<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA 5515-x multiple public IP address blocks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242077#M347849</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Shelley,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear everything is working now &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dont hesitate to ask here on CSC if something else comes along with the new firewall and its configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for marking the correct answers &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Jun 2013 07:21:03 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-06-28T07:21:03Z</dc:date>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242054#M347821</link>
      <description>&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;I am trying to install a new ASA 5515-x (OS 9.1) firewall in place of our old PIX 515-E (OS 6.4)&amp;nbsp; firewall and I am having some difficulties.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been reading through the forum and I have found other people who are having issues with multiple public IP address blocks on their ASA appliances, but I tried adding arp permit-nonconnected as suggested and it didn't fix the problem.&amp;nbsp; I am wondering now if there is something else wrong with my config and I'm hoping that someone here can help me with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My two public IP blocks are x.x.131.212 255.255.255.248 and y.y.56.200 255.255.255.248&lt;/P&gt;&lt;P&gt;My internal network is 10.0.0.x&lt;/P&gt;&lt;P&gt;The DMZ is 192.168.40.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The parts I'm concerned about are the NATing and the ACLs.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gw(config)# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.1(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname gw&lt;/P&gt;&lt;P&gt;domain-name ****.ca&lt;/P&gt;&lt;P&gt;enable password **** encrypted&lt;/P&gt;&lt;P&gt;passwd **** encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.0.0.3 AS400&lt;/P&gt;&lt;P&gt;name 10.0.0.27 DC-01&lt;/P&gt;&lt;P&gt;name 10.0.0.25 FS-01&lt;/P&gt;&lt;P&gt;name 10.0.0.26 FS-01-26&lt;/P&gt;&lt;P&gt;name 10.0.0.18 Faxserver&lt;/P&gt;&lt;P&gt;name 10.0.0.36 SpamFilter&lt;/P&gt;&lt;P&gt;name 10.0.0.5 WebFilter&lt;/P&gt;&lt;P&gt;name 192.168.40.213 VS-02&lt;/P&gt;&lt;P&gt;name 10.0.0.73 APP-02&lt;/P&gt;&lt;P&gt;name 10.0.0.72 APP-01&lt;/P&gt;&lt;P&gt;name 10.0.0.70 VS-01&lt;/P&gt;&lt;P&gt;name 192.168.40.218 WEB-02&lt;/P&gt;&lt;P&gt;name x.x.131.114 WEB-02_OUTSIDE&lt;/P&gt;&lt;P&gt;ip local pool Remote_Address 10.0.5.10-10.0.5.100 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address x.x.131.114 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.0.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.2&lt;/P&gt;&lt;P&gt;vlan 2&lt;/P&gt;&lt;P&gt;nameif VOIP&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.0.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;security-level 4&lt;/P&gt;&lt;P&gt;ip address 192.168.40.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone MST -7&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name firstcanadian.ca&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network AS400&lt;/P&gt;&lt;P&gt;host 10.0.0.3&lt;/P&gt;&lt;P&gt;object network FS-01&lt;/P&gt;&lt;P&gt;host 10.0.0.25&lt;/P&gt;&lt;P&gt;object network Exchange&lt;/P&gt;&lt;P&gt;host 10.0.0.35&lt;/P&gt;&lt;P&gt;object network APP-01&lt;/P&gt;&lt;P&gt;host 10.0.0.72&lt;/P&gt;&lt;P&gt;object network SpamFilter&lt;/P&gt;&lt;P&gt;host 10.0.0.36&lt;/P&gt;&lt;P&gt;object network WEB-02&lt;/P&gt;&lt;P&gt;host 192.168.40.218&lt;/P&gt;&lt;P&gt;object network WEB-02_outside&lt;/P&gt;&lt;P&gt;host 67.226.131.114&lt;/P&gt;&lt;P&gt;object network DMZ_IP_RANGE&lt;/P&gt;&lt;P&gt;subnet 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network inside_IP_RANGE&lt;/P&gt;&lt;P&gt;subnet 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network VOIP_IP_RANGE&lt;/P&gt;&lt;P&gt;subnet 10.0.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_10.0.5.0_25&lt;/P&gt;&lt;P&gt;subnet 10.0.5.0 255.255.255.128&lt;/P&gt;&lt;P&gt;object network Remote_inside_drs&lt;/P&gt;&lt;P&gt;subnet 10.0.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_10.0.0.0_24&lt;/P&gt;&lt;P&gt;subnet 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Remote_inside_drs_DMZ&lt;/P&gt;&lt;P&gt;subnet 192.168.41.