<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Another explanation worth in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067026#M134261</link>
    <description>&lt;P&gt;Another explanation worth following up would be amending mtu for asa interface&amp;nbsp;and possibly mss for tcp&lt;/P&gt;
&lt;P&gt;sysopt connection tcpmss xxxx&amp;nbsp;&lt;/P&gt;
&lt;P&gt;look up the isp device mtu preferred settings online.&lt;/P&gt;
&lt;P&gt;Find a happy relationship between them hopefully.&lt;/P&gt;</description>
    <pubDate>Fri, 07 Jul 2017 21:49:55 GMT</pubDate>
    <dc:creator>GRANT3779</dc:creator>
    <dc:date>2017-07-07T21:49:55Z</dc:date>
    <item>
      <title>Unable to ping out from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067016#M134251</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;
&lt;P&gt;ASA newbie here.&lt;/P&gt;
&lt;P&gt;I had what I thought was a decent grasp on how to configure a 5505 from factory settings, but I'm having trouble with some basic functionality.&amp;nbsp; Currently I'm unable to ping out from the ASA itself to anywhere on the outside interface.&amp;nbsp; (To be&amp;nbsp;clear, I'm not concerned with pinging from a host on the inside network yet.)&amp;nbsp; For example, I can't ping my ISP's gateway or 8.8.8.8.&amp;nbsp; Additionally, I'm only getting partial web page loads (if they load at all), but I can probably deal with that in another thread.&amp;nbsp; For now, I'd just like the ability to ping anything on the Internet from the firewall.&amp;nbsp; My running config is below and I've sanitized what I thought was appropriate.&amp;nbsp; Any help would be appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number: ***********&lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.2(4)&lt;BR /&gt;!&lt;BR /&gt;hostname **********&lt;BR /&gt;enable password ******************* encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd **************** encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address *.*.*.* *.*.*.*&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa924-k8.bin&lt;BR /&gt;boot system disk0:/asa825-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone pst -8&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server *.*.*.*&lt;BR /&gt;&amp;nbsp;name-server *.*.*.*&lt;BR /&gt;object-group network obj_any&lt;BR /&gt;access-list from_outside extended permit icmp any any echo-reply&lt;BR /&gt;access-list from_outside extended permit icmp any any time-exceeded&lt;BR /&gt;access-list from_outside extended permit icmp any any unreachable&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-781-150.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group from_outside in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 *.*.*.* 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http *.*.*.* *.*.*.* inside&lt;BR /&gt;http *.*.*.* *.*.*.* outside&lt;BR /&gt;http *.*.*.* *.*.*.* outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;no validation-usage&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca **************&lt;BR /&gt;******************&lt;BR /&gt;******************&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh *.*.*.* *.*.*.* inside&lt;BR /&gt;ssh *.*.*.* *.*.*.* outside&lt;BR /&gt;ssh *.*.*.* *.*.*.* outside&lt;BR /&gt;ssh timeout 15&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address *.*.*.*-*.*.*.* inside&lt;BR /&gt;dhcpd dns *.*.*.* *.*.*.* interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username provost password ****************** encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:******************&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:40:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067016#M134251</guid>
      <dc:creator>Shane.Toumey</dc:creator>
      <dc:date>2019-03-12T09:40:15Z</dc:date>
    </item>
    <item>
      <title>Under</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067017#M134252</link>
      <description>&lt;P&gt;Under&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;/P&gt;
&lt;P&gt;class inspection_default&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;add&amp;nbsp;&lt;/P&gt;
&lt;P&gt;inspect icmp&lt;/P&gt;
&lt;P&gt;First thing i would try for the pinging issue.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 20:10:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067017#M134252</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-07-07T20:10:57Z</dc:date>
    </item>
    <item>
      <title>Thanks for the suggestion.  I</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067018#M134253</link>
      <description>&lt;P&gt;Thanks for the suggestion. &amp;nbsp;I gave it a try but am still unable to ping anything.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 20:25:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067018#M134253</guid>
      <dc:creator>Shane.Toumey</dc:creator>
      <dc:date>2017-07-07T20:25:05Z</dc:date>
    </item>
    <item>
      <title>icmp permit any echo</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067019#M134254</link>
      <description>&lt;P&gt;icmp permit any echo outside&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any unreachable outside&lt;/P&gt;
&lt;P&gt;not sure it is best practice to do so but may work as I believe this is for traffic directed at asa itself and not through it.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 20:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067019#M134254</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-07-07T20:37:44Z</dc:date>
    </item>
    <item>
      <title>Here are my current access</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067020#M134255</link>
      <description>&lt;P&gt;Here are my current access-list and access-group settings:&lt;BR /&gt;access-group from_outside in interface outside&lt;BR /&gt;access-list from_outside extended permit icmp any any echo-reply&lt;BR /&gt;access-list from_outside extended permit icmp any any time-exceeded&lt;BR /&gt;access-list from_outside extended permit icmp any any unreachable&lt;BR /&gt;access-list from_outside extended permit icmp any any echo&lt;/P&gt;
&lt;P&gt;I'm still unable to ping anything.&lt;/P&gt;
&lt;P&gt;I'm starting to think this issue may be related to how the 5505 is interacting with my ISP or cable modem.&amp;nbsp; The cable modem itself has an amber link light.&amp;nbsp; When I was using my consumer firewall before, it worked normally and the light was green.&amp;nbsp; I didn't think anything of it at first because I am (strangely) able to load google.com and occasionally other pages.&lt;/P&gt;
&lt;P&gt;Maybe I should shift my focus to figuring out how best to configure the ASA to work as the edge device on my network while connected to a cable modem that uses DHCP.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 20:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067020#M134255</guid>
      <dc:creator>Shane.Toumey</dc:creator>
