<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Please help ASA 8.6 version in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306366#M342579</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA should by default without any configurations accept ICMP on its interface to my understanding&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the output of &lt;STRONG&gt;"show arp"&lt;/STRONG&gt; and see if you can see the IP address (and the MAC address) of the host/router you are trying to ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Sep 2013 07:34:27 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-09-24T07:34:27Z</dc:date>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306365#M342578</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using ASA 5525 with 8.6 version, and I am trying to ping through different interfaces, However I am not able to do that. My test results are &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - can PING between the outside interface and the next hop (same subnet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - cannot PING between the inside interface and the next hop (same subnet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - cannot PING between the DMZ interface and the next hop (same subnet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see below configuration for firewall for reference.&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 16.x.x.x 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.16&lt;/P&gt;&lt;P&gt; vlan 16&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 17.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3.69&lt;/P&gt;&lt;P&gt; vlan 69&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 18.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list o_inside extended permit icmp any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list o_inside extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list o_inside extended permit icmp 17.x.x.x (Inside interface) 255.255.0.0 18.x.x.x (DMZ interface) 255.255.255.0&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list o_inside extended permit icmp 17.x.x.x (Inside interface) 255.255.0.0 18.x.x.x (DMZ interface) 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list o_dmz extended permit icmp any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list outside extended permit icmp any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list outside extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp permit any outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp permit any dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route inside 17.x.0.0 (Whole inside interface subnet) 255.255.0.0 17.x.x.x (Internal Network) 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route dmz 17.x.x.0 (Internal) 255.255.255.0 18.x.x.x (DMZ Nework) 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route outside 18.x.x.0 (DMZ) 255.255.255.0 16.x.x.x (Outside Network) 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If possible could anyone please tell me what is wrong with the configuration, and what I need to add to achive the above desired result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Rohit Mangotra.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:42:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306365#M342578</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2019-03-12T02:42:28Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306366#M342579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA should by default without any configurations accept ICMP on its interface to my understanding&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the output of &lt;STRONG&gt;"show arp"&lt;/STRONG&gt; and see if you can see the IP address (and the MAC address) of the host/router you are trying to ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2013 07:34:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306366#M342579</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-24T07:34:27Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306367#M342580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can not see any entry in ARP table on firewall. From ASA I can only ping outside interface and only that enrtry is there in firewall. Any ideas what I am doing wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Rohit Mangotra.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2013 08:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306367#M342580</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2013-09-24T08:29:43Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306368#M342581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are saying that after you ping the internal gateway/nexthop IP address and there is no ARP for it with the &lt;STRONG&gt;"show arp" &lt;/STRONG&gt;command on the ASA then it would seem you have a problem with the connection between the ASA and the nexthop device/router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if nothing else worked you should see the nexthop IP address/MAC address in the ARP table of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2013 13:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306368#M342581</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-24T13:03:54Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306369#M342582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for all your help! I am a bit confused about the static nating for ASA 8.6. I will really appreciate, if you could please see how I can convert it into new ASA 5525 x version 8.6.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 200.190.70.85 192.168.1.85 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.1.85 192.168.1.85 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 200.190.70.87 192.168.1.56 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 172.16.0.0 172.16.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Rohit Mangotra.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Oct 2013 08:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306369#M342582</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2013-10-01T08:51:46Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306370#M342583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Were you able to solve the original problems that you posted about? Since it seemed there was some problems with the ASAs connectivity to the rest of the network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 4 &lt;STRONG&gt;"static"&lt;/STRONG&gt; configurations you have above are pretty basic but 2 of them are &lt;STRONG&gt;Static Identity NAT&lt;/STRONG&gt; configurations that you probably wont need in the new software&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below 2 configurations probably wont need any corresponding configuration in the new ASA/software since the traffic should go through wihtout NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (dmz,inside) 192.168.1.85 192.168.1.85 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,dmz) 172.16.0.0 172.16.0.0 netmask 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below &lt;STRONG&gt;Static NAT&lt;/STRONG&gt; configurations you can easily convert using Auto NAT / Network Object NAT. Use &lt;STRONG&gt;"object"&lt;/STRONG&gt; names that describe the setup better, I will use generic &lt;STRONG&gt;"object"&lt;/STRONG&gt; names.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (dmz,outside) 200.190.70.87 192.168.1.56 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (dmz,outside) 200.190.70.85 192.168.1.85 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.56&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (dmz,outside) static 200.190.70.87&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.85&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (dmz,outside) static 200.190.70.85&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Oct 2013 09:03:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306370#M342583</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-01T09:03:47Z</dc:date>
