<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CISCO ASA 5506-x ping issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4039834#M1067273</link>
    <description>&lt;P&gt;I am having an issue pinging through my ASA. I am able to ping from my outside interface on the ASA to the internet and from my client pc (on the inside network) to the (inside) port on the ASA, but can not go through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP gateway - 192.168.1.254 /24&lt;/P&gt;&lt;P&gt;ASA (Outside) - 192.168.1.231 /24&lt;/P&gt;&lt;P&gt;ASA (Inside) - 172.16.1.1 /24&lt;/P&gt;&lt;P&gt;Router (Inside) - 172.16.1.2 /24&lt;/P&gt;&lt;P&gt;Router (Inside LAN) - 172.16.10.1 /24&lt;/P&gt;&lt;P&gt;Client PC (Inside LAN) - 172.16.10.10 /24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used eigrp routing to get between the networks but the 192.168.1.0 network will not populate in the routing table. i do have a static route configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I simulated my network in packet tracer using loopbacks as my "ISP"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;&lt;P&gt;description Connection to inside&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;/P&gt;&lt;P&gt;description Connection to ISP&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 192.168.1.231 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/3&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/4&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/5&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/6&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/7&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/8&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management1/1&lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network IN-OUT&lt;/P&gt;&lt;P&gt;subnet 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.0 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list INSIDE-OUT extended permit icmp 172.16.0.0 255.255.0.0 any echo-reply&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group INSIDE-OUT in interface inside&lt;/P&gt;&lt;P&gt;access-group INSIDE-OUT out interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router eigrp 1&lt;/P&gt;&lt;P&gt;network 8.8.8.8 0.0.0.0&lt;/P&gt;&lt;P&gt;network 8.8.8.1 0.0.0.0&lt;/P&gt;&lt;P&gt;network 172.16.1 0.0.0.255&lt;/P&gt;&lt;P&gt;network 192.168.1.0&lt;/P&gt;</description>
    <pubDate>Wed, 04 Mar 2020 18:28:36 GMT</pubDate>
    <dc:creator>jacobhampton729737713</dc:creator>
    <dc:date>2020-03-04T18:28:36Z</dc:date>
    <item>
      <title>CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4039834#M1067273</link>
      <description>&lt;P&gt;I am having an issue pinging through my ASA. I am able to ping from my outside interface on the ASA to the internet and from my client pc (on the inside network) to the (inside) port on the ASA, but can not go through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP gateway - 192.168.1.254 /24&lt;/P&gt;&lt;P&gt;ASA (Outside) - 192.168.1.231 /24&lt;/P&gt;&lt;P&gt;ASA (Inside) - 172.16.1.1 /24&lt;/P&gt;&lt;P&gt;Router (Inside) - 172.16.1.2 /24&lt;/P&gt;&lt;P&gt;Router (Inside LAN) - 172.16.10.1 /24&lt;/P&gt;&lt;P&gt;Client PC (Inside LAN) - 172.16.10.10 /24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used eigrp routing to get between the networks but the 192.168.1.0 network will not populate in the routing table. i do have a static route configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I simulated my network in packet tracer using loopbacks as my "ISP"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;&lt;P&gt;description Connection to inside&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;/P&gt;&lt;P&gt;description Connection to ISP&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 192.168.1.231 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/3&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/4&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/5&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/6&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/7&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/8&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management1/1&lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network IN-OUT&lt;/P&gt;&lt;P&gt;subnet 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.0 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list INSIDE-OUT extended permit icmp 172.16.0.0 255.255.0.0 any echo-reply&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group INSIDE-OUT in interface inside&lt;/P&gt;&lt;P&gt;access-group INSIDE-OUT out interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router eigrp 1&lt;/P&gt;&lt;P&gt;network 8.8.8.8 0.0.0.0&lt;/P&gt;&lt;P&gt;network 8.8.8.1 0.0.0.0&lt;/P&gt;&lt;P&gt;network 172.16.1 0.0.0.255&lt;/P&gt;&lt;P&gt;network 192.168.1.0&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 18:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4039834#M1067273</guid>
      <dc:creator>jacobhampton729737713</dc:creator>
      <dc:date>2020-03-04T18:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4039848#M1067274</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;why you apply this on inside interface ? you done need to apply it on inside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no access-group INSIDE-OUT in interface inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and modify your ACL to below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list INSIDE-OUT extended permit icmp any 172.16.0.0 255.255.0.0 echo-reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;after doing above, ICMP should start working fine&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 03:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4039848#M1067274</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-03-04T03:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4039888#M1067277</link>
      <description>This still did not resolve. Would it be an issue with eigrp? Ospf a better option?</description>
      <pubDate>Wed, 04 Mar 2020 04:14:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4039888#M1067277</guid>
      <dc:creator>jacobhampton729737713</dc:creator>
      <dc:date>2020-03-04T04:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040082#M1067301</link>
