<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Basic Cisco ASA5525 routing fails in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451183#M270255</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think this might have been an ARP issue.&amp;nbsp; Has the IP you are testing from been associated with another PC recently?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Feb 2014 10:21:11 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-02-06T10:21:11Z</dc:date>
    <item>
      <title>Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451171#M270239</link>
      <description>&lt;P&gt;Good day,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am starting this thread because we are experiencing a problem with a 'brandnew' cisco ASA 5525x firewall.&lt;/P&gt;&lt;P&gt;We never configured these firewalls before but since the setup is quite simple, we don't know what is going wrong.&lt;/P&gt;&lt;P&gt;This is getting quite urgent because we need this firewall in production fast.&lt;/P&gt;&lt;P&gt;The type is ASA5525-IPS-K9.&lt;/P&gt;&lt;P&gt;IPS license is not yet installed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have simplified our testing setup as in the image bellow (basically this is all we configured, standby firewall was switched off)).&lt;/P&gt;&lt;P&gt;We are firewalling from enterprise dekstops to production servers (no internet involved).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have set all 'ACLs' open with any to any as much as possible, no blocked traffic is reported in debug mode of the logging.&lt;/P&gt;&lt;P&gt;We have also put all interfaces in the same 'zone' namely 100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I am not sure if Enterprise IT people have replaced the w2008r2 router by a real router/firewall, but question remains.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/8/3/8/179838-problemasa5525.png" alt="problemasa5525.png" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping request FAILS: &lt;/P&gt;&lt;P&gt;10.240.20.11 to 192.168.0.x&lt;/P&gt;&lt;P&gt;10.240.20.11 to 10.240.29.1 (I guess this is normal firewall behavior)&lt;/P&gt;&lt;P&gt;10.240.20.11 to 10.24.29.2&lt;/P&gt;&lt;P&gt;192.168.0.11 to 10.240.20.2&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;(I guess this is normal firewall behavior)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;192.168.0.11 to 10.240.20.11&lt;/P&gt;&lt;P&gt;(same thing for 10.240.21.11)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping request OK:&lt;/P&gt;&lt;P&gt;192.168.0.11 to 10.240.29.1&lt;/P&gt;&lt;P&gt;192.168.0.11 to 10.240.29.2&lt;/P&gt;&lt;P&gt;10.240.20.11 to 10.240.21.11 (routed over the firewall)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do not see any 'blocked' messages in the logging that is put to debug mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we replace the 'w2008r2 router' by a single laptop with 1 connection and IP 10.240.29.1 GW 10.240.29.2 and connect in the same port, then we are able to ping from 10.240.29.1 to 10.240.20.11 and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we replace the Cisco firewall by a L3 Cisco 3750X with similar routing configuration, we can ping from 10.240.20.11 to the entire 192.168.0.0/23 network and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These findings are making us very desperate in finding a solution because the findings do not make sense to me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone please give some input on this?&lt;/P&gt;&lt;P&gt;If required I can upload the configuration file here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Joris&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:41:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451171#M270239</guid>
      <dc:creator>Joris Syen</dc:creator>
      <dc:date>2019-03-12T03:41:02Z</dc:date>
    </item>
    <item>
      <title>Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451172#M270240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think we should start by looking at the ASAs configuration first&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 07:27:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451172#M270240</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-06T07:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451173#M270241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the configuration file.&lt;/P&gt;&lt;P&gt;The real IPs we use (not in drawing above) are 10.240.10.11 (instead of 20.11)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.6(1)2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FRW&lt;/P&gt;&lt;P&gt;enable password * encrypted&lt;/P&gt;&lt;P&gt;passwd * encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; channel-group 1 mode active&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; channel-group 1 mode active&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/6&lt;/P&gt;&lt;P&gt; description Link to c k voor vpn&lt;/P&gt;&lt;P&gt; nameif LinkTock&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.240.29.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.100.2 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0&lt;/P&gt;&lt;P&gt; description Link to Core Switch&lt;/P&gt;&lt;P&gt; nameif LinkToCore&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.240.28.