    </item>
    <item>
      <title>Re: Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306371#M342585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for all your help. Yes, previous connection issue was resolved. Currently, we have an issue of accessing via web (http port 80) from inside network to dmz server,&amp;nbsp; however I am able to do sucessful pings to dmz server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If possible could you please have a look at my firewall code (NAT) which I changed according to your recomendation. Once again I am really thankful for all your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 03:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306371#M342585</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2013-10-02T03:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306372#M342589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question if its ok &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can we test outside network can access DMZ server in order to test NAT actually works?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Rohit Mangotra.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 03:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306372#M342589</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2013-10-02T03:45:58Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306373#M342591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a quick glance it would seem to me that the converted configurations would be correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its harder to say without really looking into the original configurations compared to for example situations where I know the environment beforehand &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess your best bet to find possible problems with the ASA configurations is to use the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would tell you if some traffic is getting blocked by ACL or if the traffic is failing because of NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For a connection coming from behind &lt;STRONG&gt;"outside"&lt;/STRONG&gt; you can use this format of the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp &lt;SOURCE ip=""&gt; 12345 &lt;SERVER nat="" ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/SERVER&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To test anything else you naturally just switch the &lt;STRONG&gt;"input &lt;INTERFACE name=""&gt;"&lt;/INTERFACE&gt;&lt;/STRONG&gt; to the one where the traffic is sourced from. You will naturally also have to check whether you need to use &lt;STRONG&gt;"tcp"&lt;/STRONG&gt; or &lt;STRONG&gt;"udp"&lt;/STRONG&gt; and also select a source/destination IP/port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Taking the output of the following commands should help you troubleshoot possible problems&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could take &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command output of both of the above mentioned cases. For example testing connectivity from &lt;STRONG&gt;"outside"&lt;/STRONG&gt; to the &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; server. And the previous problem with testing connection from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 09:23:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306373#M342591</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-02T09:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306374#M342593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Hi Jouni,&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;If possible could you please confirm that the following configuration is not needed to add into new ASA 8.6? Sorry for asking too much.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: red;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (inside,dmz) 172.16.5.131 172.16.5.131 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (inside,dmz) 172.16.0.0 172.16.0.0 netmask 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (dmz,inside) 192.168.1.73 192.168.1.73 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (dmz,inside) 192.168.1.84 192.168.1.84 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (dmz,inside) 192.168.1.85 192.168.1.85 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (dmz,inside) 192.168.1.86 192.168.1.86 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (dmz,inside) 192.168.1.89 192.168.1.89 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (dmz,inside) 192.168.1.91 192.168.1.91 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (dmz,vpn_private) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (dmz,vpn_public) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (dmz,inside) 192.168.1.140 192.168.1.140 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (inside,vpn_private) 172.16.0.0 172.16.0.0 netmask 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (inside,vpn_public) 172.16.0.0 172.16.0.0 netmask 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (vpn_private,inside) 172.31.0.0 172.31.0.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (vpn_public,inside) 200.161.67.176 200.161.67.176 netmask 255.255.255.240&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt;static (vpn_public,outside) 200.161.67.176 200.161.67.176 netmask 255.255.255.240&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG style="mso-bidi-font-weight: normal;"&gt; &lt;/STRONG&gt; &lt;/P&gt;&lt;P class="MsoNormal"&gt;--------------------------------------------------------------------------------------&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;nat (management) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Any suggestion with this one ???&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Thank You,&lt;/P&gt;&lt;P class="MsoNormal"&gt;Kind Regards&lt;/P&gt;&lt;P class="MsoNormal"&gt;Rohit.