<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You won't have to add all in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426125#M267848</link>
    <description>&lt;P&gt;You won't have to add all ports and protocols to inspection_default, only ICMP. &amp;nbsp;TCP and UDP should go through anyway, as long as the interfaces and NAT are set up correctly. ICMP behaves a little differently through the ASA which is why you need the ASA to inspect it, to know that it needs to let the return traffic through. SQL should not be a problem.&lt;/P&gt;&lt;P&gt;So please clarify, have you tested and traffic is not flowing? For example, can you telnet through the ASA to something else (router or switch) on the outside, or HTTP through to a web server on the outside? I'm not seeing anything in your config that looks wrong -- NAT, routes, access lists, etc.&lt;/P&gt;</description>
    <pubDate>Fri, 04 Apr 2014 11:52:14 GMT</pubDate>
    <dc:creator>jmeggers</dc:creator>
    <dc:date>2014-04-04T11:52:14Z</dc:date>
    <item>
      <title>Problem in ASA 5515 no traffic (information) passing through</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426122#M267842</link>
      <description>&lt;P&gt;Hello Guys i need a little help&lt;/P&gt;&lt;P&gt;I have configured several ASA 5505 some years ago, now it has fall into my lap an ASA 5515 with the the version 9.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;Bellow you can find my current setup, can any one check if there is something wrong with it. From the firewall i am able to ping to machines in the outside and inside interfaces. But i am unable to ping from the machine in the inside to the outside and vice-versa. In the rules page i am able to see the hits count when i am pinging and in the output&lt;BR /&gt;I can see the icmp connection being started and soon after i see the connection teardown message. And no pings are passing throw. I tried any any rule but still no success, maybe is the NAT or this asa unit is faulty. Any help is appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I really dont know what is wrong in my configuration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;ASA Version 9.1(2)&lt;BR /&gt;!&lt;BR /&gt;hostname XPTOFW&lt;BR /&gt;domain-name XPTO.local&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.7.0.5 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.195.151.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name XPTO.local&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network D4K&lt;BR /&gt;&amp;nbsp;host 190.50.100.76&lt;BR /&gt;object network DOC01&lt;BR /&gt;&amp;nbsp;host 10.6.2.29&lt;BR /&gt;&amp;nbsp;description D4K SERVER&lt;BR /&gt;object network DOC01_NAT&lt;BR /&gt;&amp;nbsp;host 10.195.151.15&lt;BR /&gt;object-group service SQLPorts tcp-udp&lt;BR /&gt;&amp;nbsp;port-object eq 1433&lt;BR /&gt;&amp;nbsp;port-object eq 1434&lt;BR /&gt;object-group icmp-type PingGroup&lt;BR /&gt;&amp;nbsp;icmp-object echo&lt;BR /&gt;&amp;nbsp;icmp-object echo-reply&lt;BR /&gt;&amp;nbsp;icmp-object traceroute&lt;BR /&gt;access-list outside_access extended permit icmp object D4K object DOC01_NAT object-group PingGroup&lt;BR /&gt;access-list outside_access extended permit object-group TCPUDP object D4K object DOC01_NAT object-group SQLPorts&lt;BR /&gt;access-list inside_access_in extended permit icmp object DOC01 object D4K object-group PingGroup&lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP object DOC01 object D4K object-group SQLPorts&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network DOC01&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static DOC01_NAT&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access in interface outside&lt;BR /&gt;route inside 10.6.0.0 255.255.0.0 10.7.0.3 1&lt;BR /&gt;route outside 190.50.0.0 255.255.0.0 10.195.151.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.2 255.255.255.255 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 20&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 20&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;: end&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;_______________________________________&lt;/P&gt;&lt;P&gt;Thanks and Regards&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426122#M267842</guid>
      <dc:creator>JIMYSPEED</dc:creator>
      <dc:date>2019-03-12T04:01:51Z</dc:date>
    </item>
    <item>
      <title>First, try adding "inspect</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426123#M267844</link>
      <description>&lt;P&gt;First, try adding "inspect icmp" to the class inspection_default in the global_policy. That should allow ICMP through. Your NAT config looks OK to me.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2014 20:23:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426123#M267844</guid>
      <dc:creator>jmeggers</dc:creator>
      <dc:date>2014-04-03T20:23:09Z</dc:date>
    </item>
    <item>
      <title>Yes with that ping might go</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426124#M267845</link>
      <description>&lt;P&gt;Yes with that ping might go through, but what about the rest of the ports in this case the SQL ports group that i have, i just add the ping rule i could see if it was communicating, when the firewall goes to production all the ping rules will be disable&lt;/P&gt;&lt;P&gt;There must me something else wrong. Or i should add in the inspection_defaul all the ports/protocols i will use&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2014 08:42:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426124#M267845</guid>
