<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pinging through ASA from Outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129302#M1072530</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I have this basic scenario:&lt;/P&gt;&lt;P&gt;(LAN) --------- (ASA) ---------- (DSL Router) ---------- (Internet)&lt;/P&gt;&lt;P&gt;I am able to ping the DSL Router from the LAN but &lt;U&gt;not&lt;/U&gt; vice versa. Is it a common case with the ASA deployed in between or am I missing something?&lt;/P&gt;&lt;P&gt;I have an explicitly written extended ACL to permit ip any any.&lt;/P&gt;&lt;P&gt;Any sharing thought is appreciated, thank you.&lt;/P&gt;</description>
    <pubDate>Mon, 03 Aug 2020 01:42:38 GMT</pubDate>
    <dc:creator>Rolitto</dc:creator>
    <dc:date>2020-08-03T01:42:38Z</dc:date>
    <item>
      <title>Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129302#M1072530</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I have this basic scenario:&lt;/P&gt;&lt;P&gt;(LAN) --------- (ASA) ---------- (DSL Router) ---------- (Internet)&lt;/P&gt;&lt;P&gt;I am able to ping the DSL Router from the LAN but &lt;U&gt;not&lt;/U&gt; vice versa. Is it a common case with the ASA deployed in between or am I missing something?&lt;/P&gt;&lt;P&gt;I have an explicitly written extended ACL to permit ip any any.&lt;/P&gt;&lt;P&gt;Any sharing thought is appreciated, thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 01:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129302#M1072530</guid>
      <dc:creator>Rolitto</dc:creator>
      <dc:date>2020-08-03T01:42:38Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129354#M1072531</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Do you have NAT configured for inbound and outbound traffic? I assume you do.&lt;/P&gt;
&lt;P&gt;for outbound traffic you probably have a dynamic NAT rule, for all internal traffic to be natted behind the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For inbound traffic you would need to add a static NAT (in addition to the ACL you have in place), however normally you would not want to ping inbound from the internet to the local LAN.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 06:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129354#M1072531</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-03T06:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129681#M1072545</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;I did not implement NAT for inbound traffic. As for the outbound traffic, I have dynamic NAT.&lt;/P&gt;&lt;P&gt;Anyways, here's the configuration of the ASA.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;switchport access vlan 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/7&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nameif inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip address 192.168.1.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nameif outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip address dhcp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;subnet 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.1 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list LAN1 extended permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group LAN1 in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;telnet timeout 5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh timeout 5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcpd auto_config outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcpd address 192.168.1.5-192.168.1.36 inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcpd dns 192.168.1.1 interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcpd lease 86400 interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcpd enable inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I didn't find a necessity implementing NAT from inside-to-outside and from outside-to-inside as I'm dealing with private networks 192.168.1.0/24 (LAN) and 10.10.10.0/24 (Outside). I kept NAT from inside-to-outside though.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 18:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129681#M1072545</guid>
      <dc:creator>Rolitto</dc:creator>
      <dc:date>2020-08-03T18:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129685#M1072546</link>
      <description>&lt;P&gt;&lt;BR /&gt;Because you have NAT configured from inside to outside, the reply to the inside network will be NATTED. If you do not wish traffic from inside network to the ISP network on the outside, you should define a NAT exemption rule, traffic would now not be natted between those 2 networks. You need to ensure that the ISP router has a route to the 192.168.1.0/24 network via the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example NAT exemption config:-&lt;/P&gt;
&lt;PRE&gt;object network ISP&amp;nbsp;&lt;BR /&gt; subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;nat (inside,outside) source static LAN1 LAN1 destination static ISP ISP no-proxy-arp&lt;/PRE&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 06:07:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129685#M1072546</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-04T06:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129794#M1072571</link>
      <description>&lt;P&gt;But what sparked my concern is that if the security-level of outside (0), is supposedly been omitted, then the ICMP packets would successfully get through from outside-to-inside, something which made me think that it is more related to ACL rather than NAT... maybe I am wrong!&lt;/P&gt;&lt;P&gt;Having said that, I didn't have an issue with PING replies getting through the ASA from outside-to-inside when the PING requests have been initiated from the inside.&lt;/P&gt;&lt;P&gt;I hope I am being clear in explaining what I meant...&lt;/P&gt;&lt;P&gt;Anyways, I will try to implement the exemption of NAT that you suggested in the previous post, and will let you know the outcome.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 22:21:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129794#M1072571</guid>
      <dc:creator>Rolitto</dc:creator>
      <dc:date>2020-08-03T22:21:15Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129813#M1072572</link>
