<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cannot Access External Network after upgrading to 9.2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3365426#M962960</link>
    <description>&lt;P&gt;Hi Josh,&lt;/P&gt;
&lt;P&gt;I think you should remove the second equal cost default route:&lt;/P&gt;
&lt;PRE&gt;!
no route outside 0.0.0.0 0.0.0.0 ATS-PDC-NAT 1
!&lt;/PRE&gt;
&lt;P&gt;ATS-PDC-NAT is an IP used by one of your static NAT statements to translate outside traffic to ATS-PDC (192.168.1.22), which incidentally you do not have a specific route for. Did you clear the config on this ASA before applying this new build??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you remove the static route, please can you post the output of:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer intput inside tcp 172.23.10.2 45000 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
    <pubDate>Fri, 13 Apr 2018 07:43:40 GMT</pubDate>
    <dc:creator>Seb Rupik</dc:creator>
    <dc:date>2018-04-13T07:43:40Z</dc:date>
    <item>
      <title>Cannot Access External Network after upgrading to 9.2</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3363180#M962955</link>
      <description>&lt;P&gt;After Upgrading from one ASA 5505 to another with a newer build I can no longer connect to the internet. Anyone have any suggestions? Below is attached config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;: Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;!&lt;BR /&gt;ASA Version 9.2(4)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA-5505&lt;BR /&gt;domain-name ats.local&lt;BR /&gt;names&lt;BR /&gt;name 192.168.200.0 ATS-VOICE-NET description ATS Internal Voice Network&lt;BR /&gt;name 10.1.10.0 ATS-Voice-SE description ATS Voice Service Module&lt;BR /&gt;name 192.168.1.0 ATS-Net description ATS Internal Data Network&lt;BR /&gt;name 172.30.29.0 ATS-VPN-Clients description ATS VPN Clients&lt;BR /&gt;name 71.240.169.171 ATS-PDC-NAT description NAT outside IP address for ATS-PDC&lt;BR /&gt;name 192.168.1.22 ATS-PDC description ATS PDC Server&lt;BR /&gt;name 71.240.169.172 VMS-Outside&lt;BR /&gt;name 192.168.100.20 VMS-SERVER&lt;BR /&gt;ip local pool ATS-VPN-Pool 172.30.29.2-172.30.29.14 mask 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; description DMZ network&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.23.10.1 255.255.255.0&lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; description Outside interface to Verizon FIOS&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 71.240.169.170 255.255.255.248&lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; description Fail-Over Network&lt;BR /&gt; nameif failover&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.10.10.2 255.255.255.0&lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; description Video Camera Network&lt;BR /&gt; no nameif&lt;BR /&gt; security-level 100&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name ats.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-71.240.169.170&lt;BR /&gt; host 71.240.169.170&lt;BR /&gt;object network obj-10.1.10.1-OUT&lt;BR /&gt; host 10.1.10.1&lt;BR /&gt;object network obj-71.240.169.172&lt;BR /&gt; host 71.240.169.172&lt;BR /&gt;object network ATS-PDC-NAT&lt;BR /&gt; host 71.240.169.171&lt;BR /&gt;object network obj-172.30.29.0&lt;BR /&gt;object network ATS-Net&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt; description ATS Internal Data Network&lt;BR /&gt;object network ATS-PDC&lt;BR /&gt; host 192.168.1.22&lt;BR /&gt; description ATS PDC Server&lt;BR /&gt;object network ATS-VOICE-NET&lt;BR /&gt; subnet 192.168.200.0 255.255.255.0&lt;BR /&gt; description ATS Internal Voice Network&lt;BR /&gt;object network ATS-Voice-SE&lt;BR /&gt; subnet 10.1.10.0 255.255.255.0&lt;BR /&gt; description ATS Voice Service Module&lt;BR /&gt;object network ATS-VPN-Clients&lt;BR /&gt; subnet 172.30.29.0 255.255.255.240&lt;BR /&gt; description ATS VPN Clients&lt;BR /&gt;object network VMS-Outside&lt;BR /&gt; host 71.240.169.172&lt;BR /&gt;object network VMS-SERVER&lt;BR /&gt; host 192.168.100.20&lt;BR /&gt; description 255.2555.255.255&lt;BR /&gt;object network 192.168.0.0&lt;BR /&gt; subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;object network 192.168.0.0-24&lt;BR /&gt; subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;object network 192.168.3.0&lt;BR /&gt; subnet 192.168.3.0 255.255.255.0&lt;BR /&gt;object network 172.23.10.2&lt;BR /&gt; host 172.23.10.2&lt;BR /&gt;object network 172.23.10.20&lt;BR /&gt; host 172.23.10.20&lt;BR /&gt;object service ssh-PAT&lt;BR /&gt; service tcp source eq ssh destination eq 333&lt;BR /&gt;object service SSH&lt;BR /&gt; service tcp source eq ssh destination eq 333&lt;BR /&gt;object service ssh-service&lt;BR /&gt; service tcp destination eq ssh&lt;BR /&gt;object service http&lt;BR /&gt; service tcp destination eq www&lt;BR /&gt;object service https&lt;BR /&gt; service tcp destination eq https&lt;BR /&gt;object service 22609-Service&lt;BR /&gt; service tcp destination eq 22609&lt;BR /&gt;object service ssh-23&lt;BR /&gt; service tcp destination eq telnet&lt;BR /&gt;object network OBJ_GENERIC_ALL&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network INSIDE-NET&lt;BR /&gt; subnet 172.23.10.0 255.255.255.0&lt;BR /&gt;object-group network ATS-Networks&lt;BR /&gt; description ATS Internal Networks&lt;BR /&gt; network-object object ATS-Net&lt;BR /&gt; network-object object ATS-VOICE-NET&lt;BR /&gt; network-object object ATS-Voice-SE&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object icmp echo&lt;BR /&gt; service-object tcp destination eq ftp&lt;BR /&gt; service-object tcp destination eq ssh&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access_in remark Allow FTP, SSH, and ICMP Echo protocols to PDC server&lt;BR /&gt;access-list outside_access_in extended permit tcp 69.15.59.192 255.255.255.240 interface outside eq 333&lt;BR /&gt;access-list outside_access_in extended permit tcp 69.15.59.192 255.255.255.240 interface outside eq www&lt;BR /&gt;access-list outside_access_in remark Video&lt;BR /&gt;access-list outside_access_in extended permit icmp any interface outside echo-reply&lt;BR /&gt;access-list outside_access_in extended permit ip any object VMS-Outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object VMS-Outside eq 22069&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any host 71.240.169.171&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq ssh&lt;BR /&gt;access-list outside_access_in extended permit object ssh-service any any&lt;BR /&gt;access-list outside_access_in extended permit object ssh-PAT any any&lt;BR /&gt;access-list outside_access_in remark Allow FTP, SSH, and ICMP Echo protocols to PDC server&lt;BR /&gt;access-list outside_access_in remark Video&lt;BR /&gt;access-list outside_access_in remark Allow FTP, SSH, and ICMP Echo protocols to PDC server&lt;BR /&gt;access-list outside_access_in remark Video&lt;BR /&gt;access-list outside_access_in remark Video&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl remark ATS Internal Data Network&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl standard permit 172.23.10.0 255.255.255.0&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl remark ATS Internal Voice Network&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl standard permit 192.168.200.0 255.255.255.0&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl remark ATS Voice Service Module&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl standard permit 10.1.10.0 255.255.255.0&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl remark ATS Internal Data Network&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl remark ATS Internal Voice Network&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl remark ATS Voice Service Module&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl remark ATS Internal Data Network&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl remark ATS Internal Voice Network&lt;BR /&gt;access-list ATS_VPN_splitTunnelAcl remark ATS Voice Service Module&lt;BR /&gt;access-list inside_nat0_outbound remark NAT for ATS Internal Networks&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.23.10.0 255.255.255.0 192.168.240.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.23.10.0 255.255.255.0 192.168.241.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound remark NAT for ATS Internal Networks&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.23.10.0 255.255.255.0 object ATS-VPN-Clients&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object ATS-Net 192.168.240.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object ATS-VOICE-NET 192.168.240.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object ATS-Voice-SE 192.168.240.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object ATS-Net 192.168.241.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object ATS-VOICE-NET 192.168.241.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object ATS-Voice-SE 192.168.241.