      <dc:creator>JIMYSPEED</dc:creator>
      <dc:date>2014-04-04T08:42:25Z</dc:date>
    </item>
    <item>
      <title>You won't have to add all</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426125#M267848</link>
      <description>&lt;P&gt;You won't have to add all ports and protocols to inspection_default, only ICMP. &amp;nbsp;TCP and UDP should go through anyway, as long as the interfaces and NAT are set up correctly. ICMP behaves a little differently through the ASA which is why you need the ASA to inspect it, to know that it needs to let the return traffic through. SQL should not be a problem.&lt;/P&gt;&lt;P&gt;So please clarify, have you tested and traffic is not flowing? For example, can you telnet through the ASA to something else (router or switch) on the outside, or HTTP through to a web server on the outside? I'm not seeing anything in your config that looks wrong -- NAT, routes, access lists, etc.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2014 11:52:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426125#M267848</guid>
      <dc:creator>jmeggers</dc:creator>
      <dc:date>2014-04-04T11:52:14Z</dc:date>
    </item>
    <item>
      <title>That is the main issue no</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426126#M267849</link>
      <description>&lt;P&gt;That is the main issue no information is passing through. I tried web server in the outside but no luck same as sql and http or rdp.&lt;/P&gt;&lt;P&gt;I had this same configuration working in the same place but in an old asa 5510. The only thing that changes i think is the nat, that is wahy i thought that the problem could be in the nat,&amp;nbsp; but from what i have see and read in foruns the nat looks ok. Nothing changed no ip addresses no new routes, just a new firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2014 15:03:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426126#M267849</guid>
      <dc:creator>JIMYSPEED</dc:creator>
      <dc:date>2014-04-04T15:03:33Z</dc:date>
    </item>
    <item>
      <title>I would suggest opening your</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426127#M267852</link>
      <description>&lt;P&gt;I would suggest opening your inside-in ACL for testing purposes and see if traffic succeeds. Most of my customers don't configure inbound ACLs on the inside (although some do) but right now you're only allowing ICMP and SQL, so of course HTTP and telnet are going to be blocked. Also check "show xlate" to see what NATs are in the table. &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2014 17:57:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426127#M267852</guid>
      <dc:creator>jmeggers</dc:creator>
      <dc:date>2014-04-04T17:57:08Z</dc:date>
    </item>
    <item>
      <title>When o made the test i made</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426128#M267855</link>
      <description>&lt;P&gt;When o made the test i made it with the correct rules in the inside and not using the current rules.&lt;/P&gt;&lt;P&gt;Even if all the rules are in place, in the syslog messages from the ASDM i am only see the teardown of the icmp packages.&lt;/P&gt;&lt;P&gt;But i will try what you said.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2014 18:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426128#M267855</guid>
      <dc:creator>JIMYSPEED</dc:creator>
      <dc:date>2014-04-04T18:06:01Z</dc:date>
    </item>
    <item>
      <title>Is your destination in the</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426129#M267857</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Is your destination in the subnet for which you have the static route pointing outside? I noticed you don't have a default route, only specific routes.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Definitely check "show xlate" for translations. Also verify "inspect icmp" is in the class inspection_default. Maybe try NATing to the interface instead of the NAT address. That shouldn't make a difference as long as the&amp;nbsp;DOC01_NAT address is reachable, but I'm running out of ideas.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;You say ASDM logs are showing ICMP is being torn down, meaning it's not even being allowed through? Maybe check the inside-in ACL to see if you're getting hits on that (show access-list....). If I think of anything else I'll let you know.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2014 18:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426129#M267857</guid>
      <dc:creator>jmeggers</dc:creator>
      <dc:date>2014-04-04T18:29:07Z</dc:date>
    </item>
    <item>
      <title>One thing I see is the object</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426130#M267858</link>
      <description>&lt;P&gt;One thing I see is the object-group TCPUDP that you use in the access-lists is not defined above.&amp;nbsp; When I look at my existing asa deployments I have an object-group protocol TCPUDP that shows up in the config.&amp;nbsp; Maybe in the 9.0 it is a default config that doesn't show up in the running config but worth looking into.&amp;nbsp; Also, for simple troubleshooting like this I'd run the packet-tracer on the command line.&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp host 10.6.2.29 8 0 190.50.100.76 detailed&lt;/P&gt;</description>
