<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How do I get traceroutes to work through ASA? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315831#M310613</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is right, as we are on 8.2 I have to add a NAT exempt so I keep my source IP.&amp;nbsp; The 172.30.2.0/24 subnet is just one example , 172.30.2.0/24 does have a route to 192.168.90.0/24 as I can ping everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA has a route to a local Cisco router that is our WAN router.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Oct 2013 14:30:37 GMT</pubDate>
    <dc:creator>Andy White</dc:creator>
    <dc:date>2013-10-22T14:30:37Z</dc:date>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315818#M310596</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a number of networks that go though our ASA, but we have never been able to run a traceroute even though we have ICMP any any running on each inerface.&amp;nbsp; When we try a tracert from a Windows PC to a remote destination like google it works, but if we try a trace through one of the subinterfaces off the ASA (DMZ) it doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example I try and trace a router on our WAN and it goes to our LAN switch which then forwards to the ASA and then it his a wall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\Users\me&amp;gt;tracert 172.30.2.1 (remote WAN router)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;Tracing route to 172.30.2.1 over a maximum of 30 hop&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp; 192.168.90.254 (my gateway, whichis our core LAN switch)&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request timed out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've never been able to solve this, any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315818#M310596</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2019-03-12T02:54:30Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315819#M310598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the output of the following command on your ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run policy-map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If its not present, add (if you are using the default configurations)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also check this document to help with ICMP related configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 07:35:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315819#M310598</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T07:35:38Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315820#M310600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the instant reply wow!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I have, I think I most of it is our IPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; sh run policy-map&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ils&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; flow-export event-type all destination 192.168.28.136&lt;/P&gt;&lt;P&gt;policy-map ME-DMZ6-IPS-POLICY&lt;/P&gt;&lt;P&gt; class ME-DMZ6-CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;policy-map ME-DMZ4-IPS-POLICY&lt;/P&gt;&lt;P&gt; class ME-DMZ4-CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;policy-map ME-OUTSIDE-IPS-POLICY&lt;/P&gt;&lt;P&gt; class ME-OUTSIDE-CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;policy-map ME-DIGI-WAN-IPS-POLICY&lt;/P&gt;&lt;P&gt; class ME-DIGI-WAN-CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;policy-map ME-DIGI-SYSTEMS-IPS-POLICY&lt;/P&gt;&lt;P&gt; class ME-DIGI-SYSTEMS-CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;policy-map ME-REC-IPS-POLICY&lt;/P&gt;&lt;P&gt; class ME-REC-CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;policy-map ME-DMZ10-IPS-CLASS&lt;/P&gt;&lt;P&gt; class ME-DMZ10-CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips inline fail-open sensor vs0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I can just add what you put above?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 07:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315820#M310600</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2013-10-22T07:44:08Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315821#M310602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You already seem to have the both ICMP Inspections enabled in the above configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure you have added the ACL rules to your external interface ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; line 1 remark ICMP&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; line 2 permit icmp any any echo-reply &lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; line 3 permit icmp any any time-exceeded &lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; line 4 permit icmp any any unreachable &lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 07:50:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315821#M310602</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T07:50:59Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315822#M310603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just added those to the inside interface &lt;SPAN style="font-size: 10pt;"&gt;(where I am) &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;and DMZ6 where 172.30.2.1 is and no luck.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;This is what I see (sorry I use the ASDM but am learnig the CLI more):&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ6_WAN_access_in line 137 extended permit object-group DM_INLINE_SERVICE_36 any any 0xeba5b318&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list DMZ6_WAN_access_in line 137 extended permit icmp any any (hitcnt=4884) 0xf1f06367&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list DMZ6_WAN_access_in line 137 extended permit icmp any any echo-reply (hitcnt=0) 0x0afc9265&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list DMZ6_WAN_access_in line 137 extended permit icmp any any time-exceeded (hitcnt=0) 0x36a14417&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list DMZ6_WAN_access_in line 137 extended permit icmp any any unreachable (hitcnt=0) 0x3140b5ca&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in line 292 extended permit object-group DM_INLINE_SERVICE_37 any any 0x5d4fd23c&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_access_in line 292 extended permit icmp any any (hitcnt=6751) 0xd6183fb5&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_access_in line 292 extended permit icmp any any echo-reply (hitcnt=0) 0xb2f4960f&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_access_in line 292 extended permit icmp any any time-exceeded (hitcnt=0) 0x64438bdb&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_access_in line 292 extended permit icmp any any unreachable (hitcnt=0) 0xa5dece3d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 08:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315822#M310603</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2013-10-22T08:12:25Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315823#M310605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These should be added to the interface ACL that is attached to your ASA interface thats connected to the Internet. These ACL rules allow the reply messages from devices between the path to the device to which you are tracing the route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 08:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315823#M310605</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T08:17:38Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315824#M310606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same issue, athough the WAN link isn't over the internet.&amp;nbsp; I can do traces already to sites over the internet for example to google.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Off the ASA I have a trunk to a 3750 which has all the VLANs to these WAN sites and other VLANs and none can be traced, pings are fine.