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound remark NAT for ATS Internal Networks&lt;BR /&gt;access-list inside_nat0_outbound remark NAT for ATS Internal Networks&lt;BR /&gt;access-list inside_nat0_outbound remark NAT for ATS Internal Networks&lt;BR /&gt;access-list inside_nat0_outbound remark NAT for ATS Internal Networks&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group ATS-Networks object ATS-VPN-Clients&lt;BR /&gt;access-list inside_nat0_outbound remark NAT for ATS Internal Networks&lt;BR /&gt;access-list inside_nat0_outbound remark NAT for ATS Internal Networks&lt;BR /&gt;access-list inside_nat0_outbound remark NAT for ATS Internal Networks&lt;BR /&gt;access-list inside_nat0_outbound remark NAT for ATS Internal Networks&lt;BR /&gt;access-list VMS_access_in extended permit ip 71.240.169.0 255.255.255.0 any&lt;BR /&gt;access-list cap extended permit tcp any host 68.37.198.17&lt;BR /&gt;access-list cap extended permit tcp host 68.37.198.17 any&lt;BR /&gt;access-list cap extended permit icmp any host 68.37.198.17&lt;BR /&gt;access-list cap extended permit icmp host 68.37.198.17 any&lt;BR /&gt;access-list split_tunnel extended permit ip 172.23.10.0 255.255.255.0 192.168.240.0 255.255.255.0&lt;BR /&gt;access-list split_tunnel extended permit ip 192.168.241.0 255.255.255.0 192.168.240.0 255.255.255.0&lt;BR /&gt;access-list split_tunnel extended permit ip object ATS-Net 192.168.240.0 255.255.255.0&lt;BR /&gt;access-list split_tunnel extended permit ip object ATS-VOICE-NET 192.168.240.0 255.255.255.0&lt;BR /&gt;access-list split_tunnel extended permit ip object ATS-Voice-SE 192.168.240.0 255.255.255.0&lt;BR /&gt;access-list split_tunnel_1 extended permit ip 172.23.10.0 255.255.255.0 192.168.241.0 255.255.255.0&lt;BR /&gt;access-list split_tunnel_1 extended permit ip 192.168.240.0 255.255.255.0 192.168.241.0 255.255.255.0&lt;BR /&gt;access-list split_tunnel_1 extended permit ip object ATS-Net 192.168.241.0 255.255.255.0&lt;BR /&gt;access-list split_tunnel_1 extended permit ip object ATS-VOICE-NET 192.168.241.0 255.255.255.0&lt;BR /&gt;access-list split_tunnel_1 extended permit ip object ATS-Voice-SE 192.168.241.0 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap_10.10 extended permit ip any4 any4&lt;BR /&gt;access-list outside_cryptomap_65535 extended permit ip any4 any4&lt;BR /&gt;no pager&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm warnings&lt;BR /&gt;logging host inside 172.23.10.100&lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 305012&lt;BR /&gt;no logging message 305011&lt;BR /&gt;no logging message 302015&lt;BR /&gt;no logging message 302014&lt;BR /&gt;no logging message 302013&lt;BR /&gt;no logging message 302016&lt;BR /&gt;no logging message 302021&lt;BR /&gt;no logging message 302020&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu failover 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit ATS-Net 255.255.255.0 inside&lt;BR /&gt;icmp permit 172.23.10.0 255.255.255.0 inside&lt;BR /&gt;icmp permit ATS-VPN-Clients 255.255.255.240 inside&lt;BR /&gt;icmp permit ATS-VOICE-NET 255.255.255.0 inside&lt;BR /&gt;icmp permit any echo outside&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static 172.23.10.2 interface service ssh-service ssh-PAT&lt;BR /&gt;nat (inside,outside) source static 172.23.10.20 VMS-Outside service 22609-Service 22609-Service&lt;BR /&gt;nat (inside,outside) source static obj-10.1.10.1-OUT obj-10.1.10.1-OUT service http http no-proxy-arp&lt;BR /&gt;nat (inside,outside) source static obj-10.1.10.1-OUT obj-10.1.10.1-OUT service https https no-proxy-arp&lt;BR /&gt;nat (inside,outside) source static 172.23.10.20 172.23.10.20 service http http no-proxy-arp&lt;BR /&gt;nat (inside,outside) source static 172.23.10.20 172.23.10.20 service https https no-proxy-arp&lt;BR /&gt;nat (inside,outside) source static ATS-PDC ATS-PDC-NAT&lt;BR /&gt;nat (inside,any) source static any any service SSH SSH&lt;BR /&gt;nat (any,any) source static any any service ssh-23 ssh-23&lt;BR /&gt;nat (inside,outside) source dynamic OBJ_GENERIC_ALL interface&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network INSIDE-NET&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 71.240.169.1 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 ATS-PDC-NAT 1&lt;BR /&gt;route inside ATS-Voice-SE 255.255.255.0 172.23.10.2 1&lt;BR /&gt;route inside ATS-Net 255.255.255.0 172.23.10.2 1&lt;BR /&gt;route inside ATS-VOICE-NET 255.255.255.0 172.23.10.