      <description>&lt;P&gt;My update:&lt;BR /&gt;A- I added the two commands but the latter couldn't be written as suggested, so I had to edit it accordingly per what the Packet Tracer allows me to do. Therefore, the command was:&lt;BR /&gt;&lt;STRONG&gt;nat (inside,outside) static LAN1&lt;/STRONG&gt; where LAN1 is 192.168.1.0/24 as I could not add &lt;STRONG&gt;source static LAN1 LAN1&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;destination static ISP ISP&lt;/STRONG&gt;&amp;nbsp;to the command. I knew that the command was incomplete and thus useless, but that's all I could do, so i referred to solution B.&lt;BR /&gt;B- I removed all NAT rules to clear my mind from doubts that the NAT rules &lt;U&gt;might&lt;/U&gt; be causing, then I tried pinging from outside-to-inside, but that didn't work either.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 00:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129813#M1072572</guid>
      <dc:creator>Rolitto</dc:creator>
      <dc:date>2020-08-04T00:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129899#M1072579</link>
      <description>&lt;P&gt;Does the ISP/DSL router have a route to the 192.168.1.0/24 via the ASA?&lt;BR /&gt;&lt;BR /&gt;The formatting of the commands above were lost in the initial post, I've amended. The NAT exemption rule is global and not defined under an object.&lt;BR /&gt;&lt;BR /&gt;Run packet-tracer from the CLI and provide the output for review.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 06:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4129899#M1072579</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-04T06:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4130403#M1072634</link>
      <description>&lt;P&gt;Rob, I will apply the rule and will let you know what is the outcome as soon as possible because I am currently unable to resume testing.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 20:51:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4130403#M1072634</guid>
      <dc:creator>Rolitto</dc:creator>
      <dc:date>2020-08-04T20:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131069#M1072675</link>
      <description>&lt;P&gt;Firstly, the DSL Router has a static route configured pointing to the internal network of the ASA (192.168.1.0/24).&lt;/P&gt;&lt;P&gt;Here's the basic running configuration of the DSL Router:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;hostname IR800&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;boot system flash ir800-universalk9-mz.SPA.155-3.M&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip dhcp excluded-address 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip dhcp pool LAN2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;network 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;default-router 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dns-server 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip cef&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ipv6 cef&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;license udi pid IR829GW-LTE-NA-AK9 sn FTX1806A5BV-&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;license boot module ir800 technology-package datak9 disable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;spanning-tree mode pvst&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;duplex auto&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;speed auto&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;shutdown&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;description Connecting ASA0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;switchport access vlan 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;description Connecting Switch0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;switchport mode trunk&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface wlan-ap0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Wlan-GigabitEthernet0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;duplex auto&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;speed auto&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Cellular0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;shutdown&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Cellular1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;shutdown&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;shutdown&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;mac-address 0010.1112.2801&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip address 10.10.10.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip classless&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 192.168.1.0 255.255.255.0 10.10.10.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip flow-export version 9&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;line con 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;line 1 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;line 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;line 4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;transport input all&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;line 8&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;line 1/3 1/6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;line vty 0 4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;login&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;end&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Secondly, I edited the configuration on the ASA by adding a class and policy map, so here's the updated running configuration:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;hostname ciscoasa&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;enable password ********************&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;passwd *****************************&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;names&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;switchport access vlan 2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/3&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/4&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/5&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/6&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/7&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;! &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Vlan1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nameif inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;security-level 100&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ip address 192.168.1.1 255.255.255.0 &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Vlan2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nameif outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;security-level 