<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/4006116#M1050583</link>
    <description>Turn on debugs with command "debug icmp trace" and run the ping again, upload the output here for review.&lt;BR /&gt;&lt;BR /&gt;Also run packet-tracer from the CLI and provide the output - use the command "packet-tracer input LAN 192.168.1.4 8 0 172.10.0.1"</description>
    <pubDate>Fri, 03 Jan 2020 16:15:19 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-01-03T16:15:19Z</dc:date>
    <item>
      <title>ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/4005646#M1050580</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;Complete configuration of asa5510 is:&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show running-config&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;nameif LAN&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;nameif WAN&lt;BR /&gt;security-level 60&lt;BR /&gt;ip address 172.10.0.3&amp;nbsp; 255.255.252.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu WAN 1500&lt;BR /&gt;mtu LAN 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;route WAN 0.0.0.0 0.0.0.0 172.10.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 172.10.0.0 255.255.252.0 WAN&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:cdeae48234bbea3e4d267f47c1bee40a&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;But i can not&amp;nbsp; ping interface ethernet 0/3 (172.10.0.3) and gateway (172.10.0.1) via LAN network.&lt;/P&gt;&lt;P&gt;Log of ASDM is "routing failed to locate next hop for icmp from NP identity ifc:192.168.1.4/0 to LAN:WAN/0.&lt;/P&gt;&lt;P&gt;Pl&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:48:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510/m-p/4005646#M1050580</guid>
      <dc:creator>poneh35</dc:creator>
      <dc:date>2020-02-21T17:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/4005668#M1050581</link>
      <description>Hi,&lt;BR /&gt;You cannot ping the ASA's WAN interface when connected to the LAN interface, that is by design - you can only ping the ASA's closest interface.&lt;BR /&gt;&lt;BR /&gt;You probably cannot ping the WAN's gateway 172.10.0.1 because you either need to configure an ACL on the OUTSIDE interface to permit echo-reply or you could just enable icmp inspection in MPF, use the command "fixup protocol icmp".&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 02 Jan 2020 17:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510/m-p/4005668#M1050581</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-02T17:10:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/4006107#M1050582</link>
      <description>&lt;P&gt;I add this command but ping doesn't work&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 15:55:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510/m-p/4006107#M1050582</guid>
      <dc:creator>poneh35</dc:creator>
      <dc:date>2020-01-03T15:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/4006116#M1050583</link>
      <description>Turn on debugs with command "debug icmp trace" and run the ping again, upload the output here for review.&lt;BR /&gt;&lt;BR /&gt;Also run packet-tracer from the CLI and provide the output - use the command "packet-tracer input LAN 192.168.1.4 8 0 172.10.0.1"</description>
      <pubDate>Fri, 03 Jan 2020 16:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510/m-p/4006116#M1050583</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-03T16:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510/m-p/4006341#M1050584</link>
      <description>&lt;P&gt;I don't know what the problem was, but I reset the config of firewall and try again.&lt;BR /&gt;Add commands on it:&lt;BR /&gt;fixup protocol icmp&lt;BR /&gt;debug icmp trace&lt;BR /&gt;The problem was solved.&lt;BR /&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jan 2020 05:45:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510/m-p/4006341#M1050584</guid>
      <dc:creator>poneh35</dc:creator>
      <dc:date>2020-01-04T05:45:49Z</dc:date>
    </item>
  </channel>
</rss>

