<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This is as you say even more in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047876#M135328</link>
    <description>&lt;P&gt;This is as you say even more&amp;nbsp;confusing now.&lt;/P&gt;
&lt;P&gt;So the ASA can route traffic assuming it is simply not showing in the traceoute which it won't do by default as I understand it.&lt;/P&gt;
&lt;P&gt;And looking at the screenshot the default gateway for that 192.168.1.x client is set correctly.&lt;/P&gt;
&lt;P&gt;You said in an earlier post you could not ping the inside devices from the 10.3.200.1 IP on the core switch so can you try that ping to this specific client ie. 192.168.1.116 and see what happens ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
    <pubDate>Tue, 23 May 2017 21:29:50 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2017-05-23T21:29:50Z</dc:date>
    <item>
      <title>ASA 5505 with Security+ not passing traffic through ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047859#M135289</link>
      <description>&lt;P&gt;I am having a very strange issue.&amp;nbsp; Initially I thought this was a simple fix...5 hours later i am still in the same predicament.&amp;nbsp; I am simply trying to use an ASA 5505 as a router.&amp;nbsp; Why not use a router you ask, unfortunately I do not have that option.&amp;nbsp; The ASA is running 9.2(4) code.&amp;nbsp; We have another ASA on the remote end (5512 running the same code) and it works as expected routing traffic from the outside interface to the inside and vice versa.&amp;nbsp; I have created ACL's allowing any any still to no avail.&amp;nbsp; Attached is a drawing of the connectivity and the config file from the ASA in question.&amp;nbsp; Any assistance would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.1.1.0 House-1&lt;BR /&gt;name 10.2.1.0 House-2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif private&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.250 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif engineering&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.3.200.31 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa924-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network House-1&lt;BR /&gt;&amp;nbsp;subnet 10.1.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;description Created during name migration&lt;BR /&gt;object network House-2&lt;BR /&gt;&amp;nbsp;subnet 10.2.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;description Created during name migration&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object object House-1&lt;BR /&gt;&amp;nbsp;network-object object House-2&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 2626&lt;BR /&gt;&amp;nbsp;port-object eq 2627&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 2626&lt;BR /&gt;&amp;nbsp;port-object eq 2627&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object host 10.3.201.165&lt;BR /&gt;&amp;nbsp;network-object host 10.3.201.37&lt;BR /&gt;&amp;nbsp;network-object host 10.3.201.38&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;&amp;nbsp;network-object host 10.3.201.164&lt;BR /&gt;&amp;nbsp;network-object host 10.3.201.37&lt;BR /&gt;&amp;nbsp;network-object host 10.3.201.38&lt;BR /&gt;access-list cap extended permit icmp 10.0.0.0 255.0.0.0 any&lt;BR /&gt;access-list private_access_in remark Automation Timecode&lt;BR /&gt;access-list private_access_in extended permit ip 192.168.1.0 255.255.255.0 any4&lt;BR /&gt;access-list private_access_in extended permit ip any any&lt;BR /&gt;access-list in_engineering extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 40960&lt;BR /&gt;logging buffered warnings&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu private 1500&lt;BR /&gt;mtu engineering 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any private&lt;BR /&gt;icmp permit any engineering&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;access-group private_access_in in interface private&lt;BR /&gt;access-group in_engineering in interface engineering&lt;BR /&gt;route engineering 0.0.0.0 0.0.0.0 10.3.200.1 1&lt;BR /&gt;route engineering 192.168.9.0 255.255.255.0 10.3.200.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;no threat-detection basic-threat&lt;BR /&gt;no threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.1.1.17 source engineering prefer&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 2048&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:c16a8714e9850302ee5a66536bac6edc&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ASA# sh activation-key&lt;BR /&gt;&lt;BR /&gt;Running Permanent Activation Key: 0xc318c05a 0x58dc1d04 0x445265dc 0x83c83870 0x0b0822b4&lt;BR /&gt;&lt;BR /&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ Unrestricted&lt;BR /&gt;Dual ISPs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;VLAN Trunk Ports&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Active/Standby perpetual&lt;BR /&gt;Encryption-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Encryption-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Premium Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Other VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Total VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Shared License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Advanced Endpoint Assessment&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;UC Phone Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Total UC Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Botnet Traffic Filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Intercompany Media Engine&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Cluster&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;&lt;BR /&gt;This platform has an ASA 5505 Security Plus license.&lt;BR /&gt;&lt;BR /&gt;The flash permanent activation key is the SAME as the running permanent key.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047859#M135289</guid>
      <dc:creator>Chris Heighway</dc:creator>
      <dc:date>2019-03-12T09:24:24Z</dc:date>
    </item>
    <item>
      <title>Configuration looks good to</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047860#M135292</link>
      <description>&lt;P&gt;Configuration looks good to me,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;you are trying to ping&amp;nbsp;&lt;SPAN&gt;192.168.1.250 which is private interface IP, Did you try connecting a PC to any of the physical ports in VLAN 1 and then ping that IP? You will not be able to ping inside interface from WAN side, ASA architecture&amp;nbsp;doesn't allow it.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 15:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047860#M135292</guid>