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ip address dhcp setroute &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ftp mode passive&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;object network LAN1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;subnet 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list inbound extended permit ip any any &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;pager lines 24&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;logging asdm informational&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;mtu inside 1500&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;mtu outside 1500&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;no asdm history enable&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;arp timeout 14400&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;object network LAN1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-group inbound in interface outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.1 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;timeout xlate 3:00:00&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;timeout floating-conn 0:00:00&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;user-identity default-domain LOCAL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;http server enable&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;http 192.168.1.0 255.255.255.0 inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;no snmp-server location&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;no snmp-server contact&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;telnet timeout 5&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ssh timeout 5&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;console timeout 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcpd auto_config outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;dhcpd address 192.168.1.5-192.168.1.36 inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;dhcpd dns 192.168.1.1 interface inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;dhcpd lease 86400 interface inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;dhcpd enable inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;threat-detection basic-threat&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;threat-detection statistics access-list&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;no threat-detection statistics tcp-intercept&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;webvpn&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;class-map inspection_default&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;match default-inspection-traffic&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;class inspection_default&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect ftp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect h323 h225 &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect h323 ras &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect rsh &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect rtsp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect esmtp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect sqlnet &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect skinny &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect sunrpc &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect xdmcp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect sip &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect netbios &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect tftp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect icmp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;service-policy global_policy global&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;prompt hostname context &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;no call-home reporting anonymous&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Cryptochecksum:d56ac64f9c830fa33a0385ba1c08e6a7&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;: end&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Finally, I have run the packet-tracer command from CLI on ASA, and here's the output:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ciscoasa# packet-tracer input outside icmp 10.10.10.1 0 0 192.168.1.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: ACCESS-LIST&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Implicit Rule&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;MAC Access list&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: ROUTE-LOOKUP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: input&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;in 192.168.1.0 255.255.255.0 inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 3&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: ACCESS-LIST&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: log&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-group inbound in interface outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list inbound extended permit ip any any &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Phase: 4 &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: IP-OPTIONS&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 5&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: INSPECT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: np-inspect&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;class-map inspection_default&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;match default-inspection-traffic&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;class inspection_default&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect icmp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;service-policy global_policy global&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 6&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: INSPECT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: np-inspect&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 7&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: HOST-LIMIT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 8&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: NAT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: rpf-check&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;object network LAN1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-interface: outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-interface: inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The type and code that I used are 0 0 as I'm investigating for the inbound traffic, otherwise I'll use 8 0 for the outbound traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 21:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131069#M1072675</guid>