&amp;nbsp; I have to create subinterfaces off the ASA and add them to the trunk, I assume it is the ASA, but maybe not now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 08:32:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315824#M310606</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2013-10-22T08:32:08Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315825#M310607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest I am not sure I can see what the problem is with the above information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The already provided commands and link to the document is usually the ones required to get this working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can always test ICMP through ASA with &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command to check that the initial direction to your destination network/host is atleast allowed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;INPUT interface="" nameif="" /&gt; icmp &lt;SOURCE ip=""&gt; 8 0 &lt;DESTINATION ip=""&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 09:17:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315825#M310607</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T09:17:13Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315826#M310608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the results,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: DMZ6_WAN&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just put a laptop on the otherside of the ASA just to prove the trace works to the WAN router and it did, so it definately is the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh well, thanks for you time on this it was most appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 13:04:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315826#M310608</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2013-10-22T13:04:34Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315827#M310609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure if the above partial output tells me anything. And I am not sure of at the actual network layout and where the source and destination are with regards to it and what configurations/rules are applied to the traffic between them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA itself doesnt show up in the traceroute by default. That can be changed with the instructions on the document I linked. Though I usually leave the ASAs at their default setting regarding this that they dont show up in the traceroute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also monitor the logs while doing the traceroute for example through the ASDM and see if ASA is blocking any of the replys from the devices behind the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 13:10:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315827#M310609</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T13:10:28Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315828#M310610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the lack of output this is what I got:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I upped the logging level, but didn't get anything show as blocked on my syslog server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; packet-tracer input inside icmp 192.168.90.11 8 0 172.30.2.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 172.30.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; DMZ6_WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.90.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_37 any any&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_37&lt;/P&gt;&lt;P&gt; service-object icmp&lt;/P&gt;&lt;P&gt; service-object icmp echo-reply&lt;/P&gt;&lt;P&gt; service-object icmp time-exceeded&lt;/P&gt;&lt;P&gt; service-object icmp unreachable&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type:&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host 192.168.90.11 DMZ6_WAN 172.30.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 236539, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any DMZ6_WAN any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 21268, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (81.171.56.166 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 105683296, untranslate_hits = 13170795&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (DMZ6_WAN) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip DMZ6_WAN any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (81.171.56.166 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 6954867, untranslate_hits = 951791&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 13&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 1912800586, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: DMZ6_WAN&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 13:40:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315828#M310610</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2013-10-22T13:40:37Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315829#M310611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the way to allow traceroute through the ASA firewall: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Enable TTL decrement:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; policy-map global_policy &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; set connection decrement-ttl &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Adjust icmp timeouts:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; icmp unreachable rate-limit 5 burst-size 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;On interface access-lists permit UDP packets:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside-in permit udp any any gt 33433.&amp;nbsp; (or range 33434 to 33464)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Peter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 13:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315829#M310611</guid>
      <dc:creator>ppejjorgensen</dc:creator>
      <dc:date>2013-10-22T13:58:46Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315830#M310612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your full output of the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; would indicate that there is a NAT0 configuration that is applied to this traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words the source address 192.168.90.11 will not be NATed when connecting towards subnet 172.30.2.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the hosts on subnet 172.30.2.0/24 have a route to reach network 192.168.90.0/24 through the ASA? (since there is no NAT configured for the network 192.168.90.0/24) Or is the subnet 172.30.2.0/24 perhaps directly connected to the ASA and the ASA is set as the default gateway out of that network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 14:24:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315830#M310612</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T14:24:14Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315831#M310613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is right, as we are on 8.2 I have to add a NAT exempt so I keep my source IP.&amp;nbsp; The 172.30.2.0/24 subnet is just one example , 172.30.2.0/24 does have a route to 192.168.90.0/24 as I can ping everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA has a route to a local Cisco router that is our WAN router.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 14:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315831#M310613</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2013-10-22T14:30:37Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315832#M310614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Get this error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(config)# class class-default&lt;/P&gt;&lt;P&gt;ERROR: % class-default is a well-known class and is not configurable under class-map&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 14:31:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315832#M310614</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2013-10-22T14:31:49Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315833#M310615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I read that using &lt;SPAN style="font-size: 10pt;"&gt;icmp fixup and icmp fixup error has worked, is this included under the default icmp inspect as I can't find this?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 14:42:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315833#M310615</guid>
      <dc:creator>Andy White</dc:creator>
      <dc:date>2013-10-22T14:42:58Z</dc:date>
    </item>
    <item>
      <title>How do I get traceroutes to work through ASA?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315834#M310616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below configuration commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;are the old command format which is still supported but in newer software they will be converted to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which were already in your configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 14:53:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-get-traceroutes-to-work-through-asa/m-p/2315834#M310616</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T14:53:54Z</dc:date>
    </item>
  </channel>
</rss>