      <dc:creator>Ashish Jhaldiyal</dc:creator>
      <dc:date>2017-05-23T15:53:48Z</dc:date>
    </item>
    <item>
      <title>Hi Ashish,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047861#M135295</link>
      <description>&lt;P&gt;Hi Ashish,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your response!! &amp;nbsp;From the ASA and from another PC in the same subnet you can ping other IP's in the 192.168.1.x range yes. &amp;nbsp;I think you may be mistaken "Y&lt;SPAN&gt;ou will not be able to ping inside interface from WAN side, ASA architecture&amp;nbsp;doesn't allow it." unless that is a caveat specific to the 5505. &amp;nbsp;I have an ASA on the other side (5512) and is is allowing icmp from outside to inside. &amp;nbsp;This command allows for traffic between interfaces if they are the same security level -&amp;nbsp;same-security-traffic permit inter-interface. &amp;nbsp;Also I have an ACL permitting all IP traffic. and the following:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;icmp permit any private (inside)&lt;BR /&gt;icmp permit any engineering (outside)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 16:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047861#M135295</guid>
      <dc:creator>Chris Heighway</dc:creator>
      <dc:date>2017-05-23T16:08:57Z</dc:date>
    </item>
    <item>
      <title>ACLs and same security level</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047862#M135299</link>
      <description>&lt;P&gt;&lt;SPAN&gt;ACLs and&amp;nbsp;same security level -&amp;nbsp;same-security-traffic permit inter-interface commands allow through the box traffic.&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;icmp permit any private (inside)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;icmp permit any engineering (outside)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;commands allow ping on the interface but ping request &amp;nbsp;has to come from same interface, So if you want to ping LAN IP of ASA you have to ping it from LAN subnets or networks behind LAN interface. you can't ping WAN IP from LAN subnet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 16:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047862#M135299</guid>
      <dc:creator>Ashish Jhaldiyal</dc:creator>
      <dc:date>2017-05-23T16:47:27Z</dc:date>
    </item>
    <item>
      <title>Ah I see the confusion.  I do</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047863#M135304</link>
      <description>&lt;P&gt;Ah I see the confusion. &amp;nbsp;I do not need to ping the ASA LAN/inside interface, my apologies if my initial question eluded to that. &amp;nbsp;I only need to connect to the devices behind the LAN interface. &amp;nbsp;Like a router basically.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 19:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047863#M135304</guid>
      <dc:creator>Chris Heighway</dc:creator>
      <dc:date>2017-05-23T19:10:32Z</dc:date>
    </item>
    <item>
      <title>It may just be a typo but on</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047864#M135307</link>
      <description>&lt;P&gt;It may just be a typo but on the 4431 on the right hand side the next hop for the 192.168.1.0/24 subnet is the firewall but there is a L3 core device in between.&lt;/P&gt;
&lt;P&gt;Shouldn't the next hop be 10.1.1.x ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 19:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047864#M135307</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-05-23T19:24:32Z</dc:date>
    </item>
    <item>
      <title>Nice catch Jon however that</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047865#M135309</link>
      <description>&lt;P&gt;Nice catch Jon however that did not do it. &amp;nbsp;I can't even ping devices on the inside network from the L3 switch (Core on right in purple) that has the SVI for the ASA's default route.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 19:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047865#M135309</guid>
      <dc:creator>Chris Heighway</dc:creator>
      <dc:date>2017-05-23T19:40:48Z</dc:date>
    </item>
    <item>
      <title>Worth a try :)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047866#M135312</link>
      <description>&lt;P&gt;Worth a try &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Out of interest can you ping 10.3.200.31 from the core switch ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 19:46:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047866#M135312</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-05-23T19:46:31Z</dc:date>
    </item>
    <item>
      <title>Chris</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047867#M135314</link>
      <description>&lt;P&gt;Chris&lt;/P&gt;
&lt;P&gt;Apologies, just looked at your schematic again and can see you can ping that IP from the other side.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 19:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047867#M135314</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-05-23T19:49:22Z</dc:date>
    </item>
    <item>
      <title>Yes, the outside address is</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047868#M135316</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Yes, the outside address is reachable all the way from the other ASA (5512).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;5512(config)# ping 10.3.200.31&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Type escape sequence to abort.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Sending 5, 100-byte ICMP Echos to 10.3.200.31, timeout is 2 seconds:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;!!!!!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 20/28/40 ms&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;5512(config)# traceroute 10.3.200.31&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Type escape sequence to abort.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Tracing the route to 10.3.200.31&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;1 10.1.4.11 10 msec 0 msec 0 msec&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; 2 192.168.101.1 10 msec 10 msec 20 msec&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; 3 10.1.1.1 20 msec 20 msec 20 msec&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; 4 * * *&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; 5 * * *&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; 6 * * *&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 19:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047868#M135316</guid>
