<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Internal Subnets not getting OUT via ASA outside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/internal-subnets-not-getting-out-via-asa-outside-interface/m-p/3934326#M1050483</link>
    <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;It may very well be the time of day I'm writing this and long hours of looking at the screen.. but I'm setting up a lab ASA with an inside and outside interface. Inside interface is connected to a L3 Nexus 3064 using a transit VLAN ( 172.31.100.0/29) with simply a default route on the N3K pointing to the ASA's inside interface (172.31.100.1) - I have 3 different internal subnets I'd like to get out to the internet via any protocol.&lt;/P&gt;&lt;P&gt;LabMgmt- 10.0.0.0/24&lt;/P&gt;&lt;P&gt;VM_NetworkA- 10.0.1.0/24&lt;/P&gt;&lt;P&gt;VM_NetworkB- 10.0.2.0/24AC&lt;/P&gt;&lt;P&gt;The gateways of the above networks reside on the Nexus 3k (all .1 respectively) I'm using the Nexus 3k as a test by sourcing the gateway IP address to 1.1.1.1 for example. The ASA itself can ping 1.1.1.1 but the none of the Nexus internal networks can. Below is the configuration,.. I must be missing something really silly..&lt;/P&gt;&lt;P&gt;I show a capture of testing with 10.0.2.1. any help would be appreciated! Thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Boston-LabASA# show capture&lt;BR /&gt;capture capinside type raw-data interface inside [Capturing - 570 bytes]&lt;BR /&gt;match ip host 10.0.2.1 any&lt;BR /&gt;capture asp-drop type raw-data interface inside [Capturing - 570 bytes]&lt;BR /&gt;match ip host 10.0.2.1 any&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA# show cap&lt;BR /&gt;Boston-LabASA# show capture capinside&lt;/P&gt;&lt;P&gt;5 packets captured&lt;/P&gt;&lt;P&gt;1: 02:17:13.132378 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;2: 02:17:15.140724 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;3: 02:17:17.151450 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;4: 02:17:19.161780 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;5: 02:17:21.172125 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;5 packets shown&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA# show cap asp-drop&lt;/P&gt;&lt;P&gt;5 packets captured&lt;/P&gt;&lt;P&gt;1: 02:17:13.132378 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;2: 02:17:15.140724 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;3: 02:17:17.151450 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;4: 02:17:19.161780 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;5: 02:17:21.172125 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;5 packets shown&lt;BR /&gt;Boston-LabASA#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Boston-LabASA# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number: FCH1928JDWD&lt;BR /&gt;: Hardware: ASA5512, 4096 MB RAM, CPU Clarkdale 2792 MHz, 1 CPU (2 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.2(3)4&lt;BR /&gt;!&lt;BR /&gt;hostname Boston-LabASA&lt;BR /&gt;names&lt;BR /&gt;ip local pool LABVPNUserPool 192.168.177.5-192.168.177.50 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description outside&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description inside&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.31.100.1 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa983-18-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name focustsi.com&lt;BR /&gt;object network LabMgmt_Network&lt;BR /&gt;subnet 10.0.0.0 255.255.255.0&lt;BR /&gt;object network VM_NetworkA&lt;BR /&gt;subnet 10.0.1.0 255.255.255.0&lt;BR /&gt;object network VM_NetworkB&lt;BR /&gt;subnet 10.0.2.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 10.0.0.0 255.255.255.0 192.168.177.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 172.31.100.0 255.255.255.0 192.168.177.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 10.0.1.0 255.255.255.0 192.168.177.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 10.0.2.0 255.255.255.0 192.168.177.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 10.0.3.0 255.255.255.0 192.168.177.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-792-152.