<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic In addition to what JP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029752#M135425</link>
    <description>&lt;P&gt;In addition to what JP correctly noted, an ASA does not by default inspect icmp traffic and thus ping through the device will never work as the icmp echo reply messages will be droppped at the outside interface.&lt;/P&gt;
&lt;P&gt;Also, generally speaking ping is not the best test to use for connectiivty as it might work while communications requiring an actual connection (i.e. TCP 3-way handshake) will not work due to any number of reasons that wold not be shown via a simple ping. I recommend testing via actual representative user traffic like browsing to the Internet or, for a sys admin, logging into a device on the other side of the firewall via RDP, ssh or telnet or such.&lt;/P&gt;
&lt;P&gt;To fix the ping issue, you can add the inspection as follows:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;policy-map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;  class inspection_default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;    inspect icmp&lt;/SPAN&gt;&lt;/PRE&gt;</description>
    <pubDate>Fri, 19 May 2017 04:52:17 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-05-19T04:52:17Z</dc:date>
    <item>
      <title>Cisco ASA 5505 not pinging Google or computers on the Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029750#M135418</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am currently training for my CCENT and plan on getting my CCNA, but unfortunately our network engineer left the organization&amp;nbsp;and all of his responsibilities have landed on my shoulders. I have been scrapping by thanks to google and our online training program, but this has got me stuck. We have a small off site&amp;nbsp;facility with only 3 devices and a Cisco ASA 5505. Unfortunately that device broke and we had to purchase a new ASA which I am now configuring. I cannot for the life of me get this to ping 8.8.8.8 or an internal IP Address. I believe the issue lies with the NAT settings, but almost every guide I find is using the Global command which is apparently no longer in use. I also found cisco's guide on the change, but I don't understand enough of it to apply the change to this ASA. Please take a look at the running config and let me know if you see anything wrong. I also want to set up and use ASDM just like our other 2 firewalls, so if you see any settings missing from that, I would appreciate the help as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you have a moment to explain the commands, so I can learn from this mistake, I would greatly appreciate the information.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;NOTE: I replaced any confidential information with "?" and our Hostname with "HOSTNAME"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HOSTNAME# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number:&amp;nbsp;????????????&lt;BR /&gt;: Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(6)&lt;BR /&gt;!&lt;BR /&gt;hostname&amp;nbsp;HOSTNAME&lt;BR /&gt;enable password ????????????&amp;nbsp;encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.5.66 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.4.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside-subnet&lt;BR /&gt; subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network dmz-subnet&lt;BR /&gt; subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network inside-subnet&lt;BR /&gt; nat (inside,Outside) dynamic interface&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 192.168.5.254 1&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 192.168.1.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.5.66 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd dns 192.168.5.254&lt;BR /&gt;dhcpd auto_config Outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.5.10-192.168.5.20 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username ??????&amp;nbsp;password ????????????&amp;nbsp;encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:bc027647fbf5752b0952b684a2e3e30c&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:23:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029750#M135418</guid>
      <dc:creator>jdamico</dc:creator>
      <dc:date>2019-03-12T09:23:24Z</dc:date>
    </item>
    <item>
      <title>Hi jdamico@tgcaz.org,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029751#M135423</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/jdamicotgcazorg" title="View user profile." class="username" lang="" about="/users/jdamicotgcazorg" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;jdamico@tgcaz.org&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Considering you outside interface is part of the network 192.168.4.0/24 your route to the outside should be part of that network:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Current routes:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route Outside 0.0.0.0 0.0.0.0 192.168.5.254 1 --remove&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;route Outside 0.0.0.0 0.0.0.0 192.168.1.254 1 --remove&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;New route:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route Outside 0.0.0.0 0.0.0.0 192.168.4.x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The nat seems fine.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Hope this info helps!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rate if helps you!!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-JP-&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 01:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029751#M135423</guid>
      <dc:creator>JP Miranda Z</dc:creator>
      <dc:date>2017-05-19T01:35:06Z</dc:date>
    </item>
    <item>
      <title>In addition to what JP</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029752#M135425</link>
      <description>&lt;P&gt;In addition to what JP correctly noted, an ASA does not by default inspect icmp traffic and thus ping through the device will never work as the icmp echo reply messages will be droppped at the outside interface.&lt;/P&gt;
&lt;P&gt;Also, generally speaking ping is not the best test to use for connectiivty as it might work while communications requiring an actual connection (i.e. TCP 3-way handshake) will not work due to any number of reasons that wold not be shown via a simple ping. I recommend testing via actual representative user traffic like browsing to the Internet or, for a sys admin, logging into a device on the other side of the firewall via RDP, ssh or telnet or such.&lt;/P&gt;
&lt;P&gt;To fix the ping issue, you can add the inspection as follows:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;policy-map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;  class inspection_default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;    inspect icmp&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 19 May 2017 04:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029752#M135425</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-19T04:52:17Z</dc:date>
    </item>
    <item>
      <title>Thank you for your help JP,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029753#M135428</link>
      <description>&lt;P&gt;Thank you for your help JP, but that unfortunately didn't fix the issue. I cannot access the internet or access the site for ASDM. I attached the new sh run, just in case.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I also did not know that Marvin, thank you.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Some topology.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Interface 0 - Incoming from Modem.&lt;/P&gt;
&lt;P&gt;Interface 7 - Laptop.&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2017 22:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029753#M135428</guid>
      <dc:creator>jdamico</dc:creator>
      <dc:date>2017-05-19T22:23:53Z</dc:date>
    </item>
    <item>
      <title>Are you able to ping the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029754#M135429</link>
      <description>&lt;P&gt;Are you able to ping the upstream gateway (modem address 192.168.4.66) from an inside computer?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 20 May 2017 03:49:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029754#M135429</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-20T03:49:58Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin/JP,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029755#M135431</link>
      <description>&lt;P&gt;Hi Marvin/JP,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Sorry, This past week has been absolutely crazy with issues, hopefully things will slow down so I can get this set up and running. I had a few minutes to plug it in and try pinging 192.168.4.66, which failed. I looked at the default gateway that I was getting on the computer plugged into interface 7, this gateway showed as 192.168.5.66. Which I was able to ping. I am at a loss at what to try next.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for any knowledge you can pass on!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-JD&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 22:08:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029755#M135431</guid>
      <dc:creator>jdamico</dc:creator>
      <dc:date>2017-05-24T22:08:54Z</dc:date>
    </item>
    <item>
      <title>If you cannot reach the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029756#M135433</link>
      <description>&lt;P&gt;If you cannot reach the default gateway from the ASA then you certainly won't be able to reach anything on the Internet.&lt;/P&gt;
&lt;P&gt;Are you sure you have the gateway address correct? .66 is a bit of an odd address for a gateway on a /24 subnet. .1 or .254 would be much more common.&lt;/P&gt;
&lt;P&gt;See if you can resolve that and let us know if you can.&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 08:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029756#M135433</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-25T08:06:40Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029757#M135436</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I had followed a guide online step by step and after seeing what you posted and thinking about it, you are correct, the default gateway was 192.168.1.1. After switching this over I am good to go. Now to configure the site to site vpn.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your help!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-JD&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2017 16:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-not-pinging-google-or-computers-on-the-interfaces/m-p/3029757#M135436</guid>
      <dc:creator>jdamico</dc:creator>
      <dc:date>2017-05-26T16:49:43Z</dc:date>
    </item>
  </channel>
</rss>

