<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks Akshay! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786528#M174416</link>
    <description>&lt;P&gt;Thanks Akshay!&lt;/P&gt;
&lt;P&gt;We don't have another internal subnet and I ran the packet tracer as suggested, please see results below:&lt;/P&gt;
&lt;P&gt;I cannot ping the 4.2.2.2 address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# packet-tracer input inside tcp 192.168.1.39 1234 4.2.2.2 80 detail&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd516e090, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=359, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd51714e8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.1.0 255.255.255.0 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (67.63.146.142)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.1.39/1234 to 67.63.146.142/1024 using netmask 255.255.&lt;BR /&gt;255.255&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd5217ca8, priority=1, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xd5217c08, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=192.168.1.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.1.0 255.255.255.0 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (67.63.146.142)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd52180a0, priority=1, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xd5217c08, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=192.168.1.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd5145240, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 3, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: output and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 67.63.146.125 using egress ifc outside&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 0023.9ca8.8ff3 hits 15&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
    <pubDate>Wed, 02 Dec 2015 20:58:39 GMT</pubDate>
    <dc:creator>erickedstrom</dc:creator>
    <dc:date>2015-12-02T20:58:39Z</dc:date>
    <item>
      <title>ASA 5510 Stopped working when we moved to a new building</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786526#M174414</link>
      <description>&lt;P&gt;Our ASA 5510 stopped working when we moved to a new building, we keep the same ISP and IP adresses. I can ping our router and ASA,&amp;nbsp;but I&amp;nbsp;cannot&amp;nbsp;ping the ISP interface and gain access to the internet. We've tried several things attempting to get it to work, but no luck. Any suggestions would be greatly appreciated, please see our running config below:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA Version 8.0(2)&lt;BR /&gt;!&lt;BR /&gt;hostname eleasa&lt;BR /&gt;domain-name asa.eleinc.com&lt;BR /&gt;&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;description Public facing&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 67.63.146.126 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;description Private network&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.30.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;description Customer access sites&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;nameif Extranet&lt;BR /&gt;&amp;nbsp;security-level 25&lt;BR /&gt;&amp;nbsp;ip address 172.16.100.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;description DMZ&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;passwd N662WcFpuBxvdiwu encrypted&lt;BR /&gt;boot system disk0:/asa802-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name asa.eleinc.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list outside_access_in extended permit gre any host 67.63.146.131&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 67.63.146.131 eq pptp&lt;/P&gt;
&lt;P&gt;access-list outside_access_in extended permit tcp any host 67.63.146.132 eq www&lt;/P&gt;
&lt;P&gt;access-list outside_access_in extended permit tcp host 24.214.206.254 host 67.63&lt;BR /&gt;.146.141 eq ssh&lt;BR /&gt;access-list outside_access_in extended permit tcp 69.73.20.64 255.255.255.192 ho&lt;BR /&gt;st 67.63.146.141 eq ssh&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 67.63.146.132 eq http&lt;BR /&gt;s&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 67.63.146.133 eq http&lt;BR /&gt;s&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 67.63.146.134 eq http&lt;BR /&gt;s&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 67.63.146.137 eq http&lt;BR /&gt;s&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 67.63.146.138 eq http&lt;BR /&gt;s&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 67.63.146.139 eq http&lt;BR /&gt;s&lt;BR /&gt;access-list outside_access_in extended permit tcp host 173.14.206.193 host 67.63&lt;BR /&gt;.146.141 eq ssh&lt;BR /&gt;access-list outside_access_in extended permit icmp any any&lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu Extranet 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;asdm image disk0:/asdm-61551.