<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic According to you, all in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445190#M268339</link>
    <description>&lt;P&gt;According to you, all machines in your inside network is not able to ping 20.x network when the ASA is the default gateway and works fine if you use the router as the default gateway. Just like Marius said, are you able to reach 20.x using different protocol?&amp;nbsp;If yes and only ICMP that is not working, then it is high likely that your ICMP policy is the cause.&lt;/P&gt;&lt;P&gt;I see that you have a policy map configured for inspecting icmp, but it is applied on the outside interface.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Mar 2014 09:32:13 GMT</pubDate>
    <dc:creator>Rudy Sanjoko</dc:creator>
    <dc:date>2014-03-14T09:32:13Z</dc:date>
    <item>
      <title>Static route problems</title>
      <link>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445188#M268334</link>
      <description>&lt;P&gt;Hey All,&lt;/P&gt;
&lt;P&gt;I have an ASA5510 w/ Security+ that's giving me issues with some static routes.&amp;nbsp;The inside network is 192.168.1.0/24, the inside interface is 192.168.1.3. There is a second router in the network that exists at 192.168.1.180. I need any traffic destined for the subnet 192.168.20.0/24 to go to the 180 gateway. All machines use the asa(192.168.1.3) as their gateway. I have a few routes in the asa:&lt;/P&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
route inside 10.1.1.0 255.255.255.0 192.168.1.15 1
route inside 10.1.10.0 255.255.255.0 192.168.1.15 1
route inside 192.168.3.0 255.255.255.0 192.168.1.3 1
route inside 192.168.20.0 255.255.255.0 192.168.1.180 1&lt;/PRE&gt;

&lt;P&gt;All machines are able to get on the internet, but none can reach the 20.x network. When I try to ping the 20.x network I get the following error in the logs of the ASA:&lt;BR /&gt;Deny inbound icmp src inside:192.X.X.X dst inside:10.X.X.X (type 8, code 0)&lt;/P&gt;
&lt;P&gt;I know my routes are programmed into the 192.168.1.180 router correctly, becuase if i set a machine's gateway to be 1.180, i can ping and get to the 20.x network fine. But the ASA is preventing the routes from completing. Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:56:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445188#M268334</guid>
      <dc:creator>mehrzad.torki</dc:creator>
      <dc:date>2019-03-12T03:56:29Z</dc:date>
    </item>
    <item>
      <title>First off, are you able to</title>
      <link>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445189#M268337</link>
      <description>&lt;P&gt;First off, are you able to reach your hosts on the 20.x network using different protocols, such as RDP, WWW, FTP....etc?&lt;/P&gt;&lt;P&gt;Could you run a packet-tracer, this will give us an idea of what setting on the ASA is dropping the traffic.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;packet-tracer input inside tcp &amp;lt;source address&amp;gt; 12345 &amp;lt;destination address&amp;gt; 80 detail&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Fri, 14 Mar 2014 08:20:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445189#M268337</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-03-14T08:20:45Z</dc:date>
    </item>
    <item>
      <title>According to you, all</title>
      <link>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445190#M268339</link>
      <description>&lt;P&gt;According to you, all machines in your inside network is not able to ping 20.x network when the ASA is the default gateway and works fine if you use the router as the default gateway. Just like Marius said, are you able to reach 20.x using different protocol?&amp;nbsp;If yes and only ICMP that is not working, then it is high likely that your ICMP policy is the cause.&lt;/P&gt;&lt;P&gt;I see that you have a policy map configured for inspecting icmp, but it is applied on the outside interface.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Mar 2014 09:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445190#M268339</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-03-14T09:32:13Z</dc:date>
    </item>
    <item>
      <title>Marius &amp; Rudy,First off,</title>
      <link>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445191#M268341</link>
      <description>&lt;DIV&gt;Marius &amp;amp; Rudy,&lt;/DIV&gt;&lt;DIV&gt;First off, thanks for your help!&lt;/DIV&gt;&lt;DIV&gt;No, I'm not able to reach my hosts using any protocols. I have a Fluke Etherscope which is running a webserver at 192.168.20.250, and i can't reach it. It seems like my traffic is making there, but unable to return, due to the ASA dropping the packets, although i may be wrong about that.&lt;/DIV&gt;&lt;DIV&gt;Rudy, yes that's correct. If use my router as the gateway, everything seems to work fine. When i use that ASA as my default gateway, i can't reach (or get return packets) from the 20.x network.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Also, I guess that's correct about the ICMP-inspection policy, I never seem to be able to ping hosts on the internet.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thanks Again,&lt;/DIV&gt;&lt;DIV&gt;Mehrzad&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result of the command: "packet-tracer input inside tcp 192.168.1.181 12345 192.168.20.253 80 detail"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab8c5d98, priority=1, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=2829692679, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/DIV&gt;&lt;DIV&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;/DIV&gt;&lt;DIV&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: UN-NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: static&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;static (inside,inside) 192.168.20.0 192.168.20.0 netmask 255.255.255.0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip inside 192.168.20.0 255.255.255.0 inside any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; static translation to 192.168.20.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 5, untranslate_hits = 1587&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;NAT divert to egress interface inside&lt;/DIV&gt;&lt;DIV&gt;Untranslate 192.168.20.0/0 to 192.168.20.0/0 using netmask 255.255.255.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 3&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab8c6e60, priority=3, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=2513198, user_data=0x0, cs_id=0x0, flags=0x4000, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 4&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab8c84d0, priority=0, domain=inspect-ip-options, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=154410326, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 5&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: DROP&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip inside any inside any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 2383570, untranslate_hits = 0&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xaba45948, priority=1, domain=nat, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=2749385, user_data=0xaba45888, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: inside&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: inside&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: drop&lt;/DIV&gt;&lt;DIV&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/DIV&gt;</description>
      <pubDate>Fri, 14 Mar 2014 14:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445191#M268341</guid>
      <dc:creator>mehrzad.torki</dc:creator>
      <dc:date>2014-03-14T14:42:08Z</dc:date>
    </item>
    <item>
      <title>The problem is that when</title>
      <link>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445192#M268342</link>
      <description>&lt;P&gt;-&lt;/P&gt;</description>
      <pubDate>Sun, 16 Mar 2014 17:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-problems/m-p/2445192#M268342</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-03-16T17:02:45Z</dc:date>
    </item>
  </channel>
</rss>

