<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861350#M162767</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you try pinging 8.8.8.8 IP from the Guest &lt;G class="gr_ gr_60 gr-alert gr_gramm undefined Punctuation multiReplace" id="60" data-gr-id="60"&gt;PC ?&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On the ASA enable &lt;STRONG&gt;debug &lt;/STRONG&gt;&lt;G class="gr_ gr_161 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="161" data-gr-id="161"&gt;icmp&lt;/G&gt;&lt;STRONG&gt;&amp;nbsp;trace&lt;/STRONG&gt; and check if you see the ping requests reaching the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Use &lt;G class="gr_ gr_263 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="263" data-gr-id="263"&gt;undebug&lt;/G&gt;&lt;STRONG&gt; all&lt;/STRONG&gt; to turn off the debugs.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_129 gr-alert gr_gramm gr_disable_anim_appear undefined Punctuation multiReplace" id="129" data-gr-id="129"&gt;Also&lt;/G&gt; if you check the &lt;G class="gr_ gr_87 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="87" data-gr-id="87"&gt;ipconfig&lt;/G&gt;&amp;nbsp;on the PC what is the default gateway of the PC ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Mar 2016 10:17:07 GMT</pubDate>
    <dc:creator>Aditya Ganjoo</dc:creator>
    <dc:date>2016-03-16T10:17:07Z</dc:date>
    <item>
      <title>ASA 5512 Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861343#M162760</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am trying to set up a guest network on a ASA 5512 but to no avail. I have attached the config, am I missing anything?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks all!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861343#M162760</guid>
      <dc:creator>tsheltonuk</dc:creator>
      <dc:date>2019-03-12T07:29:51Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861344#M162761</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;May I know what are the requirements for the Guest &lt;G class="gr_ gr_74 gr-alert gr_gramm undefined Punctuation multiReplace" id="74" data-gr-id="74"&gt;network ?&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What do we want to access from the Guest network ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 09:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861344#M162761</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-16T09:43:35Z</dc:date>
    </item>
    <item>
      <title>Just internet access. The</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861345#M162762</link>
      <description>&lt;P&gt;Just internet access. The guest network should utilize public DNS (8.8.8.8) and should not be able to access anything on the Corporate LAN (10.7.0.0/16).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Tom&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 09:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861345#M162762</guid>
      <dc:creator>tsheltonuk</dc:creator>
      <dc:date>2016-03-16T09:45:29Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861346#M162763</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The config looks fine for internet access.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you share the packet-tracer output for the Guest &lt;G class="gr_ gr_59 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="59" data-gr-id="59"&gt;vlan&lt;/G&gt;:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input guest &lt;G class="gr_ gr_76 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="76" data-gr-id="76"&gt;icmp&lt;/G&gt;&amp;nbsp;10.3.0.2 8 0 4.2.2.2 &lt;G class="gr_ gr_131 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="131" data-gr-id="131"&gt;det&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also on the inside access-group&amp;nbsp;inside_access_in you can deny the Guest subnet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 09:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861346#M162763</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-16T09:52:24Z</dc:date>
    </item>
    <item>
      <title>Hi there, </title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861347#M162764</link>
      <description>&lt;P&gt;Hi there,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;See below:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ABNS-Aptus-Bolton-ASA-01# packet-tracer input guest icmp 10.3.0.2 8 0 4.2.2.2 $&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffa23a8f40, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=4, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt; input_ifc=guest, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 via 185.12.137.189, outside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Guest-Network&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.3.0.2/0 to 185.12.137.190/9827&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffa22f0770, priority=6, domain=nat, deny=false&lt;BR /&gt; hits=79, user_data=0x7fffa3ea2cc0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=10.3.0.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=outside&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffa1921740, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt; hits=211585, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffa236a640, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=756, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=guest, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffa23aa3b0, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt; hits=1, user_data=0x7fffa3215480, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=guest, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffa2369ed0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt; hits=5, user_data=0x7fffa238a6e0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=guest, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffa1921740, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt; hits=211587, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffa22de970, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=552646, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 541426, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: guest&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 09:56:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861347#M162764</guid>