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service Mail tcp&lt;/P&gt;&lt;P&gt;description "Allow Mail Traffic from Outside"&lt;/P&gt;&lt;P&gt;port-object eq https&lt;/P&gt;&lt;P&gt;port-object eq 8080&lt;/P&gt;&lt;P&gt;port-object eq 444&lt;/P&gt;&lt;P&gt;port-object eq 465&lt;/P&gt;&lt;P&gt;port-object eq 995&lt;/P&gt;&lt;P&gt;port-object eq 993&lt;/P&gt;&lt;P&gt;port-object eq 587&lt;/P&gt;&lt;P&gt;port-object eq imap4&lt;/P&gt;&lt;P&gt;port-object eq pop3&lt;/P&gt;&lt;P&gt;object-group service WebAccess tcp&lt;/P&gt;&lt;P&gt;description "Allow Web Traffic to Web Service"&lt;/P&gt;&lt;P&gt;port-object eq www&lt;/P&gt;&lt;P&gt;port-object eq https&lt;/P&gt;&lt;P&gt;object-group service CA400_ODBC tcp&lt;/P&gt;&lt;P&gt;description "Allow traffic from WEB-02 to AS400"&lt;/P&gt;&lt;P&gt;port-object eq 446&lt;/P&gt;&lt;P&gt;object-group service Spamfilter tcp&lt;/P&gt;&lt;P&gt;description "Allow Mail Traffic to the Spamfilter"&lt;/P&gt;&lt;P&gt;port-object eq smtp&lt;/P&gt;&lt;P&gt;port-object eq ssh&lt;/P&gt;&lt;P&gt;object-group service IntWebApp tcp&lt;/P&gt;&lt;P&gt;description "Allow Internal Traffic from WEB-02 to APP-01"&lt;/P&gt;&lt;P&gt;port-object eq 8383&lt;/P&gt;&lt;P&gt;object-group icmp-type PingTraffic&lt;/P&gt;&lt;P&gt;description "Allow Echo Echo-Reply Unreachable and Time-Exceeded Traffic"&lt;/P&gt;&lt;P&gt;icmp-object echo&lt;/P&gt;&lt;P&gt;icmp-object echo-reply&lt;/P&gt;&lt;P&gt;icmp-object unreachable&lt;/P&gt;&lt;P&gt;icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;access-list ACL_OUT remark Allow Echo, Echo-Reply, Unreachable and Time-Exceeded on Outside&lt;/P&gt;&lt;P&gt;access-list ACL_OUT extended permit icmp any x.x.131.0 255.255.255.0 object-group PingTraffic log&lt;/P&gt;&lt;P&gt;access-list ACL_OUT remark Allow Echo, Echo-Reply, Unreachable and Time-Exceeded on Outside&lt;/P&gt;&lt;P&gt;access-list ACL_OUT extended permit icmp any y.y.56.0 255.255.255.0 object-group PingTraffic log&lt;/P&gt;&lt;P&gt;access-list ACL_OUT remark "Allow Ping to WEB-02 on Outside"&lt;/P&gt;&lt;P&gt;access-list ACL_OUT extended permit icmp any object WEB-02 object-group PingTraffic log&lt;/P&gt;&lt;P&gt;access-list ACL_OUT remark "Allow HTTP and HTTPS to WEB-02_outside"&lt;/P&gt;&lt;P&gt;access-list ACL_OUT extended permit tcp any object WEB-02 object-group WebAccess log&lt;/P&gt;&lt;P&gt;access-list ACL_OUT remark "Allow Mail Traffic from Outside to Exchange"&lt;/P&gt;&lt;P&gt;access-list ACL_OUT extended permit tcp any object Exchange object-group Mail log&lt;/P&gt;&lt;P&gt;access-list ACL_OUT remark "Allow Mail Traffic from Outside to SpamFilter"&lt;/P&gt;&lt;P&gt;access-list ACL_OUT extended permit tcp any object SpamFilter object-group Spamfilter log&lt;/P&gt;&lt;P&gt;access-list ACL_OUT remark "Allow Hosts in DMZ to Browse Internet"&lt;/P&gt;&lt;P&gt;access-list ACL_OUT extended permit udp object WEB-02 any eq domain log&lt;/P&gt;&lt;P&gt;access-list ACL_OUT remark "Allow Site to Site VPN Traffic"&lt;/P&gt;&lt;P&gt;access-list ACL_OUT extended permit esp any 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list ACL_OUT extended permit udp any eq 4500 10.0.0.0 255.255.255.0 eq 4500&lt;/P&gt;&lt;P&gt;access-list ACL_OUT extended permit udp any eq isakmp 10.0.0.0 255.255.255.0 eq isakmp&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ remark "Allow echo,echo-reply,unreachable and time-exceeded on Outside"&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ extended permit icmp object DMZ_IP_RANGE any object-group PingTraffic log&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ remark "Allow FTP Access from DMZ to FS-01 on Inside"&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ extended permit tcp object WEB-02 object FS-01 eq ftp&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ remark "Allow Access from WEB-02 in DMZ to AS400"&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ extended permit tcp object WEB-02 object AS400 object-group CA400_ODBC&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ remark "Allow Access from WEB-02 in DMZ to FCIC-APP-01"&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ extended permit tcp object WEB-02 object APP-01 object-group IntWebApp&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ extended permit udp object DMZ_IP_RANGE any eq domain&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ extended permit tcp object DMZ_IP_RANGE any eq www&lt;/P&gt;&lt;P&gt;access-list ACL_DMZ extended permit tcp object DMZ_IP_RANGE any eq https&lt;/P&gt;&lt;P&gt;access-list Tunnel_Group_splitTunnelAcl standard permit 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_1 extended permit ip 10.0.0.0 255.255.255.0 object Remote_inside_drs&lt;/P&gt;&lt;P&gt;access-list Remote_splitTunnelAcl standard permit 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Remote_splitTunnelAcl standard permit 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn-access extended permit ip 192.168.40.0 255.255.255.0 10.0.