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network LabMgmt_Network&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network VM_NetworkA&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network VM_NetworkB&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;route inside 10.0.0.0 255.255.255.0 172.31.100.2 1&lt;BR /&gt;route inside 10.0.1.0 255.255.255.0 172.31.100.2 1&lt;BR /&gt;route inside 10.0.2.0 255.255.255.0 172.31.100.2 1&lt;BR /&gt;route inside 10.0.3.0 255.255.255.0 172.31.100.2 1&lt;BR /&gt;route outside 192.168.177.0 255.255.255.0 x.x.x.x 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authorization exec LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain localtrust&lt;BR /&gt;quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl server-version any&lt;BR /&gt;ssl client-version any&lt;BR /&gt;ssl encryption 3des-sha1 aes128-sha1 aes256-sha1 des-sha1 rc4-sha1&lt;BR /&gt;ssl trust-point localtrust outside&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.3.00748-k9.pkg 1&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;group-policy LABVPNUser internal&lt;BR /&gt;group-policy LABVPNUser attributes&lt;BR /&gt;dns-server value 8.8.8.8&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value no-nat&lt;BR /&gt;address-pools value LABVPNUserPool&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly 19&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly 19&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:4aa9921ecd5699aecf89ac952f135196&lt;BR /&gt;: end&lt;BR /&gt;Boston-LabASA#&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:33:09 GMT</pubDate>
    <dc:creator>roliveira11</dc:creator>
    <dc:date>2020-02-21T17:33:09Z</dc:date>
    <item>
      <title>Internal Subnets not getting OUT via ASA outside interface</title>
      <link>https://community.cisco.com/t5/network-security/internal-subnets-not-getting-out-via-asa-outside-interface/m-p/3934326#M1050483</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;It may very well be the time of day I'm writing this and long hours of looking at the screen.. but I'm setting up a lab ASA with an inside and outside interface. Inside interface is connected to a L3 Nexus 3064 using a transit VLAN ( 172.31.100.0/29) with simply a default route on the N3K pointing to the ASA's inside interface (172.31.100.1) - I have 3 different internal subnets I'd like to get out to the internet via any protocol.&lt;/P&gt;&lt;P&gt;LabMgmt- 10.0.0.0/24&lt;/P&gt;&lt;P&gt;VM_NetworkA- 10.0.1.0/24&lt;/P&gt;&lt;P&gt;VM_NetworkB- 10.0.2.0/24AC&lt;/P&gt;&lt;P&gt;The gateways of the above networks reside on the Nexus 3k (all .1 respectively) I'm using the Nexus 3k as a test by sourcing the gateway IP address to 1.1.1.1 for example. The ASA itself can ping 1.1.1.1 but the none of the Nexus internal networks can. Below is the configuration,.. I must be missing something really silly..&lt;/P&gt;&lt;P&gt;I show a capture of testing with 10.0.2.1. any help would be appreciated! Thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Boston-LabASA# show capture&lt;BR /&gt;capture capinside type raw-data interface inside [Capturing - 570 bytes]&lt;BR /&gt;match ip host 10.0.2.1 any&lt;BR /&gt;capture asp-drop type raw-data interface inside [Capturing - 570 bytes]&lt;BR /&gt;match ip host 10.0.2.1 any&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA# show cap&lt;BR /&gt;Boston-LabASA# show capture capinside&lt;/P&gt;&lt;P&gt;5 packets captured&lt;/P&gt;&lt;P&gt;1: 02:17:13.132378 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;2: 02:17:15.140724 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;3: 02:17:17.151450 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;4: 02:17:19.161780 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;5: 02:17:21.172125 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;5 packets shown&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA#&lt;BR /&gt;Boston-LabASA# show cap asp-drop&lt;/P&gt;&lt;P&gt;5 packets captured&lt;/P&gt;&lt;P&gt;1: 02:17:13.132378 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;2: 02:17:15.140724 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;3: 02:17:17.151450 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;4: 02:17:19.161780 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;5: 02:17:21.172125 10.0.2.1 &amp;gt; 1.1.1.1: icmp: echo request&lt;BR /&gt;5 packets shown&lt;BR /&gt;Boston-LabASA#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Boston-LabASA# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number: FCH1928JDWD&lt;BR /&gt;: Hardware: ASA5512, 4096 MB RAM, CPU Clarkdale 2792 MHz, 1 CPU (2 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.2(3)4&lt;BR /&gt;!