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp outside 67.63.146.125 0023.9ca8.8ff3&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 1 67.63.146.142&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;static (inside,outside) 67.63.146.131 192.168.1.130 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 67.63.146.132 192.168.1.132 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 67.63.146.141 192.168.1.92 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 67.63.146.133 192.168.1.172 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 67.63.146.134 192.168.1.173 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 67.63.146.137 192.168.1.197 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 67.63.146.138 192.168.1.198 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 67.63.146.139 192.168.1.199 netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 67.63.146.125 1&lt;BR /&gt;route outside 67.63.146.128 255.255.255.240 67.63.146.129 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 172.16.30.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;telnet 172.16.30.0 255.255.255.0 inside&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 management&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:885b35e9bd2d16949e923126ed3b3e09&lt;BR /&gt;: end&lt;BR /&gt;eleasa#&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786526#M174414</guid>
      <dc:creator>erickedstrom</dc:creator>
      <dc:date>2019-03-12T06:58:25Z</dc:date>
    </item>
    <item>
      <title>Hi Erick,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786527#M174415</link>
      <description>&lt;P&gt;Hi Erick,&lt;/P&gt;
&lt;P&gt;From the configuration, i could see that only 192.168.1.0 subnet is configured for Internet access :&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;global (outside) 1 interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;global (outside) 1 67.63.146.142&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;if you have other internal subnet as you have moved to new building then add that same subnet under this nat command :&lt;/P&gt;
&lt;P&gt;nat (inside) 1 &amp;lt;new subnet&amp;gt; &amp;lt;subnet-mask&amp;gt;&lt;/P&gt;
&lt;P&gt;Are you able to ping 4.2.2.2 from ASA? asa)#ping 4.2.2.2&lt;/P&gt;
&lt;P&gt;Could you please check the packet-tracer output :&lt;/P&gt;
&lt;P&gt;"packet-tracer input inside tcp &amp;lt;source-ip&amp;gt; 12345 4.2.2.2 80 detail"&lt;/P&gt;
&lt;P&gt;Check the output and see where it is dropping (if it is).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;
&lt;P&gt;Remember to rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 06:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786527#M174415</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-12-02T06:27:21Z</dc:date>
    </item>
    <item>
      <title>Thanks Akshay!</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786528#M174416</link>
      <description>&lt;P&gt;Thanks Akshay!&lt;/P&gt;
&lt;P&gt;We don't have another internal subnet and I ran the packet tracer as suggested, please see results below:&lt;/P&gt;
&lt;P&gt;I cannot ping the 4.2.2.2 address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# packet-tracer input inside tcp 192.168.1.39 1234 4.2.2.2 80 detail&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd516e090, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=359, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd51714e8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.1.0 255.255.255.0 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (67.63.146.142)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.1.39/1234 to 67.63.146.142/1024 using netmask 255.255.&lt;BR /&gt;255.255&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd5217ca8, priority=1, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xd5217c08, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=192.168.1.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.1.0 255.255.255.0 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (67.63.146.142)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd52180a0, priority=1, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xd5217c08, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=192.168.1.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd5145240, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 3, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: output and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 67.63.146.125 using egress ifc outside&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 0023.9ca8.8ff3 hits 15&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 20:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786528#M174416</guid>
      <dc:creator>erickedstrom</dc:creator>
      <dc:date>2015-12-02T20:58:39Z</dc:date>
    </item>
    <item>
      <title>Hi Erick,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786529#M174417</link>
      <description>&lt;P&gt;Hi Erick,&lt;/P&gt;
&lt;P&gt;Packet-tracer looks fine and it is hitting a required nat statement. However as you have mentioned that you are not able to ping 4.2.2.2 from ASA then it looks that the reachability might be not there.&lt;/P&gt;
&lt;P&gt;Are you able to ping next-hop ip of outside interface(&lt;SPAN&gt;67.63.146.125) ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Check the arp entry for this ip with 'show arp'. I&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also take the arp capture with 'capture arpcap ether arp interface outside' and ping 4.2.2.2 from ASA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;See the output with 'show cap arpcap | in &amp;lt;outside-interface-ip&amp;gt;'&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Akshay Rastogi&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 00:59:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786529#M174417</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-12-03T00:59:04Z</dc:date>