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip 10.0.0.0 255.255.255.0 object Remote_inside_drs&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu VOIP 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static inside_IP_RANGE inside_IP_RANGE destination static NETWORK_OBJ_10.0.5.0_25 NETWORK_OBJ_10.0.5.0_25 no-proxy-arp&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static NETWORK_OBJ_10.0.0.0_24 NETWORK_OBJ_10.0.0.0_24 destination static Remote_inside_drs Remote_inside_drs no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network Exchange&lt;/P&gt;&lt;P&gt;nat (any,any) static y.y.56.204&lt;/P&gt;&lt;P&gt;object network SpamFilter&lt;/P&gt;&lt;P&gt;nat (any,any) static x.x.131.113&lt;/P&gt;&lt;P&gt;object network WEB-02&lt;/P&gt;&lt;P&gt;nat (any,any) static WEB-02_outside&lt;/P&gt;&lt;P&gt;object network DMZ_IP_RANGE&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network inside_IP_RANGE&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network VOIP_IP_RANGE&lt;/P&gt;&lt;P&gt;nat (VOIP,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group ACL_OUT in interface outside&lt;/P&gt;&lt;P&gt;access-group ACL_DMZ in interface DMZ&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt;passive-interface default&lt;/P&gt;&lt;P&gt;arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 y.y.56.206 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***crypto section removed to save space&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 192.168.0.99 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;username test password **** encrypted privilege 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*removed Tunnel info to save space&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum client auto&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;inspect ftp&lt;/P&gt;&lt;P&gt;inspect h323 h225&lt;/P&gt;&lt;P&gt;inspect h323 ras&lt;/P&gt;&lt;P&gt;inspect rsh&lt;/P&gt;&lt;P&gt;inspect rtsp&lt;/P&gt;&lt;P&gt;inspect esmtp&lt;/P&gt;&lt;P&gt;inspect sqlnet&lt;/P&gt;&lt;P&gt;inspect skinny&lt;/P&gt;&lt;P&gt;inspect sunrpc&lt;/P&gt;&lt;P&gt;inspect xdmcp&lt;/P&gt;&lt;P&gt;inspect sip&lt;/P&gt;&lt;P&gt;inspect netbios&lt;/P&gt;&lt;P&gt;inspect tftp&lt;/P&gt;&lt;P&gt;inspect ip-options&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;inspect http&lt;/P&gt;&lt;P&gt;inspect ipsec-pass-thru&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home reporting anonymous&lt;/P&gt;&lt;P&gt;password encryption aes&lt;/P&gt;&lt;P&gt;Cryptochecksum:****&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;gw(config)#&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:59:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242054#M347821</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2019-03-12T01:59:48Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242055#M347822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been reading through the discussion boards and have changed my ACLs to reflect the suggestions made in other discussions.&lt;/P&gt;&lt;P&gt;I want to allow some traffic from the DMZ to the Inside, Web traffic to my web server in the DMZ and Email traffic to my email servers on the inside.&amp;nbsp; I also want users on the inside and in the DMZ to be able to access the internet.&amp;nbsp; Can someone please give this a quick review and let me know if my rules look ok?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT remark "Allow Ping to WEB-02 on Outside"&lt;BR /&gt;access-list ACL_OUT extended permit icmp any object WEB-02 object-group PingTraffic log &lt;BR /&gt;access-list ACL_OUT remark "Allow HTTP and HTTPS to WEB-02_outside"&lt;BR /&gt;access-list ACL_OUT extended permit tcp any object WEB-02 object-group WebAccess log &lt;BR /&gt;access-list ACL_OUT extended permit icmp any object Exchange object-group PingTraffic &lt;BR /&gt;access-list ACL_OUT remark "Allow Mail Traffic from Outside to Exchange"&lt;BR /&gt;access-list ACL_OUT extended permit tcp any object Exchange object-group Mail log &lt;BR /&gt;access-list ACL_OUT extended permit icmp any object SpamFilter object-group PingTraffic &lt;BR /&gt;access-list ACL_OUT remark "Allow Mail Traffic from Outside to SpamFilter"&lt;BR /&gt;access-list ACL_OUT extended permit tcp any object SpamFilter object-group Spamfilter log &lt;BR /&gt;access-list ACL_OUT remark "Allow Site to Site VPN Traffic"&lt;BR /&gt;access-list ACL_OUT extended permit esp any 10.0.0.0 255.255.255.0 &lt;BR /&gt;access-list ACL_OUT extended permit udp any eq 4500 10.0.0.0 255.255.255.0 eq 4500 &lt;BR /&gt;access-list ACL_OUT extended permit udp any eq isakmp 10.0.0.0 255.255.255.0 eq isakmp &lt;/P&gt;&lt;P&gt;access-list ACL_DMZ remark "Allow FTP Access from DMZ to FS-01 on Inside"&lt;BR /&gt;access-list ACL_DMZ extended permit tcp object WEB-02 object FS-01 eq ftp &lt;BR /&gt;access-list ACL_DMZ remark "Allow Access from WEB-02 in DMZ to AS400"&lt;BR /&gt;access-list ACL_DMZ extended permit tcp object WEB-02 object AS400 object-group CA400_ODBC &lt;BR /&gt;access-list ACL_DMZ remark "Allow Access from WEB-02 in DMZ to APP-01"&lt;BR /&gt;access-list ACL_DMZ extended permit tcp object WEB-02 object APP-01 object-group IntWebApp &lt;BR /&gt;access-list ACL_DMZ extended permit tcp host 192.168.40.204 object FS-01 object-group DMZtoInsideDomainTCP &lt;BR /&gt;access-list ACL_DMZ extended permit udp host 192.168.40.204 object FS-01 object-group DMZtoInsideDomainUDP &lt;BR /&gt;access-list ACL_DMZ remark Deny all other access from DMZ to Inside&lt;BR /&gt;access-list ACL_DMZ extended deny ip 192.168.40.0 255.255.255.0 10.0.0.0 255.255.255.0 &lt;BR /&gt;access-list ACL_DMZ extended deny ip 192.168.40.0 255.255.255.0 10.0.10.0 255.255.255.0 &lt;BR /&gt;access-list ACL_DMZ remark Allow all other DMZ traffic out&lt;BR /&gt;access-list ACL_DMZ extended permit ip 192.168.40.0 255.255.255.0 any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 19:19:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242055#M347822</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2013-06-18T19:19:40Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242056#M347823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;We're putting the new ASA in tonight, so just to cover all of my bases, what routes do I need to have set up for the multiple public IP subnets?