      <dc:creator>Rolitto</dc:creator>
      <dc:date>2020-08-05T21:48:50Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131217#M1072683</link>
      <description>&lt;P&gt;As you can see in the packet-tracer output the packet is being NATTED behind the outside interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;&lt;STRONG&gt;object network LAN1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do not see the NAT exemption rule in your configuration, either add it (using the example I previously provided) or temporarily remove the dynamic NAT.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 06:17:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131217#M1072683</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-06T06:17:13Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131668#M1072705</link>
      <description>&lt;P&gt;Yes it is, and I did remove the dynamic NAT considered as the easier choice, but that didn't solve my problem.&lt;/P&gt;&lt;P&gt;Here's a capture of packet-tracer from CLI when pinging is initiated from outside-to-inside and in particular from [ext IP address of ASA = 10.10.10.2] to [int IP address of ASA = 192.168.1.1] using inbound traffic with type and code 8 0:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ciscoasa# packet-tracer input outside icmp 10.10.10.2 8 0 192.168.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: ROUTE-LOOKUP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: input&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;in 192.168.1.1 255.255.255.255 identity&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: ACCESS-LIST&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Implicit Rule&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-interface: outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-interface: NP Identity Ifc&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Here's a capture of packet-tracer from CLI when pinging is initiated from inside-to-outside and in particular from [int IP address of ASA = 192.168.1.1] to [ext IP address of ASA = 10.10.10.2] using outbound traffic with type and code 8 0:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: ROUTE-LOOKUP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: input&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;in 192.168.1.1 255.255.255.255 identity&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: ACCESS-LIST&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Implicit Rule&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 3&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: IP-OPTIONS&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 4&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: INSPECT &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: np-inspect&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 5&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: INSPECT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: np-inspect&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 6&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: FLOW-CREATION&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;New flow created with id 363, packet dispatched to next module&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-interface: inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-interface: NP Identity Ifc&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Action: allow&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 20:15:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131668#M1072705</guid>
      <dc:creator>Rolitto</dc:creator>
      <dc:date>2020-08-06T20:15:00Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131674#M1072707</link>
      <description>192.168.1.1 is the inside IP address of your ASA, so I'd expect your test to fail. The ASA only responds to ICMP traffic sent to the interface that traffic comes in on; you cannot send ICMP traffic through an interface (outside) to a far interface (inside).&lt;BR /&gt;&lt;BR /&gt;Ping through the ASA to test, not to the ASA.</description>
      <pubDate>Thu, 06 Aug 2020 20:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131674#M1072707</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-06T20:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131706#M1072709</link>
      <description>&lt;P&gt;But even pinging initiated from outside-to-inside, precisely to a PC on the local LAN (192.168.1.0/24) doesn't succeed. That means, if I am using the router's IP address of 10.10.10.1 to ping the PC's IP address of 192.168.1.5, the output of the ping reply is timed out.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 21:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131706#M1072709</guid>
      <dc:creator>Rolitto</dc:creator>
      <dc:date>2020-08-06T21:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131709#M1072710</link>
      <description>Provide the full output of "packet-tracer input outside icmp 10.10.10.2 8 0 192.168.1.5"&lt;BR /&gt;Provide the current ASA configuration and the output of "show nat detail".&lt;BR /&gt;Does the device 192.168.1.5 have a local firewall that could be blocking ping response?</description>
      <pubDate>Thu, 06 Aug 2020 21:37:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131709#M1072710</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-06T21:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131755#M1072711</link>
      <description>&lt;P&gt;Rob, I reloaded both devices, the router and the ASA and guess what? It finally worked!&lt;/P&gt;&lt;P&gt;I am now able to ping any inside device from outside the ASA. Therefore, I would like to thank you for solving my issue, and I will mark the issue as solved! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 00:12:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/4131755#M1072711</guid>
      <dc:creator>Rolitto</dc:creator>
      <dc:date>2020-08-07T00:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/5103069#M1112369</link>