&lt;BR /&gt;hostname Boston-LabASA&lt;BR /&gt;names&lt;BR /&gt;ip local pool LABVPNUserPool 192.168.177.5-192.168.177.50 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description outside&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description inside&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.31.100.1 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa983-18-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name focustsi.com&lt;BR /&gt;object network LabMgmt_Network&lt;BR /&gt;subnet 10.0.0.0 255.255.255.0&lt;BR /&gt;object network VM_NetworkA&lt;BR /&gt;subnet 10.0.1.0 255.255.255.0&lt;BR /&gt;object network VM_NetworkB&lt;BR /&gt;subnet 10.0.2.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 10.0.0.0 255.255.255.0 192.168.177.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 172.31.100.0 255.255.255.0 192.168.177.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 10.0.1.0 255.255.255.0 192.168.177.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 10.0.2.0 255.255.255.0 192.168.177.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 10.0.3.0 255.255.255.0 192.168.177.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-792-152.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network LabMgmt_Network&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network VM_NetworkA&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network VM_NetworkB&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;route inside 10.0.0.0 255.255.255.0 172.31.100.2 1&lt;BR /&gt;route inside 10.0.1.0 255.255.255.0 172.31.100.2 1&lt;BR /&gt;route inside 10.0.2.0 255.255.255.0 172.31.100.2 1&lt;BR /&gt;route inside 10.0.3.0 255.255.255.0 172.31.100.2 1&lt;BR /&gt;route outside 192.168.177.0 255.255.255.0 x.x.x.x 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authorization exec LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain localtrust&lt;BR /&gt;quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl server-version any&lt;BR /&gt;ssl client-version any&lt;BR /&gt;ssl encryption 3des-sha1 aes128-sha1 aes256-sha1 des-sha1 rc4-sha1&lt;BR /&gt;ssl trust-point localtrust outside&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.3.00748-k9.pkg 1&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;group-policy LABVPNUser internal&lt;BR /&gt;group-policy LABVPNUser attributes&lt;BR /&gt;dns-server value 8.8.8.8&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value no-nat&lt;BR /&gt;address-pools value LABVPNUserPool&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly 19&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly 19&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:4aa9921ecd5699aecf89ac952f135196&lt;BR /&gt;: end&lt;BR /&gt;Boston-LabASA#&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internal-subnets-not-getting-out-via-asa-outside-interface/m-p/3934326#M1050483</guid>
      <dc:creator>roliveira11</dc:creator>
      <dc:date>2020-02-21T17:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: Internal Subnets not getting OUT via ASA outside interface</title>
      <link>https://community.cisco.com/t5/network-security/internal-subnets-not-getting-out-via-asa-outside-interface/m-p/3937600#M1050485</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Apply an ACL on the outside interface in IN direction:&lt;/P&gt;
&lt;PRE&gt;access-list OUTSIDE-IN extended permit icmp any any&lt;BR /&gt;!&lt;BR /&gt;&lt;SPAN&gt;access-group OUTSIDE-IN in interface outside&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;If this will not work then share the Packet Tracer output with us.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2019 04:44:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internal-subnets-not-getting-out-via-asa-outside-interface/m-p/3937600#M1050485</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-10-09T04:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: Internal Subnets not getting OUT via ASA outside interface</title>
      <link>https://community.cisco.com/t5/network-security/internal-subnets-not-getting-out-via-asa-outside-interface/m-p/3937648#M1050489</link>
      <description>Your configuration looks good. If you are testing internet connectivity through PING (ICMP), you must inspect ICMP as Cisco ASA by default does not inspect ICMP. To do so you can use below command.&lt;BR /&gt;"fixup protocol icmp"&lt;BR /&gt;&lt;BR /&gt;You can also use the other method mentioned by Expert Deepak Kumar.&lt;BR /&gt;&lt;BR /&gt;If you still facing problem please post the output of packet tracer from ASA.&lt;BR /&gt;packet-tracer input INSIDE icmp 10.0.0.10 8 0 1.1.1.1 detailed&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Wed, 09 Oct 2019 07:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internal-subnets-not-getting-out-via-asa-outside-interface/m-p/3937648#M1050489</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-10-09T07:06:49Z</dc:date>
    </item>
  </channel>
</rss>

