<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi. Class Maps are used to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833202#M173769</link>
    <description>&lt;P&gt;Hi. Class Maps are used to match traffic. Policy maps apply an action to the mapped traffic (eg. Inspect icmp, or inspect http).&lt;/P&gt;
&lt;P&gt;So you need to enable the inspect action in the policy map, on the traffic matched by the class map.&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
    <pubDate>Wed, 30 Dec 2015 07:00:16 GMT</pubDate>
    <dc:creator>Andre Neethling</dc:creator>
    <dc:date>2015-12-30T07:00:16Z</dc:date>
    <item>
      <title>No connectivity with ASA HELP!</title>
      <link>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833195#M173755</link>
      <description>&lt;P&gt;Hi, i have a problem with getting PC's on the inside interface on packet tracer to ping beyond the asa default gateway interface in my topology.&lt;/P&gt;
&lt;P&gt;I have a router on the edge with a fa 0/0 address of 172.16.30.1 and a s2/0 address of 192.168.1.3. The PC's can ping the ASA inside VLAN 30 interface from the statically configured PC's but they cant go beyond that and ping the router 172 or 192 interfaces. I have a global service policy implemented that inspects ICMP as well. The asa outside interface is 172.16.30.2 also. The asa can ping the 172.16.30.1 and&amp;nbsp;&lt;SPAN&gt;192.168.1.3 fine, just&amp;nbsp;nothing&amp;nbsp;from the PC's on the inside.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Any idea why this simple problem doeskin seem to be working?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;(there is a dhcp pool etc.. configured but the PC's aren't using it and the VPN isn't being used as well)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hostname ciscoasa&lt;/P&gt;
&lt;P&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/0&lt;/P&gt;
&lt;P&gt;switchport access vlan 2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/1&lt;/P&gt;
&lt;P&gt;switchport access vlan 30&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/2&lt;/P&gt;
&lt;P&gt;switchport access vlan 30&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/3&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/4&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/5&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/6&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/7&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan1&lt;/P&gt;
&lt;P&gt;no nameif&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan2&lt;/P&gt;
&lt;P&gt;nameif outside&lt;/P&gt;
&lt;P&gt;security-level 0&lt;/P&gt;
&lt;P&gt;ip address 172.16.30.2 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan30&lt;/P&gt;
&lt;P&gt;nameif inside&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip address 10.30.0.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;route outside 0.0.0.0 255.255.255.255 172.16.30.1 1&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list VPN standard permit 10.30.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;group-policy vpn internal&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;class-map inspect&lt;/P&gt;
&lt;P&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;class-map test&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;policy-map global&lt;/P&gt;
&lt;P&gt;class inspect&lt;/P&gt;
&lt;P&gt;inspect icmp&lt;/P&gt;
&lt;P&gt;class test&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;service-policy global global&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;telnet timeout 5&lt;/P&gt;
&lt;P&gt;ssh timeout 5&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;dhcpd enable&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;dhcpd address 10.30.0.10-10.30.0.15 inside&lt;/P&gt;
&lt;P&gt;dhcpd enable inside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;crypto ipsec ikev1 transform-set VPN esp-aes 256 esp-sha-hmac&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;crypto map VPN_MAP 1 match address VPN&lt;/P&gt;
&lt;P&gt;crypto map VPN_MAP 1 set peer 172.16.31.2&lt;/P&gt;
&lt;P&gt;crypto map VPN_MAP 1 set security-association lifetime seconds 8600&lt;/P&gt;
&lt;P&gt;crypto map VPN_MAP 1 set ikev1 transform-set VPN&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 1&lt;/P&gt;
&lt;P&gt;encr aes&lt;/P&gt;
&lt;P&gt;authentication pre-share&lt;/P&gt;
&lt;P&gt;group 5&lt;/P&gt;
&lt;P&gt;lifetime 8600&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;tunnel-group 172.16.31.2 type ipsec-l2l&lt;/P&gt;
&lt;P&gt;tunnel-group 172.16.31.2 ipsec-attributes&lt;/P&gt;
&lt;P&gt;ikev1 pre-shared-key cisco&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:04:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833195#M173755</guid>
      <dc:creator>robbo79871</dc:creator>
      <dc:date>2019-03-12T07:04:40Z</dc:date>
    </item>
    <item>
      <title>Hello.</title>
      <link>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833196#M173758</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I think the problem could be because of this: route outside 0.0.0.0 255.255.255.255 172.16.30.1 1&lt;/P&gt;
&lt;P&gt;Try to change it to route outside 0.0.0.0 0.0.0.0 172.16.30.1 1 (if you want to use 172.16.30.1 as default route).&lt;/P&gt;
&lt;P&gt;Best Regards.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Dec 2015 13:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833196#M173758</guid>