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http ATS-Net 255.255.255.0 inside&lt;BR /&gt;http 172.23.10.0 255.255.255.0 inside&lt;BR /&gt;http 74.7.110.168 255.255.255.248 outside&lt;BR /&gt;http 66.180.118.88 255.255.255.248 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev1 transform-set vpn_set esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set vpn_set&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map dynmap 10 match address outside_cryptomap_10.10&lt;BR /&gt;crypto dynamic-map dynmap 10 set ikev1 transform-set vpn_set&lt;BR /&gt;crypto dynamic-map dynmap 10 set security-association lifetime seconds 2147483647&lt;BR /&gt;crypto dynamic-map dynmap 10 set security-association lifetime kilobytes 2147483647&lt;BR /&gt;crypto map outside_map 10 ipsec-isakmp dynamic dynmap&lt;BR /&gt;crypto map outside_map 65535 match address outside_cryptomap_65535&lt;BR /&gt;crypto map outside_map 65535 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 65535 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt; no validation-usage&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 43200&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash md5&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;telnet timeout 15&lt;BR /&gt;ssh scopy enable&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh 172.23.10.0 255.255.255.0 inside&lt;BR /&gt;ssh ATS-Net 255.255.255.0 inside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.23.10.5-172.23.10.129 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 64.113.32.5&lt;BR /&gt;ntp server 18.26.4.105&lt;BR /&gt;ssl encryption rc4-sha1 aes128-sha1 3des-sha1&lt;BR /&gt;webvpn&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt;group-policy ATS_VPN_1 internal&lt;BR /&gt;group-policy ATS_VPN_1 attributes&lt;BR /&gt; dns-server value 192.168.1.20 208.180.42.100&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value split_tunnel_1&lt;BR /&gt; nem enable&lt;BR /&gt;group-policy ATS_VPN internal&lt;BR /&gt;group-policy ATS_VPN attributes&lt;BR /&gt; dns-server value 192.168.1.20 208.180.42.100&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value split_tunnel&lt;BR /&gt;tunnel-group ATS_VPN type remote-access&lt;BR /&gt;tunnel-group ATS_VPN general-attributes&lt;BR /&gt; address-pool ATS-VPN-Pool&lt;BR /&gt; default-group-policy ATS_VPN&lt;BR /&gt;tunnel-group ATS_VPN ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group ATS_VPN_1 type remote-access&lt;BR /&gt;tunnel-group ATS_VPN_1 general-attributes&lt;BR /&gt; address-pool ATS-VPN-Pool&lt;BR /&gt; default-group-policy ATS_VPN_1&lt;BR /&gt;tunnel-group ATS_VPN_1 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns migrated_dns_map_1&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt; no active&lt;BR /&gt; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt; destination address email callhome@cisco.com&lt;BR /&gt; destination transport-method http&lt;BR /&gt; subscribe-to-alert-group diagnostic&lt;BR /&gt; subscribe-to-alert-group environment&lt;BR /&gt; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3363180#M962955</guid>
      <dc:creator>jljones</dc:creator>
      <dc:date>2020-02-21T15:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Access External Network after upgrading to 9.2</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3363259#M962956</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;What is the output of:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer intput inside tcp 172.23.10.2 45000 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also are both of your default route next-hops reachable from the ASA:&lt;/P&gt;
&lt;P&gt;71.240.169.1&lt;/P&gt;
&lt;P&gt;71.240.169.171&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2018 07:40:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3363259#M962956</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2018-04-10T07:40:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Access External Network after upgrading to 9.2</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3363722#M962957</link>
      <description>&lt;P&gt;nothing is reachable on the outside interface including next hop. Nothing for tracert.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2018 20:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3363722#M962957</guid>
      <dc:creator>jljones</dc:creator>
      <dc:date>2018-04-10T20:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Access External Network after upgrading to 9.2</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3364087#M962958</link>
      <description>&lt;P&gt;Sounds like you may have an issue between your ASA and your gateway devices.&lt;/P&gt;
