<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cant ping from inside to outside thru ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886001#M1102684</link>
    <description>&lt;P&gt;hi Flavio and thank for your reply i will try to attachet it again.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Jul 2023 12:32:46 GMT</pubDate>
    <dc:creator>lomai</dc:creator>
    <dc:date>2023-07-17T12:32:46Z</dc:date>
    <item>
      <title>cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4885996#M1102682</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i have a couple of questions about an issue with a backup firewall, ill try to explain but am new to this so let me know if somthing is not clear.&lt;/P&gt;&lt;P&gt;i have set up 2 ASA one default and one backup the deafult one is working and i can ping from inside to the ISP router but on the backup i cant ping from inside to the ISP router. the config is exactly the same beside the IP addresses.&amp;nbsp;&lt;/P&gt;&lt;P&gt;the packet tracer file is attached here.&lt;/P&gt;&lt;P&gt;the other question i have is, should a backup server be in the same dmz zone as a web server or should it be in the internal network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 12:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4885996#M1102682</guid>
      <dc:creator>lomai</dc:creator>
      <dc:date>2023-07-17T12:26:45Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886000#M1102683</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1556312"&gt;@lomai&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I can not see your file attached.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;About the server, it is up to you. DMZ is meant for device who can be reached from the Internet and local network. If you believe the backup server falls in this situation, put it on the DMZ. But, if only internal device can access it, it does not need to be on the DMZ.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 12:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886000#M1102683</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-07-17T12:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886001#M1102684</link>
      <description>&lt;P&gt;hi Flavio and thank for your reply i will try to attachet it again.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 12:32:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886001#M1102684</guid>
      <dc:creator>lomai</dc:creator>
      <dc:date>2023-07-17T12:32:46Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886007#M1102685</link>
      <description>&lt;P&gt;the password to get inn to the routers are exam on all of them&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 12:39:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886007#M1102685</guid>
      <dc:creator>lomai</dc:creator>
      <dc:date>2023-07-17T12:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886017#M1102686</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1556312"&gt;@lomai&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The problem is that on the router Core-R1, you have a default route sending to Firewall :&lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;ip route 0.0.0.0 0.0.0.0 192.168.10.25&lt;/P&gt;
&lt;P style="-qt-paragraph-type: empty; -qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="-qt-paragraph-type: empty; -qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;And then, you have the command "default-information originate" on the OSPF.&amp;nbsp; Which means, this router is default gateway for the whole network and as it has a default route to firewall, all traffic coming from local networl will be sent to Firewall ASA1.&lt;/P&gt;
&lt;P style="-qt-paragraph-type: empty; -qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;&amp;nbsp; IF you run traceroute from the PC you can confirm that.&amp;nbsp; So, either you remove this config on the router or you add a connection from firewall ASA1&amp;nbsp; to ISP-5G&lt;/P&gt;
&lt;P style="-qt-paragraph-type: empty; -qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 13:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886017#M1102686</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-07-17T13:04:08Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886028#M1102687</link>
      <description>&lt;P&gt;when i remove&amp;nbsp;&lt;SPAN&gt;ip route 0.0.0.0 0.0.0.0 192.168.10.25 then its not possible to ping from pc anymore...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;and the tracert on pc shows:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;tracert 10.10.20.