    </item>
    <item>
      <title>hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786530#M174418</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;did you check/report with your ISP?&lt;/P&gt;
&lt;P&gt;i suspect it could be their issue.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 03:10:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786530#M174418</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-12-03T03:10:28Z</dc:date>
    </item>
    <item>
      <title>Hello Akshay!</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786531#M174426</link>
      <description>&lt;P&gt;Hello Akshay!&lt;/P&gt;
&lt;P&gt;I cannot ping 67.63.146.125 from the ASA and I do have it as an arp entry. I've cleared arp also.&lt;/P&gt;
&lt;P&gt;Please see results below:&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# show cap arpcap&lt;BR /&gt;19 packets captured&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 1: 04:39:23.642743 arp who-has 67.63.146.136 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 04:39:24.422616 arp who-has 67.63.146.136 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 04:39:25.322447 arp who-has 67.63.146.136 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 04:39:25.922315 arp who-has 67.63.146.136 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 04:39:26.522220 arp who-has 67.63.146.136 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 04:41:07.271989 arp who-has 67.63.146.130 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 04:41:08.201817 arp who-has 67.63.146.130 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 04:41:09.101664 arp who-has 67.63.146.130 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 04:41:09.901473 arp who-has 67.63.146.130 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp; 10: 04:41:10.701333 arp who-has 67.63.146.130 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp; 11: 04:41:13.260896 arp who-has 67.63.146.136 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp; 12: 04:41:14.200734 arp who-has 67.63.146.136 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp; 13: 04:41:14.800587 arp who-has 67.63.146.136 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp; 14: 04:41:15.600463 arp who-has 67.63.146.136 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp; 15: 04:41:16.500294 arp who-has 67.63.146.136 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp; 16: 04:41:38.446311 arp who-has 67.63.146.132 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp; 17: 04:41:38.446311 arp reply 67.63.146.132 is-at 0:24:14:d3:93:3a&lt;BR /&gt;&amp;nbsp; 18: 04:41:54.733345 arp who-has 67.63.146.142 tell 67.63.146.129&lt;BR /&gt;&amp;nbsp; 19: 04:41:54.733345 arp reply 67.63.146.142 is-at 0:24:14:d3:93:3a&lt;BR /&gt;19 packets shown&lt;/P&gt;
&lt;P&gt;-------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# show cap arpcap | in 67.63.146.126&lt;BR /&gt;&amp;nbsp; 81: 04:50:18.478735 arp who-has 67.63.146.126 tell 67.63.146.125&lt;BR /&gt;&amp;nbsp; 82: 04:50:18.478735 arp reply 67.63.146.126 is-at 0:24:14:d3:93:3a&lt;/P&gt;
&lt;P&gt;--------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# sh logging&lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Facility: 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timestamp logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Standby logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Deny Conn when Queue Full: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Console logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Monitor logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Buffer logging: level debugging, 36941 messages logged&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Trap logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; History logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device ID: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mail logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASDM logging: level informational, 30840 messages logged&lt;BR /&gt;rdown dynamic UDP translation from inside:192.168.1.201/60097 to outside:67.63.1&lt;BR /&gt;46.142/4750 duration 0:02:38&lt;BR /&gt;%ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.201/59140&lt;BR /&gt;to outside:67.63.146.142/4763 duration 0:02:33&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 10344 for outside:192.54.112.30/53 to ins&lt;BR /&gt;ide:192.168.1.200/59774 duration 0:02:01 bytes 35&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 10345 for outside:64.89.100.3/53 to insid&lt;BR /&gt;e:192.168.1.200/60117 duration 0:02:01 bytes 35&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 10346 for outside:64.89.100.3/53 to insid&lt;BR /&gt;e:192.168.1.200/59434 duration 0:02:01 bytes 45&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 10351 for outside:192.26.92.30/53 to insi&lt;BR /&gt;de:192.168.1.201/59566 duration 0:02:01 bytes 45&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 10352 for outside:156.154.65.10/53 to ins&lt;BR /&gt;ide:192.168.1.201/60633 duration 0:02:01 bytes 34&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 10353 for outside:156.154.65.10/53 to ins&lt;BR /&gt;ide:192.168.1.201/59190 duration 0:02:01 bytes 74&lt;BR /&gt;%ASA-6-302015: Built outbound UDP connection 11085 for outside:64.89.100.3/53 (6&lt;BR /&gt;4.89.100.3/53) to inside:192.168.1.200/59945 (67.63.146.142/5086)&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 10891 for outside:209.235.147.200/25 to i&lt;BR /&gt;nside:192.168.1.71/64509 duration 0:00:30 bytes 0 SYN Timeout&lt;BR /&gt;%ASA-6-305011: Built dynamic TCP translation from inside:192.168.1.58/50967 to o&lt;BR /&gt;utside:67.63.146.142/1616&lt;BR /&gt;%ASA-6-302013: Built outbound TCP connection 11086 for outside:209.208.227.184/4&lt;BR /&gt;43 (209.208.227.184/443) to inside:192.168.1.58/50967 (67.63.146.142/1616)&lt;BR /&gt;%Ifc:172.16.30.254&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 192.168.1.39/3 gaddr 172.