<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 initial build - Failed to locate egress interface (Please help :-) ) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474510#M267571</link>
    <description>&lt;P&gt;Hi, I have just purchased a ASA 5505 and have completed the initial setup via the wizard.&amp;nbsp; I am currently unable to access services on the outside of the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The error: 'Failed to locate egress interface for UDP from inside'....&amp;nbsp; appears when ever my DNS server attempts a lookup.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured this several times from scratch using the wizard and I am unable to figure out the issue with the NAT / Routing config.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I run the packet tracer I get the error: "(no-route) no route to host", however I do have a default route configured so I suspect it maybe my NAT configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Overview, 192.168.10.0/24 inside the ASA, 192.168.1.0/24 outside the ASA, 192.168.1.1 is the gateway to the internet.&amp;nbsp; I ideally want the ASA to use PAT to mask the 192.168.10.0/24 network behind the ASAs 192.168.1.0/24 network address but still allow clients to gain internet access.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Full config follows, screen shots attached, any help would be very gratefully received.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.0(1)&lt;BR /&gt;!&lt;BR /&gt;hostname firewall&lt;BR /&gt;enable password (REMOVED) encrypted&lt;BR /&gt;passwd (REMOVED) encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address dhcp&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Server1&lt;BR /&gt;&amp;nbsp;host 192.168.10.10&lt;BR /&gt;object network GoogleDNS1&lt;BR /&gt;&amp;nbsp;host 8.8.8.8&lt;BR /&gt;&amp;nbsp;description Google DNS Server&lt;BR /&gt;object network GoogleDNS2&lt;BR /&gt;&amp;nbsp;host 8.8.4.4&lt;BR /&gt;&amp;nbsp;description Google DNS Server&lt;BR /&gt;object network 192.168.10.x&lt;BR /&gt;&amp;nbsp;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network InternetRouter&lt;BR /&gt;&amp;nbsp;host 192.168.1.1&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object object GoogleDNS1&lt;BR /&gt;&amp;nbsp;network-object object GoogleDNS2&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;access-list inside_access_in remark External DNS Lookups&lt;BR /&gt;access-list inside_access_in extended permit udp object Server1 object-group DM_INLINE_NETWORK_1 eq domain&lt;BR /&gt;access-list inside_access_in extended permit tcp 192.168.10.0 255.255.255.0 any object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list inside_access_in extended deny ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 255.255.255.255 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:(REMOVED)&lt;BR /&gt;: end&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:04:20 GMT</pubDate>
    <dc:creator>robert404</dc:creator>
    <dc:date>2019-03-12T04:04:20Z</dc:date>
    <item>
      <title>ASA 5505 initial build - Failed to locate egress interface (Please help :-) )</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474510#M267571</link>
      <description>&lt;P&gt;Hi, I have just purchased a ASA 5505 and have completed the initial setup via the wizard.&amp;nbsp; I am currently unable to access services on the outside of the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The error: 'Failed to locate egress interface for UDP from inside'....&amp;nbsp; appears when ever my DNS server attempts a lookup.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured this several times from scratch using the wizard and I am unable to figure out the issue with the NAT / Routing config.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I run the packet tracer I get the error: "(no-route) no route to host", however I do have a default route configured so I suspect it maybe my NAT configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Overview, 192.168.10.0/24 inside the ASA, 192.168.1.0/24 outside the ASA, 192.168.1.1 is the gateway to the internet.&amp;nbsp; I ideally want the ASA to use PAT to mask the 192.168.10.0/24 network behind the ASAs 192.168.1.0/24 network address but still allow clients to gain internet access.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Full config follows, screen shots attached, any help would be very gratefully received.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.0(1)&lt;BR /&gt;!&lt;BR /&gt;hostname firewall&lt;BR /&gt;enable password (REMOVED) encrypted&lt;BR /&gt;passwd (REMOVED) encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address dhcp&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Server1&lt;BR /&gt;&amp;nbsp;host 192.168.10.10&lt;BR /&gt;object network GoogleDNS1&lt;BR /&gt;&amp;nbsp;host 8.8.8.8&lt;BR /&gt;&amp;nbsp;description Google DNS Server&lt;BR /&gt;object network GoogleDNS2&lt;BR /&gt;&amp;nbsp;host 8.8.4.4&lt;BR /&gt;&amp;nbsp;description Google DNS Server&lt;BR /&gt;object network 192.168.10.x&lt;BR /&gt;&amp;nbsp;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network InternetRouter&lt;BR /&gt;&amp;nbsp;host 192.168.1.1&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object object GoogleDNS1&lt;BR /&gt;&amp;nbsp;network-object object GoogleDNS2&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;access-list inside_access_in remark External DNS Lookups&lt;BR /&gt;access-list inside_access_in extended permit udp object Server1 object-group DM_INLINE_NETWORK_1 eq domain&lt;BR /&gt;access-list inside_access_in extended permit tcp 192.168.10.0 255.255.255.0 any object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list inside_access_in extended deny ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 255.255.255.255 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:(REMOVED)&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474510#M267571</guid>
      <dc:creator>robert404</dc:creator>
      <dc:date>2019-03-12T04:04:20Z</dc:date>
    </item>
    <item>
      <title>Your default route statement</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474511#M267573</link>
