<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I see now, object network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583135#M225350</link>
    <description>&lt;P&gt;I see now,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;object network ExchSvr&lt;/SPAN&gt;&lt;BR style="font-size: 14.4444446563721px;" /&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;&amp;nbsp;nat (any,any) static 110.74.132.52&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once i removed the&amp;nbsp;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;nat (any,any) static 110.74.132.52, i'm able to ping to the destination.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;The nat above is actually for me to ping from external to the public ip of 110.74.132.52.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;If i remove the nat command above, how can i still ping to the public ip of 110.74.132.52 from external??&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Oct 2014 06:10:49 GMT</pubDate>
    <dc:creator>Mohd Khairul Nizam</dc:creator>
    <dc:date>2014-10-16T06:10:49Z</dc:date>
    <item>
      <title>Ping problem to this VLAN</title>
      <link>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583131#M225340</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have an ASA firewall configured with VLAN. All this while to configuration was OK and each server (VM) able to ping each other.&lt;/P&gt;&lt;P&gt;Then we start to configure NAT in the firewall. Somehow (2 days ago)&amp;nbsp;&amp;nbsp;we realize that there is one server that we can't ping from other internal server.&lt;/P&gt;&lt;P&gt;Others server OK.&lt;/P&gt;&lt;P&gt;I have 4 VLAN (12,20,30,50)&lt;/P&gt;&lt;P&gt;i check the ASA log and found this&amp;nbsp;&lt;/P&gt;&lt;P&gt;"5&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;Oct 16 2014&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;11:38:48&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;10.1.12.30&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;10.1.20.2&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src VLAN12:10.1.12.30 dst VLAN20:10.1.20.2 (type 8, code 0) denied due to NAT reverse path failure"&lt;/P&gt;&lt;P&gt;What could be the NAT rules that prevent the icmp???&amp;nbsp;&lt;/P&gt;&lt;P&gt;================================================&lt;/P&gt;&lt;P&gt;ASA Version 9.1(2)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname ASHFW01&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 110.74.132.50 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.1&lt;BR /&gt;&amp;nbsp;vlan 12&lt;BR /&gt;&amp;nbsp;nameif VLAN12&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.12.254 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.2&lt;BR /&gt;&amp;nbsp;vlan 20&lt;BR /&gt;&amp;nbsp;nameif VLAN20&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.20.254 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.3&lt;BR /&gt;&amp;nbsp;vlan 30&lt;BR /&gt;&amp;nbsp;nameif VLAN30&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.30.254 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.4&lt;BR /&gt;&amp;nbsp;vlan 50&lt;BR /&gt;&amp;nbsp;nameif VLAN50&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.50.254 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone SGT 8&lt;BR /&gt;dns domain-lookup VLAN12&lt;BR /&gt;dns domain-lookup VLAN20&lt;BR /&gt;dns domain-lookup VLAN30&lt;BR /&gt;dns domain-lookup VLAN50&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network TerminalServer-RDP&lt;BR /&gt;&amp;nbsp;host 10.1.12.13&lt;BR /&gt;object network Exch-SMTP&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network Exch-POP3&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network Exch-SMTPS&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network ExchServer-RDP&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network MgmtSvr-RDP&lt;BR /&gt;&amp;nbsp;host 10.1.12.30&lt;BR /&gt;object network Exch-SMTP1&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network Exch-HTTP&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network Portal&lt;BR /&gt;&amp;nbsp;host 10.1.12.14&lt;BR /&gt;&amp;nbsp;description Portal&lt;BR /&gt;object service Portal80&lt;BR /&gt;&amp;nbsp;service tcp source eq www destination eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp;description Portal80&lt;BR /&gt;object service SalesMobile9090&lt;BR /&gt;&amp;nbsp;service tcp destination eq 9090&amp;nbsp;&lt;BR /&gt;&amp;nbsp;description SalesMobile9090&lt;BR /&gt;object network MgmtSvr&lt;BR /&gt;&amp;nbsp;host 10.1.12.30&lt;BR /&gt;object network TerminalServer&lt;BR /&gt;&amp;nbsp;host 10.1.12.13&lt;BR /&gt;object network ExchServer&lt;BR /&gt;object network ExchSvr&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object service smtp2&lt;BR /&gt;&amp;nbsp;service tcp destination eq 587&amp;nbsp;&lt;BR /&gt;object network SalesMobile&lt;BR /&gt;&amp;nbsp;host 10.1.12.14&lt;BR /&gt;&amp;nbsp;description SalesMobile&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object object ExchSvr&lt;BR /&gt;&amp;nbsp;network-object object MgmtSvr&lt;BR /&gt;&amp;nbsp;network-object object TerminalServer&lt;BR /&gt;object-group service Exch-Services&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq pop3&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object object smtp2&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq smtp&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any4 any&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 object-group rdp&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object-group Exch-Services any object ExchSvr&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Portal eq www&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object SalesMobile9090 any object SalesMobile&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended deny ip any any&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu VLAN12 1500&lt;BR /&gt;mtu VLAN20 1500&lt;BR /&gt;mtu VLAN30 1500&lt;BR /&gt;mtu VLAN50 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any VLAN12&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network TerminalServer-RDP&lt;BR /&gt;&amp;nbsp;nat (VLAN12,outside) static 110.74.132.51 service tcp 3389 3389&amp;nbsp;&lt;BR /&gt;object network Exch-SMTP&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp smtp smtp&amp;nbsp;&lt;BR /&gt;object network Exch-POP3&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp https https&amp;nbsp;&lt;BR /&gt;object network Exch-SMTPS&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp 587 587&amp;nbsp;&lt;BR /&gt;object network ExchServer-RDP&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp 3389 3389&amp;nbsp;&lt;BR /&gt;object network MgmtSvr-RDP&lt;BR /&gt;&amp;nbsp;nat (VLAN12,outside) static 110.74.132.53 service tcp 3389 3389&amp;nbsp;&lt;BR /&gt;object network Exch-SMTP1&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp pop3 pop3&amp;nbsp;&lt;BR /&gt;object network Exch-HTTP&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp www www&amp;nbsp;&lt;BR /&gt;object network Portal&lt;BR /&gt;&amp;nbsp;nat (VLAN12,outside) static 110.74.132.51 service tcp www www&amp;nbsp;&lt;BR /&gt;object network MgmtSvr&lt;BR /&gt;&amp;nbsp;nat (any,any) static 110.74.132.53&lt;BR /&gt;object network ExchSvr&lt;BR /&gt;&amp;nbsp;nat (any,any) static 110.74.132.52&lt;BR /&gt;object network SalesMobile&lt;BR /&gt;&amp;nbsp;nat (VLAN12,outside) static 110.74.132.51 service tcp 9090 9090&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;nat (any,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;==============================================================&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:56:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583131#M225340</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2019-03-12T04:56:35Z</dc:date>
    </item>
    <item>
      <title>Hi,You can run this packet</title>
      <link>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583132#M225342</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can run this packet tracer on the ASA device to check:-&lt;/P&gt;&lt;P&gt;packet input&amp;nbsp;VLAN12 icmp 10.1.12.30 8 0 10.1.20.2 det&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 04:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583132#M225342</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-16T04:34:04Z</dc:date>
    </item>
    <item>
      <title>This is what i get===========</title>
      <link>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583133#M225344</link>
      <description>&lt;P&gt;This is what i get&lt;/P&gt;&lt;P&gt;======================&lt;/P&gt;&lt;DIV&gt;Result of the command: "packet input VLAN12 icmp 10.1.12.30 8 0 10.1.20.2 det"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff2a638790, priority=1, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1375642, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/DIV&gt;&lt;DIV&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;/DIV&gt;&lt;DIV&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/DIV&gt;&lt;DIV&gt;input_ifc=VLAN12, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: ROUTE-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype: input&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;in &amp;nbsp; 10.1.20.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; 255.255.255.0 &amp;nbsp; VLAN20&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 3&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;object network MgmtSvr&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nat (any,any) static 110.74.132.53&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;Static translate 10.1.12.30/0 to 110.74.132.53/0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff2a80b110, priority=6, domain=nat, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1834, user_data=0x7fff2a8098c0, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=10.1.12.30, mask=255.255.255.255, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=any, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 4&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff2a7a09f0, priority=2, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1827, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=VLAN12, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 5&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: per-session&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff29b81a90, priority=0, domain=nat-per-session, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=4666, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=any, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 