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address y.y.56.201 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp permit-nonconnected &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 y.y.56.206 1 (that is the gateway for the first subnet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to also route my second subnet to the outside IP of my ASA like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside x.x.131.212 255.255.255.248 y.y.56.201 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or should that traffic be routed out through my primary gateway of y.y.56.206 along with the rest of the traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance for any help you can give me!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 20:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242056#M347823</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2013-06-18T20:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242057#M347824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry I misread your intentions. I'll review our setup and see if I can shed some light. BTW: we have 1 5515 and several 5520's&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 01:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242057#M347824</guid>
      <dc:creator>Ron_Boyd57</dc:creator>
      <dc:date>2013-06-19T01:49:24Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242058#M347825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Ron!&amp;nbsp; Any help you can give me would be greatly appreciated.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 13:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242058#M347825</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2013-06-19T13:04:15Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242059#M347826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am a bit confused why I am seeing both &lt;STRONG&gt;"arp permit-nonconnected"&lt;/STRONG&gt; and &lt;STRONG&gt;"no arp permit-nonconnected"&lt;/STRONG&gt; in your configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your ISP has configured both public subnets on their gateway interface then the &lt;STRONG&gt;"arp permit-nonconnected"&lt;/STRONG&gt; should be enough to enable ARP to work so that the secondary nonconnected subnet can be used for NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should also check that you dont see the following in your configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sysopt noproxyarp outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can confirm this with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run all sysopt&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If&amp;nbsp; you see &lt;STRONG&gt;"no sysopt noproxyarp outside"&lt;/STRONG&gt; then everything should be fine. If you see &lt;STRONG&gt;"sysopt noproxyarp outside"&lt;/STRONG&gt; then you will have ARP problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I look at your NAT configurations its mostly seems OK. Though naturally I personally like to keep the naming of objects consistent and clear. The only real thing I would immediately change is the Static NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how you have configured NAT and how I would configure the NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;CURRENT CONFIGURATION&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static inside_IP_RANGE inside_IP_RANGE&amp;nbsp; destination static NETWORK_OBJ_10.0.5.0_25 NETWORK_OBJ_10.0.5.0_25&amp;nbsp; no-proxy-arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static&amp;nbsp; NETWORK_OBJ_10.0.0.0_24 NETWORK_OBJ_10.0.0.0_24 destination static&amp;nbsp; Remote_inside_drs Remote_inside_drs no-proxy-arp route-lookup&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network Exchange&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,any) static y.y.56.204&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SpamFilter&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,any) static x.x.131.113&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WEB-02&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,any) static WEB-02_outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DMZ_IP_RANGE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network inside_IP_RANGE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VOIP_IP_RANGE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (VOIP,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;MY CONFIGURATION&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;NAT0 CONFIGURATINS FOR VPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.0.5.0 255.255.255.128&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network INSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.0.