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;&lt;P&gt; nameif LinkToDMZ&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1.10&lt;/P&gt;&lt;P&gt; description Vlan for DMZ SQL&lt;/P&gt;&lt;P&gt; vlan 10&lt;/P&gt;&lt;P&gt; nameif Vlan10DMZSQL&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.240.10.2 255.255.255.0 standby 10.240.10.4 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1.11&lt;/P&gt;&lt;P&gt; description Link to Vlan 11 DMZ Backup&lt;/P&gt;&lt;P&gt; vlan 11&lt;/P&gt;&lt;P&gt; nameif Vlan11DMZBackup&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.240.11.2 255.255.255.0 standby 10.240.11.4 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1.12&lt;/P&gt;&lt;P&gt; description Link to vlan 12 DMZ share&lt;/P&gt;&lt;P&gt; vlan 12&lt;/P&gt;&lt;P&gt; nameif Vlan12DMZShare&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.240.12.2 255.255.255.0 standby 10.240.12.4 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1.13&lt;/P&gt;&lt;P&gt; description Link to Vlan 13 DMZ AVI&lt;/P&gt;&lt;P&gt; vlan 13&lt;/P&gt;&lt;P&gt; nameif Vlan13DMZAVI&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.240.13.2 255.255.255.0 standby 10.240.13.4 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1.20&lt;/P&gt;&lt;P&gt; description Link to Vlan 20 DMZ ENG&lt;/P&gt;&lt;P&gt; vlan 20&lt;/P&gt;&lt;P&gt; nameif Vlan20DMZENG&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.240.20.2 255.255.255.0 standby 10.240.20.4 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1.21&lt;/P&gt;&lt;P&gt; description Link to Vlan 21 DMZ External&lt;/P&gt;&lt;P&gt; vlan 21&lt;/P&gt;&lt;P&gt; nameif Vlan21DMZExternal&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.240.21.2 255.255.255.0 standby 10.240.21.4 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/4&lt;/P&gt;&lt;P&gt; description Link To Enterprise Core Swith 2&lt;/P&gt;&lt;P&gt; nameif LinkToEnterPriseCore2&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.240.202.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/5&lt;/P&gt;&lt;P&gt; description Link to Enterprise Core switch 1&lt;/P&gt;&lt;P&gt; nameif LinkToEnterpriseCore1&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.240.201.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Port-channel1&lt;/P&gt;&lt;P&gt; description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list global_access extended permit ip any any log debugging &lt;/P&gt;&lt;P&gt;access-list global_access extended permit icmp any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan20DMZENG_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan20DMZENG_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list Vlan12DMZShare_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan12DMZShare_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list LinkToEnterpriseCore1_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list LinkToEnterpriseCore1_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list LinkToDMZ_access_out extended permit ip any any log debugging &lt;/P&gt;&lt;P&gt;access-list LinkToDMZ_access_out extended permit icmp any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan11DMZBackup_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan11DMZBackup_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list LinkToEnterpriseCore1_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list LinkToEnterpriseCore1_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list Vlan20DMZENG_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan20DMZENG_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list LinkToDMZ_access_in extended permit ip any any log debugging &lt;/P&gt;&lt;P&gt;access-list LinkToDMZ_access_in extended permit icmp any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_out extended permit tcp any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_out extended permit udp any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_out extended permit icmp any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_out extended permit ip any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_out extended deny ip any any inactive &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_out extended deny icmp any any inactive &lt;/P&gt;&lt;P&gt;access-list LinkToCore_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list LinkToCore_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list LinkToEnterPriseCore2_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list LinkToEnterPriseCore2_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_in extended permit icmp any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_in extended permit udp any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_in extended permit tcp any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_in extended permit ip any any log debugging &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_in extended deny ip any any inactive &lt;/P&gt;&lt;P&gt;access-list Vlan10DMZSQL_access_in extended deny icmp any any inactive &lt;/P&gt;&lt;P&gt;access-list LinkToEnterPriseCore2_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list LinkToEnterPriseCore2_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan21DMZExternal_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan21DMZExternal_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list