      <pubDate>Sun, 06 Apr 2014 01:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426130#M267858</guid>
      <dc:creator>jmattbullen</dc:creator>
      <dc:date>2014-04-06T01:00:28Z</dc:date>
    </item>
    <item>
      <title>jmattbullen With that packet</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426131#M267859</link>
      <description>&lt;DIV class="authoring-info"&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A class="username" href="https://supportforums.cisco.com/users/jmattbullen" title="View user profile."&gt;jmattbullen&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;With that packet tracer command this is the output:&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2a639130, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=53, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 190.50.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit icmp object PGDOC01 object D4K_BUSINESS object-group PingGroup&lt;BR /&gt;object-group icmp-type PingGroup&lt;BR /&gt;&amp;nbsp;icmp-object echo&lt;BR /&gt;&amp;nbsp;icmp-object echo-reply&lt;BR /&gt;&amp;nbsp;icmp-object traceroute&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff29d6eb60, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=2, user_data=0x7fff23768380, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=10.6.2.29, mask=255.255.255.255, icmp-type=8, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=190.50.100.76, mask=255.255.255.255, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network PGDOC01&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static PGDOC01_NAT&lt;/P&gt;&lt;P&gt;Additional Information:&lt;BR /&gt;Static translate 10.6.2.29/0 to 10.195.151.15/0&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2a65ebc0, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=2, user_data=0x7fff2a38f1a0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=10.6.2.29, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=inside, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff29b81660, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=18, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2a60ada0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=12, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2a303de0, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=3, user_data=0x7fff2a6a8a70, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2a60abc0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=3, user_data=0x7fff2a63c130, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff29b81660, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=20, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2a616420, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=8, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 432, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A class="username" href="https://supportforums.cisco.com/users/jmeggers" title="View user profile."&gt;jmeggers&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;I am back to basic now, i erased all the rules, just leave the object group, nat and routes in place, rules are any any and every thing is ok, but when i put any rule for ping or ip or whatever doesn´t work.&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;There must be something that i am missing...&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;Best Regards&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="authoring-info"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Mon, 07 Apr 2014 13:45:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426131#M267859</guid>
      <dc:creator>JIMYSPEED</dc:creator>
      <dc:date>2014-04-07T13:45:49Z</dc:date>
    </item>
    <item>
      <title>If everything works as you</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426132#M267860</link>
      <description>&lt;P&gt;If everything works as you want with no acls then that means your nat and routing is spot on.&amp;nbsp; The only thing left is your ACLs.&amp;nbsp; I want to just make sure I'm not assuming anything and verify that when you are running your tests from the Inside network you are only using a client with the ip 10.6.2.29.&amp;nbsp; Next I'd setup your logging to debug.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;logging monitor debugging&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;terminal monitor&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;logging buffer debugging&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Also, when you create your access-list end them with the log command so they will create an entry on match.&amp;nbsp; Make sure you see the hits when you are generating traffic.&amp;nbsp; As for the ACLs, I think this one is incorrect&lt;/P&gt;&lt;P&gt;access-list outside_access extended permit icmp object D4K object &lt;STRONG&gt;DOC01_NAT&lt;/STRONG&gt; object-group PingGroup&lt;BR /&gt;access-list outside_access extended permit object-group TCPUDP object D4K object &lt;STRONG&gt;DOC01_NAT&lt;/STRONG&gt; object-group SQLPorts&lt;/P&gt;&lt;P&gt;ACLs map to the real IP not the mapped IP so it should be&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_access extended permit icmp object D4K object &lt;STRONG&gt;DOC01&lt;/STRONG&gt; object-group PingGroup&lt;BR /&gt;access-list outside_access extended permit object-group TCPUDP object D4K object &lt;STRONG&gt;DOC01&lt;/STRONG&gt; object-group SQLPorts&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2014 01:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426132#M267860</guid>
