<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,You are using too much in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-not-able-to-ping-outside-n-w-from-inside-interface/m-p/2529811#M236390</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You are using too much ACLs in your configuration. Keep in mind that,&amp;nbsp;by default, traffic from higher security interface (inside) is allowed to lower security interface (outside) without the need for any ACL. The only ACL you need is for traffic comes from outside to inside in the inbound interface direction. The "out" keyword is rarely used and should be avoided as it is only used for specific scenarios. Also, remove the current NAT configs and just create a simple dynamic PAT using Auto-NAT for the inside subnet. Twice NAT is a bit complex and used for specific situations.&lt;/P&gt;&lt;P&gt;I suggest to use the following configs:&lt;/P&gt;&lt;P&gt;access-list Outside_IN extended permit icmp any any echo (&lt;STRONG&gt;Not recommended in production&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;access-list Outside_IN extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-group Outside-IN in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network Inside_Subnet&lt;/P&gt;&lt;P&gt;subnet 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also suggest to ping live machines rather than ASA's own interfaces.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 29 Jul 2014 04:50:45 GMT</pubDate>
    <dc:creator>turbo_engine26</dc:creator>
    <dc:date>2014-07-29T04:50:45Z</dc:date>
    <item>
      <title>ASA 5520: Not able to ping outside n/w from inside interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-not-able-to-ping-outside-n-w-from-inside-interface/m-p/2529809#M236388</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am new to ASA. I have set up a lab in GNS3.&lt;/P&gt;&lt;P&gt;I cannot ping the outside interface from inside or vice versa. I have tried adding ACL's, inspect icmp and everything that I found while searching for the solution.&lt;/P&gt;&lt;P&gt;My Current running config is:&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show running-config&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.0.0.1 255.0.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network nonat&lt;BR /&gt;access-list outside_access_out extended permit tcp any eq echo any eq echo&lt;BR /&gt;access-list outside_access_out extended permit ip any any&lt;BR /&gt;access-list outside_access_out extended permit ip 10.0.0.0 255.0.0.0 172.16.0.0 255.255.255.0&lt;BR /&gt;access-list inside_access_out extended permit tcp any eq echo any eq echo&lt;BR /&gt;access-list inside_access_out extended permit ip any any&lt;BR /&gt;access-list inside_access_out extended permit ip 172.16.0.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit tcp any any eq echo&lt;BR /&gt;access-list inside_access_in extended permit ip 10.0.0.0 255.0.0.0 172.16.0.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit ip any any&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq echo&lt;BR /&gt;access-list outside_access_in extended permit ip 172.16.0.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list nonat extended permit ip 172.16.0.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list nonat extended permit ip 10.0.0.0 255.0.0.0 172.16.0.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any echo inside&lt;BR /&gt;icmp permit any echo outside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static any any&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group inside_access_out out interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group outside_access_out out interface outside&lt;BR /&gt;!&lt;BR /&gt;router ospf 1&lt;BR /&gt;&amp;nbsp;network 10.0.0.0 255.0.0.0 area 0&lt;BR /&gt;&amp;nbsp;network 172.16.0.0 255.255.255.0 area 0&lt;BR /&gt;&amp;nbsp;log-adj-changes&lt;BR /&gt;!&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 172.16.0.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.2 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet 192.168.1.1 255.255.255.255 outside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username ameya password xxxxxxxxxxxxxxx encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;crashinfo save disable&lt;BR /&gt;Cryptochecksum:69a533dbabc0f5a84aaeee0c2054746a&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pings even dont work when I ping from outside interface to inside interface and vice versa.&lt;/P&gt;&lt;P&gt;ciscoasa# ping inside 10.0.0.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;ciscoasa# ping outside 172.16.0.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 172.16.0.1, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:30:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-not-able-to-ping-outside-n-w-from-inside-interface/m-p/2529809#M236388</guid>
      <dc:creator>ameyahanamsagar</dc:creator>
      <dc:date>2019-03-12T04:30:13Z</dc:date>
    </item>
    <item>
      <title>Hi ameyahanamsagar Ping from</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-not-able-to-ping-outside-n-w-from-inside-interface/m-p/2529810#M236389</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A about="/users/ameyahanamsagar" class="username" datatype="" href="https://supportforums.cisco.com/users/ameyahanamsagar" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;ameyahanamsagar&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ping from your inside interface to the outside interface &amp;nbsp;is not allowed on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try to create a virtual machine &amp;nbsp;and do the test or create a LAN environment, I'm pretty sure ping should work fine as long as the ASA keeps reachable .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would add to the configuration:&lt;/P&gt;&lt;P&gt;ICMP permit any echo-reply in&lt;/P&gt;&lt;P&gt;ICMP permit any echo-reply out&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this help !&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Randy -&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jul 2014 18:07:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-not-able-to-ping-outside-n-w-from-inside-interface/m-p/2529810#M236389</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2014-07-21T18:07:52Z</dc:date>
    </item>
    <item>
      <title>Hi,You are using too much</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-not-able-to-ping-outside-n-w-from-inside-interface/m-p/2529811#M236390</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You are using too much ACLs in your configuration. Keep in mind that,&amp;nbsp;by default, traffic from higher security interface (inside) is allowed to lower security interface (outside) without the need for any ACL. The only ACL you need is for traffic comes from outside to inside in the inbound interface direction. The "out" keyword is rarely used and should be avoided as it is only used for specific scenarios. Also, remove the current NAT configs and just create a simple dynamic PAT using Auto-NAT for the inside subnet. Twice NAT is a bit complex and used for specific situations.&lt;/P&gt;&lt;P&gt;I suggest to use the following configs:&lt;/P&gt;&lt;P&gt;access-list Outside_IN extended permit icmp any any echo (&lt;STRONG&gt;Not recommended in production&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;access-list Outside_IN extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-group Outside-IN in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network Inside_Subnet&lt;/P&gt;&lt;P&gt;subnet 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also suggest to ping live machines rather than ASA's own interfaces.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 04:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-not-able-to-ping-outside-n-w-from-inside-interface/m-p/2529811#M236390</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-29T04:50:45Z</dc:date>
    </item>
  </channel>
</rss>