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network REMOTE-SITE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.0.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static INSIDE INSIDE destination static VPN-POOL VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static INSIDE INSIDE destination static REMOTE-SITE REMOTE-SITE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;BASIC DYNAMIC PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DEFAULT-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.0.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.0.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.40.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;STATIC NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only want to NAT these servers to public IP address towards the "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network Exchange&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.0.0.35&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static y.y.56.204&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SpamFilter&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.0.0.36&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static x.x.131.113&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WEB-02&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.40.218&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (DMZ,outside) static x.x.131.114&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to NAT these servers to public IP address towards ANY interface on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network Exchange&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.0.0.35&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,any) static y.y.56.204&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SpamFilter&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.0.0.36&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,any) static x.x.131.113&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WEB-02&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.40.218&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (DMZ,any) static x.x.131.114&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I am also somewhat confused as you mention you have 2 public subnets. You mention the end part of the IP address and the network mask. But when I compare one of these to the end of the IP address on your "outside" interface they dont really match? I mean they cant belong to the same /29 subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you should first determine is that naturally the NAT configurations for the directly connected network configured to your &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface is working correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When this is done you should try to determine what is the situation with the secondary subnet that is not configured on any interface but rather as NAT IP addresses on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you could do is&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If you have Static NAT configured using one of the public IP addresses from the nonconnected network then attempt connections to it from the the Internet.&lt;/LI&gt;&lt;LI&gt;Then issue the command &lt;STRONG&gt;"show arp | inc outside"&lt;/STRONG&gt; and look if you can see any ARP table markings for that public secondary subnet. The ISPs gateway IP addresses IP/MAC should be visible in the command output IF the ASA is populating its ARP table with the nonconnected networks IP addresses.&lt;/LI&gt;&lt;LI&gt;If its showing after the tests and you are still having problems then I would assume there is either some problems with the ASA configurations OR some problem behind the ASA on the local network.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A good tool to test ASA configured rules is to use the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command. It will simulate a connection through your firewall and tell which rules it hits and if the connection is allowed or dropped&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The basic configuration format is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;SOURCE interface=""&gt; &lt;TCP or="" udp=""&gt; &lt;SOURCE ip=""&gt; &lt;SOURCE port=""&gt; &lt;DESTINATION ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/SOURCE&gt;&lt;/TCP&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you will the above fields with the correct information related to what you are trying to get working then you should see wha the problem is if there is a problem with the ASA configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 