<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello, There are certain in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452686#M238674</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are certain settings on a server that will make it reachable from devices on the same subnet but not from other subnets (Host Based Firewall, Anti-Virus,etc).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure that is disable and if that does not work then move forward to the next step which is ICMP Inspection is turned on on both firewalls&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To add use fixup protocol icmp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If that does not make a difference than run a packet capture on the inside interfaces of both firewalls&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On your side&lt;/P&gt;&lt;P&gt;capture jcarvaja interface inside match icmp host Your_PC host _Remote_PC&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;On the other side&lt;/P&gt;&lt;P&gt;capture jcarvaja interface inside match icmp host Your_PC host Remote_PC&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;Then attempt to ping and provide&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show cap capin (On both Firewalls)&lt;/P&gt;&lt;P&gt;show cap asp | include Your_IP (On both firewalls)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jcarvaja&lt;/P&gt;</description>
    <pubDate>Thu, 08 May 2014 00:00:04 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2014-05-08T00:00:04Z</dc:date>
    <item>
      <title>ASA NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452683#M238668</link>
      <description>&lt;P&gt;I have several NAT statements pointing External to Internal on an ASA. &amp;nbsp;When I do a packet-tracer, it appears that everything is working, but I can't get to it via the IP...&lt;BR /&gt;&lt;BR /&gt;The command I ran was this:&lt;/P&gt;&lt;P&gt;#packet-tracer input outside icmp [MY IP] 0 8 [External NAT] detailed&lt;/P&gt;&lt;P&gt;The result I get is this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffa3bca830, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=1317, user_data=0x7fffa3bc9da0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffa59b5750, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=15711, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network ftp2&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static [External NAT IP]&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fffa3cae3e0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=342, user_data=0x7fffa3bf8cf0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=[Internal NAT IP], mask=255.255.255.255, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 37844, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, my ping from my windows machine (the same IP I'm using in my packet-tracer, btw) yields "request timed out."&lt;/P&gt;&lt;P&gt;I know the device on the other side is pingable, because you can do it from their other ASA on a different external IP. &amp;nbsp;Could it be routing to the other firewall on the return route? &amp;nbsp;Why would it act successful on the new ASA side?&lt;/P&gt;&lt;P&gt;I'm confused.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452683#M238668</guid>
      <dc:creator>dustin.kinn</dc:creator>
      <dc:date>2019-03-12T04:10:16Z</dc:date>
    </item>
    <item>
      <title>Dustin,The packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452684#M238672</link>
      <description>&lt;P&gt;Dustin,&lt;/P&gt;&lt;P&gt;The packet tracer information tells you that the path from Outside to Inside is working. &amp;nbsp;However, it does not check or verify that the path from Inside to Outside is also working for ICMP, and it would need to be working in order for your ICMP echo-reply to reach the sending host on the Outside.&lt;/P&gt;&lt;P&gt;Check your Outside and Inside ACLs to see if they allow ICMP, and compare them to the ACLs on the firewall that you said allows ICMP to successfully ping the inside host from the outside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-rb&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2014 21:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452684#M238672</guid>
      <dc:creator>ronbuchalski</dc:creator>
      <dc:date>2014-05-07T21:22:43Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply.  The</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452685#M238673</link>
      <description>&lt;P&gt;Thanks for the reply. &amp;nbsp;The ACLs are exactly the same on both ASAs, except the IPs are changed. &amp;nbsp;That's why I'm thinking a routing problem. &amp;nbsp;I'm speculating that perhaps the ICMP is returning to the current ASA on the out-route, rather than my new one. &amp;nbsp;But the default route for the network goes to the main gateway, so I'm not sure why that would happen. &amp;nbsp;My only thought there is that the default route is the old ASA's network, whereas the new ASA exists on a different subnet (even though the gateway resides on the same core switch).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tonight, I'm changing the default route for a bit as a test, and anything pointing to the old ASA is getting redirected to the new as well. &amp;nbsp;Then it will go right back, but hopefully the test is successful.&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2014 23:46:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452685#M238673</guid>
      <dc:creator>dustin.kinn</dc:creator>
      <dc:date>2014-05-07T23:46:59Z</dc:date>
    </item>
    <item>
      <title>Hello, There are certain</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452686#M238674</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are certain settings on a server that will make it reachable from devices on the same subnet but not from other subnets (Host Based Firewall, Anti-Virus,etc).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure that is disable and if that does not work then move forward to the next step which is ICMP Inspection is turned on on both firewalls&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To add use fixup protocol icmp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If that does not make a difference than run a packet capture on the inside interfaces of both firewalls&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On your side&lt;/P&gt;&lt;P&gt;capture jcarvaja interface inside match icmp host Your_PC host _Remote_PC&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;On the other side&lt;/P&gt;&lt;P&gt;capture jcarvaja interface inside match icmp host Your_PC host Remote_PC&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;Then attempt to ping and provide&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show cap capin (On both Firewalls)&lt;/P&gt;&lt;P&gt;show cap asp | include Your_IP (On both firewalls)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jcarvaja&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2014 00:00:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452686#M238674</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-05-08T00:00:04Z</dc:date>
    </item>
    <item>
      <title>It ended up being routing on</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452687#M238675</link>
      <description>&lt;P&gt;It ended up being routing on the core switch. &amp;nbsp;I had thought they were routing to an interface that existed on their core for the default route, but instead, they were routing to a separate router for an MPLS connection that hosted like 5 of their 20 subnets. &amp;nbsp;That router happened to be on the same subnet as the old ASA, so it was able to thankfully find its way back to the original FW.&lt;/P&gt;&lt;P&gt;Changed that default route to my new ASA and added the routes for the MPLS nets to go to the MPLS router and everything worked.&lt;/P&gt;&lt;P&gt;This place is in need of a network diagram badly.&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2014 12:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452687#M238675</guid>
      <dc:creator>dustin.kinn</dc:creator>
      <dc:date>2014-05-08T12:31:08Z</dc:date>
    </item>
    <item>
      <title>Glad to know that. If it</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452688#M238676</link>
      <description>&lt;P&gt;Glad to know that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it works please make sure you mark this question as answered so the discussion can be closed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2014 12:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/2452688#M238676</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-05-08T12:34:59Z</dc:date>
    </item>
  </channel>
</rss>