      <dc:creator>Chris Heighway</dc:creator>
      <dc:date>2017-05-23T19:55:34Z</dc:date>
    </item>
    <item>
      <title>Yeah everything points to</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047869#M135318</link>
      <description>&lt;P&gt;Yeah everything points to something in the ASA it seems. &amp;nbsp;I just have no clue what that is...I have upgraded the code and see no bugs related. &amp;nbsp;The config is just about replicated from the other ASA that is passing traffic...no clue at this point. &amp;nbsp;Thank you for taking a stab at it.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 19:58:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047869#M135318</guid>
      <dc:creator>Chris Heighway</dc:creator>
      <dc:date>2017-05-23T19:58:16Z</dc:date>
    </item>
    <item>
      <title>Okay, don't want to insult</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047870#M135320</link>
      <description>&lt;P&gt;Okay, don't want to insult your intelligence but the obvious things ie. you say you can ping a 192.168.1.x client from the ASA. Are you trying to ping the same client through the firewall ie. just trying to make sure the clients are not blocking the pings.&lt;/P&gt;
&lt;P&gt;Have you tried the packet tracer command to see if it should be allowed ie.&lt;/P&gt;
&lt;P&gt;"packet-tracer input outside icmp 10.200.31.1 8 0 192.168.1.x"&lt;/P&gt;
&lt;P&gt;and also you could try applying an acl outbound to the inside interface to see if traffic is actually going out to the 192.168.1.x client.&lt;/P&gt;
&lt;P&gt;Apologies if you have done all this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 20:08:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047870#M135320</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-05-23T20:08:09Z</dc:date>
    </item>
    <item>
      <title>Hey Jon,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047871#M135321</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Hey Jon,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;No worries, I am here because I am out of ideas, no harm in double checking.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Yes same client with no firewall blocking ICMP. &amp;nbsp;I have done the packet tracer and the ASA comes back saying all should pass:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;5505(config)# packet-tracer input engineering icmp 192.168.9.12 0 0 192.168.1.$&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Type: ROUTE-LOOKUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Subtype: Resolve Egress Interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;in 192.168.1.0 255.255.255.0 private&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Phase: 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Subtype: log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;access-group in_engineering in interface engineering&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;access-list in_engineering extended permit ip any any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; in id=0xcccedcf0, priority=13, domain=permit, deny=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; hits=4339, user_data=0xca2ce520, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; input_ifc=engineering, output_ifc=any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Phase: 3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Type: NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Subtype: per-session&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; in id=0xcbcaa5c8, priority=0, domain=nat-per-session, deny=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; hits=4398, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; input_ifc=any, output_ifc=any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Phase: 4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; in id=0xcc3bbab0, priority=0, domain=inspect-ip-options, deny=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; hits=13221, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; input_ifc=engineering, output_ifc=any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Phase: 5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Type: INSPECT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Subtype: np-inspect&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;class-map inspection_default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; match default-inspection-traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; class inspection_default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; inspect icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; in id=0xccc74e70, priority=70, domain=inspect-icmp, deny=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; hits=32, user_data=0xccc73798, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; input_ifc=engineering, output_ifc=any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Phase: 6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Type: INSPECT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Subtype: np-inspect&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; in id=0xccc77ee8, priority=70, domain=inspect-icmp-error, deny=false&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; hits=32, user_data=0xccc76780, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; input_ifc=engineering, output_ifc=any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Phase: 7&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Type: FLOW-CREATION&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;New flow created with id 13014, packet dispatched to next module&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Module information for forward flow ...&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;snp_fp_tracer_drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;snp_fp_inspect_ip_options&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;snp_fp_inspect_icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;snp_fp_adjacency&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;snp_fp_fragment&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;snp_ifc_stat&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Module information for reverse flow ...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Result:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;input-interface: engineering&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;input-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;output-interface: private&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;output-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have not ran a capture. Good call I will try that now.&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 20:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047871#M135321</guid>
