<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic &amp;quot;access-group 101 out in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031984#M146801</link>
    <description>&lt;P&gt;"access-group 101 out interface outside"&lt;/P&gt;
&lt;P&gt;This allows traffic defined in ACL 101 in the outbound direction on the outside interface. The ACL does not seem to have an entry for echo-request, only reply. Try adding echo-request also to allow that to flow outbound from the ASA.&lt;/P&gt;
&lt;P&gt;Also, are you sourcing the ping from behind the inside or test interface? The inside interface seems to be shutdown.&lt;/P&gt;</description>
    <pubDate>Mon, 06 Feb 2017 18:05:00 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-02-06T18:05:00Z</dc:date>
    <item>
      <title>Cannot Ping from inside to outside - Config Attached</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031983#M146800</link>
      <description>&lt;P&gt;I have attempted to create ACL's that would allow me to simply ping from any inside interfaces to desktops outside.... but nothing is working. Any help would be greatly appreciated by looking at the below config and telling me if you see anything&amp;nbsp;wrong.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;: : Hardware: ASA5525, 8192 MB RAM, CPU Lynnfield 2393 MHz, 1 CPU (4 cores)&lt;BR /&gt;: Written by enable_15 at 11:56:04.710 GMT Mon Feb 6 2017&lt;BR /&gt;!&lt;BR /&gt;ASA Version 9.2(2)4 &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.2.100 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; shutdown&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; nameif&amp;nbsp;test&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.3.100 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT 0&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;access-list 101 extended permit icmp any any echo-reply &lt;BR /&gt;access-list 101 extended permit icmp any any source-quench &lt;BR /&gt;access-list 101 extended permit icmp any any unreachable &lt;BR /&gt;access-list 101 extended permit icmp any any time-exceeded &lt;BR /&gt;access-list permit_ping extended permit icmp any any echo-reply &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu Deltav 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;access-group 101 in interface outside&lt;BR /&gt;access-group 101 out interface outside&lt;BR /&gt;access-group permit_ping in interface Deltav&lt;BR /&gt;access-group 101 out interface Deltav&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.3.0 255.255.255.0 test&lt;BR /&gt;http 192.168.2.0 255.255.255.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:418d5164334ce212560896d947090533&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031983#M146800</guid>
      <dc:creator>Scott</dc:creator>
      <dc:date>2019-03-12T08:53:36Z</dc:date>
    </item>
    <item>
      <title>"access-group 101 out</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031984#M146801</link>
      <description>&lt;P&gt;"access-group 101 out interface outside"&lt;/P&gt;
&lt;P&gt;This allows traffic defined in ACL 101 in the outbound direction on the outside interface. The ACL does not seem to have an entry for echo-request, only reply. Try adding echo-request also to allow that to flow outbound from the ASA.&lt;/P&gt;
&lt;P&gt;Also, are you sourcing the ping from behind the inside or test interface? The inside interface seems to be shutdown.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 18:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031984#M146801</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-06T18:05:00Z</dc:date>
    </item>
    <item>
      <title>Rahul,</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031985#M146802</link>
      <description>&lt;P&gt;Rahul,&lt;/P&gt;
&lt;P&gt;I added the "&lt;SPAN&gt;access-group 101 out interface outside" without success. I am pinging from a desktop on the test interface. I can ping the 192.168.3.100 interface fine.... tracert also... however, when I choose the 192.168.2.100 (outside interface or 192.168.2.50 (desktop on the outside interface) I get "Request timed out" and when I tracert to 192.168.3.X I get no hops . not even the 192.168.2.100... that I ping. Maybe a route issue?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please see example diagram&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks for ur reply.. I have been working on this for days....&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 18:32:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031985#M146802</guid>
      <dc:creator>Scott</dc:creator>
      <dc:date>2017-02-06T18:32:53Z</dc:date>
    </item>
    <item>
      <title>Ok, much more clearer. Thanks</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031986#M146803</link>