Vlan12DMZShare_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan12DMZShare_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list Vlan13DMZAVI_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan13DMZAVI_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list LinkToCore_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list LinkToCore_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan21DMZExternal_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan21DMZExternal_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list Vlan11DMZBackup_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan11DMZBackup_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list Vlan13DMZAVI_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list Vlan13DMZAVI_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list LinkTock_access_out extended permit tcp any any log debugging &lt;/P&gt;&lt;P&gt;access-list LinkTock_access_out extended permit udp any any log debugging &lt;/P&gt;&lt;P&gt;access-list LinkTock_access_out extended permit icmp any any log debugging &lt;/P&gt;&lt;P&gt;access-list LinkTock_access_out extended permit ip any any log debugging &lt;/P&gt;&lt;P&gt;access-list LinkTock_access_in extended permit udp any any log debugging &lt;/P&gt;&lt;P&gt;access-list LinkTock_access_in extended permit tcp any any log debugging &lt;/P&gt;&lt;P&gt;access-list LinkTock_access_in extended permit icmp any any log debugging &lt;/P&gt;&lt;P&gt;access-list LinkTock_access_in extended permit ip any any log debugging &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu LinkTock 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu LinkToCore 1500&lt;/P&gt;&lt;P&gt;mtu LinkToDMZ 1500&lt;/P&gt;&lt;P&gt;mtu Vlan10DMZSQL 1500&lt;/P&gt;&lt;P&gt;mtu Vlan11DMZBackup 1500&lt;/P&gt;&lt;P&gt;mtu Vlan12DMZShare 1500&lt;/P&gt;&lt;P&gt;mtu Vlan13DMZAVI 1500&lt;/P&gt;&lt;P&gt;mtu Vlan20DMZENG 1500&lt;/P&gt;&lt;P&gt;mtu Vlan21DMZExternal 1500&lt;/P&gt;&lt;P&gt;mtu LinkToEnterPriseCore2 1500&lt;/P&gt;&lt;P&gt;mtu LinkToEnterpriseCore1 1500&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface failover Port-channel1&lt;/P&gt;&lt;P&gt;failover link failover Port-channel1&lt;/P&gt;&lt;P&gt;failover interface ip failover 10.240.100.1 255.255.255.0 standby 10.240.100.2&lt;/P&gt;&lt;P&gt;no monitor-interface LinkTock&lt;/P&gt;&lt;P&gt;no monitor-interface management&lt;/P&gt;&lt;P&gt;monitor-interface Vlan10DMZSQL&lt;/P&gt;&lt;P&gt;monitor-interface Vlan11DMZBackup&lt;/P&gt;&lt;P&gt;monitor-interface Vlan12DMZShare&lt;/P&gt;&lt;P&gt;monitor-interface Vlan13DMZAVI&lt;/P&gt;&lt;P&gt;monitor-interface Vlan20DMZENG&lt;/P&gt;&lt;P&gt;monitor-interface Vlan21DMZExternal&lt;/P&gt;&lt;P&gt;no monitor-interface LinkToEnterPriseCore2&lt;/P&gt;&lt;P&gt;no monitor-interface LinkToEnterpriseCore1&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any LinkTock&lt;/P&gt;&lt;P&gt;icmp permit any management&lt;/P&gt;&lt;P&gt;icmp permit any LinkToCore&lt;/P&gt;&lt;P&gt;icmp permit any LinkToDMZ&lt;/P&gt;&lt;P&gt;icmp permit any Vlan10DMZSQL&lt;/P&gt;&lt;P&gt;icmp permit any Vlan11DMZBackup&lt;/P&gt;&lt;P&gt;icmp permit any Vlan12DMZShare&lt;/P&gt;&lt;P&gt;icmp permit any Vlan13DMZAVI&lt;/P&gt;&lt;P&gt;icmp permit any Vlan20DMZENG&lt;/P&gt;&lt;P&gt;icmp permit any Vlan21DMZExternal&lt;/P&gt;&lt;P&gt;icmp permit any LinkToEnterPriseCore2&lt;/P&gt;&lt;P&gt;icmp permit any LinkToEnterpriseCore1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group LinkTock_access_in in interface LinkTock&lt;/P&gt;&lt;P&gt;access-group LinkTock_access_out out interface LinkTock&lt;/P&gt;&lt;P&gt;access-group LinkToCore_access_in in interface LinkToCore&lt;/P&gt;&lt;P&gt;access-group LinkToCore_access_out out interface LinkToCore&lt;/P&gt;&lt;P&gt;access-group LinkToDMZ_access_in in interface LinkToDMZ&lt;/P&gt;&lt;P&gt;access-group LinkToDMZ_access_out out interface LinkToDMZ&lt;/P&gt;&lt;P&gt;access-group Vlan10DMZSQL_access_in in interface Vlan10DMZSQL&lt;/P&gt;&lt;P&gt;access-group Vlan10DMZSQL_access_out out interface Vlan10DMZSQL&lt;/P&gt;&lt;P&gt;access-group Vlan11DMZBackup_access_in in interface Vlan11DMZBackup&lt;/P&gt;&lt;P&gt;access-group Vlan11DMZBackup_access_out out interface Vlan11DMZBackup&lt;/P&gt;&lt;P&gt;access-group Vlan12DMZShare_access_in in interface Vlan12DMZShare&lt;/P&gt;&lt;P&gt;access-group Vlan12DMZShare_access_out out interface Vlan12DMZShare&lt;/P&gt;&lt;P&gt;access-group Vlan13DMZAVI_access_in in interface Vlan13DMZAVI&lt;/P&gt;&lt;P&gt;access-group Vlan13DMZAVI_access_out out interface Vlan13DMZAVI&lt;/P&gt;&lt;P&gt;access-group Vlan20DMZENG_access_in in interface Vlan20DMZENG&lt;/P&gt;&lt;P&gt;access-group Vlan20DMZENG_access_out out interface Vlan20DMZENG&lt;/P&gt;&lt;P&gt;access-group Vlan21DMZExternal_access_in in interface Vlan21DMZExternal&lt;/P&gt;&lt;P&gt;access-group Vlan21DMZExternal_access_out out interface Vlan21DMZExternal&lt;/P&gt;&lt;P&gt;access-group LinkToEnterPriseCore2_access_in in interface LinkToEnterPriseCore2&lt;/P&gt;&lt;P&gt;access-group LinkToEnterPriseCore2_access_out out interface LinkToEnterPriseCore2&lt;/P&gt;&lt;P&gt;access-group LinkToEnterpriseCore1_access_in in interface LinkToEnterpriseCore1&lt;/P&gt;&lt;P&gt;access-group LinkToEnterpriseCore1_access_out out interface LinkToEnterpriseCore1&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;route LinkTock 0.0.0.0 0.0.0.0 10.240.29.