<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This command inside ASA ?in in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673583#M194106</link>
    <description>&lt;P&gt;This command inside ASA ?&lt;/P&gt;&lt;P&gt;in core I have default route to ASA!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 04 Jul 2015 20:22:40 GMT</pubDate>
    <dc:creator>mohammad saeed</dc:creator>
    <dc:date>2015-07-04T20:22:40Z</dc:date>
    <item>
      <title>ASA firewall connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673576#M194091</link>
      <description>&lt;P style="font-size: 14.3999996185303px;"&gt;Hi guys,&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;I have this scenario (GW------ASA-------Core) I can ping between ASA+GW and ASA+core but I can't ping between Core + GW!&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;What is the problem?&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673576#M194091</guid>
      <dc:creator>mohammad saeed</dc:creator>
      <dc:date>2019-03-12T06:13:29Z</dc:date>
    </item>
    <item>
      <title>Hi Mohammad,Is your ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673577#M194093</link>
      <description>&lt;P&gt;Hi Mohammad,&lt;/P&gt;&lt;P&gt;Is your ASA routed-mode? Do you have proper routing on the ASA? Routing is not required for connected interfaces.&lt;/P&gt;&lt;P&gt;g1&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 19:35:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673577#M194093</guid>
      <dc:creator>Ji-Won Park</dc:creator>
      <dc:date>2015-07-04T19:35:41Z</dc:date>
    </item>
    <item>
      <title>Hi Ji Won, I have default</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673578#M194095</link>
      <description>&lt;P&gt;Hi Ji Won,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have default route to the GW &amp;nbsp;and Static route to the core like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;description " Connection to GW"&lt;/P&gt;&lt;P&gt;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.60.20.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;description " Connection to Core-1"&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.60.10.2 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.60.30.2 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 84.235.6.55&lt;BR /&gt;&amp;nbsp;name-server 84.235.57.230&lt;BR /&gt;&amp;nbsp;domain-name Saudi.net.sa&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network NAT&amp;nbsp;&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;access-list PERMIT_ALL extended permit ip any any&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu DMZ 1500 &amp;nbsp;&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;access-group PERMIT_ALL global&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.60.20.2 1&lt;BR /&gt;route inside 10.0.0.0 255.0.0.0 10.60.10.1 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mohammad&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 19:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673578#M194095</guid>
      <dc:creator>mohammad saeed</dc:creator>
      <dc:date>2015-07-04T19:48:43Z</dc:date>
    </item>
    <item>
      <title>Does your GW has a route to</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673579#M194098</link>
      <description>&lt;P&gt;Does your GW has a route to the network behind the ASA?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 20:00:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673579#M194098</guid>
      <dc:creator>Ji-Won Park</dc:creator>
      <dc:date>2015-07-04T20:00:45Z</dc:date>
    </item>
    <item>
      <title>Yes GW has static route</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673580#M194101</link>
      <description>&lt;P&gt;Yes GW has static route routed to ASA. and default route to outside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 20:05:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673580#M194101</guid>
      <dc:creator>mohammad saeed</dc:creator>
      <dc:date>2015-07-04T20:05:05Z</dc:date>
    </item>
    <item>
      <title>Your GW should have a route</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673581#M194104</link>
      <description>&lt;P&gt;try this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp "core-ip" 8 0 "GW-ip"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show me the output.&lt;/P&gt;&lt;P&gt;g1&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 20:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673581#M194104</guid>
      <dc:creator>Ji-Won Park</dc:creator>
      <dc:date>2015-07-04T20:11:19Z</dc:date>
    </item>
    <item>
      <title>You should also confirm if</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673582#M194105</link>
      <description>&lt;P&gt;You should also confirm if Core has route to GW inside interface through ASA.&lt;/P&gt;&lt;P&gt;g1&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 20:15:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673582#M194105</guid>
      <dc:creator>Ji-Won Park</dc:creator>