&lt;BR /&gt;16.30.254/0 laddr 172.16.30.254/0&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 192.168.1.39/3 gaddr 172.16.30&lt;BR /&gt;.254/0 laddr 172.16.30.254/0&lt;BR /&gt;%ASA-7-609002: Teardown local-host NP Identity Ifc:172.16.30.254 duration 0:00:0&lt;BR /&gt;0&lt;BR /&gt;%ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.201/59093&lt;BR /&gt;to outside:67.63.146.142/4775 duration 0:02:34&lt;BR /&gt;%ASA-6-302015: Built outbound UDP connection 11119 for outside:64.89.100.3/53 (6&lt;BR /&gt;4.89.100.3/53) to inside:192.168.1.200/60792 (67.63.146.142/5100)&lt;BR /&gt;%ASA-6-305011: Built dynamic UDP translation from inside:192.168.1.200/61058 to&lt;BR /&gt;outside:67.63.146.142/5109&lt;BR /&gt;%ASA-6-302015: Built outbound UDP connection 11120 for outside:64.89.100.2/53 (6&lt;BR /&gt;4.89.100.2/53) to inside:192.168.1.200/61058 (67.63.146.142/5109)&lt;BR /&gt;%ASA-6-302015: Built outbound UDP connection 11121 for outside:64.89.100.3/53 (6&lt;BR /&gt;4.89.100.3/53) to inside:192.168.1.200/59714 (67.63.146.142/5102)&lt;BR /&gt;ection 10906 for outside:209.208.227.184/443 to inside:192.168.1.58/50941 durati&lt;BR /&gt;on 0:00:30 bytes 0 SYN Timeout&lt;BR /&gt;%ASA-6-305012: Teardown dynamic TCP translation from inside:192.168.1.58/50910 t&lt;BR /&gt;o outside:67.63.146.142/1564 duration 0:01:00&lt;BR /&gt;%ASA-7-609001: Built local-host NP Identity Ifc:172.16.30.254&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 192.168.1.39/3 gaddr 172.&lt;BR /&gt;16.30.254/0 laddr 172.16.30.254/0&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 192.168.1.39/3 gaddr 172.16.30&lt;BR /&gt;.254/0 laddr 172.16.30.254/0&lt;BR /&gt;%ASA-7-609002: Teardown local-host NP Identity Ifc:172.16.30.254 duration 0:00:0&lt;BR /&gt;0&lt;BR /&gt;%ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.201/61025&lt;BR /&gt;to outside:67.63.146.142/4774 duration 0:02:33&lt;BR /&gt;%ASA-7-609001: Built local-host outside:111.30.132.180&lt;BR /&gt;%ASA-6-305011: Built dynamic UDP translation from inside:192.168.1.200/60926 to&lt;BR /&gt;outside:67.63.146.142/5107&lt;BR /&gt;%ASA-6-302015: Built outbound UDP connection 11112 for outside:111.30.132.180/53&lt;BR /&gt;&amp;nbsp;(111.30.132.180/53) to inside:192.168.1.200/60926 (67.63.146.142/5107)&lt;BR /&gt;%ASA-7-609001: Built local-host outside:4.2.2.2&lt;BR /&gt;%ASA-6-302020: Built outbound ICMP connection for faddr 4.2.2.2/0 gaddr 67.63.14&lt;BR /&gt;6.142/1 laddr 192.168.1.39/3&lt;BR /&gt;%ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.200/61042&lt;BR /&gt;to outside:67.63.146.142/4785 duration 0:02:30&lt;BR /&gt;%ASA-6-305012: Teardown dynamic UDP translation from inside:192.168.1.22/56564 t&lt;BR /&gt;o outside:67.63.146.142/4780 duration 0:02:31&lt;BR /&gt;%ASA-6-302016: Teardown UDP connection 10374 for outside:64.89.100.2/53 to insid&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 15:44:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786531#M174426</guid>
      <dc:creator>erickedstrom</dc:creator>
      <dc:date>2015-12-03T15:44:20Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786532#M174428</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Yes we have and they said everything is fine on their end. We also built a temporary Linux firewall to verify their equipment and everything works behind that firewall.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 15:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786532#M174428</guid>
      <dc:creator>erickedstrom</dc:creator>
      <dc:date>2015-12-03T15:50:50Z</dc:date>
    </item>
    <item>
      <title>Hi Erick,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786533#M174429</link>
      <description>&lt;P&gt;Hi Erick,&lt;/P&gt;
&lt;P&gt;I could see these two routes in your configuration :&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route outside 0.0.0.0 0.0.0.0 67.63.146.125 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;route outside 67.63.146.128 255.255.255.240 67.63.146.129 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Which one is your next hop on Outside interface for ISP (129 or 125)? I could see that 129 is sending a lot of ARP request. If 129 is the next hop then change the default route to .129 and see if internet traffic works.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If 125 is the next hop for ISP then call ISP and check if ISP is able to receive the traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hope it helps.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Akshay Rastogi&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 19:46:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-stopped-working-when-we-moved-to-a-new-building/m-p/2786533#M174429</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-12-03T19:46:05Z</dc:date>
    </item>
  </channel>
</rss>