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tracing route to 10.10.20.2 over a maximum of 30 hops:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 0 ms 0 ms 0 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;2 0 ms 0 ms 0 ms 192.168.10.22&lt;/P&gt;&lt;P&gt;3 0 ms 0 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;4 0 ms 0 ms 0 ms 192.168.10.22&lt;/P&gt;&lt;P&gt;5 0 ms 0 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;6 0 ms 0 ms 0 ms 192.168.10.22&lt;/P&gt;&lt;P&gt;7 0 ms 0 ms 0 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;8 0 ms 0 ms 0 ms 192.168.10.22&lt;/P&gt;&lt;P&gt;9 0 ms 0 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;10 0 ms 0 ms 0 ms 192.168.10.14&lt;/P&gt;&lt;P&gt;11 0 ms 0 ms 0 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;12 0 ms 1 ms 0 ms 192.168.10.18&lt;/P&gt;&lt;P&gt;13 0 ms 0 ms 0 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;14 0 ms 0 ms 0 ms 192.168.10.22&lt;/P&gt;&lt;P&gt;15 0 ms 0 ms 1 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;16 0 ms 0 ms 0 ms 192.168.10.18&lt;/P&gt;&lt;P&gt;17 0 ms 0 ms 1 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;18 0 ms 0 ms 0 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;19 0 ms 17 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;20 10 ms 0 ms 0 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;21 10 ms 0 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;22 0 ms 0 ms 10 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;23 1 ms 0 ms 0 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;24 0 ms 0 ms 0 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;25 0 ms 0 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;26 10 ms 10 ms 1 ms 192.168.10.18&lt;/P&gt;&lt;P&gt;27 10 ms 10 ms 0 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;28 10 ms 10 ms 10 ms 192.168.10.14&lt;/P&gt;&lt;P&gt;29 10 ms 10 ms 10 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;30 10 ms 10 ms 10 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trace complete.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;ping 10.10.20.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pinging 10.10.20.2 with 32 bytes of data:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Request timed out.&lt;/P&gt;&lt;P&gt;Request timed out.&lt;/P&gt;&lt;P&gt;Request timed out.&lt;/P&gt;&lt;P&gt;Request timed out.&lt;/P&gt;&lt;P&gt;C:\&amp;gt;tracert 10.10.10.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tracing route to 10.10.10.2 over a maximum of 30 hops:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 0 ms 0 ms 0 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;2 0 ms 0 ms 0 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;3 0 ms 0 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;4 0 ms 0 ms 0 ms 192.168.10.22&lt;/P&gt;&lt;P&gt;5 0 ms 0 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;6 0 ms 0 ms 0 ms 192.168.10.22&lt;/P&gt;&lt;P&gt;7 0 ms 0 ms 0 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;8 0 ms 0 ms 0 ms 192.168.10.22&lt;/P&gt;&lt;P&gt;9 0 ms 0 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;10 0 ms 0 ms 0 ms 192.168.10.18&lt;/P&gt;&lt;P&gt;11 0 ms 0 ms 0 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;12 0 ms 0 ms 0 ms 192.168.10.14&lt;/P&gt;&lt;P&gt;13 0 ms 0 ms 7 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;14 0 ms 0 ms 0 ms 192.168.10.22&lt;/P&gt;&lt;P&gt;15 0 ms 0 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;16 0 ms 0 ms 0 ms 192.168.10.14&lt;/P&gt;&lt;P&gt;17 1 ms 0 ms 0 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;18 0 ms 0 ms 1 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;19 0 ms 0 ms 0 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;20 0 ms 0 ms 0 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;21 0 ms 1 ms 10 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;22 10 ms 0 ms 0 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;23 0 ms 0 ms 1 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;24 0 ms 0 ms 0 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;25 0 ms 1 ms 10 ms 192.168.20.2&lt;/P&gt;&lt;P&gt;26 10 ms 10 ms 10 ms 192.168.10.14&lt;/P&gt;&lt;P&gt;27 10 ms 10 ms 10 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;28 10 ms 10 ms 10 ms 192.168.10.18&lt;/P&gt;&lt;P&gt;29 10 ms 10 ms 10 ms 192.168.20.3&lt;/P&gt;&lt;P&gt;30 10 ms 10 ms 10 ms 192.168.10.6&lt;/P&gt;&lt;P&gt;the same withe tracert to 10.10.20.2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if i add a link from ASA1 to ISP-5G then it has to be in outside vlan is that correct ?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 13:19:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886028#M1102687</guid>
      <dc:creator>lomai</dc:creator>
      <dc:date>2023-07-17T13:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886031#M1102688</link>
      <description>&lt;P&gt;Just a second, let me fix and share the file here.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 13:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886031#M1102688</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-07-17T13:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886036#M1102689</link>
      <description>&lt;P&gt;my intention in this topology is that; if ISP-cable router is down the network will use the ISP-5G&amp;nbsp;&lt;/P&gt;&lt;P&gt;in ASA the dual ISP function is disabled on the OS so i cant use that function..&lt;/P&gt;&lt;P&gt;will it be esear to only use on ISP connections and have the redundancy only on firewall?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 13:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886036#M1102689</guid>
      <dc:creator>lomai</dc:creator>
      <dc:date>2023-07-17T13:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886050#M1102690</link>
      <description>&lt;P&gt;Let´s make it work this way first and then we can see if the other solution is better.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 13:55:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886050#M1102690</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-07-17T13:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886051#M1102691</link>