      <description>&lt;P&gt;Please help me, I am student of university of since in Vietnam.&amp;nbsp;I have a problem about pinging through ASA.&amp;nbsp;I cannot ping from PC2 from outside to 4.0.0.1 of DMZ or 8.0.0.1 of inside although I can ping from DMZ via inside. Can also ping from DMZ and inside to google successfully. I think the problem is related to setting up NAT from the outside in&lt;/P&gt;&lt;P&gt;ASA:&lt;/P&gt;&lt;P&gt;ena&lt;BR /&gt;conf t&lt;BR /&gt;hostname Asa1&lt;/P&gt;&lt;P&gt;int g0/6&lt;BR /&gt;nameif inside1&lt;BR /&gt;security-level 100&lt;BR /&gt;ip add dhcp&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;username thien password 123 privilege 15&lt;BR /&gt;http server enable&lt;BR /&gt;http 0 0 inside1&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;int g0/1&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip add 4.0.0.254 255.0.0.0&lt;BR /&gt;no shut&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;int g0/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip add 8.0.0.254 255.0.0.0&lt;BR /&gt;no shut&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;int g0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip add 3.0.0.254 255.0.0.0&lt;BR /&gt;no shut&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;int g0/3&lt;BR /&gt;nameif winter&lt;BR /&gt;security-level 50&lt;BR /&gt;ip add 9.0.0.254 255.0.0.0&lt;BR /&gt;no shut&lt;BR /&gt;exit&lt;BR /&gt;--------------------------------------------DMZ&lt;/P&gt;&lt;P&gt;object network LAN_DMZ&lt;BR /&gt;host 4.0.0.1&lt;BR /&gt;nat (DMZ,outside) static 3.0.0.10&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;object network OUT&lt;BR /&gt;host 4.0.0.1&lt;BR /&gt;nat (DMZ,winter) static 9.0.0.10&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;object network LAN_INSIDE&lt;BR /&gt;host 8.0.0.1&lt;BR /&gt;nat (inside,outside) static 3.0.0.10&lt;BR /&gt;exit&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 3.0.0.2&lt;/P&gt;&lt;P&gt;object network OUT_DMZ&lt;BR /&gt;no subnet 3.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;--------------------------------------------------------COnf domain&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 192.168.27.2&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;domain-name google.com&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;--------------------------------------------------------ko can de ping den google&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect icmp error&lt;BR /&gt;exit&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;access-list PING extended permit ip any any&lt;BR /&gt;access-list PING extended permit icmp any any&lt;BR /&gt;access-list PING extended permit tcp any any&lt;BR /&gt;access-group PING in interface outside&lt;/P&gt;&lt;P&gt;access-list dmz extended permit ip any any&lt;BR /&gt;access-list dmz extended permit icmp any any&lt;BR /&gt;access-list dmz extended permit tcp any any&lt;BR /&gt;access-group dmz in interface DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R2&lt;/P&gt;&lt;P&gt;ena&lt;BR /&gt;conf t&lt;BR /&gt;int f1/0&lt;BR /&gt;ip add 2.0.0.2 255.0.0.0&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;int f0/1&lt;BR /&gt;ip dhcp&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;int s3/0&lt;BR /&gt;ip add 5.0.0.2 255.0.0.0&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;int f0/0&lt;BR /&gt;ip add 3.0.0.2 255.0.0.0&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;int f4/0&lt;BR /&gt;ip add 4.0.0.2 255.0.0.0&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;username thien password 123&lt;BR /&gt;ip domain-name thien.vn&lt;BR /&gt;enable password 123&lt;BR /&gt;line vty 0 4&lt;BR /&gt;login local&lt;BR /&gt;transport input ssh&lt;BR /&gt;exit&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;crypto key generate rsa&lt;BR /&gt;1024&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;router ospf 1&lt;BR /&gt;router-id 2.2.2.2&lt;BR /&gt;net 2.0.0.0 0.255.255.255 area 0&lt;BR /&gt;net 5.0.0.0 0.255.255.255 area 0&lt;BR /&gt;net 3.0.0.0 0.255.255.255 area 0&lt;BR /&gt;net 4.0.0.0 0.255.255.255 area 0&lt;BR /&gt;default-information originate&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;BR /&gt;ip add 10.10.2.1 255.255.255.0&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;---------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip name-server 192.168.27.2&lt;BR /&gt;ip name-server 8.8.8.8&lt;BR /&gt;ip domain lookup&lt;/P&gt;&lt;P&gt;DMZ&lt;/P&gt;&lt;P&gt;ena&lt;BR /&gt;conf t&lt;BR /&gt;int f0/1&lt;BR /&gt;ip add 4.0.0.1 255.0.0.0&lt;BR /&gt;no shut&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 3.0.0.254&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;username thien password 123&lt;BR /&gt;ip domain-name thien.vn&lt;BR /&gt;enable password 123&lt;BR /&gt;line vty 0 4&lt;BR /&gt;login local&lt;BR /&gt;transport input ssh&lt;BR /&gt;exit&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;crypto key generate rsa&lt;BR /&gt;1024&lt;/P&gt;&lt;P&gt;ip name-server 192.168.27.2&lt;BR /&gt;ip name-server 8.8.8.8&lt;BR /&gt;ip domain lookup&lt;/P&gt;&lt;P&gt;SERVER:&lt;/P&gt;&lt;P&gt;ena&lt;BR /&gt;conf t&lt;BR /&gt;int f0/0&lt;BR /&gt;ip add 8.0.0.1 255.0.0.0&lt;BR /&gt;no shut&lt;BR /&gt;exit&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 8.0.0.254&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;username thien password 123&lt;BR /&gt;enable password 123&lt;BR /&gt;ip domain name thien.vn&lt;BR /&gt;line vty 0 4&lt;BR /&gt;login local&lt;BR /&gt;transport input ssh&lt;BR /&gt;exit&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;crypto key generate rsa&lt;BR /&gt;1024&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip name-server 192.168.27.2&lt;BR /&gt;ip domain lookup&lt;BR /&gt;ip name-server 8.8.8.8&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-12 211844.png" style="width: 200px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218132iEEDAF8653C00F71F/image-size/small?v=v2&amp;amp;px=200" role="button" title="Screenshot 2024-05-12 211844.png" alt="Screenshot 2024-05-12 211844.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2024 14:26:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/5103069#M1112369</guid>
      <dc:creator>Thien are Margo</dc:creator>
      <dc:date>2024-05-12T14:26:27Z</dc:date>
    </item>
    <item>
      <title>Re: Pinging through ASA from Outside</title>
      <link>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/5103070#M1112370</link>
      <description>&lt;P&gt;Make new post it better&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 12 May 2024 14:30:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pinging-through-asa-from-outside/m-p/5103070#M1112370</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-05-12T14:30:18Z</dc:date>
    </item>
  </channel>
</rss>

