<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT problems with ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-problems-with-asa5505/m-p/2378872#M309302</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean you can't connect to anything on the WAN from the LAN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see any NAT configuration that should stop that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me it seems though that from the external network the connections for your configured Static PAT (Port Forward) will fail because of the below configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (inside,outside) source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could remove it since you already have this that does the same thing without causing problems&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj_any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can test the connectivity from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"outside"&lt;/STRONG&gt; with &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 172.26.0.100 12345 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The output should tell us if there is any problems. But at the moment I can't see anything else wrong than what I mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also modify the above command to simulate the connections that dont work at the moment. Version of ICMP would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside icmp 172.26.0.100 8 0 8.8.8.8&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could naturally make sure you have ICMP Inspection enabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could issue commands like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I cant see your &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; configurations I can't tell if they are already configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Nov 2013 12:56:38 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-11-08T12:56:38Z</dc:date>
    <item>
      <title>NAT problems with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems-with-asa5505/m-p/2378871#M309301</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I think I have misconfigured NAT, I can not make internet ping from the LAN, or connections such as a Telnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone help??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;enable password &lt;/P&gt;&lt;P&gt;passwd &lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.26.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.0.2.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;object network obj-172.26.0.0&lt;/P&gt;&lt;P&gt; subnet 172.26.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.0&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.224&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_172.26.0.0_24&lt;/P&gt;&lt;P&gt; subnet 172.26.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.1.0_27&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.224&lt;/P&gt;&lt;P&gt;object network AS400&lt;/P&gt;&lt;P&gt; host 172.26.0.250&lt;/P&gt;&lt;P&gt;object network Puerto8001tcp&lt;/P&gt;&lt;P&gt; host 172.26.0.249&lt;/P&gt;&lt;P&gt; description AdministraciÃ³n cÃ¡maras puerto 8001 tcp&lt;/P&gt;&lt;P&gt;object network Puerto8001udp&lt;/P&gt;&lt;P&gt; host 172.26.0.249&lt;/P&gt;&lt;P&gt; description AdministraciÃ³n cÃ¡maras puerto 8001 udp&lt;/P&gt;&lt;P&gt;object network puerto8000tcp&lt;/P&gt;&lt;P&gt; host 172.26.0.249&lt;/P&gt;&lt;P&gt; description AministraciÃ³n camaras puerto 8000 tcp&lt;/P&gt;&lt;P&gt;object network puerto8000udp&lt;/P&gt;&lt;P&gt; host 172.26.0.249&lt;/P&gt;&lt;P&gt; description AdministraciÃ³n camaras puerto 8000 udp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCPUDP_1 tcp-udp&lt;/P&gt;&lt;P&gt; port-object eq 8000&lt;/P&gt;&lt;P&gt; port-object eq 8001&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list TRABAJADORESVPN_splitTunnelAcl standard permit 172.26.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.26.0.0 255.255.255.0 192.168.1.0 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list TRABAJADOREXTERNO_splitTunnelAcl standard permit host 172.26.0.250 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group TCPUDP any any object-group DM_INLINE_TCPUDP_1 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool vpn_pool 192.168.1.10-192.168.1.20 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-172.26.0.0 obj-172.26.0.0 destination static obj-192.168.1.0 obj-192.168.1.0 no-proxy-arp&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static NETWORK_OBJ_172.26.0.0_24 NETWORK_OBJ_172.26.0.0_24 destination static NETWORK_OBJ_192.168.1.0_27 NETWORK_OBJ_192.168.1.0_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network Puerto8001tcp&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 8001 8001 &lt;/P&gt;&lt;P&gt;object network Puerto8001udp&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service udp 8001 8001 &lt;/P&gt;&lt;P&gt;object network puerto8000tcp&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 8000 8000 &lt;/P&gt;&lt;P&gt;object network puerto8000udp&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service udp 8000 8000 &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.0.2.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.26.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 172.26.0.33-172.26.0.100 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 80.58.61.250 80.58.61.254 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy TRABAJADOREXTERNO internal&lt;/P&gt;&lt;P&gt;group-policy TRABAJADOREXTERNO attributes&lt;/P&gt;&lt;P&gt; dns-server value 8.8.8.8&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value TRABAJADOREXTERNO_splitTunnelAcl&lt;/P&gt;&lt;P&gt;group-policy TRABAJADORESVPN internal&lt;/P&gt;&lt;P&gt;group-policy TRABAJADORESVPN attributes&lt;/P&gt;&lt;P&gt; dns-server value 8.8.8.8 80.58.61.250&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; password-storage enable&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value TRABAJADORESVPN_splitTunnelAcl&lt;/P&gt;&lt;P&gt; user-authentication-idle-timeout none&lt;/P&gt;&lt;P&gt;username &lt;/P&gt;&lt;P&gt;username &lt;/P&gt;&lt;P&gt;username &lt;/P&gt;&lt;P&gt;tunnel-group TRABAJADOR type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group TRABAJADOR general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpn_pool&lt;/P&gt;&lt;P&gt; default-group-policy TRABAJADOR&lt;/P&gt;&lt;P&gt;tunnel-group TRABAJADORESVPN ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group TRABAJADOREXTERNO type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group TRABAJADOREXTERNO general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpn_pool&lt;/P&gt;&lt;P&gt; default-group-policy TRABAJADOREXTERNO&lt;/P&gt;&lt;P&gt;tunnel-group TRABAJADOREXTERNO ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:02:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems-with-asa5505/m-p/2378871#M309301</guid>
      <dc:creator>enrique.jara</dc:creator>
      <dc:date>2019-03-12T03:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problems with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems-with-asa5505/m-p/2378872#M309302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean you can't connect to anything on the WAN from the LAN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see any NAT configuration that should stop that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me it seems though that from the external network the connections for your configured Static PAT (Port Forward) will fail because of the below configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (inside,outside) source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could remove it since you already have this that does the same thing without causing problems&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj_any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can test the connectivity from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"outside"&lt;/STRONG&gt; with &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 172.26.0.100 12345 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The output should tell us if there is any problems. But at the moment I can't see anything else wrong than what I mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also modify the above command to simulate the connections that dont work at the moment. Version of ICMP would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside icmp 172.26.0.100 8 0 8.8.8.8&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could naturally make sure you have ICMP Inspection enabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could issue commands like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I cant see your &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; configurations I can't tell if they are already configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Nov 2013 12:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems-with-asa5505/m-p/2378872#M309302</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-08T12:56:38Z</dc:date>
    </item>
  </channel>
</rss>