      <description>&lt;P&gt;you are using eigrp between ASA and Internet edge ? both interfaces are on same subnet where you are running protocol between two ?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 11:41:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040082#M1067301</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-03-04T11:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040090#M1067303</link>
      <description>&lt;P&gt;PROBLEM&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;
&lt;P&gt;description Connection to inside&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nameif inside&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip address 172.16.1.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Change the nameif&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/2&lt;BR /&gt;description Connection to ISP&lt;BR /&gt;&lt;STRONG&gt;nameif inside -- change to outside&lt;/STRONG&gt;&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.231 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;access-list INSIDE-OUT extended permit icmp any 172.16.0.0 255.255.0.0 echo-reply&lt;BR /&gt;access-group INSIDE-OUT out interface outside&lt;BR /&gt;!&lt;BR /&gt;packet-tracer input outside icmp 8.8.8.8 8 0 172.16.1.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you see your configuration you define nameif inside twice and than you match the access-group with interface outside&lt;/P&gt;
&lt;P&gt;(or)&lt;/P&gt;
&lt;P&gt;give a command fixup protocol icmp&amp;nbsp; AND fixup protocol icmp-error&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 12:20:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040090#M1067303</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-03-04T12:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040378#M1067340</link>
      <description>&lt;P&gt;I fixed that problem. Still cannot ping. Here are my new configs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;&lt;P&gt;description Connection to inside&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;/P&gt;&lt;P&gt;description Connection to ISP&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 192.168.1.231 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network IN-OUT&lt;/P&gt;&lt;P&gt;subnet 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;route ISP 0.0.0.0 0.0.0.0 192.168.1.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list INSIDE-OUT extended permit icmp any 172.16.0.0 255.255.0.0 echo-reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group INSIDE-OUT out interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;router eigrp 1&lt;/P&gt;&lt;P&gt;network 8.8.8.8 0.0.0.0&lt;/P&gt;&lt;P&gt;network 8.8.8.1 0.0.0.0&lt;/P&gt;&lt;P&gt;network 180.100.99.0 0.0.0.255&lt;/P&gt;&lt;P&gt;network 192.168.13.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Potential OS issue between devices?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 18:45:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040378#M1067340</guid>
      <dc:creator>jacobhampton729737713</dc:creator>
      <dc:date>2020-03-04T18:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040414#M1067347</link>
      <description>&lt;P&gt;Is this a test lab or a production network? I noted you do not have nat rules. in order to ping or any other services you running from outside to inside need a static nat. even though you have an access-list define and also access-group define. it will always fail. as you coming from outside to inside and outside have a security level 0 and inside have security level 100. from 100 to 0 you can go no problem but from 0 to 100 you need access-list/access-group and to define nat rule (this could be identity nat or dynamic nat).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 19:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040414#M1067347</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-03-04T19:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040419#M1067348</link>
      <description>&lt;P&gt;Simulation of a production network. I have nat configured as such&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 19:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040419#M1067348</guid>
      <dc:creator>jacobhampton729737713</dc:creator>
      <dc:date>2020-03-04T19:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040420#M1067349</link>
      <description>&lt;P&gt;I assume you are pinging from inside to outside, you need to modify the direction from out to in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;no access-group INSIDE-OUT out interface outside&lt;/PRE&gt;&lt;PRE&gt;access-group INSIDE-OUT &lt;STRONG&gt;in&lt;/STRONG&gt; interface outside&lt;/PRE&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 19:47:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040420#M1067349</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-03-04T19:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040426#M1067351</link>
      <description>&lt;P&gt;good spot &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you doing a dynamic nat it will fail on rpf-check. you need a whole range of ip address to be ping able from outside?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you have spare ip address as you already using RFC1918 for outside. do this for test.&lt;/P&gt;
&lt;P&gt;object network TEST&lt;/P&gt;
&lt;P&gt;&amp;nbsp;host 172.x.x.x (inside-single-host-ip-adresss)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;nat (inside,outside) static 192.168.x.x&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list outside_in ex permit icmp any object TEST eq echo-reply&lt;/P&gt;
&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 20:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040426#M1067351</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-03-04T20:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040545#M1067358</link>
      <description>&lt;P&gt;Making progress. Test did not work. I deleted the eigrp route to the 192.168.1.0 network on the ASA. I am now getting a reply :destination host unreachable, whereas before, nothing. I have icmp enabled on ASA going out the outside interface. New configs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;&lt;P&gt;description Connection to inside&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;/P&gt;&lt;P&gt;description Connection to ISP&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 192.168.1.231 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network IN-OUT&lt;/P&gt;&lt;P&gt;subnet 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list INSIDE-OUT extended permit icmp 172.16.1.0 255.255.255.0 any echo-reply&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group INSIDE-OUT in interface outside&lt;/P&gt;&lt;P&gt;object network IN-OUT&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 192.168.1.231&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;router eigrp 1&lt;/P&gt;&lt;P&gt;network 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 02:07:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040545#M1067358</guid>
