<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: internet access restriction based on IP addresses. (ASA 5500 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563374#M608570</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hope ur doing well, You are familer with my infrastructre, Lately&amp;nbsp; we acquired a Cisco Profile 42 Video Conferencing Equipment now i need&amp;nbsp; to get into the firewall and create a NAT or static route of the sorts&amp;nbsp; so that i can foward SIP and H232 to the VC I need your help on this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Nov 2011 12:58:06 GMT</pubDate>
    <dc:creator>mukalazisnr</dc:creator>
    <dc:date>2011-11-09T12:58:06Z</dc:date>
    <item>
      <title>internet access restriction based on IP addresses. (ASA 5500)</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563363#M608559</link>
      <description>&lt;P&gt;Dear Members,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of my Clients just aquired a CISCO ASA firewall, and they would like to restrict internet access, that is they want to block internet for Junior employees while managemnet remains connected, Looking at the situation, The ASA serves as the gateway,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried an Access list like below for one pc to test if it works but instead everyone just went off, may be i misfired somehwere.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list 110 deny tcp any host 192.168.20.100 eq www&lt;BR /&gt;Access-list 110 deny tcp any host 192.168.20.100 eq 443&lt;BR /&gt;Access-list 110 permit tcp any any eq www&lt;BR /&gt;Access-list 110 permit tcp any any eq 443&lt;BR /&gt;access-group 110 in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I will appreciate all your help, Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:58:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563363#M608559</guid>
      <dc:creator>mukalazisnr</dc:creator>
      <dc:date>2019-03-11T18:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563364#M608560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The first 2 lines of the access-list should be as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list 110 deny tcp host 192.168.20.100 any eq www&lt;BR /&gt;Access-list 110 deny tcp host 192.168.20.100 any&amp;nbsp; eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, based on the current access-list that you have configured, access to the internet should not be broken at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One possibility is you are using an external DNS server, and if this is correct, you would need to allow DNS request outbound as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 permit udp any any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Furthermore, once you created an access-list, there will be an implicit deny at the end of the access-list, therefore, any other traffic needs to be explicitly permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example: if you have mail server internally, you would need to allow the SMTP/mail traffic outbound, otherwise, noone can send email out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment, base on the 4 lines of access-list (after modifying the first 2 lines as specified above), &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;only &lt;/STRONG&gt;&lt;/SPAN&gt;web access (http and https) will be denied for 192.168.20.100, and everyone else will &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;only &lt;/STRONG&gt;&lt;/SPAN&gt;have http and https access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 09:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563364#M608560</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-10-21T09:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563365#M608561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok i think am being silly,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you talked about SMTP but i had taken care of it but i surely was not figuring out a way of restricting internet. here is my running config as of now but with out the lines earlier shown.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now also the way the network was setup no proxies, now when you put it looks liek the number of people not allowed internet access is more than those are allowed and may be i will have to enter those ips one after the other since they are kind o scatterd,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so is there a way i will just block the rest then just punch in the few allowed to access ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the config,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kla-fw-01# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.0(8)&lt;BR /&gt;!&lt;BR /&gt;hostname kla-fw-01&lt;BR /&gt;enable password 2vR3Gt8cWNRFPvqV encrypted&lt;BR /&gt;passwd 0LddFM.OYPWuzZaF encrypted&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.40.31 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 199.199.199.14 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;access-list smtp extended permit ip any any&lt;BR /&gt;access-list all extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 199.199.199.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp interface smtp 199.199.199.99 smtp netmask 255.255.2&lt;BR /&gt;55.255&lt;BR /&gt;static (inside,outside) tcp interface imap4 199.199.199.99 imap4 netmask 255.255&lt;BR /&gt;.255.255&lt;BR /&gt;static (inside,outside) tcp interface pop3 199.199.199.99 pop3 netmask 255.255.2&lt;BR /&gt;55.255&lt;BR /&gt;static (inside,outside) tcp interface https 199.199.199.99 https netmask 255.255&lt;BR /&gt;.255.255&lt;BR /&gt;static (inside,outside) tcp interface 995 199.199.199.99 995 netmask 255.255.255&lt;BR /&gt;.255&lt;BR /&gt;static (inside,outside) tcp interface 993 199.199.199.99 993 netmask 255.255.255&lt;BR /&gt;.255&lt;BR /&gt;static (inside,outside) tcp interface 465 199.199.199.99 465 netmask 255.255.255&lt;BR /&gt;.255&lt;BR /&gt;access-group smtp in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.40.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;BR /&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 0.0.0.0 0.0.0.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 199.199.199.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd lease 3600&lt;BR /&gt;dhcpd ping_timeout 50&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns maximum-length 512&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Cryptochecksum:f3a3190192333c84ac6d946d2d16780f&lt;BR /&gt;: end&lt;BR /&gt;kla-fw-01#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks once again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 10:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563365#M608561</guid>
      <dc:creator>mukalazisnr</dc:creator>