      <description>&lt;P&gt;Ok, much more clearer. Thanks for the diagram. remove the "&lt;SPAN&gt;access-group 101 out interface outside"&lt;/SPAN&gt; statement. If you need to filter outbound requests from the ASA, then add icmp echo-request to list of allowed icmp types. As of now, you have only the following:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list 101 extended permit icmp any any echo-reply &lt;BR /&gt;access-list 101 extended permit icmp any any source-quench &lt;BR /&gt;access-list 101 extended permit icmp any any unreachable &lt;BR /&gt;access-list 101 extended permit icmp any any time-exceeded &lt;/PRE&gt;
&lt;P&gt;You wont be able to ping the outside interface of the ASA when sourced from test interface (by design). But you should try pinging the desktop on the outside interface. Run an ASA packet-tracer command to see how the ASA processed your ping request:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;packet-tracer input test icmp 192.168.3.50 8 0 192.168.2.50 detailed&lt;/PRE&gt;
&lt;P&gt;Also, apply a packet capture on the ASA test and outside interfaces so that you can see where the packet gets dropped in the flow.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 19:16:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031986#M146803</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-06T19:16:16Z</dc:date>
    </item>
    <item>
      <title>Not related to your problem .</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031987#M146804</link>
      <description>&lt;P&gt;Not related to your problem ...&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;access-list 101 extended permit icmp any any source-quench&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Don't allow source-quench. &lt;G class="gr_ gr_104 gr-alert gr_spell gr_disable_anim_appear ContextualSpelling" id="104" data-gr-id="104"&gt;It's&lt;/G&gt; usage is &lt;A href="https://tools.ietf.org/html/rfc6633"&gt;deprecated since nearly five years&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 19:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031987#M146804</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-02-06T19:30:04Z</dc:date>
    </item>
    <item>
      <title>Rahul,</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031988#M146805</link>
      <description>&lt;P&gt;Rahul,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Below is the output of the packet-tracer... I also added the latest config ....FYI.. I changed the interface name from test to deltav.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;again.. THANK YOU for ur continued help!!!&lt;/P&gt;
&lt;P&gt;ciscoasa# packet-tracer input deltav icmp 192.168.3.50 8 0 192.168.2.50 detail$&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;/P&gt;
&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;
&lt;P&gt;Subtype: Resolve Egress Interface&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;/P&gt;
&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: DROP&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Implicit Rule&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Forward Flow based lookup yields rule:&lt;/P&gt;
&lt;P&gt;in&amp;nbsp; id=0x7fff33096db0, priority=11, domain=permit, deny=true&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=74, user_data=0x5, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Deltav, output_ifc=any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Result:&lt;/P&gt;
&lt;P&gt;input-interface: Deltav&lt;/P&gt;
&lt;P&gt;input-status: up&lt;/P&gt;
&lt;P&gt;input-line-status: up&lt;/P&gt;
&lt;P&gt;output-interface: outside&lt;/P&gt;
&lt;P&gt;output-status: up&lt;/P&gt;
&lt;P&gt;output-line-status: up&lt;/P&gt;
&lt;P&gt;Action: drop&lt;/P&gt;
&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# sho run&lt;/P&gt;
&lt;P&gt;: Saved&lt;/P&gt;
&lt;P&gt;:&lt;/P&gt;
&lt;P&gt;:&amp;nbsp;: Hardware:&amp;nbsp;&amp;nbsp; ASA5525, 8192 MB RAM, CPU Lynnfield 2393 MHz, 1 CPU (4 cores)&lt;/P&gt;
&lt;P&gt;:&lt;/P&gt;
&lt;P&gt;ASA Version 9.2(2)4&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;hostname ciscoasa&lt;/P&gt;
&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;
&lt;P&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;
&lt;P&gt;nameif outside&lt;/P&gt;
&lt;P&gt;security-level 0&lt;/P&gt;
&lt;P&gt;ip address 192.168.2.100 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;
&lt;P&gt;shutdown&lt;/P&gt;
&lt;P&gt;nameif inside&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;
&lt;P&gt;nameif Deltav&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip address 192.168.3.100 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;
&lt;P&gt;shutdown&lt;/P&gt;
&lt;P&gt;no nameif&lt;/P&gt;
&lt;P&gt;no security-level&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;
&lt;P&gt;shutdown&lt;/P&gt;
&lt;P&gt;no nameif&lt;/P&gt;
&lt;P&gt;no security-level&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;
&lt;P&gt;shutdown&lt;/P&gt;
&lt;P&gt;no nameif&lt;/P&gt;
&lt;P&gt;no security-level&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/6&lt;/P&gt;
&lt;P&gt;shutdown&lt;/P&gt;
&lt;P&gt;no nameif&lt;/P&gt;
&lt;P&gt;no security-level&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/7&lt;/P&gt;
&lt;P&gt;shutdown&lt;/P&gt;
&lt;P&gt;no nameif&lt;/P&gt;
&lt;P&gt;no security-level&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Management0/0&lt;/P&gt;
