11-30T15:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544229#M579038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds Like hairpinning issue. can you do sh logging and paste some part of the output&amp;nbsp; that shows the IP address of the webserver that you are trying to access from Inside the network.&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 16:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544229#M579038</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2010-11-30T16:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544230#M579039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you please advise on the steps, I don't know cisco much, but can do all the rest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 16:47:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544230#M579039</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-11-30T16:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544231#M579040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does it work if you try to reach the server using its local ip address from the inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 16:48:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544231#M579040</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-30T16:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544232#M579041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;when i use local ip it works without any issues, it also works when I am outside of the network getting in via external IP, but it doesn't work when I use external IP within the house. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I want to avoid using two different source IP and use only one based on our external IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Patrick&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 16:52:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544232#M579041</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-11-30T16:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544233#M579042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so as mentioned already, the issue is probably due to the hair-pinning. Let me explain:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;static (inside,inside) webmail-outside-180 exchsvr netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;same-security permit intra&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These will have the ASA receive the packet on the inside and send it to the server. The setup breaks when the server responds to the client. He uses its local ip address and is destined to the client. Though that traffic is not seen by the ASA (it is switched/routed locally) and thus the client rejects it as the source of the return traffic was not from the outside ip of the server. In order to make it work you would need to do a "static (inside,inside) .... for the clients that will be reaching the server, which would make the ASA own their ip addresses and thus see all the flow and translate/untranslate properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general it is not good practice. Usually it is better if users change their DNS server setup to give the local ip for users that are internal trying to reach the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 17:25:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544233#M579042</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-30T17:25:59Z</dc:date>
    </item>
    <item>
      <title>Re: http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544234#M579043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the respons, however I cannot use DNS redirection within the house as the external domain is different to the internal and I want to avoind using another zone file for this instance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We had similar issue with webmail-180 where we were calling exernal IP from inside which was reverting back to inside server, can the same be applied for the unicorn?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 19:26:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544234#M579043</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-11-30T19:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544235#M579044</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what if I run this command, could it work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) unicorn-outside-182 unicornsvr netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 15:38:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544235#M579044</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-12-03T15:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544236#M579045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;YUP , this will allow you to reach that server at the public address from inside the network. If you do not do this then the firewall blocks you and logs errors with ip spoof. you should try reading a little bit on hairpinning on asa for more explanation.&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 16:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544236#M579045</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2010-12-03T16:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: http traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544237#M579046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your comment, however I am not cisco engineer and trying to resolve only a small issue which we have. I appreciate your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 16:51:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/http-traffic-issue/m-p/1544237#M579046</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-12-03T16:51:15Z</dc:date>
    </item>
  </channel>
</rss>