      <description>&lt;P&gt;thank you! appreciate it.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 13:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886051#M1102691</guid>
      <dc:creator>lomai</dc:creator>
      <dc:date>2023-07-17T13:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886053#M1102692</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1556312"&gt;@lomai&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;On the topology attached you are able to ping from PCs to ISP1 and ISP2. Take a close look and let me know.&lt;/P&gt;
&lt;P&gt;Now, we can discus about other option in the diagram if you want.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 14:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886053#M1102692</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-07-17T14:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886056#M1102693</link>
      <description>&lt;P&gt;i just have to update my Packet tracer verison to be able to open your file and ill get back ti you. tnx so much&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 14:08:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886056#M1102693</guid>
      <dc:creator>lomai</dc:creator>
      <dc:date>2023-07-17T14:08:12Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886068#M1102696</link>
      <description>&lt;P&gt;i tested and it works perfectly &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; tnx!!&lt;/P&gt;&lt;P&gt;i see that you added a route on bouth core-routers :&lt;/P&gt;&lt;P&gt;core-1: ip route 10.10.10.0 255.255.255.252 192.168.10.25&lt;/P&gt;&lt;P&gt;core-2: ip route 10.10.20.0 255.255.255.252 192.168.10.42&lt;/P&gt;&lt;P&gt;then added&amp;nbsp;&lt;/P&gt;&lt;P&gt;redistribute static subnets on the ospf&amp;nbsp;&lt;/P&gt;&lt;P&gt;and finaly removed&amp;nbsp;&lt;/P&gt;&lt;P&gt;default-information originate&lt;/P&gt;&lt;P&gt;i have been hopping from article to article and video to video and did not find any explanation for that but it seems like i did not look for the right ting.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but for the question i had if we consider redundanscy is this a good setup or as i asked befor is it enoufg with one isp and have the redundancy in the firewall?&lt;/P&gt;&lt;P&gt;what is the best solution in your opinion?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 14:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886068#M1102696</guid>
      <dc:creator>lomai</dc:creator>
      <dc:date>2023-07-17T14:28:19Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886072#M1102698</link>
      <description>&lt;P&gt;i will also appreciate if you have any good articles on DMZ ACL setup on ASA and network hardening (security implementations on the different layers and protocols)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 14:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886072#M1102698</guid>
      <dc:creator>lomai</dc:creator>
      <dc:date>2023-07-17T14:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886081#M1102699</link>
      <description>&lt;P&gt;It is good and the exercise you need to to is if you shutdown one firewall what would happen, or if you shutdown on router what would happen.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;But for better resilience I believe you can install the static route on the Dists switches and you can add two static routes like&lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;ip route 10.10.20.0 255.255.255.252 R1 1 &lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;ip route 10.10.20.0 255.255.255.252 R2 2 &lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;On the other Dist you do&lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;ip route 10.10.20.0 255.255.255.252 R2 1&lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;ip route 10.10.20.0 255.255.255.252 R1 2&lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="-qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;This way, if the router fail, the Dist will send the traffic for the other Router&lt;/P&gt;
&lt;P style="-qt-paragraph-type: empty; -qt-block-indent: 0; text-indent: 0px; margin: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 14:45:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886081#M1102699</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-07-17T14:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886090#M1102701</link>
      <description>&lt;P&gt;that sounds good i will try impliment that Static routs and do the exercise to see what happens, am writing an exam report too so that would be nice to show on the report.&lt;/P&gt;&lt;P&gt;thanks again for so fast reply and good help!&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 14:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886090#M1102701</guid>
      <dc:creator>lomai</dc:creator>
      <dc:date>2023-07-17T14:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: cant ping from inside to outside thru ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886096#M1102702</link>
      <description>&lt;P&gt;Sure thing. I will share with your as soon as I find something usefull&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 15:07:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-ping-from-inside-to-outside-thru-asa/m-p/4886096#M1102702</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-07-17T15:07:52Z</dc:date>
    </item>
  </channel>
</rss>