&lt;P&gt;management-only&lt;/P&gt;
&lt;P&gt;no nameif&lt;/P&gt;
&lt;P&gt;no security-level&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ftp mode passive&lt;/P&gt;
&lt;P&gt;clock timezone GMT 0&lt;/P&gt;
&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;
&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;
&lt;P&gt;object network obj_any&lt;/P&gt;
&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;P&gt;access-list 101 extended permit icmp any any echo-reply&lt;/P&gt;
&lt;P&gt;access-list 101 extended permit icmp any any source-quench&lt;/P&gt;
&lt;P&gt;access-list 101 extended permit icmp any any unreachable&lt;/P&gt;
&lt;P&gt;access-list 101 extended permit icmp any any time-exceeded&lt;/P&gt;
&lt;P&gt;access-list 101 extended permit icmp any any traceroute&lt;/P&gt;
&lt;P&gt;pager lines 24&lt;/P&gt;
&lt;P&gt;logging asdm informational&lt;/P&gt;
&lt;P&gt;mtu outside 1500&lt;/P&gt;
&lt;P&gt;mtu inside 1500&lt;/P&gt;
&lt;P&gt;mtu Deltav 1500&lt;/P&gt;
&lt;P&gt;no failover&lt;/P&gt;
&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;
&lt;P&gt;asdm history enable&lt;/P&gt;
&lt;P&gt;arp timeout 14400&lt;/P&gt;
&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network obj_any&lt;/P&gt;
&lt;P&gt;nat (any,outside) dynamic interface&lt;/P&gt;
&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;
&lt;P&gt;access-group 101 in interface Deltav&lt;/P&gt;
&lt;P&gt;access-group 101 out interface Deltav&lt;/P&gt;
&lt;P&gt;router rip&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;
&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;
&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;
&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;
&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;
&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;
&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;
&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;
&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;
&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;
&lt;P&gt;http server enable&lt;/P&gt;
&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;
&lt;P&gt;http 192.168.3.0 255.255.255.0 Deltav&lt;/P&gt;
&lt;P&gt;http 192.168.2.0 255.255.255.0 outside&lt;/P&gt;
&lt;P&gt;no snmp-server location&lt;/P&gt;
&lt;P&gt;no snmp-server contact&lt;/P&gt;
&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;
&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;
&lt;P&gt;telnet 192.168.3.0 255.255.255.0 Deltav&lt;/P&gt;
&lt;P&gt;telnet timeout 5&lt;/P&gt;
&lt;P&gt;no ssh stricthostkeycheck&lt;/P&gt;
&lt;P&gt;ssh timeout 5&lt;/P&gt;
&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;
&lt;P&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;/P&gt;
&lt;P&gt;threat-detection scanning-threat&lt;/P&gt;
&lt;P&gt;threat-detection statistics port&lt;/P&gt;
&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;
&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;
&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;class-map inspection_default&lt;/P&gt;
&lt;P&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;
&lt;P&gt;parameters&lt;/P&gt;
&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;
&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;/P&gt;
&lt;P&gt;class inspection_default&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;service-policy global_policy global&lt;/P&gt;
&lt;P&gt;prompt hostname context&lt;/P&gt;
&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;
&lt;P&gt;Cryptochecksum:e1a4b1505fa28ddcc94ebf345033982e&lt;/P&gt;
&lt;P&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 19:44:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031988#M146805</guid>
      <dc:creator>Scott</dc:creator>
      <dc:date>2017-02-06T19:44:57Z</dc:date>
    </item>
    <item>
      <title>Looks like your inbound ACL</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031989#M146806</link>
      <description>&lt;P&gt;Looks like your inbound ACL on Deltav interface is blocking it:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;/PRE&gt;
&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;
&lt;P&gt;access-group 101 in interface Deltav&lt;/P&gt;
&lt;P&gt;access-group 101 out interface Deltav&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Since your first packet is going to be an echo-request, it should be added into the ACL 101 if you want to allow that traffic inbound on Deltav&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 20:01:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031989#M146806</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-06T20:01:10Z</dc:date>
    </item>
    <item>
      <title>That worked! Thank You!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031990#M146807</link>
      <description>&lt;P&gt;That worked! Thank You!&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 20:17:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-inside-to-outside-config-attached/m-p/3031990#M146807</guid>
      <dc:creator>Scott</dc:creator>
      <dc:date>2017-02-06T20:17:58Z</dc:date>
    </item>
  </channel>
</rss>