      <dc:date>2017-07-07T20:53:34Z</dc:date>
    </item>
    <item>
      <title>The icmp permit commands are</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067021#M134256</link>
      <description>&lt;P&gt;The icmp permit commands are totally separate from your acls and access-group command.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Did you add them from configuration mode to test?&lt;/P&gt;
&lt;P&gt;Can you also post output of show interface eth0/0&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 21:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067021#M134256</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-07-07T21:00:10Z</dc:date>
    </item>
    <item>
      <title>I think I understand that now</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067022#M134257</link>
      <description>&lt;P&gt;I think I understand that now.&amp;nbsp; I added the commands you mentioned but still no dice.&lt;/P&gt;
&lt;P&gt;Here's the output of sh int eth0/0 and I'm throwing in vlan2 as well.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Interface Ethernet0/0 "", is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is 88E6095, BW 100 Mbps, DLY 100 usec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Input flow control is unsupported, output flow control is unsupported&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Available but not configured via nameif&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address ****.****.****, MTU not set&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address unassigned&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 164073 packets input, 82635857 bytes, 0 no buffer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 102948 broadcasts, 0 runts, 0 giants&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause input, 0 resume input&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 L2 decode drops&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4921 switch ingress policy drops&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 29884 packets output, 2582839 bytes, 0 underruns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause output, 0 resume output&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 late collisions, 0 deferred&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 rate limit drops&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 switch egress policy drops&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input reset drops, 0 output reset drops&lt;BR /&gt;&lt;BR /&gt;Interface Vlan2 "outside", is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is EtherSVI, BW 100 Mbps, DLY 100 usec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address ****.****.****, MTU 1500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address *.*.*.*, subnet mask&amp;nbsp;*.*.*.*&lt;BR /&gt;&amp;nbsp; Traffic Statistics for "outside":&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 159265 packets input, 79200361 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 29886 packets output, 1909165 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 286 packets dropped&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute input rate 10 pkts/sec,&amp;nbsp; 495 bytes/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute output rate 0 pkts/sec,&amp;nbsp; 4 bytes/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute drop rate, 0 pkts/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute input rate 10 pkts/sec,&amp;nbsp; 504 bytes/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute output rate 0 pkts/sec,&amp;nbsp; 6 bytes/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute drop rate, 0 pkts/sec&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 21:07:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067022#M134257</guid>
      <dc:creator>Shane.Toumey</dc:creator>
      <dc:date>2017-07-07T21:07:12Z</dc:date>
    </item>
    <item>
      <title>Switch ingress policy drops</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067023#M134258</link>
      <description>&lt;P&gt;Switch ingress policy drops &amp;nbsp;stand out on the physical interface.&lt;/P&gt;
&lt;P&gt;I would look at this.&lt;/P&gt;
&lt;P&gt;Is there a switch in between the asa and isp device or are yiu connected directly to isp device?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 21:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067023#M134258</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-07-07T21:20:11Z</dc:date>
    </item>
    <item>
      <title>Connected directly.</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067024#M134259</link>
      <description>&lt;P&gt;Connected directly.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 21:24:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067024#M134259</guid>
      <dc:creator>Shane.Toumey</dc:creator>
      <dc:date>2017-07-07T21:24:14Z</dc:date>
    </item>
    <item>
      <title>I would maybe try a few</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067025#M134260</link>
      <description>&lt;P&gt;I would maybe try a few different combinations of hard setting duplex and speed of the eth0/0 interface. See if the isp device likes it better.&lt;/P&gt;
&lt;P&gt;Enable logging to buffer and see if anything stands out.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 21:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067025#M134260</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-07-07T21:34:59Z</dc:date>
    </item>
    <item>
      <title>Another explanation worth</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067026#M134261</link>
      <description>&lt;P&gt;Another explanation worth following up would be amending mtu for asa interface&amp;nbsp;and possibly mss for tcp&lt;/P&gt;
&lt;P&gt;sysopt connection tcpmss xxxx&amp;nbsp;&lt;/P&gt;
&lt;P&gt;look up the isp device mtu preferred settings online.&lt;/P&gt;
&lt;P&gt;Find a happy relationship between them hopefully.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 21:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067026#M134261</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-07-07T21:49:55Z</dc:date>
    </item>
    <item>
      <title>My boss recommended putting a</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067027#M134262</link>
      <description>&lt;P&gt;My boss recommended putting a switch between the modem and ASA.&amp;nbsp; Afterwards I'm able to ping from the ASA out to the Internet.&lt;/P&gt;
&lt;P&gt;I'm betting you were right about trying a hard setting for speed and duplex.&amp;nbsp; I'm going to try that next and see if I can eliminate the switch.&lt;/P&gt;
&lt;P&gt;I'll post results.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2017 16:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-out-from-asa-5505/m-p/3067027#M134262</guid>
      <dc:creator>Shane.Toumey</dc:creator>
      <dc:date>2017-07-12T16:34:04Z</dc:date>
    </item>
  </channel>
</rss>