      <dc:creator>ATAK_RUSSIA</dc:creator>
      <dc:date>2015-12-28T13:37:47Z</dc:date>
    </item>
    <item>
      <title>Does the outside router have</title>
      <link>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833197#M173761</link>
      <description>&lt;P&gt;As noted, your default route is not properly formed. Also, does the outside router have a route to return traffic from 10.30.0.0/24 to the ASA outside interface?&lt;/P&gt;
&lt;P&gt;What does packet-tracer tell you:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;packet-tracer input inside icmp 10.30.0.2 8 0 172.16.30.1&lt;/PRE&gt;</description>
      <pubDate>Mon, 28 Dec 2015 13:50:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833197#M173761</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-28T13:50:59Z</dc:date>
    </item>
    <item>
      <title>Hi, thanks to both of you for</title>
      <link>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833198#M173764</link>
      <description>&lt;P&gt;Hi, thanks to both of you for the help, it was indeed the route configuration that i screwed up. All sorted now. BUT ironically i have the same problem at the other "site" i have configured but for the life of me this time i cannot see where the problem is.&lt;/P&gt;
&lt;P&gt;All the setup on this site is identical to the other one, except for the inside Vlan is 20 and the inside addresses are 10.20.0.0/24, i will also post the config of the router on the edge to but i highly doubt there is something wrong with that because the site with Vlan 30 can ping all the way across the site, through the local ASA and through the edge router all the way through the external site router through to the external ASA's outside interface because of the static routes i have configured on both routers and both ASA's. So its baffling me how this small problem in the local site on the PC's, is not pinging the edge router interface of 172.16.20.1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA Version 8.4(2)&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;hostname ciscoasa&lt;/P&gt;
&lt;P&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/0&lt;/P&gt;
&lt;P&gt;switchport access vlan 2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/1&lt;/P&gt;
&lt;P&gt;switchport access vlan 20&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/2&lt;/P&gt;
&lt;P&gt;switchport access vlan 20&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/3&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/4&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/5&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/6&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/7&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan1&lt;/P&gt;
&lt;P&gt;no nameif&lt;/P&gt;
&lt;P&gt;no security-level&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan2&lt;/P&gt;
&lt;P&gt;nameif outside&lt;/P&gt;
&lt;P&gt;security-level 0&lt;/P&gt;
&lt;P&gt;ip address 172.16.20.2 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan20&lt;/P&gt;
&lt;P&gt;nameif inside&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip address 10.20.0.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;webvpn&lt;/P&gt;
&lt;P&gt;enable&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.20.1 1&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;class-map inspect&lt;/P&gt;
&lt;P&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;policy-map global&lt;/P&gt;
&lt;P&gt;class inspect&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;service-policy global global&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;telnet timeout 5&lt;/P&gt;
&lt;P&gt;ssh timeout 5&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;dhcpd enable&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Router config&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Current configuration : 1230 bytes&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;version 12.2&lt;/P&gt;
&lt;P&gt;no service timestamps log datetime msec&lt;/P&gt;
&lt;P&gt;no service timestamps debug datetime msec&lt;/P&gt;
&lt;P&gt;no service password-encryption&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;hostname Router2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip cef&lt;/P&gt;
&lt;P&gt;no ipv6 cef&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;
&lt;P&gt;ip address 172.16.20.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;duplex auto&lt;/P&gt;
&lt;P&gt;speed auto&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet1/0&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;duplex auto&lt;/P&gt;
&lt;P&gt;speed auto&lt;/P&gt;
&lt;P&gt;shutdown&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Serial2/0&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;encapsulation frame-relay&lt;/P&gt;
&lt;P&gt;frame-relay interface-dlci 102&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Serial2/0.201 point-to-point&lt;/P&gt;
&lt;P&gt;ip address 192.168.0.2 255.255.255.0&lt;/P&gt;
&lt;P&gt;frame-relay interface-dlci 201&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Serial2/0.203 point-to-point&lt;/P&gt;
&lt;P&gt;ip address 192.168.3.2 255.255.255.0&lt;/P&gt;
&lt;P&gt;frame-relay interface-dlci 203&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Serial3/0&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;clock rate 2000000&lt;/P&gt;