      <dc:creator>Chris Heighway</dc:creator>
      <dc:date>2017-05-23T20:29:15Z</dc:date>
    </item>
    <item>
      <title>If the capture shows traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047872#M135323</link>
      <description>&lt;P&gt;If the capture shows traffic passing the only other thing I can think of would be the IP settings on the clients ie. subnet mask and default gateway.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 20:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047872#M135323</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-05-23T20:32:39Z</dc:date>
    </item>
    <item>
      <title>Yeah I have asked them 3</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047873#M135325</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Yeah I have asked them 3 times to verify that..they ensure me that is all correct. &amp;nbsp;Guess I will need to validate myself. &amp;nbsp;The capture shows inbound but no outbound.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;access-list cap line 1 extended permit ip any4 any4 (hitcnt=23914)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;capture capin type raw-data access-list cap interface engineering&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;5505# sh cap capin | inc 10.1.4.41&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; 3: 15:46:33.275040 802.1Q vlan#2 P0 10.1.4.41 &amp;gt; 192.168.1.101: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; 73: 15:46:35.274994 802.1Q vlan#2 P0 10.1.4.41 &amp;gt; 192.168.1.101: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; 145: 15:46:37.274994 802.1Q vlan#2 P0 10.1.4.41 &amp;gt; 192.168.1.101: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; 208: 15:46:39.274949 802.1Q vlan#2 P0 10.1.4.41 &amp;gt; 192.168.1.101: icmp: echo request&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 8pt;"&gt; 258: 15:46:41.275010 802.1Q vlan#2 P0 10.1.4.41 &amp;gt; 192.168.1.101: icmp: echo request&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 20:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047873#M135325</guid>
      <dc:creator>Chris Heighway</dc:creator>
      <dc:date>2017-05-23T20:52:42Z</dc:date>
    </item>
    <item>
      <title>It is a bit of a puzzle this</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047874#M135326</link>
      <description>&lt;P&gt;It is a bit of a puzzle this one &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Can't think of anything else at the moment. If the ASA can ping 192.168.1.x clients then it looks like the internal switch connectivity is fine.&lt;/P&gt;
&lt;P&gt;If anything else comes to mind I'll post back.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 21:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047874#M135326</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-05-23T21:04:17Z</dc:date>
    </item>
    <item>
      <title>I have another piece to the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047875#M135327</link>
      <description>&lt;P&gt;I have another piece to the puzzle that only makes things even more confusing...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;There is a subnet (who's SVI is on the same core switch) that can reach the 192.168.1.x network both ways. &amp;nbsp;10.3.201.x. &amp;nbsp;I attached a couple screenshots they took.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/10_3_201_64.jpg" class="migrated-markup-image" /&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/192_168_1_116.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 21:07:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047875#M135327</guid>
      <dc:creator>Chris Heighway</dc:creator>
      <dc:date>2017-05-23T21:07:58Z</dc:date>
    </item>
    <item>
      <title>This is as you say even more</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047876#M135328</link>
      <description>&lt;P&gt;This is as you say even more&amp;nbsp;confusing now.&lt;/P&gt;
&lt;P&gt;So the ASA can route traffic assuming it is simply not showing in the traceoute which it won't do by default as I understand it.&lt;/P&gt;
&lt;P&gt;And looking at the screenshot the default gateway for that 192.168.1.x client is set correctly.&lt;/P&gt;
&lt;P&gt;You said in an earlier post you could not ping the inside devices from the 10.3.200.1 IP on the core switch so can you try that ping to this specific client ie. 192.168.1.116 and see what happens ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2017 21:29:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047876#M135328</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-05-23T21:29:50Z</dc:date>
    </item>
    <item>
      <title>hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047877#M135329</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;did you check if VLAN assignment (or allowed VLAN on trunk) is correct on the port on IDF-2 (puple side) which connects to 5505 eth0/0? it should be the same VLAN as the SVI for Core 10.3.200.1.&lt;/P&gt;
&lt;P&gt;if theVLAN is correct, the 5505 should ping 10.3.200.1 (and vice-versa on Core-purple side)&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 00:07:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047877#M135329</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2017-05-24T00:07:20Z</dc:date>
    </item>
    <item>
      <title>Ok, so it looks like, of the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047878#M135330</link>
      <description>&lt;P&gt;Ok, so it looks like, of the IP'd devices on the "inside" of the 5505 (192.168.1.x) may in fact have a mis-configuration though I was assured that all was well...&lt;/P&gt;
&lt;P&gt;That address (1.116) is reachable through the whole path..it is the only one of mess..seen by the ASA..&lt;IMG src="https://community.cisco.com/legacyfs/online/media/arp.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Thanks for all the tips!!&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 15:25:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-security-not-passing-traffic-through-asa/m-p/3047878#M135330</guid>
      <dc:creator>Chris Heighway</dc:creator>
      <dc:date>2017-05-24T15:25:44Z</dc:date>
    </item>
  </channel>
</rss>