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no user-identity enable&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.240.20.0 255.255.255.0 Vlan20DMZENG&lt;/P&gt;&lt;P&gt;http 10.240.32.0 255.255.255.0 LinkToCore&lt;/P&gt;&lt;P&gt;http 10.240.29.0 255.255.255.0 LinkTock&lt;/P&gt;&lt;P&gt;http 192.168.100.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;sysopt connection tcpmss 0&lt;/P&gt;&lt;P&gt;telnet 10.240.29.0 255.255.255.0 LinkTock&lt;/P&gt;&lt;P&gt;telnet 192.168.100.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;telnet 10.240.32.0 255.255.255.0 LinkToCore&lt;/P&gt;&lt;P&gt;telnet 10.240.20.0 255.255.255.0 Vlan20DMZENG&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;no threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:*&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 08:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451173#M270241</guid>
      <dc:creator>Joris Syen</dc:creator>
      <dc:date>2014-02-06T08:05:25Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451174#M270242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have done a test by replacing the w2008r2 router by a 'normal' virtual machine with IP 10.240.29.1 and gateway 10.240.29.2.&lt;/P&gt;&lt;P&gt;This did not work (no pings possible, vmware uses a standard virtual switch on the ethernet port).&lt;/P&gt;&lt;P&gt;When we plugged in a laptop with the same settings, it worked.&lt;/P&gt;&lt;P&gt;When we plugged the laptop in a managed 2960x switch and connected that to the firewall, it worked.&lt;/P&gt;&lt;P&gt;If we used another laptop in that switch, with different MAC, same ip settings, it worked.&lt;/P&gt;&lt;P&gt;When we tried the orgininal laptop again using the switch, it failed!&lt;/P&gt;&lt;P&gt;2nd laptop via switch... worked.&lt;/P&gt;&lt;P&gt;Orginal laptop directly... worked.&lt;/P&gt;&lt;P&gt;Orginal laptop via switch... fails.&lt;/P&gt;&lt;P&gt;2nd laptop via switch... works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;reboot 1st laptop, keep in switch, keeps failing.&lt;/P&gt;&lt;P&gt;put in firewall, works again.&lt;/P&gt;&lt;P&gt;Put in switch, works again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has this to do with MAC address security somewhere?&lt;/P&gt;&lt;P&gt;Or with settings on the laptops?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can this cause the problem? This is getting really strange.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 08:49:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451174#M270242</guid>
      <dc:creator>Joris Syen</dc:creator>
      <dc:date>2014-02-06T08:49:03Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451175#M270244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you also post the switch configuration please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First off, I am curious as to why you have outgoing ACLs configured on each interface?&amp;nbsp; This is not needed, and are very seldom used.&amp;nbsp; I would suggest removing them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please issue the following command and post back the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input Vlan20DMZENG tcp 10.240.20.11 12345 10.240.29.1 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input LinkTock tcp 10.240.29.1 12345 10.240.20.11 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 09:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451175#M270244</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-06T09:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451176#M270246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also from the ASA are you able to ping 10.240.29.1?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 09:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451176#M270246</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-06T09:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451177#M270248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can ping the 10.240.29.1 from the ASA (telnet).&lt;/P&gt;&lt;P&gt;I can even ping the 192.168.0.0/23 from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your anser I will try your suggestion immediately.&lt;/P&gt;&lt;P&gt;I have also done some updates on my latest post.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 09:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451177#M270248</guid>
      <dc:creator>Joris Syen</dc:creator>