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: red;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Oct 2013 01:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306374#M342593</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2013-10-03T01:51:18Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306375#M342594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well your original NAT configuration is not quite how I would configure the NAT to begin with so it might be that you would need some of the above configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mainly because you were doing Dynamic PAT from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"dmz"&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this was true and you removed the above &lt;STRONG&gt;"static"&lt;/STRONG&gt; commands that refer to &lt;STRONG&gt;"(inside,dmz)"&lt;/STRONG&gt; then you wouldnt be able to connect from &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; to those &lt;STRONG&gt;"inside"&lt;/STRONG&gt; IP addresses (of those static commands). This is the main reason why I never configure Dynamic PAT between local interfaces. It causes complexity for the NAT configurations when you have to add extra NAT configurations to override the possible problems caused by the Dynamic PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the &lt;STRONG&gt;"management"&lt;/STRONG&gt; interface you probably need any new NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest its a bit hard to say the exact configuration that are needed and which are not but I think the Dynamic PAT from &lt;STRONG&gt;"inside" to "dmz"&lt;/STRONG&gt; means that you would need some Static Identity NAT configuration mentioned above also in the new software otherwise the ASA would drop the connection attempts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Oct 2013 07:33:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306375#M342594</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-03T07:33:51Z</dc:date>
    </item>
    <item>
      <title>Re: Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306376#M342595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply. If we change the current static NAT (Version 7.1) to the new NAT(Version 8.6) will it work? Is there any potential problem in this new configuration. Could you please check the code for VPN at the end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ------ static (dmz,inside) 192.168.1.73 192.168.1.73 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt; object network obj-192.168.1.73-dmz-inside&lt;/P&gt;&lt;P&gt; host 192.168.1.73&lt;/P&gt;&lt;P&gt; nat (dmz,inside) static 192.168.1.73&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ----- static (dmz,inside) 192.168.1.84 192.168.1.84 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt; object network obj-192.168.1.84-dmz-inside&lt;/P&gt;&lt;P&gt; host 192.168.1.84&lt;/P&gt;&lt;P&gt; nat (dmz,inside) static 192.168.1.84&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---- static (dmz,inside) 192.168.1.85 192.168.1.85 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt; object network obj-192.168.1.85-dmz-inside&lt;/P&gt;&lt;P&gt; host 192.168.1.85&lt;/P&gt;&lt;P&gt; nat (dmz,inside) static 192.168.1.85&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---- static (dmz,inside) 192.168.1.86 192.168.1.86 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-192.168.1.86-dmz-inside&lt;/P&gt;&lt;P&gt; host 192.168.1.86&lt;/P&gt;&lt;P&gt; nat (dmz,inside) static 192.168.1.86&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; static (dmz,inside) 192.168.1.89 192.168.1.89 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt; object network obj-192.168.1.89-dmz-inside&lt;/P&gt;&lt;P&gt; host 192.168.1.89&lt;/P&gt;&lt;P&gt; nat (dmz,inside) static 192.168.1.89&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ---- static (dmz,inside) 192.168.1.91 192.168.1.91 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-192.168.1.91-dmz-inside&lt;/P&gt;&lt;P&gt; host 192.168.1.91&lt;/P&gt;&lt;P&gt; nat (dmz,inside) static 192.168.1.91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- static (dmz,inside) 192.168.1.140 192.168.1.140 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-192.168.1.140-dmz-inside&lt;/P&gt;&lt;P&gt; host 192.168.1.140&lt;/P&gt;&lt;P&gt; nat (dmz,inside) static 192.168.1.140&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; --- static (inside,dmz) 172.16.0.0 172.16.0.0 netmask 255.255.0.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-172.16.0.0-inside-dmz&lt;/P&gt;&lt;P&gt; subnet 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; nat (inside,dmz) static 172.16.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- static (inside,dmz) 172.16.5.131 172.16.5.131 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt; object network obj-172.16.5.131-inside-dmz&lt;/P&gt;&lt;P&gt; host 172.16.5.131&lt;/P&gt;&lt;P&gt; nat (inside,dmz) static 172.16.5.131&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; --- static (dmz,vpn_private) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-192.168.1.0-dmz-vpn-pri&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; nat (dmz,vpn_private) static 192.168.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- static (dmz,vpn_public) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-192.168.1.0-dmz-vpn-pub&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; nat (dmz,vpn_public) static 192.168.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; --- static (vpn_private,inside) 172.31.0.0 172.31.0.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-172.31.0.0-vpn-pri-inside&lt;/P&gt;&lt;P&gt; subnet 172.31.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; nat (inside,vpn_private) static 172.31.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- static (inside,vpn_private) 172.16.0.0 172.16.0.0 netmask 255.255.0.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-172.16.0.0-inside-vpn-pri&lt;/P&gt;&lt;P&gt; subnet 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; nat (inside,vpn_private) static 172.16.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; --- static (vpn_public,outside) 200.161.67.176 200.161.67.176 netmask 255.255.255.240 &lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-200.161.67.176-vpn-pub-outside&lt;/P&gt;&lt;P&gt; subnet 200.161.67.176 255.255.255.240&lt;/P&gt;&lt;P&gt; nat (vpn_public,outside) static 200.161.67.176&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- static (inside,vpn_public) 172.16.0.0 172.16.0.0 netmask 255.255.0.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-172.16.0.0-inside-vpn-pub&lt;/P&gt;&lt;P&gt; subnet 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; nat (inside,vpn_public) static 172.16.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- static (vpn_public,inside) 200.161.67.176 200.161.67.176 netmask 255.255.255.240 &lt;/P&gt;&lt;P&gt;&amp;nbsp; object network obj-200.161.67.176-vpn-pub-inside&lt;/P&gt;&lt;P&gt; subnet 203.161.67.176 255.255.255.240&lt;/P&gt;&lt;P&gt; nat (vpn_public,inside) static 200.161.67.176&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notes:&amp;nbsp;&amp;nbsp; VPN private subnet = 172.31.0.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VPN public subnet&amp;nbsp; = 200.161.67.176/28&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside subnet&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 172.16.0.0/16&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dmz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subnet&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 192.168.1.