      <dc:date>2010-10-21T10:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563366#M608562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, now you don't have any access-list configured at all on your inside interface, and your outside ACL is permitting everything inbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can definitely allow a few and block everything, but as advised earlier, there is an implicit "deny ip any any" once you configured an ACL, therefore, you would need to explicitly allow any traffic that you would like going outbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that you would like to allow only a few people web traffic, and block the rest web traffic, however, still allow outbound mail and dns request. Here is the example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside-acl permit udp any any eq 53&lt;/P&gt;&lt;P&gt;access-list inside-acl permit tcp host &lt;MAIL-SERVER&gt; any eq 25&lt;/MAIL-SERVER&gt;&lt;/P&gt;&lt;P&gt;access-list inside-acl permit tcp host &lt;ALLOW-WEB-TRAFFIC-IP&gt; any eq 80&lt;/ALLOW-WEB-TRAFFIC-IP&gt;&lt;/P&gt;&lt;P&gt;access-list inside-acl permit tcp host &lt;ALLOW-WEB-TRAFFIC-IP&gt; any eq 443&lt;/ALLOW-WEB-TRAFFIC-IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above ACL will allow the following:&lt;/P&gt;&lt;P&gt;1st line: outbound DNS request&lt;/P&gt;&lt;P&gt;2nd line: outbound mail from mail server&lt;/P&gt;&lt;P&gt;3rd line: outbound HTTP traffic from an ip address that is allowed HTTP access&lt;/P&gt;&lt;P&gt;4th line: outbound HTTPS traffic from an ip address that is allowed HTTPS access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything else will be denied going outbound.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 11:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563366#M608562</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-10-21T11:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563367#M608563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much Halim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It worked very well i did not have any issues, but then after that i realised that i can not ping outside any more, I use the oing normally to test the internet Connection for which I report to my ISP in case it drops. how do i enable that traffic,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and Secondly if i want to restrict again in the group of people allowed to access the internet is there a way i can limit some of them to just afew websites related to the work they do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise am as happy as can be for your help, I dunno wati would have done without you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 08:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563367#M608563</guid>
      <dc:creator>mukalazisnr</dc:creator>
      <dc:date>2010-11-02T08:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563368#M608564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To allow outbound ping, you can configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside-acl permit icmp any any&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a couple of methods that you can use to restrict a group of people to access only certains websites:&lt;/P&gt;&lt;P&gt;1) If you know the ip address of the websites, you can just configure access-list to only allow those users to access those ip addresses.&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;www.cisco.com ip address is 198.133.219.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure the following ACL to allow access to only cisco.com:&lt;/P&gt;&lt;P&gt;access-list inside-acl permit tcp host &lt;ALLOW-WEB-TRAFFIC-IP&gt; host 198.133.219.25 eq 80&lt;/ALLOW-WEB-TRAFFIC-IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure the same for other websites that you know the ip address, and/or if there is only 1 ip address associated to the websites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If there are multiple ip addresses associated to the websites, for example: google.com, then you can use regex (regular expression) to allow/disallow access. However, this method is slightly more complicated and is only supported from version 7.2 onwards.&lt;/P&gt;&lt;P&gt;Here is a sample configuration for your reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 04:50:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563368#M608564</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-11-04T04:50:37Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563369#M608565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you again Jenifer,&lt;/P&gt;&lt;P&gt;that fixed most of my issues i think the last one is the VPN i have a cisco Client VPN now when the user tries to connect he gets an error;&lt;SPAN class="l active_link"&gt; reason &lt;EM&gt;412: The remote peer is no longer responding, i have tried to add an access list to allow port 500, 510, and &lt;/EM&gt;&lt;/SPAN&gt;62515 still no luck any help on this one?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Nov 2010 09:33:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563369#M608565</guid>
      <dc:creator>mukalazisnr</dc:creator>
      <dc:date>2010-11-05T09:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563370#M608566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the VPN Client terminating on the same ASA, or on a different device?&lt;/P&gt;&lt;P&gt;If it's terminating on the ASA, you don't need to configure any access-list. From the configuration posted earlier, I don't see any VPN being configured. Can you share the configuration?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Nov 2010 11:10:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563370#M608566</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-11-05T11:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563371#M608567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i sent you the config in a private email&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Nov 2010 13:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563371#M608567</guid>
      <dc:creator>mukalazisnr</dc:creator>
      <dc:date>2010-11-05T13:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563372#M608568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jenefer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it has been resolved, i permited port 10000 for that particular pc then i went on the VPN client and did the same let it connect thru tcp/udp port 10000 that was it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much for your support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Nov 2010 09:29:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563372#M608568</guid>
      <dc:creator>mukalazisnr</dc:creator>
      <dc:date>2010-11-09T09:29:55Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563373#M608569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear, George. Thanks for the update.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Nov 2010 09:36:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563373#M608569</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-11-09T09:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: internet access restriction based on IP addresses. (ASA 5500</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563374#M608570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hope ur doing well, You are familer with my infrastructre, Lately&amp;nbsp; we acquired a Cisco Profile 42 Video Conferencing Equipment now i need&amp;nbsp; to get into the firewall and create a NAT or static route of the sorts&amp;nbsp; so that i can foward SIP and H232 to the VC I need your help on this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2011 12:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-restriction-based-on-ip-addresses-asa-5500/m-p/1563374#M608570</guid>
      <dc:creator>mukalazisnr</dc:creator>
      <dc:date>2011-11-09T12:58:06Z</dc:date>
    </item>
  </channel>
</rss>

