<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, The main problem here are in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577254#M205998</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main problem here are these things&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have configured the subnet 10.10.10.0/30 between the ASA and the ISP R5. This means the subnet contains addresses between 10.10.10.0 - 10.10.10.3. Of these addresses 10.10.10.0 and 10.10.10.3 are not used as they are subnet and broadcast address. IP address 10.10.10.1 is configured on ASA interface and IP address 10.10.10.2 is configured on the ISP R5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the ASA you have configured the following Static NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 10.10.10.2 192.168.2.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This basically tells the ASA to translate the internal IP address 192.168.2.10 to external IP address 10.10.10.2. This does not make sense as IP address 10.10.10.2 is configured on the ISP R5. The IP address is used both on ASA and on ISP R5 and this naturally can not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would therefore suggest that you change the subnet mask on the ASA and ISP R5 to /24 (255.255.255.0) and remove the existing Static NAT and replace it with this for example&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 10.10.10.10 192.168.2.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then you could try to ping 10.10.10.2 from R1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
    <pubDate>Thu, 16 Oct 2014 11:46:40 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-10-16T11:46:40Z</dc:date>
    <item>
      <title>unable to ping outside interface of ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577239#M205983</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I build a small GNS lab,all my internal devices are pinging well on the same subnet,however when i try to reach another subnet via ASA its giving me unreachable icmp mesg.&lt;/P&gt;&lt;P&gt;as per the attached topology iam unable to reach outside interface of ASA from R1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577239#M205983</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2019-03-12T04:55:59Z</dc:date>
    </item>
    <item>
      <title>Hi, Which side of the ASA is</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577240#M205984</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which side of the ASA is the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; ? Which ASA interfaces IP address are you trying to ping?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notice that the users/device has to be behind the interface which it tries to ping to be able to get a reply. You can not ping the ASA interface IP address if you are doing the ping from behind a different ASA interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So in your case if for example the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface is the &lt;STRONG&gt;"e1"&lt;/STRONG&gt; then you can not ping it from &lt;STRONG&gt;R1&lt;/STRONG&gt;. Only from&lt;STRONG&gt; R5&lt;/STRONG&gt; as its behind that ASA interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the device is behind the correct interface then by default the ASA should reply to the ICMP to my understanding. You can always add the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This would allow all ICMP on the interface. In an actual network environment the above command would probably not be ideal to use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also you should make sure that the ASA and all the Routers in between have the necesary routing information so that the ICMP can go through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PS.&lt;/STRONG&gt; Did you manage the solve problems related to ASDM in your other post?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 12:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577240#M205984</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-10-15T12:12:56Z</dc:date>
    </item>
    <item>
      <title>Thanks Jouni for the reply</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577241#M205985</link>
      <description>&lt;P&gt;Thanks Jouni for the reply,&lt;/P&gt;&lt;P&gt;yes e1 is the outside interface of the ASA.&lt;/P&gt;&lt;P&gt;In my topology R1 is a user PC which is trying to reach the outside network i.e R5.&lt;/P&gt;&lt;P&gt;How can i allow R1 to reach R5 if as per you its not possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;p.s well for the asdm issue i have to go to my other office....will definitely let u know&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for ur help&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 12:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577241#M205985</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-15T12:34:04Z</dc:date>
    </item>
    <item>
      <title>Hi, Ok, if "e1" is the</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577242#M205986</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok, if &lt;STRONG&gt;"e1"&lt;/STRONG&gt; is the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; then no device behind the &lt;STRONG&gt;"e0"&lt;/STRONG&gt; interface will be able to ping the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. The only limiting factor here is simply the thing I mentioned. The device/host doing the ping must be located behind the interface that its trying to ping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To allow ICMP from R1 to R5 should not require much (if any) configurations on the ASA other than the normal interface settings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its hard for me to say that the problem might be if you cannot ICMP from the R1 to R5 without seeing the configurations. I would suggest checking routing first. Make sure that R1 has a route for the IP address on R5 that you are trying to ping. This might use default route unless your lab simply uses specific static routes. Similiarly you should check on R5 that it has the route towards the R1 address where the ping is coming from. Notice that the devices use the closest interface towards the destination IP address as the source for the ping so that is the address for which you should check routes in between and at the destination device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After going through the routing then there is naturally the big question with the ASA configurations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it use interface ACLs that could block the traffic?