      <dc:date>2014-02-06T09:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451178#M270250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have port security configured on the switch?&amp;nbsp; Would help to see the config of the switch that the PC is connected to when it fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 09:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451178#M270250</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-06T09:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451179#M270251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK I ran your commands while the firewall was connected to the failing "w2008r2 router" virtual machine.&lt;/P&gt;&lt;P&gt;While running this script, a ping from 10.240.10.11 was running to 10.240.29.1, which kept failing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;User Access Verification&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Password:&lt;BR /&gt;Type help or '?' for a list of available commands.&lt;BR /&gt;ftw01&amp;gt; enable 15&lt;BR /&gt;Password: *************&lt;BR /&gt;ftw01# packet-tracer input vlan10dmzsql tcp 10.240.10.11 12345 10.240.29.1 $&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.240.29.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; LinkTock&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Vlan10DMZSQL_access_in in interface Vlan10DMZSQL&lt;BR /&gt;access-list Vlan10DMZSQL_access_in extended permit tcp any any log debugging&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 10036, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Vlan10DMZSQL&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: LinkTock&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftw01# packet-tracer input LinkTock tcp 10.240.29.1 12345 10.24$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.240.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; Vlan10DMZSQL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group LinkTock_access_in in interface LinkTock&lt;BR /&gt;access-list LinkTock_access_in extended permit tcp any any log debug&lt;BR /&gt;ging&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 10075, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: LinkTock&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Vlan10DMZSQL&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;"&gt;&lt;P&gt;&lt;/P&gt;User Access Verification&lt;P&gt;&lt;/P&gt;Password:&lt;BR /&gt;Type help or '?' for a list of available commands.&lt;BR /&gt;ftw01&amp;gt; enable 15&lt;BR /&gt;Password: *************&lt;BR /&gt;ftw01# packet-tracer input vlan10dmzsql tcp 10.240.10.11 12345 10.240.29.1 $&lt;P&gt;&lt;/P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.240.29.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; LinkTock&lt;P&gt;&lt;/P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Vlan10DMZSQL_access_in in interface Vlan10DMZSQL&lt;BR /&gt;access-list Vlan10DMZSQL_access_in extended permit tcp any any log debugging&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 4&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 6&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 10036, packet dispatched to next module&lt;P&gt;&lt;/P&gt;Result:&lt;BR /&gt;input-interface: Vlan10DMZSQL&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: LinkTock&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;P&gt;&lt;/P&gt;ftw01# packet-tracer input LinkTock tcp 10.240.29.1 12345 10.24$&lt;P&gt;&lt;/P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;P&gt;&lt;/P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.240.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; Vlan10DMZSQL&lt;P&gt;&lt;/P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group LinkTock_access_in in interface LinkTock&lt;BR /&gt;access-list LinkTock_access_in extended permit tcp any any log debug&lt;BR /&gt;ging&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 5&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;P&gt;&lt;/P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 10075, packet dispatched to next module&lt;P&gt;&lt;/P&gt;Result:&lt;BR /&gt;input-interface: LinkTock&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Vlan10DMZSQL&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 09:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451179#M270251</guid>
      <dc:creator>Joris Syen</dc:creator>
      <dc:date>2014-02-06T09:44:33Z</dc:date>
    </item>
    <item>
      <title>Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451180#M270252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration seems pretty basic as all the source networks behind this firewall are directly connected and only the default route is needed towards the router in front of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just incase I would suggest adding this as you seem to lack it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service-policy global_policy global&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as Marius said, &lt;STRONG&gt;"out"&lt;/STRONG&gt; / outbound ACLs aren't really not needed they just add complexity. In your case you also have a Global ACL that I tend not to use at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command should pretty much tell you if there is a problem on the ASA but on a quick look it seems you are permitting traffic in any possible direction. You have also enabled traffic from same &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interfaces and you are not performing any NAT on any of the networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I am not sure what the ASA would be doing if it was blocking some traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could for example capture ICMP traffic on the "external" interface of the firewall and see if any of the hosts traffic is getting through the firewall and if they receive a reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list ICMP-CAP permit