<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Website not accessible on single ASA interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/website-not-accessible-on-single-asa-interface/m-p/3951695#M935710</link>
    <description>&lt;P&gt;Your ASA configuration appears correct from what you've shared.&lt;/P&gt;
&lt;P&gt;Its older software and inability to support newer ciphers only affects traffic that terminates on the ASA itself - not anything going THROUGH the ASA.&lt;/P&gt;
&lt;P&gt;How it is setup physically? i.e. is your public VLAN 10 traffic connecting to the ASA via a trunk or on a dedicated interface?&lt;/P&gt;</description>
    <pubDate>Fri, 01 Nov 2019 11:48:49 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-11-01T11:48:49Z</dc:date>
    <item>
      <title>Website not accessible on single ASA interface</title>
      <link>https://community.cisco.com/t5/network-security/website-not-accessible-on-single-asa-interface/m-p/3951362#M935709</link>
      <description>&lt;P&gt;I am working with an old ASA 5505 version 8.4(3).&amp;nbsp; On this ASA there are three interfaces: Public [VLAN 10] 172.16.0.1/24, Private [VLAN 5] 172.16.1.1/24 and Outside [VLAN1] External IP.&amp;nbsp; If I plug my laptop into a switch on the Private interface I can get to this external website (hosted by an outside company).&amp;nbsp; When I connect my laptop to the Public interface I get a website timed out error.&amp;nbsp; I captured session information from my laptop using Fiddler for both networks.&amp;nbsp; On Public I see the HTTP request timed out and it was not able to authenticate with the site certificate.&amp;nbsp; Looking at the firewall we are using deprecated protocols and ciphers.&amp;nbsp; I would update the firewall with the latest firmware but there is no service contract.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All I am asking is: could the reason we cannot navigate to the site on the Public interface because the firewall is using old ciphers/protocols? If so, how is it possible one interface is using one suite while another is using something different?&amp;nbsp; If not, what else could be blocking the site on the firewall?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I say it's the firewall because I am testing with a laptop that has no AV, Windows firewall disabled, no other software and it's not on the domain.&amp;nbsp; It's not software on the computers causing the problem.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently the ASA can only support SSL 3.0/TLS 1.0 because no one ever updated the device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ran a packet capture on the firewall and saw traffic going from my computer through the Public interface but nothing from/to the Outside interface from the external site.&amp;nbsp; Something has to be blocking traffic on the firewall but I don't know what it is.&lt;/P&gt;&lt;P&gt;**EDIT** Here is part of my config and the result of a packet-tracer:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;interface Vlan2
 nameif private
 security-level 50
 ip address 10.0.2.1 255.255.255.0 
!
interface Vlan3
 nameif outside
 security-level 0
 ip address 1.1.1.1 255.255.255.224 
!
interface Vlan10
 nameif public
 security-level 100
 ip address 172.16.0.254 255.255.255.0 
!
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network public-net
 subnet 172.16.0.0 255.255.255.0
object network outside-nat
 host 1.1.1.1
object network private_10.0.2.0
 subnet 10.0.2.0 255.255.255.0
access-list outside_access_in extended permit ip any any 
pager lines 24
logging enable
logging asdm informational
mtu private 1500
mtu outside 1500
mtu public 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-647.bin
no asdm history enable
arp timeout 14400
object network public-net
 nat (public,outside) dynamic interface
object network private_10.0.2.0
 nat (private,outside) dynamic interface
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;/PRE&gt;&lt;P&gt;And here is the packet tracer:&lt;/P&gt;&lt;PRE&gt;Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   0.0.0.0         0.0.0.0         outside

Phase: 3
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 4
Type: NAT
Subtype:
Result: ALLOW
Config:
object network public-net
 nat (public,outside) dynamic interface
Additional Information:
Dynamic translate 172.16.0.22/443 to 1.1.1.1/261

Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 6
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 158038629, packet dispatched to next 
module

Result:
input-interface: public
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: allow&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/website-not-accessible-on-single-asa-interface/m-p/3951362#M935709</guid>
      <dc:creator>Trebien21</dc:creator>
      <dc:date>2020-02-21T17:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: Website not accessible on single ASA interface</title>
      <link>https://community.cisco.com/t5/network-security/website-not-accessible-on-single-asa-interface/m-p/3951695#M935710</link>
      <description>&lt;P&gt;Your ASA configuration appears correct from what you've shared.&lt;/P&gt;
&lt;P&gt;Its older software and inability to support newer ciphers only affects traffic that terminates on the ASA itself - not anything going THROUGH the ASA.&lt;/P&gt;
&lt;P&gt;How it is setup physically? i.e. is your public VLAN 10 traffic connecting to the ASA via a trunk or on a dedicated interface?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2019 11:48:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/website-not-accessible-on-single-asa-interface/m-p/3951695#M935710</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-11-01T11:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: Website not accessible on single ASA interface</title>
      <link>https://community.cisco.com/t5/network-security/website-not-accessible-on-single-asa-interface/m-p/3951703#M935712</link>
      <description>&lt;P&gt;It's a dedicated interface from switch to ASA it's a trunk from the ASA to the ISP.&amp;nbsp; So my laptop plugs into a switch on the public network that switch passes traffic to the ASA the ASA sends it out the trunk to the ISP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2019 12:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/website-not-accessible-on-single-asa-interface/m-p/3951703#M935712</guid>
      <dc:creator>Trebien21</dc:creator>
      <dc:date>2019-11-01T12:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: Website not accessible on single ASA interface</title>
      <link>https://community.cisco.com/t5/network-security/website-not-accessible-on-single-asa-interface/m-p/3952040#M935714</link>
      <description>&lt;P&gt;Did you confirm you can resolve the address of the website's FQDN when you plug into the public interface?&lt;/P&gt;
&lt;P&gt;Have you tried capturing traffic on your Outside interface to/from the public web server?&lt;/P&gt;
&lt;P&gt;Try this:&lt;/P&gt;
&lt;PRE&gt;capture capout interface outside match tcp any &amp;lt;website ip&amp;gt; 255.255.255.255 eq 80&lt;/PRE&gt;
&lt;P&gt;(or "eq 443" for https).&lt;/P&gt;</description>
      <pubDate>Sat, 02 Nov 2019 04:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/website-not-accessible-on-single-asa-interface/m-p/3952040#M935714</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-11-02T04:54:26Z</dc:date>
    </item>
  </channel>
</rss>