      <dc:creator>jacobhampton729737713</dc:creator>
      <dc:date>2020-03-05T02:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040565#M1067360</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now all configuration looks good but still ACL have issue, you have to modify&amp;nbsp; your ACL to allow the ICMP traffic destined to 172.16.1.0 network, so this network should be mention in the destination part of ACL, not on the source part&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;no access-list INSIDE-OUT extended permit icmp 172.16.1.0 255.255.255.0 any echo-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list INSIDE-OUT extended permit icmp any 172.16.1.0 255.255.255.0 echo-reply&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 02:40:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040565#M1067360</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-03-05T02:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040577#M1067362</link>
      <description>&lt;P&gt;no success here. Can ping from client on inside to inside port on ASA but not through.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 03:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040577#M1067362</guid>
      <dc:creator>jacobhampton729737713</dc:creator>
      <dc:date>2020-03-05T03:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040595#M1067364</link>
      <description>&lt;P&gt;i just notice your NAT, since your are translating whole subnet to single IP address ( outside ), it should be dybamic not static.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group INSIDE-OUT in interface outside&lt;/P&gt;&lt;P&gt;object network IN-OUT&lt;/P&gt;&lt;P&gt;&amp;nbsp;no nat (inside,outside) static 192.168.1.231&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic 192.168.1.231&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can you test above ?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 04:03:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040595#M1067364</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-03-05T04:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040654#M1067371</link>
      <description>&lt;P&gt;dynamic nat is not going to work as you break the asa fundamentals. in order to reach from outside to inside network you need a nat rule with static nat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have just test this in lab. here is my output. change your network ip addressing accordingly.&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network ALL-WIRELESS&amp;nbsp;&amp;nbsp; (THIS IS MY WIRELESS NETOWRK WITH SECURITY-LEVEL100)&lt;BR /&gt;subnet 192.168.185.0 255.255.255.0&lt;BR /&gt;nat (wireless-house,outside) static 192.168.1.55&amp;nbsp; (I borrowed one ip address from outside subnet range)&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list ALL-WIRELESS line 1 extended permit icmp any object ALL-WIRELESS echo-reply&lt;/P&gt;
&lt;P&gt;access-group ALL-WIRELESS in interface outside&lt;/P&gt;
&lt;P&gt;packet-tracer input outside icmp 8.8.8.8 0 8 192.168.1.55&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map SFR-CLASS&lt;BR /&gt;match access-list SFR&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class SFR-CLASS&lt;BR /&gt;sfr fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network ALL-WIRELESS&lt;BR /&gt;nat (wireless-house,outside) static 192.168.1.55&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 273112, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: wireless-house&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 07:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040654#M1067371</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-03-05T07:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040972#M1067399</link>
      <description>&lt;P&gt;But I am not trying to go from the outside to inside, unless that is referring to icmp packets returning? Would dynamic be necessary as static would be for a single address coming from inside where I would have multiple?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 15:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4040972#M1067399</guid>
      <dc:creator>jacobhampton729737713</dc:creator>
      <dc:date>2020-03-05T15:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4041036#M1067404</link>
      <description>&lt;P&gt;I am sorry i completely lost it what is the issue and what is you trying to achieve?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 16:06:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4041036#M1067404</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-03-05T16:06:03Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4041298#M1067427</link>
      <description>&lt;P&gt;I am unable to ping from my inside (the 172.16) network to the outside (192.168.13). Once I am able to ping through, with the first location I will be adding another location to go through the ASA. But for now I need to be able to access the internet on the inside network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am able to ping from a client pc to the inside interface on the ASA but not through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the outside interface on the ASA I can ping the internet put not my inside network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 21:48:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4041298#M1067427</guid>
      <dc:creator>jacobhampton729737713</dc:creator>
      <dc:date>2020-03-05T21:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA 5506-x ping issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4042117#M1067493</link>
      <description>&lt;P&gt;let get this sorted once for all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;could you past your result of packet-tracer from inside to outside for example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer interface inside 192.168.1.1 8 0 8.8.8.8 detail&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2020 09:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-ping-issues/m-p/4042117#M1067493</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-03-07T09:12:53Z</dc:date>
    </item>
  </channel>
</rss>