&amp;nbsp; If no ACLs are in use on the ASA interfaces then the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; determines which direction connections can be initiated. Users behind the interface with the higher &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interface can connect to any destination behind any lower &lt;STRONG&gt;"security-level" &lt;/STRONG&gt;interface. As I said, if ACLs are in use on the interfaces then the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; does not matter but traffic has to be allowed in the interface ACL instead.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is the ASA doing NAT between its interfaces as this could affect the possibility to connect between the Routers. If there is any Dynamic PAT configurations between the ASA interfaces then it means that connections can be initiated only from one end. (As Dynamic translations dont enable bidirectional connection initiation)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have &lt;STRONG&gt;"inspect icmp"&lt;/STRONG&gt; and &lt;STRONG&gt;"inspect icmp error"&lt;/STRONG&gt; configured under the &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; configurations?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use the following command to check if those are enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run policy-map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can not see the &lt;STRONG&gt;"inspect icmp"&lt;/STRONG&gt; configurations there you should add them there. Go to the right configuration mode (under which the existing &lt;STRONG&gt;"inspect"&lt;/STRONG&gt; commands are located) and enter the commands.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Above are some things to check.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope I made any sense and hope it helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 12:53:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577242#M205986</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-10-15T12:53:21Z</dc:date>
    </item>
    <item>
      <title>Thanks for your help,In my</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577243#M205987</link>
      <description>&lt;P&gt;Thanks for your help,&lt;/P&gt;&lt;P&gt;In my scenario R1 is a PC with no ip routing configured and iam considering R5 as the ISP router on which i have only assigned ip address on the interface facing towards the ASA,assuming iam not having no privelige on R5.What iam trying to achieve is how a user at R1 reaches the isp router.&lt;/P&gt;&lt;P&gt;I have static routing configured on every device.&lt;/P&gt;&lt;P&gt;Kindly find the ASA config below,&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.1 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;access-list 101 extended permit icmp any host 10.10.10.2 echo&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;static (inside,outside) 10.10.10.2 192.168.2.10 netmask 255.255.255.255&lt;BR /&gt;access-group 101 in interface outside&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 192.168.1.2 1&lt;BR /&gt;route outside 10.10.10.2 255.255.255.255 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:840e8d7a27f16c9094388b697a7894fb&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if you need any other device config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 13:42:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577243#M205987</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-15T13:42:53Z</dc:date>
    </item>
    <item>
      <title>Hi, You seem to have the ICMP</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577244#M205988</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You seem to have the ICMP Inspection configured so thats fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure what this &lt;STRONG&gt;"route"&lt;/STRONG&gt; configurations purpose is&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 10.10.10.2 255.255.255.255 192.168.1.1 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can remove this from the configuration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You seem to have configured a Static NAT for some internal host. Is this Static NAT for the R1?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 10.10.10.2 192.168.2.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This does a NAT for some internal IP address and uses a NAT IP address that belongs to the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;interface subnet. This should mean that atleast this internal host should be able to reach the ISP Router R5 IP address without needing any additional routing configurations on the ISP Router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So is the IP address 192.168.2.10 the IP address of the R1? Or as you say the PCs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 07:06:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577244#M205988</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-10-16T07:06:03Z</dc:date>
    </item>
    <item>
      <title> Thanks Jouni for the reply</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577245#M205989</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks Jouni for the reply,though ur every reply is correct I clicked the correct answer too early,anyways,&lt;/P&gt;&lt;P&gt;as per your suggestion I removed the route outside command.&lt;/P&gt;&lt;P&gt;you are right 192.168.2.10 is the ip address of R1 (pc) and the static nat purpose was to allow this host to reach the isp router i.e R5.&lt;/P&gt;&lt;P&gt;iam still not able to reach R5,&lt;/P&gt;&lt;P&gt;R1#ping 10.10.10.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.10.10.2, timeout is 2 seconds:&lt;BR /&gt;UUUUU&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 08:13:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577245#M205989</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-16T08:13:55Z</dc:date>
    </item>
    <item>
      <title>Hi, Seems to me to be a</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577246#M205990</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems to me to be a routing problem still. As I suggested before go through the all the devices and on each device make sure that there is always a route for the source address of the ping and the destination address of the ping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems like you are missing a route somewhere. Make sure that there are no typos in the static routes for example.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 08:20:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577246#M205990</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-10-16T08:20:56Z</dc:date>
    </item>
    <item>