6&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff2a640630, priority=0, domain=inspect-ip-options, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=9745, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=VLAN12, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 7&lt;/DIV&gt;&lt;DIV&gt;Type: INSPECT&lt;/DIV&gt;&lt;DIV&gt;Subtype: np-inspect&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;class-map inspection_default&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match default-inspection-traffic&lt;/DIV&gt;&lt;DIV&gt;policy-map global_policy&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;class inspection_default&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;service-policy global_policy global&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff2aefe1b0, priority=70, domain=inspect-icmp, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1634, user_data=0x7fff2aefc550, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=VLAN12, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 8&lt;/DIV&gt;&lt;DIV&gt;Type: INSPECT&lt;/DIV&gt;&lt;DIV&gt;Subtype: np-inspect&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff2a63ff60, priority=66, domain=inspect-icmp-error, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1634, user_data=0x7fff2a63f4d0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=VLAN12, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 9&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: rpf-check&lt;/DIV&gt;&lt;DIV&gt;Result: DROP&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;object network ExchSvr&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nat (any,any) static 110.74.132.52&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;out id=0x7fff2a80f780, priority=6, domain=nat-reverse, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1271, user_data=0x7fff2a80db20, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=10.1.20.2, mask=255.255.255.255, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=any, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: VLAN12&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: VLAN20&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: drop&lt;/DIV&gt;&lt;DIV&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/DIV&gt;</description>
      <pubDate>Thu, 16 Oct 2014 04:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583133#M225344</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2014-10-16T04:55:20Z</dc:date>
    </item>
    <item>
      <title>Hi,NAT statement is the issue</title>
      <link>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583134#M225347</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;NAT statement is the issue:-&lt;/P&gt;&lt;DIV&gt;object network ExchSvr&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nat (any,any) static 110.74.132.52&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Change this to specific interfaces on the NAT and that should fix this issue for you.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;If i am correct it should change to:-&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;nat (VLAN20,outside) static 110.74.132.52&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thanks and Regards,&lt;/DIV&gt;&lt;DIV&gt;Vibhor Amrodia&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 16 Oct 2014 05:03:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583134#M225347</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-16T05:03:17Z</dc:date>
    </item>
    <item>
      <title>I see now, object network</title>
      <link>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583135#M225350</link>
      <description>&lt;P&gt;I see now,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;object network ExchSvr&lt;/SPAN&gt;&lt;BR style="font-size: 14.4444446563721px;" /&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;&amp;nbsp;nat (any,any) static 110.74.132.52&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once i removed the&amp;nbsp;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;nat (any,any) static 110.74.132.52, i'm able to ping to the destination.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;The nat above is actually for me to ping from external to the public ip of 110.74.132.52.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;If i remove the nat command above, how can i still ping to the public ip of 110.74.132.52 from external??&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 06:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583135#M225350</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2014-10-16T06:10:49Z</dc:date>
    </item>
    <item>
      <title>Hi,You still need that NAt</title>
      <link>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583136#M225353</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You still need that NAt but with specific Interface Names in the NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;object network ExchSvr&lt;/SPAN&gt;&lt;BR /&gt;nat (VLAN20,outside) static 110.74.132.52&lt;/P&gt;&lt;P&gt;This should still help you to ping the Public IP from the internet.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 06:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-problem-to-this-vlan/m-p/2583136#M225353</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-16T06:14:13Z</dc:date>
    </item>
  </channel>
</rss>