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for all your help&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Rohit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Oct 2013 09:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306376#M342595</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2013-10-03T09:07:13Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306377#M342596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you might be fine with any of those Static Identity NAT configurations if you wouldnt use this Dynamic PAT configuration between &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,dmz) after-auto source dynamic inside-pat-source dmz-pat-global&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a particular reason that you want all traffic from&lt;STRONG&gt; "inside"&lt;/STRONG&gt; to the &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; to be visible with an IP address beloging to &lt;STRONG&gt;"dmz"&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general when I migrate 8.2 (or lower) firewall configurations to a newer platform and software I only have to migrate the Dynamic PAT, Static NAT, NAT0 and possible Policy NAT configurations while leaving all Static Identity NAT configurations off the new configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I have said before in this discussion. I think if you were to remove the Dynamic PAT from &lt;STRONG&gt;"inside" to "dmz"&lt;/STRONG&gt; then you should be safe to remove all the Static Identity NAT configurations from the new configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if you left the Dynamic PAT between &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; then I think you could still leave out the Static Identity NAT configuration regarding other interfaces (Static Indentity NAT configurations that have interfaces OTHER THAN &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interfaces mentioned)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Oct 2013 10:51:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306377#M342596</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-03T10:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306378#M342598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot Jouni. Really appraciate your help. The code is working fine now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Oct 2013 06:16:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306378#M342598</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2013-10-07T06:16:35Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306379#M342599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to hear its working &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you end up using all the converted configurations or did you leave out any of the old configurations?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Oct 2013 06:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306379#M342599</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-07T06:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306380#M342601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for late reply, actually was busy with the ongoing project.We converted the configuration as you recomended, and it is working except for 1 issue that we are facing. Please see attached file for more information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;•-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Can PING from internal network to VPN concentrator Private interface&lt;/LI&gt;&lt;LI&gt;•-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Can PING from DMZ network to VPN concentrator Private interface&lt;/LI&gt;&lt;LI&gt;•-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Can PING from external network to VPN concentrator Public interface&lt;/LI&gt;&lt;LI&gt;•-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Can PING from VPN concentrator to Internal network&lt;/LI&gt;&lt;LI&gt;•-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Can PING from VPN concentrator to DMZ network&lt;/LI&gt;&lt;LI&gt;•-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Can PING from VPN concentrator to Outside network&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;•-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cannot PING from internal network to VPN concentrator Public interface&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 36.0pt;"&gt;(can see PING traffics hit the FW’s ACL when PINGING from internal network)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;•-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cannot PING from DMZ network to VPN concentrator Public interface&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 36.0pt;"&gt;(can see PING traffics hit the FW’s ACL when PINGING from DMZ network)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks a lot in advance&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Rohit.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 05:38:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306380#M342601</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2013-10-25T05:38:00Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306381#M342603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output for the PING from INTERNAL to VPN CONCENTRATOR PUBLIC and from DMZ to VPN CONCENTRATOR PUBLIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside icmp &lt;SOURCE ip=""&gt; 8 0 &lt;VPN concentrator="" public="" ip=""&gt;&lt;/VPN&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input dmz icmp &lt;SOURCE ip=""&gt; 8 0 &lt;VPN concentrator="" public="" ip=""&gt;&lt;/VPN&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should tell us if the ASA configurations are fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 06:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306381#M342603</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-25T06:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306382#M342604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see the attached file for Packet-Tracker as you asked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Rohit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 06:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306382#M342604</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2013-10-25T06:42:20Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306383#M342607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to go through just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has this worked before change?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was just thinking how you have setup routing on the VPN Concentrator. The default route on the concentrator should forward the ICMP Echo reply through its public interface UNLESS you have routed the INSIDE and DMZ network through the concentrators private interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 07:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306383#M342607</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-25T07:01:01Z</dc:date>
    </item>
    <item>
      <title>Please help ASA 8.6 version</title>
      <link>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306384#M342608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for all your help. I will have a look at the vpn concentrator and see what's going on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Rohit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 08:52:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-asa-8-6-version/m-p/2306384#M342608</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2013-10-25T08:52:19Z</dc:date>
    </item>
  </channel>
</rss>