      <title> plz find the routing table</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577247#M205991</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;plz find the routing table of each device:&lt;/P&gt;&lt;P&gt;L3 switch:&lt;/P&gt;&lt;P&gt;===&lt;/P&gt;&lt;P&gt;L3switch#sh ip route&lt;BR /&gt;Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;E1 - OSPF external type 1, E2 - OSPF external type 2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;o - ODR, P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 192.168.2.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;C &amp;nbsp; &amp;nbsp;192.168.2.0/24 is directly connected, Vlan2&lt;BR /&gt;S* &amp;nbsp; 0.0.0.0/0 [1/0] via 192.168.2.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R4 Router:&lt;/P&gt;&lt;P&gt;===&lt;/P&gt;&lt;P&gt;R4#sh ip route&lt;BR /&gt;Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;E1 - OSPF external type 1, E2 - OSPF external type 2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;o - ODR, P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is not set&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.0.0/24 is subnetted, 1 subnets&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.10.10.0 [1/0] via 192.168.1.1&lt;BR /&gt;C &amp;nbsp; &amp;nbsp;192.168.1.0/24 is directly connected, Ethernet1/0&lt;BR /&gt;C &amp;nbsp; &amp;nbsp;192.168.2.0/24 is directly connected, FastEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA:&lt;/P&gt;&lt;P&gt;====&lt;/P&gt;&lt;P&gt;ciscoasa# SH ROUte&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;* - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 192.168.1.2 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;C &amp;nbsp; &amp;nbsp;10.10.10.0 255.255.255.252 is directly connected, outside&lt;BR /&gt;C &amp;nbsp; &amp;nbsp;192.168.1.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;S* &amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 192.168.1.2, inside&lt;/P&gt;&lt;P&gt;====&lt;/P&gt;&lt;P&gt;As i told u earlier that &amp;nbsp;i have not done any sort of configuration on the ISP Router (R5),let me know if something needs to be done on that as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 08:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577247#M205991</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-16T08:40:38Z</dc:date>
    </item>
    <item>
      <title>Hi, ASA has the requires</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577248#M205992</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA has the required routes, even though the default route pointing to internal network is not typical but then again this is a lab network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R4 connected to ASA seems to have the routes also and it has the subnet 192.168.2.0/24 directly connected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now my confusion is with the fact that the topology picture lists 2x L3 switches. Are we missing one L3 switches configuration? Is the missing device also missing the required routing information?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems to me that the R4 is already directly connected to the subnet 192.168.2.0/24 and therefore there should not be devices routing between R1 and R4. I mean that there should be a L2 link between R4 and R1 atleast with regards to the connection from R4 port FastEthernet0/0. On the switch it seems to be Vlan ID 2? So that should go all the way from the port connected to the R4 F0/0 to R2 port F1/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; So many typos&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 08:51:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577248#M205992</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-10-16T08:51:47Z</dc:date>
    </item>
    <item>
      <title> yes ur right the other L3</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577249#M205993</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes ur right the other L3 switch which u see in the topology has been used as an L2 switch only to bypass the Vlan information.&lt;/P&gt;&lt;P&gt;Your observation is right.&lt;/P&gt;&lt;P&gt;Now iam wondering since R1 is able to reach ASA but not beyond that so do we need to configure any static route which would allow 192.168.2.0/24 network to reach R5 on ASA.&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 09:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577249#M205993</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-16T09:18:34Z</dc:date>
    </item>
    <item>
      <title>Hi, I just now noticed that</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577250#M205994</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just now noticed that you tried to ping the IP address 10.10.10.2 from the R1. You are pinging the NAT IP address of the host where you are pinging from.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the IP address on the ISP R5? You should be pinging that IP address. Though considering that your subnet mask is /30 on the link between ASA and R5 there does not really seem to be many free IP addresses. Could you maybe reconfigure the network mask on ASA and R5 for their link?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 09:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577250#M205994</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-10-16T09:30:07Z</dc:date>
    </item>
    <item>
      <title> yes 10.10.10.2 is the nat</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577251#M205995</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes 10.10.10.2 is the nat address as well as the ip address of the R5 link connected to the ASA.&lt;/P&gt;&lt;P&gt;I reconfigured the subnet mask both on ASA and R5 and changed to /24.&lt;/P&gt;&lt;P&gt;iam still not able to ping:now i notice packet drops instead of unreachable icmp mesgg.&lt;/P&gt;&lt;P&gt;R1#ping 10.10.10.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.10.10.2, timeout is 2 seconds:&lt;BR /&gt;.....&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 09:41:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577251#M205995</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-16T09:41:09Z</dc:date>
    </item>
    <item>
      <title>Hi, What I meant with the</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577252#M205996</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I meant with the thing is that the pinging to the NAT IP address of the R1 makes no sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You said you were trying to ping the R5 so in that case the IP address 10.10.10.2 has nothing to do with R5 as its not configured there or atleast should not be since its configured on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The IP address 10.10.10.2 is the IP address with which the R1 is visible to the ISP Router R5. So what is the IP address configured on the R5 that you should be pinging?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 09:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577252#M205996</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-10-16T09:47:42Z</dc:date>
    </item>
    <item>