13:50:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242059#M347826</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-19T13:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242060#M347827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your other question about routes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will only need to configure the default route pointing towards your ISP gateway IP address of the network that is part of the connected network between the ISP gateway and your ASAs "outside" interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont need routes on the ASA for the other nonconnected public subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 13:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242060#M347827</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-19T13:57:59Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242061#M347828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much for your help, Jouni!&amp;nbsp; I'm going to go through my config again now and see if I can apply some of your suggestions.&lt;/P&gt;&lt;P&gt;Shelley&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 14:06:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242061#M347828</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2013-06-19T14:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242062#M347829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We tried installing our new firewall last night, but it still didn't work properly.&amp;nbsp; We can access the internet from inside and our phone system on VLAN 1 worked, but no traffic seems to be able to get into the firewall.&amp;nbsp; I can't ping any of my public IPs and our web server and email server are not visible outside of the network.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a packet trace from the outside to our web server and it comes back with Allowed, so I don't understand what could be wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone has a few minutes to have a look at this for me, I would really appreciate it!&amp;nbsp; We're going to purchase a SmartNet contract, but I would much prefer to be able to sort this with your help and repair some of the damage to my ego.&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the results of the show xlate command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gw(config)# show xlate&lt;/P&gt;&lt;P&gt;8 in use, 8 most used&lt;/P&gt;&lt;P&gt;Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; s - static, T - twice, N - net-to-net&lt;/P&gt;&lt;P&gt;NAT from inside:10.0.0.0/24 to outside:10.0.0.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sIT idle 0:00:18 timeout 0:00:00&lt;/P&gt;&lt;P&gt;NAT from outside:10.0.5.0/25 to inside:10.0.5.0/25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sIT idle 0:00:18 timeout 0:00:00&lt;/P&gt;&lt;P&gt;NAT from inside:10.0.0.0/24 to outside:10.0.0.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sIT idle 0:00:18 timeout 0:00:00&lt;/P&gt;&lt;P&gt;NAT from outside:10.0.1.0/24 to inside:10.0.1.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sIT idle 0:00:18 timeout 0:00:00&lt;/P&gt;&lt;P&gt;NAT from outside:0.0.0.0/0 to any:0.0.0.0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sIT idle 0:00:18 timeout 0:00:00&lt;/P&gt;&lt;P&gt;NAT from inside:10.0.0.35 to outside:y.y.56.204&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 0:00:18 timeout 0:00:00&lt;/P&gt;&lt;P&gt;NAT from inside:SpamFilter to outside:x.x.131.113&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 0:00:18 timeout 0:00:00&lt;/P&gt;&lt;P&gt;NAT from DMZ:WEB-02 to outside:WEB-02_OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 0:00:18 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here is the result of show arp:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gw(config)# show arp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside x.x.56.206 000a.41db.ad80 25&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside WebFilter 0017.5400.c15a 3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 10.0.0.130 2892.4a25.644a 3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside FS-01 0004.23dd.efd0 9&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 10.0.0.144 0800.0f69.f3a9 11&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 10.0.0.138 0800.0f4f.5649 13&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 10.0.0.165 0015.17e5.d56f 14&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VOIP 10.0.10.2 0800.0f4e.39e6 14&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ 192.168.40.204 0004.23b8.f713 8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have I somehow managed to block all outgoing traffic or something like that? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my full config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;: Saved&lt;/PRE&gt;&lt;PRE&gt;:&lt;/PRE&gt;&lt;PRE&gt;ASA Version 9.1(1) &lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;hostname gw&lt;/PRE&gt;&lt;PRE&gt;domain-name domain.ca&lt;/PRE&gt;&lt;PRE&gt;enable password **** encrypted&lt;/PRE&gt;&lt;PRE&gt;passwd **** encrypted&lt;/PRE&gt;&lt;PRE&gt;names&lt;/PRE&gt;&lt;PRE&gt;name 10.0.0.3 AS400&lt;/PRE&gt;&lt;PRE&gt;name 10.0.0.27 DC-01&lt;/PRE&gt;&lt;PRE&gt;name 10.0.0.25 FS-01&lt;/PRE&gt;&lt;PRE&gt;name 10.0.0.26 FS-01-26&lt;/PRE&gt;&lt;PRE&gt;name 10.0.0.18 Faxserver&lt;/PRE&gt;&lt;PRE&gt;name 10.0.0.36 SpamFilter&lt;/PRE&gt;&lt;PRE&gt;name 10.0.0.5 WebFilter&lt;/PRE&gt;&lt;PRE&gt;name 192.168.40.213 VS-02&lt;/PRE&gt;&lt;PRE&gt;name 10.0.0.73 APP-02&lt;/PRE&gt;&lt;PRE&gt;name 10.0.0.72 APP-01&lt;/PRE&gt;&lt;PRE&gt;name 10.0.0.70 VS-01&lt;/PRE&gt;&lt;PRE&gt;name 192.168.40.218 WEB-02&lt;/PRE&gt;&lt;PRE&gt;name x.x.131.114 WEB-02_OUTSIDE&lt;/PRE&gt;&lt;PRE&gt;ip local pool Remote_Address 10.0.5.10-10.0.5.100 mask 255.255.255.0&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;interface GigabitEthernet0/0&lt;/PRE&gt;&lt;PRE&gt; nameif outside&lt;/PRE&gt;&lt;PRE&gt; security-level 0&lt;/PRE&gt;&lt;PRE&gt; ip address y.y.56.201 255.255.255.248 &lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;interface GigabitEthernet0/1&lt;/PRE&gt;&lt;PRE&gt; nameif inside&lt;/PRE&gt;&lt;PRE&gt; security-level 100&lt;/PRE&gt;&lt;PRE&gt; ip address 10.0.0.1 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;interface GigabitEthernet0/1.2&lt;/PRE&gt;&lt;PRE&gt; vlan 2&lt;/PRE&gt;&lt;PRE&gt; nameif VOIP&lt;/PRE&gt;&lt;PRE&gt; security-level 100&lt;/PRE&gt;&lt;PRE&gt; ip address 10.0.10.1 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;interface GigabitEthernet0/2&lt;/PRE&gt;&lt;PRE&gt; nameif DMZ&lt;/PRE&gt;&lt;PRE&gt; security-level 4&lt;/PRE&gt;&lt;PRE&gt; ip address 192.168.40.1 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;interface GigabitEthernet0/3&lt;/PRE&gt;&lt;PRE&gt; shutdown&lt;/PRE&gt;&lt;PRE&gt; no nameif&lt;/PRE&gt;&lt;PRE&gt; no security-level&lt;/PRE&gt;&lt;PRE&gt; no ip address&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;interface GigabitEthernet0/4&lt;/PRE&gt;&lt;PRE&gt; shutdown&lt;/PRE&gt;&lt;PRE&gt; no nameif&lt;/PRE&gt;&lt;PRE&gt; no security-level&lt;/PRE&gt;&lt;PRE&gt; no ip address&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;interface GigabitEthernet0/5&lt;/PRE&gt;&lt;PRE&gt; shutdown&lt;/PRE&gt;&lt;PRE&gt; no nameif&lt;/PRE&gt;&lt;PRE&gt; no security-level&lt;/PRE&gt;&lt;PRE&gt; no ip address&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;interface Management0/0&lt;/PRE&gt;&lt;PRE&gt; management-only&lt;/PRE&gt;&lt;PRE&gt; nameif management&lt;/PRE&gt;&lt;PRE&gt; security-level 100&lt;/PRE&gt;&lt;PRE&gt; ip address 192.168.1.1 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;ftp mode passive&lt;/PRE&gt;&lt;PRE&gt;clock timezone MST -7&lt;/PRE&gt;&lt;PRE&gt;dns server-group DefaultDNS&lt;/PRE&gt;&lt;PRE&gt; domain-name firstcanadian.ca&lt;/PRE&gt;&lt;PRE&gt;same-security-traffic permit inter-interface&lt;/PRE&gt;&lt;PRE&gt;same-security-traffic permit intra-interface&lt;/PRE&gt;&lt;PRE&gt;object network AS400&lt;/PRE&gt;&lt;PRE&gt; host 10.0.0.3&lt;/PRE&gt;&lt;PRE&gt;object network FS-01&lt;/PRE&gt;&lt;PRE&gt; host 10.0.0.25&lt;/PRE&gt;&lt;PRE&gt;object network Exchange&lt;/PRE&gt;&lt;PRE&gt; host 10.0.0.35&lt;/PRE&gt;&lt;PRE&gt;object network APP-01&lt;/PRE&gt;&lt;PRE&gt; host 10.0.0.72&lt;/PRE&gt;&lt;PRE&gt;object network SpamFilter&lt;/PRE&gt;&lt;PRE&gt; host 10.0.0.36&lt;/PRE&gt;&lt;PRE&gt;object network WEB-02&lt;/PRE&gt;&lt;PRE&gt; host 192.168.40.218&lt;/PRE&gt;&lt;PRE&gt;object network WEB-02_outside&lt;/PRE&gt;&lt;PRE&gt; host x.x.131.114&lt;/PRE&gt;&lt;PRE&gt;object network DMZ_IP_RANGE&lt;/PRE&gt;&lt;PRE&gt; subnet 192.168.40.0 255.255.255.0&lt;/PRE&gt;&lt;PRE&gt;object network inside_IP_RANGE&lt;/PRE&gt;&lt;PRE&gt; subnet 10.0.0.0 255.255.255.0&lt;/PRE&gt;&lt;PRE&gt;object network VOIP_IP_RANGE&lt;/PRE&gt;&lt;PRE&gt; subnet 10.0.10.0 255.255.255.0&lt;/PRE&gt;&lt;PRE&gt;object network NETWORK_OBJ_10.0.5.0_25&lt;/PRE&gt;&lt;PRE&gt; subnet 10.0.5.0 255.255.255.128&lt;/PRE&gt;&lt;PRE&gt;object network Remote_inside_drs&lt;/PRE&gt;&lt;PRE&gt; subnet 10.0.1.0 255.255.255.0&lt;/PRE&gt;&lt;PRE&gt;object network NETWORK_OBJ_10.0.0.0_24&lt;/PRE&gt;&lt;PRE&gt; subnet 10.0.0.0 255.255.255.0&lt;/PRE&gt;&lt;PRE&gt;object network Remote_inside_drs_DMZ&lt;/PRE&gt;&lt;PRE&gt; subnet 192.168.41.0 255.255.255.0&lt;/PRE&gt;&lt;PRE&gt;object network Exchange_outside&lt;/PRE&gt;&lt;PRE&gt; host y.y.56.204&lt;/PRE&gt;&lt;PRE&gt;object network SpamFilter_outside&lt;/PRE&gt;&lt;PRE&gt; host x.x.131.113&lt;/PRE&gt;&lt;PRE&gt;object-group service Mail tcp&lt;/PRE&gt;&lt;PRE&gt; description "Allow Mail Traffic from Outside"&lt;/PRE&gt;&lt;PRE&gt; port-object eq https&lt;/PRE&gt;&lt;PRE&gt; port-object eq 8080&lt;/PRE&gt;&lt;PRE&gt; port-object eq 444&lt;/PRE&gt;&lt;PRE&gt; port-object eq 465&lt;/PRE&gt;&lt;PRE&gt; port-object eq 995&lt;/PRE&gt;&lt;PRE&gt; port-object eq 993&lt;/PRE&gt;&lt;PRE&gt; port-object eq 587&lt;/PRE&gt;&lt;PRE&gt; port-object eq imap4&lt;/PRE&gt;&lt;PRE&gt; port-object eq pop3&lt;/PRE&gt;&lt;PRE&gt;object-group service WebAccess tcp&lt;/PRE&gt;&lt;PRE&gt; description "Allow Web Traffic to Web Service"&lt;/PRE&gt;&lt;PRE&gt; port-object