&lt;P&gt;shutdown&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet4/0&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;shutdown&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet5/0&lt;/P&gt;
&lt;P&gt;no ip address&lt;/P&gt;
&lt;P&gt;shutdown&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;router ospf 1&lt;/P&gt;
&lt;P&gt;router-id 2.2.2.2&lt;/P&gt;
&lt;P&gt;log-adjacency-changes&lt;/P&gt;
&lt;P&gt;network 192.168.0.0 0.0.255.255 area 0&lt;/P&gt;
&lt;P&gt;network 172.16.20.0 0.0.0.255 area 0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip classless&lt;/P&gt;
&lt;P&gt;ip route 10.20.0.0 255.255.255.0 172.16.20.2&lt;/P&gt;
&lt;P&gt;ip route 10.30.0.0 255.255.255.0 192.168.3.1&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip flow-export version 9&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;no cdp run&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;line con 0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;line aux 0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;line vty 0 4&lt;/P&gt;
&lt;P&gt;login&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;end&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 05:48:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833198#M173764</guid>
      <dc:creator>robbo79871</dc:creator>
      <dc:date>2015-12-30T05:48:03Z</dc:date>
    </item>
    <item>
      <title>Hello.</title>
      <link>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833199#M173765</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;If you mean that you can't get access from vlan 2 to vlan 20 then you can't get access because of the security level. For undenstanding it you can read this: https://www.shilpasys.com/articles/what-are-cisco-asa-firewall-security-levels/&lt;/P&gt;
&lt;P&gt;Best Regards.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 06:03:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833199#M173765</guid>
      <dc:creator>AllertGen</dc:creator>
      <dc:date>2015-12-30T06:03:38Z</dc:date>
    </item>
    <item>
      <title>Hi. I noticed that you don't</title>
      <link>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833200#M173766</link>
      <description>&lt;P&gt;Hi. I noticed that you don't have ICMP inspection enabled on this ASA, so the return ICMP traffic will not be allowed. See below excerpt from your other ASA config you posted earlier in the thread&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;policy-map global&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;class inspect&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;inspect icmp&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 06:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833200#M173766</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-12-30T06:14:38Z</dc:date>
    </item>
    <item>
      <title>Thanks for the help again</title>
      <link>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833201#M173767</link>
      <description>&lt;P&gt;Thanks for the help again with this, what you suggested worked. I have a question though, the reason why this confused me was because i createds the class map inspect with the&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"default-inspection-traffic Match default inspection traffic:&lt;/P&gt;
&lt;P&gt;ctiqbe----tcp--2748 dns-------udp--53&lt;/P&gt;
&lt;P&gt;ftp-------tcp--21 gtp-------udp--2123,3386&lt;/P&gt;
&lt;P&gt;h323-h225-tcp--1720 h323-ras--udp--1718-1719&lt;/P&gt;
&lt;P&gt;http------tcp--80 icmp------icmp&lt;/P&gt;
&lt;P&gt;ils-------tcp--389 ip-options-----rsvp&lt;/P&gt;
&lt;P&gt;mgcp------udp--2427,2727 netbios---udp--137-138&lt;/P&gt;
&lt;P&gt;radius-acct----udp--1646 rpc-------udp--111&lt;/P&gt;
&lt;P&gt;rsh-------tcp--514 rtsp------tcp--554&lt;/P&gt;
&lt;P&gt;sip-------tcp--5060 sip-------udp--5060&lt;/P&gt;
&lt;P&gt;skinny----tcp--2000 smtp------tcp--25&lt;/P&gt;
&lt;P&gt;sqlnet----tcp--1521 tftp------udp--69&lt;/P&gt;
&lt;P&gt;waas------tcp--1-65535 xdmcp-----udp--177"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;associated with it, ICMP is listed as part of the inspection protocols here so i applied it to the policy map global and created the global service policy. I didnt think i needed to have the inspect icmp sytax in the policy map part also, seeing as it is listed in the match traffic "&lt;SPAN&gt;default-inspection-traffic&lt;/SPAN&gt;" in the class map. I was wondering if you could tell me why that is not working then?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for the help again&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 06:49:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833201#M173767</guid>
      <dc:creator>robbo79871</dc:creator>
      <dc:date>2015-12-30T06:49:48Z</dc:date>
    </item>
    <item>
      <title>Hi. Class Maps are used to</title>
      <link>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833202#M173769</link>
      <description>&lt;P&gt;Hi. Class Maps are used to match traffic. Policy maps apply an action to the mapped traffic (eg. Inspect icmp, or inspect http).&lt;/P&gt;
&lt;P&gt;So you need to enable the inspect action in the policy map, on the traffic matched by the class map.&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 07:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-connectivity-with-asa-help/m-p/2833202#M173769</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-12-30T07:00:16Z</dc:date>
    </item>
  </channel>
</rss>