      <title> Now iam confued,10.10.10.2</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577253#M205997</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now iam confued,&lt;/P&gt;&lt;P&gt;10.10.10.2 is the ip address configured on R5 and 10.10.10.1 is configured on outside interface of ASA.&lt;/P&gt;&lt;P&gt;Now iam not sure whether the static Nat command which i have configured is correct or not.&lt;/P&gt;&lt;P&gt;R5#sh ip int br&lt;BR /&gt;Interface &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IP-Address &amp;nbsp; &amp;nbsp; &amp;nbsp;OK? Method Status &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Protocol&lt;BR /&gt;Ethernet0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.10.10.2 &amp;nbsp; &amp;nbsp; &amp;nbsp;YES manual up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;======&lt;/P&gt;&lt;P&gt;ciscoasa# sh int ip bri&lt;BR /&gt;Interface &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IP-Address &amp;nbsp; &amp;nbsp; &amp;nbsp;OK? Method Status &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Protocol&lt;BR /&gt;Ethernet0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;192.168.1.1 &amp;nbsp; &amp;nbsp; YES manual up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;Ethernet0/1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.10.10.1 &amp;nbsp; &amp;nbsp; &amp;nbsp;YES manual up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;/P&gt;&lt;P&gt;iam trying to ping from R1 to ethernet0/0 of R5.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 09:52:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577253#M205997</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-16T09:52:57Z</dc:date>
    </item>
    <item>
      <title>Hi, The main problem here are</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577254#M205998</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main problem here are these things&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have configured the subnet 10.10.10.0/30 between the ASA and the ISP R5. This means the subnet contains addresses between 10.10.10.0 - 10.10.10.3. Of these addresses 10.10.10.0 and 10.10.10.3 are not used as they are subnet and broadcast address. IP address 10.10.10.1 is configured on ASA interface and IP address 10.10.10.2 is configured on the ISP R5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the ASA you have configured the following Static NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 10.10.10.2 192.168.2.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This basically tells the ASA to translate the internal IP address 192.168.2.10 to external IP address 10.10.10.2. This does not make sense as IP address 10.10.10.2 is configured on the ISP R5. The IP address is used both on ASA and on ISP R5 and this naturally can not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would therefore suggest that you change the subnet mask on the ASA and ISP R5 to /24 (255.255.255.0) and remove the existing Static NAT and replace it with this for example&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 10.10.10.10 192.168.2.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then you could try to ping 10.10.10.2 from R1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 11:46:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577254#M205998</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-10-16T11:46:40Z</dc:date>
    </item>
    <item>
      <title> Excellent I did the same and</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577255#M205999</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Excellent I did the same and it works,thanks for ur help.&lt;/P&gt;&lt;P&gt;R1#ping 10.10.10.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.10.10.2, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 16/28/64 ms&lt;/P&gt;&lt;P&gt;========&lt;/P&gt;&lt;P&gt;Now plz let me know if i want R5 to reach R1(192.168.2.10) what I need to do on ASA....&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 12:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577255#M205999</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-16T12:11:46Z</dc:date>
    </item>
    <item>
      <title>Hi, Well there is not much</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577256#M206000</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well there is not much you have to do&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You already have an ACL configured on the ASA that you can use to allow traffic from R5 to R1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list 101 extended permit icmp any host 10.10.10.10 echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The existing rule that you have for the destination IP address 10.10.10.2 is not needed.&lt;BR /&gt;&lt;BR /&gt;Since you now should have this Static NAT configured&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 10.10.10.10 192.168.2.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It should mean that you can now reach R1 from R5 by pinging the IP address 10.10.10.10. (Unless something on the R1 blocks the traffic for some reason)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 12:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577256#M206000</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-10-16T12:17:11Z</dc:date>
    </item>
    <item>
      <title>Hi,Did u mean that i should</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577257#M206001</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Did u mean that i should remove&amp;nbsp;&lt;STRONG style="font-size: 14px;"&gt;access-list 101 extended permit icmp any host 10.10.10.10 echo &lt;/STRONG&gt;&lt;STRONG style="font-size: 14px;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG style="font-size: 14px;"&gt;from ASA.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 14px;"&gt;I did that but didn't worked,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 14px;"&gt;since now iam able to ping 10.10.10.2 from R1,however i want to reach 192.168.2.10 from R5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 14px;"&gt;Thanks&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 12:27:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577257#M206001</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-16T12:27:25Z</dc:date>
    </item>
    <item>
      <title>Hi, No, you could not have</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577258#M206002</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No, you could not have removed it since it was not configured. I meant you should add the ACL line mentioned. I simply meant that the ACL rule that you have there already is not needed as it has the wrong IP address in the rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also mentioned that since you are NATing 192.168.2.10 to 10.10.10.10 towards ISP R5 that means you will have to ping the IP address 10.10.10.10 from ISP R5&amp;nbsp; if you want to ping R1 (as its visible to the R5 with that NAT IP address)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 12:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface-of-asa/m-p/2577258#M206002</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-10-16T12:30:37Z</dc:date>
    </item>
  </channel>
</rss>