&lt;P&gt;Do you have a switch positioned between the ASA and the two routers?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the output of &lt;STRONG&gt;sh arp&lt;/STRONG&gt; on the ASA?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Apr 2018 08:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3364087#M962958</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2018-04-11T08:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Access External Network after upgrading to 9.2</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3365290#M962959</link>
      <description>&lt;P&gt;Hi, thanks, here are the details and items to be considered. From the config above the outside interface subnet is 255.255.255.0. There is a hub connected to the external ISP and connected to it are the ASA5505 and a laptop. The laptop has no issue with internet access using an IP of .173.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I run a SH ARP command from the ASA I get:&lt;/P&gt;
&lt;P&gt;ASA-5505(config)# SH ARP&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside 71.240.169.173 0026.b916.e134 11&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside 71.240.169.1 f4b5.2f04.b0c3 76&lt;BR /&gt; &lt;/P&gt;
&lt;P&gt;When I run an ARP /A command from the laptop i get:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; color: black;"&gt;D:\Users\steve&amp;gt;ARP /A&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; color: black;"&gt;Interface: 71.240.169.173 --- 0xa&lt;BR /&gt; &amp;nbsp; Internet Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Physical Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type&lt;BR /&gt; &amp;nbsp; 71.240.169.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; f4-b5-2f-04-b0-c3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic&lt;BR /&gt; &amp;nbsp; 71.240.169.170&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6c-41-6a-7f-dc-aa&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic&lt;BR /&gt; &amp;nbsp; 71.240.169.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ff-ff-ff-ff-ff-ff&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static&lt;BR /&gt; &amp;nbsp; 224.0.0.22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 01-00-5e-00-00-16&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static&lt;BR /&gt; &amp;nbsp; 224.0.0.251&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 01-00-5e-00-00-fb&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static&lt;BR /&gt; &amp;nbsp; 224.0.0.252&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 01-00-5e-00-00-fc&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static&lt;BR /&gt; &amp;nbsp; 239.255.255.250&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 01-00-5e-7f-ff-fa&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static&lt;BR /&gt; &amp;nbsp; 255.255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ff-ff-ff-ff-ff-ff&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; color: black;"&gt;Again, both are connected to the same hub that is also connected to ISP, laptop has no issues getting outside.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; color: black;"&gt;best,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; color: black;"&gt;Josh&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 01:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3365290#M962959</guid>
      <dc:creator>joshualochjones</dc:creator>
      <dc:date>2018-04-13T01:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Access External Network after upgrading to 9.2</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3365426#M962960</link>
      <description>&lt;P&gt;Hi Josh,&lt;/P&gt;
&lt;P&gt;I think you should remove the second equal cost default route:&lt;/P&gt;
&lt;PRE&gt;!
no route outside 0.0.0.0 0.0.0.0 ATS-PDC-NAT 1
!&lt;/PRE&gt;
&lt;P&gt;ATS-PDC-NAT is an IP used by one of your static NAT statements to translate outside traffic to ATS-PDC (192.168.1.22), which incidentally you do not have a specific route for. Did you clear the config on this ASA before applying this new build??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you remove the static route, please can you post the output of:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer intput inside tcp 172.23.10.2 45000 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Apr 2018 07:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-network-after-upgrading-to-9-2/m-p/3365426#M962960</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2018-04-13T07:43:40Z</dc:date>
    </item>
  </channel>
</rss>