      <dc:creator>tsheltonuk</dc:creator>
      <dc:date>2016-03-16T09:56:02Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861348#M162765</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The output seems fine and it should allow access to the internet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On the test PC in the guest network&amp;nbsp;please make sure the default gateway should be &amp;nbsp;10.3.0.1 and you should have a public DNS configured such as 8.8.8.8.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 10:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861348#M162765</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-16T10:03:44Z</dc:date>
    </item>
    <item>
      <title>Hi there,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861349#M162766</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;DHCP is being done by the firewall and the gateway and DNS are set as described, but still no internet access.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 10:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861349#M162766</guid>
      <dc:creator>tsheltonuk</dc:creator>
      <dc:date>2016-03-16T10:05:42Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861350#M162767</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you try pinging 8.8.8.8 IP from the Guest &lt;G class="gr_ gr_60 gr-alert gr_gramm undefined Punctuation multiReplace" id="60" data-gr-id="60"&gt;PC ?&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On the ASA enable &lt;STRONG&gt;debug &lt;/STRONG&gt;&lt;G class="gr_ gr_161 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="161" data-gr-id="161"&gt;icmp&lt;/G&gt;&lt;STRONG&gt;&amp;nbsp;trace&lt;/STRONG&gt; and check if you see the ping requests reaching the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Use &lt;G class="gr_ gr_263 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="263" data-gr-id="263"&gt;undebug&lt;/G&gt;&lt;STRONG&gt; all&lt;/STRONG&gt; to turn off the debugs.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_129 gr-alert gr_gramm gr_disable_anim_appear undefined Punctuation multiReplace" id="129" data-gr-id="129"&gt;Also&lt;/G&gt; if you check the &lt;G class="gr_ gr_87 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="87" data-gr-id="87"&gt;ipconfig&lt;/G&gt;&amp;nbsp;on the PC what is the default gateway of the PC ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 10:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861350#M162767</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-16T10:17:07Z</dc:date>
    </item>
    <item>
      <title>ABNS-Aptus-Bolton-ASA-01#</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861351#M162768</link>
      <description>&lt;P&gt;ABNS-Aptus-Bolton-ASA-01# ICMP echo request from inside:10.3.0.2 to outside:8.8.8.8 ID=43 seq=0 len=72&lt;BR /&gt;ICMP echo request translating inside:10.3.0.2 to outside:185.12.137.190&lt;BR /&gt;ICMP echo reply from outside:8.8.8.8 to inside:185.12.137.190 ID=43 seq=0 len=72&lt;BR /&gt;ICMP echo reply untranslating outside:185.12.137.190 to inside:10.3.0.2&lt;BR /&gt;ICMP echo request from inside:10.3.0.2 to outside:8.8.8.8 ID=43 seq=1 len=72&lt;BR /&gt;ICMP echo request translating inside:10.3.0.2 to outside:185.12.137.190&lt;BR /&gt;ICMP echo reply from outside:8.8.8.8 to inside:185.12.137.190 ID=43 seq=1 len=72&lt;BR /&gt;ICMP echo reply untranslating outside:185.12.137.190 to inside:10.3.0.2&lt;BR /&gt;ICMP echo request from inside:10.3.0.2 to outside:8.8.8.8 ID=43 seq=2 len=72&lt;BR /&gt;ICMP echo request translating inside:10.3.0.2 to outside:185.12.137.190&lt;BR /&gt;ICMP echo reply from outside:8.8.8.8 to inside:185.12.137.190 ID=43 seq=2 len=72&lt;BR /&gt;ICMP echo reply untranslating outside:185.12.137.190 to inside:10.3.0.2&lt;BR /&gt;ICMP echo request from inside:10.3.0.2 to outside:8.8.8.8 ID=43 seq=3 len=72&lt;BR /&gt;ICMP echo request translating inside:10.3.0.2 to outside:185.12.137.190&lt;BR /&gt;ICMP echo reply from outside:8.8.8.8 to inside:185.12.137.190 ID=43 seq=3 len=72&lt;BR /&gt;ICMP echo reply untranslating outside:185.12.137.190 to inside:10.3.0.2&lt;BR /&gt;ICMP echo request from inside:10.3.0.2 to outside:8.8.8.8 ID=43 seq=4 len=72&lt;BR /&gt;ICMP echo request translating inside:10.3.0.2 to outside:185.12.137.190&lt;BR /&gt;ICMP echo reply from outside:8.8.8.8 to inside:185.12.137.190 ID=43 seq=4 len=72&lt;BR /&gt;ICMP echo reply untranslating outside:185.12.137.190 to inside:10.3.0.2&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 10:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861351#M162768</guid>
      <dc:creator>tsheltonuk</dc:creator>
      <dc:date>2016-03-16T10:20:03Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861352#M162769</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It seems the requests are being sent from the inside interface instead of the Guest.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ICMP echo request from inside:10.3.0.2 to outside:8.8.8.8 ID=43 seq=2 len=72&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ICMP echo request translating inside:10.3.0.2 to outside:185.12.137.190&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Could you check it &lt;G class="gr_ gr_96 gr-alert gr_gramm undefined Punctuation multiReplace" id="96" data-gr-id="96"&gt;why ?&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 10:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-issue/m-p/2861352#M162769</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-16T10:42:56Z</dc:date>
    </item>
  </channel>
</rss>