icmp &lt;SOURCE host="" network=""&gt; &lt;MASK&gt; 192.168.0.0 255.255.254.0&lt;/MASK&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list ICMP-CAP permit icmp 192.168.0.0 255.255.254.0 &lt;SOURCE host="" network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture ICMP-CAP type raw-data access-list ICMP-CAP interface LinkTock buffer 10000000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the place of &lt;STRONG&gt;&lt;SOURCE host="" network=""&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt; use the network/subnet address of the subnet from which you are trying to ping the network 192.168.0.0/23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could then use the following command to check if anything is captured after using ICMP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can show the actual contents of the capture with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture ICMP-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can copy the capture to your computer so you can view it with Wireshark for example with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;copy /pcap capture:ICMP-CAP t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/ICMP-CAP.pcap"&gt;ftp://x.x.x.x/ICMP-CAP.pcap&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can remove the capture and the captured data with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture ICMP-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to remove the ACL separately&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 09:45:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451180#M270252</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-06T09:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451181#M270253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the output of the packet tracer. traffic is allowed through the ASA, atleast on port 80. But since you have permit IP any any everywhere we can safely assume ICMP is also permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would start looking closer at the switch or even the PC you are testing from that is failing for the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 09:47:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451181#M270253</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-06T09:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451182#M270254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We added the laptop (10.240.29.1 GW 10.240.29.2) to the switch, and were in a failing configuration (we could not ping from 10.240.10.11 to 10.240.29.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Then, we started a ping from the laptop to the other, so started a ping from 10.240.29.1 to 10.240.10.11, this worked.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;After this, the ping from 10.240.10.11 to 10.240.29.1 started succeeding, without any config change ???&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this sound like ARP problems?&lt;/P&gt;&lt;P&gt;Thanks for your input we are really using this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The switch has no security-port settings.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 10:02:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451182#M270254</guid>
      <dc:creator>Joris Syen</dc:creator>
      <dc:date>2014-02-06T10:02:52Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451183#M270255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think this might have been an ARP issue.&amp;nbsp; Has the IP you are testing from been associated with another PC recently?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 10:21:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451183#M270255</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-06T10:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451184#M270256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This thread is about ARP problems with ASA switches could this be related? &lt;/P&gt;&lt;P&gt;It is quite technical to me.&lt;/P&gt;&lt;P&gt;(edited post above)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2133340"&gt;https://supportforums.cisco.com/thread/2133340&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 10:23:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451184#M270256</guid>
      <dc:creator>Joris Syen</dc:creator>
      <dc:date>2014-02-06T10:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451185#M270257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Has the IP you are testing from been associated with another PC recently?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually we are constantly changing the 10.240.29.1 and 10.240.29.2 'hosts'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the initial setup, the .2 is on a 3750X and the .1 is on the w2008router, no problems.&lt;/P&gt;&lt;P&gt;In the 'new' setup, the .2 is on the firezall and the .1 is on the w2008router, problems.&lt;/P&gt;&lt;P&gt;If we set the .1 on a laptop it will work, but when we start changing the laptop and using a switch between, it starts failing again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 10:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451185#M270257</guid>
      <dc:creator>Joris Syen</dc:creator>