      <description>&lt;P&gt;Your default route statement is incorrectly formed. You have:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;route outside 0.0.0.0 255.255.255.255 192.168.1.1 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;and it should be:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 12:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474511#M267573</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-14T12:00:23Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,Thank you so much</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474512#M267575</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;Thank you so much for your reply, I have changed the route as per your recommendation and applied the configuration, however I still get the same results with the packet trace.&amp;nbsp; (no-route) No route to host.&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 12:54:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474512#M267575</guid>
      <dc:creator>robert404</dc:creator>
      <dc:date>2014-04-14T12:54:47Z</dc:date>
    </item>
    <item>
      <title>You did delete the incorrect</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474513#M267577</link>
      <description>&lt;P&gt;You did delete the incorrect route, yes? If you didn't it's still in there.&lt;/P&gt;&lt;P&gt;Please provide the output of:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Consolas, Monaco, 'Courier New', Courier, monospace, sans-serif; font-size: 13px; white-space: pre-wrap; background-color: rgb(245, 245, 245);"&gt;show run route&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Consolas, Monaco, 'Courier New', Courier, monospace, sans-serif; font-size: 13px; white-space: pre-wrap; background-color: rgb(245, 245, 245);"&gt;packet-tracer input inside udp 192.168.10.10 53 8.8.8.8 53&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 13:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474513#M267577</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-14T13:15:21Z</dc:date>
    </item>
    <item>
      <title>Yes, I did delete the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474514#M267578</link>
      <description>&lt;P&gt;Yes, I did delete the incorrect route, and also applied the configuration.&amp;nbsp; Here is the output:&lt;/P&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;Result of the command: "show run route"&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;Result of the command: "packet-tracer input inside udp 192.168.10.10 53 8.8.8.8 53"&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;Result:&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;input-interface: inside&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;input-status: up&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;Action: drop&lt;/DIV&gt;&lt;DIV style="background:#eee;border:1px solid #ccc;padding:5px 10px;"&gt;Drop-reason: (no-route) No route to host&lt;/DIV&gt;</description>
      <pubDate>Mon, 14 Apr 2014 14:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474514#M267578</guid>
      <dc:creator>robert404</dc:creator>
      <dc:date>2014-04-14T14:13:22Z</dc:date>
    </item>
    <item>
      <title>Hmm, the routing looks good</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474515#M267579</link>
      <description>&lt;P&gt;Hmm, the routing looks good now.&lt;/P&gt;&lt;P&gt;Can you verify that the outside interface (Ethernet0/0) is UP/UP:&lt;/P&gt;&lt;P&gt;"show interface Eth0/0"&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 14:45:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474515#M267579</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-14T14:45:25Z</dc:date>
    </item>
    <item>
      <title>Ah.  That switch port had</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474516#M267580</link>
      <description>&lt;P&gt;Ah.&amp;nbsp; That switch port had gone into error disable before my last test, I have changed the cable and the interfaces are now clean of errors. (Apologies)&lt;/P&gt;&lt;P&gt;I have now retested and its working! I have double checked and it looks like my issue was all down to that default gateway setting being incorrect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you said, it should have read:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px"&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thank you for all your help with this. I am really very grateful.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 15:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474516#M267580</guid>
      <dc:creator>robert404</dc:creator>
      <dc:date>2014-04-14T15:40:20Z</dc:date>
    </item>
    <item>
      <title>Just to want to be sure, can</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474517#M267581</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Just to want to be sure, can you post output from &lt;STRONG&gt;show int ip brie &lt;/STRONG&gt;and &lt;B&gt;show route&lt;/B&gt;? And try to remove your ACL for testing purpose or at least don't applied it anywhere yet.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Once done, try do another packet-tracer to 8.8.8.8 using icmp packet instead of UDP paste the whole the output here. Before doing this, add&amp;nbsp;&lt;STRONG&gt;icmp any any outside&amp;nbsp;&lt;/STRONG&gt;command on the ASA.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;I know this should have anything to do with your issue, because if ACL is the issue then you will see output being denied by ACL on the packet tracer output. Let us know the results.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 15:56:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474517#M267581</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-14T15:56:58Z</dc:date>
    </item>
    <item>
      <title>Disregards my comment just</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474518#M267582</link>
      <description>&lt;P&gt;Disregards my comment just now then &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 15:57:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474518#M267582</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-14T15:57:52Z</dc:date>
    </item>
    <item>
      <title>You're welcome. Funny how the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474519#M267583</link>
      <description>&lt;P&gt;You're welcome. Funny how the simplest things can sometimes trip us up.&lt;/P&gt;&lt;P&gt;Thanks for the rating.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 15:59:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-initial-build-failed-to-locate-egress-interface-please/m-p/2474519#M267583</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-14T15:59:09Z</dc:date>
    </item>
  </channel>
</rss>