      <dc:date>2015-07-04T20:15:42Z</dc:date>
    </item>
    <item>
      <title>This command inside ASA ?in</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673583#M194106</link>
      <description>&lt;P&gt;This command inside ASA ?&lt;/P&gt;&lt;P&gt;in core I have default route to ASA!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 20:22:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673583#M194106</guid>
      <dc:creator>mohammad saeed</dc:creator>
      <dc:date>2015-07-04T20:22:40Z</dc:date>
    </item>
    <item>
      <title>Yes, packet-tracer is a</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673584#M194107</link>
      <description>&lt;P&gt;Yes, packet-tracer is a feature in ASA you can simulate packets and it will tell you where it drops the packet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try the command and show me the output&lt;/P&gt;&lt;P&gt;g1&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 20:25:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673584#M194107</guid>
      <dc:creator>Ji-Won Park</dc:creator>
      <dc:date>2015-07-04T20:25:40Z</dc:date>
    </item>
    <item>
      <title>ciscoasa(config)# packet</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673585#M194108</link>
      <description>&lt;P&gt;ciscoasa(config)# packet-tracer input inside icmp 10.60.10.1 8 0 10.60.20.2&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 10.60.20.0 &amp;nbsp; &amp;nbsp; &amp;nbsp;255.255.255.0 &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group PERMIT_ALL global&lt;BR /&gt;access-list PERMIT_ALL extended permit ip any any&amp;nbsp;&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.60.10.1/0 to 10.60.20.1/31551&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&amp;nbsp;&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 373270, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;ciscoasa(c&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 20:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673585#M194108</guid>
      <dc:creator>mohammad saeed</dc:creator>
      <dc:date>2015-07-04T20:28:00Z</dc:date>
    </item>
    <item>
      <title>Add this line and let me know</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673586#M194109</link>
      <description>&lt;P&gt;Add this line and let me know:&lt;/P&gt;&lt;P&gt;access-list out_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-group out_in in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also, show me your default class policy-map&lt;/P&gt;&lt;P&gt;show run policy-map&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;g1&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 20:46:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673586#M194109</guid>
      <dc:creator>Ji-Won Park</dc:creator>
      <dc:date>2015-07-04T20:46:46Z</dc:date>
    </item>
    <item>
      <title>I added that access list and</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673587#M194110</link>
      <description>&lt;P&gt;I added that access list and no success!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect http&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;ciscoasa#&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 20:51:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673587#M194110</guid>
      <dc:creator>mohammad saeed</dc:creator>
      <dc:date>2015-07-04T20:51:44Z</dc:date>
    </item>
    <item>
      <title>can you try to take out the</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673588#M194113</link>
      <description>&lt;P&gt;can you try to take out the icmp ispection and try? What's the software version of your ASA?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2015 20:52:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673588#M194113</guid>
      <dc:creator>Ji-Won Park</dc:creator>
      <dc:date>2015-07-04T20:52:57Z</dc:date>
    </item>
    <item>
      <title>Wow! Thanks, it works! after</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673589#M194115</link>
      <description>&lt;P&gt;Wow! Thanks, it works! after removed it !!! strange.&lt;/P&gt;&lt;P&gt;My ASA version 8.3(1)&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Sun, 05 Jul 2015 03:36:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673589#M194115</guid>
      <dc:creator>mohammad saeed</dc:creator>
      <dc:date>2015-07-05T03:36:54Z</dc:date>
    </item>
    <item>
      <title>It is strange. it should work</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673590#M194118</link>
      <description>It is strange. it should work even with default inspection. I just gave it a try as I ran into the similar issue where DNS was broken and I had to remove it from the inspection and it worked. It was a known bug in 9.1.1 code. You might want to open a case with TAC to verify the bug ID.</description>
      <pubDate>Sun, 05 Jul 2015 10:22:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-connectivity/m-p/2673590#M194118</guid>
      <dc:creator>Ji-Won Park</dc:creator>
      <dc:date>2015-07-05T10:22:11Z</dc:date>
    </item>
  </channel>
</rss>