      <dc:date>2014-02-06T10:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451186#M270258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try issuing a &lt;STRONG&gt;clear arp&lt;/STRONG&gt; on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and &lt;STRONG&gt;clear ip arp&lt;/STRONG&gt; (or you might have to go as far as issuing a &lt;STRONG&gt;clear arp-cache&lt;/STRONG&gt;) on the switch and router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 10:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451186#M270258</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-06T10:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451187#M270259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have done the ARP resetting and all mac addresses seemed to be fine after.&lt;/P&gt;&lt;P&gt;Still our uplink to the 2008r2 router does not work while everything seems OK.&lt;/P&gt;&lt;P&gt;This is really worrying me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But thanks for the input..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 11:02:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451187#M270259</guid>
      <dc:creator>Joris Syen</dc:creator>
      <dc:date>2014-02-06T11:02:08Z</dc:date>
    </item>
    <item>
      <title>Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451188#M270260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would still suggest as an easy way to confirm the section from LAN/DMZ host to the firewall external interface with the ICMP capture (or whatever traffic you want to capture, the capture can be modified to pretty much any setup needed).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the capture you could confirm if&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The ICMP Echo from the LAN host has come to the firewall&lt;/LI&gt;&lt;LI&gt;The ICMP Echo from the LAN host has passed through the firewall and being forwarded to the nexthop device&lt;/LI&gt;&lt;LI&gt;The ICMP Echo has received Echo Reply from the remote network 192.168.0.0/24&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way you would probably be able to narrow down the problem to a certain section without constantly changing the network setup that might give false results if the ARP doesnt happen to refresh to the current test setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your original setup seemed to point to a situation that you were able to ICMP from the ASA directly to the remote network 192.168.0.0/23 but not from behind the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 11:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451188#M270260</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-06T11:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451189#M270261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As Jouni has mentioned the packet capture will give us a 100% confirmation that the traffic is passing through the ASA.&amp;nbsp; &lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Then, we started a ping from the laptop to the other, so started a ping from 10.240.29.1 to 10.240.10.11, this worked.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;After this, the ping from 10.240.10.11 to 10.240.29.1 started succeeding, without any config change ???&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK, I don't see 10.240.10.11 in your diagram further up, though I do see that the ASA has an interface in this subnet.&amp;nbsp; Are you experiencing this problem from all subnets attached to the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am starting to wonder if the 2008r2 router is missing some routes maybe.&amp;nbsp; Is this a Cisco router? Could you post the router configuration please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 12:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451189#M270261</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-06T12:10:29Z</dc:date>
    </item>
    <item>
      <title>Basic Cisco ASA5525 routing fails</title>
      <link>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451190#M270262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all , thank you all for the responses and tips.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 2008r2 router is not a Cisco router, it is a Windows Server 2008 R2 virtual machine that has 2 NIC's, and has the "LAN Routing" role activated. It has static routes that seemed OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We solved the problem by leaving out this 2008r2 "router" and by giving the firewall 1 IP address in the Enterprise LAN 192.168.1.17. We then configured the enterprise router (which is a real router) to route the 10.240.0.0 traffic to the 192.168.1.17 and everything worked fine. I think the problem was caused by the "Windows Router" that was linked to the firewall, but we are unsure why this was. In the end, it doesn't matter because after integration the firewall will be connected to a 'real' router and not a Windows Server routed machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 12:05:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-cisco-asa5525-routing-fails/m-p/2451190#M270262</guid>
      <dc:creator>Joris Syen</dc:creator>
      <dc:date>2014-02-07T12:05:18Z</dc:date>
    </item>
  </channel>
</rss>

