<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Internet Access from LAN flapping on ASA 5506 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775559#M7954</link>
    <description>&lt;P&gt;in the past when was it? what ASA box and what version?&lt;/P&gt;</description>
    <pubDate>Tue, 08 Jan 2019 23:16:35 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2019-01-08T23:16:35Z</dc:date>
    <item>
      <title>Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775503#M7932</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have been in situation feels like crazy as everything on ASA configured is OK. Still Internet is not working on LAN side or sometimes flapped. Here I am giving all the required configuration and testing done by me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WAN: x.x.x.x&lt;/P&gt;&lt;P&gt;LAN:&amp;nbsp;&lt;SPAN&gt;10.184.2.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From ASA can able to ping both LAN side devices as well as WAN side (8.8.8.8) &amp;amp; (Gateway).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Running Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: ABCDZEE&lt;BR /&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password $sha512$5000$7M8VSNtue5ABc2G1tmiuDQ==$3jzB+QaYW6Puc8mqWAfEWw== pbkdf2&lt;BR /&gt;names&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.184.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x x.x.x.x&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_3&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_4&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_5&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_6&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_7&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any1&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:653c319420afd6503f38236cecd2c6e0&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Even tested using Packet-Tracer and it's positive still where is the fault:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;sh nat&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;sh access-list &amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;&amp;#8;packet-tracer input inside icmp 10.184.2.25 8 0 8.8.8.8 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop (x.x.x.x gateway)using egress ifc outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.184.2.25/0 to x.x.x.x/14506&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fb4f9b6cec0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=1251, user_data=0x7fb4f90af9d0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fb4f8c60c40, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=1086, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fb4f986c390, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=1392, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fb4f99cd0c0, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;hits=8, user_data=0x7fb4fa0fe1b0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fb4f986bba0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=263, user_data=0x7fb4f986b110, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fb4f8c60c40, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=1088, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fb4f98fffc0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=1150, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1428, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PLEASE SUGGEST! THANKS IN ADVANCE.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775503#M7932</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2020-02-21T16:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775513#M7933</link>
      <description>Hi,&lt;BR /&gt;So the output of the packet-tracer confirms it should be permitted, but what source IP address are you using when it does not work?&lt;BR /&gt;Is it also from the 10.184.2.x network?&lt;BR /&gt;You have multiple interfaces defined are you accessing from these networks? Your current nat entry only allows from the source "inside".&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Jan 2019 22:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775513#M7933</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-08T22:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775515#M7934</link>
      <description>&lt;P&gt;can you try this and tell us if its working&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 10.184.2.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 22:27:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775515#M7934</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-08T22:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775520#M7935</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;I was thinking he is missing the subnet as in current config the subnet is 0.0.0.0 0.0.0.0 which is why&amp;nbsp; lan can not use the nat to do the PAT.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 22:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775520#M7935</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-08T22:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775521#M7936</link>
      <description>Yes the devices on lan is on subnet 10.184.2.x /24. As per above configuration NAT allowed is correct or not ?</description>
      <pubDate>Tue, 08 Jan 2019 22:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775521#M7936</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-08T22:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775523#M7937</link>
      <description>&lt;P&gt;i think you need to give this command and test it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 10.184.2.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 22:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775523#M7937</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-08T22:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775524#M7938</link>
      <description>Done. Still the problem persist. Even changed the firewall.</description>
      <pubDate>Tue, 08 Jan 2019 22:33:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775524#M7938</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-08T22:33:12Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775526#M7939</link>
      <description>&lt;P&gt;give us a output of this command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show conn&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;not all of them few of the output would be ok. do you have any switch between the user and the firewall? As per your packet tracer output 10.x.x.x network is ok go to out to internet. if there is switch in between than check that might be flapping in on that side?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 22:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775526#M7939</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-08T22:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775531#M7941</link>
      <description>Hi, please refer to this link for the output. &lt;A href="https://pastebin.com/0PtkVBMN" target="_blank"&gt;https://pastebin.com/0PtkVBMN&lt;/A&gt;</description>
      <pubDate>Tue, 08 Jan 2019 22:47:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775531#M7941</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-08T22:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775533#M7943</link>
      <description>&lt;P&gt;Thanks for the output as one example:&amp;nbsp;&lt;/P&gt;&lt;P&gt;outside &amp;nbsp;8.8.8.8:53 inside &amp;nbsp;10.184.2.71:49580 seem your nat is working fine. but could you explain how the user are connected to firewall?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 22:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775533#M7943</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-08T22:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775536#M7944</link>
      <description>Firewall LAN side port is connected to cisco switch sg 220 and then users. currently checking the issue with switch if any.</description>
      <pubDate>Tue, 08 Jan 2019 22:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775536#M7944</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-08T22:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775549#M7946</link>
      <description>&lt;P&gt;looking into your firewall config. you have one interface conneted to firewall as inside and other one is connected to internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;USER-----&amp;gt;SW-----&amp;gt;FW------INTERNET&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in regards to your firewall config is ok according to your network. i suspect there is issue somewhere in switch. as i see the conn connection there is traffic flow happening.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 23:03:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775549#M7946</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-08T23:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775551#M7947</link>
      <description>If switch is the issue. Then can I connect those four servers directly in firewall interface and can act as one (subnet using Bvi) ?</description>
      <pubDate>Tue, 08 Jan 2019 23:06:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775551#M7947</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-08T23:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775554#M7949</link>
      <description>&lt;P&gt;your BVI has no ip address and no name and no nat rule. once you define these than yes you can connect your server directly to the firewall.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 23:13:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775554#M7949</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-08T23:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775555#M7952</link>
      <description>In past when I entered nameif command in Bvi firewall crashed. So What is the issue with that ? What if it happen again.</description>
      <pubDate>Tue, 08 Jan 2019 23:14:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775555#M7952</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-08T23:14:45Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775559#M7954</link>
      <description>&lt;P&gt;in the past when was it? what ASA box and what version?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 23:16:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775559#M7954</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-08T23:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775568#M7957</link>
      <description>ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;Version 9.8(2). Today itself it rebooted.</description>
      <pubDate>Tue, 08 Jan 2019 23:32:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775568#M7957</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-08T23:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775797#M7960</link>
      <description>&lt;P&gt;did you figured out what the issue was?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 08:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3775797#M7960</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-09T08:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3776140#M7963</link>
      <description>Yes. Issue is on WAN side, asa is connected to comcast modem and dhcp was enable and double nat creating problem so internal devices not able to connect internet. Currently working on the WAN Side.</description>
      <pubDate>Wed, 09 Jan 2019 15:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3776140#M7963</guid>
      <dc:creator>jrnetipsec</dc:creator>
      <dc:date>2019-01-09T15:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: Internet Access from LAN flapping on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3776143#M8024</link>
      <description>&lt;P&gt;Glad you fix the issue. you mind rate the post please.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jan 2019 15:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internet-access-from-lan-flapping-on-asa-5506/m-p/3776143#M8024</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-09T15:02:56Z</dc:date>
    </item>
  </channel>
</rss>