      <dc:creator>jmattbullen</dc:creator>
      <dc:date>2014-04-08T01:15:52Z</dc:date>
    </item>
    <item>
      <title>Did you ever get this to work</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426133#M267861</link>
      <description>&lt;P&gt;Did you ever get this to work? I am having the same issue...&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 03:05:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426133#M267861</guid>
      <dc:creator>mfernan91</dc:creator>
      <dc:date>2014-04-10T03:05:17Z</dc:date>
    </item>
    <item>
      <title>Hey guys sorry for the late</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426134#M267862</link>
      <description>&lt;P&gt;Hey guys sorry for the late response. &lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A class="username" href="https://supportforums.cisco.com/users/jmattbullen" title="View user profile."&gt;jmattbullen&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp; the problem was that i was using the nat ip instead of the real ip my bad.&lt;/P&gt;&lt;P&gt;And also i had to clear the ARP table from the swtiches connected to the outside and inside interfaces because they still had the mac address from the old firewall. One of my initial mistakes was that i just copy paste the config from the old firewall to the new one and the IOS version was older then 8.3.&lt;/P&gt;&lt;P&gt;when i contacted this cisco center in my region they said migrating to a new next generation firewall should be easy and with zero down time, this is not really true. In this case my costumer believes in this mambo jambo zero down time sh....t and was always demanding for a quick and fast response.&lt;/P&gt;&lt;P&gt;Lesson learned: Always prepare a firewall migration days before the job is done,&lt;/P&gt;&lt;P&gt;Thanks for the help guys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 23:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426134#M267862</guid>
      <dc:creator>JIMYSPEED</dc:creator>
      <dc:date>2014-04-10T23:21:06Z</dc:date>
    </item>
    <item>
      <title>Yes mfernan91It did work</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426135#M267867</link>
      <description>&lt;P&gt;Yes &lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A class="username" href="https://supportforums.cisco.com/users/mfernan91" title="View user profile."&gt;mfernan91&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;It did work &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 23:23:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426135#M267867</guid>
      <dc:creator>JIMYSPEED</dc:creator>
      <dc:date>2014-04-10T23:23:50Z</dc:date>
    </item>
    <item>
      <title>If you don't mind can you</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426136#M267869</link>
      <description>&lt;P&gt;If you don't mind can you send me you config? I have been struggling with an ASA for the last two weeks. I cant get a ping reply from my NAT public IP from outside..Mask your PUBLIC IP's if you have to..&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 21:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426136#M267869</guid>
      <dc:creator>mfernan91</dc:creator>
      <dc:date>2014-04-11T21:12:25Z</dc:date>
    </item>
    <item>
      <title>Above you can find a sample</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426137#M267871</link>
      <description>&lt;P&gt;Above you can find a sample of my current config, the only difference is that the real one has 100 times more rules, and of course the NAT was changed according to &lt;SPAN class="field-content"&gt;&lt;A class="username" href="https://supportforums.cisco.com/users/jmattbullen" title="View user profile."&gt;jmattbullen&lt;/A&gt; example&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2014 10:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426137#M267871</guid>
      <dc:creator>JIMYSPEED</dc:creator>
      <dc:date>2014-04-17T10:01:14Z</dc:date>
    </item>
    <item>
      <title>I am having a similar issue</title>
      <link>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426138#M267872</link>
      <description>&lt;P&gt;I am having a similar issue with asa5515. I can get to my cameras from outside with the old firewall(ASA5510)but i migrated the config to a ASA5515 IOS 9.2 and i cannot get to the cameras anymore. I had the Service provider(NTS) clear the mac address associations on their end,called cisco TAC to check the config and they it&amp;nbsp;was perfect.Still i cannot access my camera from outside. Please any help will be appreciated. I ended up plugging the old firewall back in(ASA5510). Please help. I uploaded my config&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jun 2015 22:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-in-asa-5515-no-traffic-information-passing-through/m-p/2426138#M267872</guid>
      <dc:creator>obumrozel</dc:creator>
      <dc:date>2015-06-03T22:00:50Z</dc:date>
    </item>
  </channel>
</rss>