eq www&lt;/PRE&gt;&lt;PRE&gt; port-object eq https&lt;/PRE&gt;&lt;PRE&gt;object-group service CA400_ODBC tcp&lt;/PRE&gt;&lt;PRE&gt; description "Allow traffic from WEB-02 to AS400"&lt;/PRE&gt;&lt;PRE&gt; port-object eq 446&lt;/PRE&gt;&lt;PRE&gt;object-group service Spamfilter tcp&lt;/PRE&gt;&lt;PRE&gt; description "Allow Mail Traffic to the Spamfilter"&lt;/PRE&gt;&lt;PRE&gt; port-object eq smtp&lt;/PRE&gt;&lt;PRE&gt; port-object eq ssh&lt;/PRE&gt;&lt;PRE&gt;object-group service IntWebApp tcp&lt;/PRE&gt;&lt;PRE&gt; description "Allow Internal Traffic from WEB-02 to APP-01"&lt;/PRE&gt;&lt;PRE&gt; port-object eq 8383&lt;/PRE&gt;&lt;PRE&gt;object-group icmp-type PingTraffic&lt;/PRE&gt;&lt;PRE&gt; description "Allow Echo Echo-Reply Unreachable and Time-Exceeded Traffic"&lt;/PRE&gt;&lt;PRE&gt; icmp-object echo&lt;/PRE&gt;&lt;PRE&gt; icmp-object echo-reply&lt;/PRE&gt;&lt;PRE&gt; icmp-object unreachable&lt;/PRE&gt;&lt;PRE&gt; icmp-object time-exceeded&lt;/PRE&gt;&lt;PRE&gt;object-group service DMZtoInsideDomainTCP tcp&lt;/PRE&gt;&lt;PRE&gt; description Allow domain traffic between DMZ and Inside&lt;/PRE&gt;&lt;PRE&gt; port-object range 10000 10200&lt;/PRE&gt;&lt;PRE&gt; port-object eq 135&lt;/PRE&gt;&lt;PRE&gt; port-object range 3268 3269&lt;/PRE&gt;&lt;PRE&gt; port-object eq 42&lt;/PRE&gt;&lt;PRE&gt; port-object eq 445&lt;/PRE&gt;&lt;PRE&gt; port-object eq 88&lt;/PRE&gt;&lt;PRE&gt; port-object eq domain&lt;/PRE&gt;&lt;PRE&gt; port-object eq ldap&lt;/PRE&gt;&lt;PRE&gt; port-object eq ldaps&lt;/PRE&gt;&lt;PRE&gt; port-object eq netbios-ssn&lt;/PRE&gt;&lt;PRE&gt;object-group service DMZtoInsideDomainUDP udp&lt;/PRE&gt;&lt;PRE&gt; port-object eq 389&lt;/PRE&gt;&lt;PRE&gt; port-object eq 88&lt;/PRE&gt;&lt;PRE&gt; port-object eq domain&lt;/PRE&gt;&lt;PRE&gt; port-object eq netbios-dgm&lt;/PRE&gt;&lt;PRE&gt; port-object eq netbios-ns&lt;/PRE&gt;&lt;PRE&gt;object-group network DEFAULT-PAT-SOURCE&lt;/PRE&gt;&lt;PRE&gt; network-object 10.0.0.0 255.255.255.0&lt;/PRE&gt;&lt;PRE&gt; network-object 10.0.10.0 255.255.255.0&lt;/PRE&gt;&lt;PRE&gt; network-object 192.168.40.0 255.255.255.0&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT remark "Allow Ping to WEB-02 on Outside"&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT extended permit icmp any object WEB-02 object-group PingTraffic log &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT remark "Allow HTTP and HTTPS to WEB-02_outside"&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT extended permit tcp any object WEB-02 object-group WebAccess log &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT extended permit icmp any object Exchange object-group PingTraffic &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT remark "Allow Mail Traffic from Outside to Exchange"&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT extended permit tcp any object Exchange object-group Mail log &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT extended permit icmp any object SpamFilter object-group PingTraffic &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT remark "Allow Mail Traffic from Outside to SpamFilter"&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT extended permit tcp any object SpamFilter object-group Spamfilter log &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT remark "Allow Site to Site VPN Traffic"&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT extended permit esp any 10.0.0.0 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT extended permit udp any eq 4500 10.0.0.0 255.255.255.0 eq 4500 &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_OUT extended permit udp any eq isakmp 10.0.0.0 255.255.255.0 eq isakmp &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_VPN remark "Allow Access from VPN IPs to Inside"&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_VPN extended permit tcp 10.0.5.0 255.255.255.0 10.0.0.0 255.255.255.0 log &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_VPN extended permit ip 10.0.5.0 255.255.255.0 10.0.0.0 255.255.255.0 log &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_VPN extended permit icmp 10.0.5.0 255.255.255.0 any log &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ remark "Allow FTP Access from DMZ to FS-01 on Inside"&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ extended permit tcp object WEB-02 object FS-01 eq ftp &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ remark "Allow Access from WEB-02 in DMZ to AS400"&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ extended permit tcp object WEB-02 object AS400 object-group CA400_ODBC &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ remark "Allow Access from WEB-02 in DMZ to APP-01"&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ extended permit tcp object WEB-02 object APP-01 object-group IntWebApp &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ extended permit tcp host 192.168.40.204 object FS-01 object-group DMZtoInsideDomainTCP &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ extended permit udp host 192.168.40.204 object FS-01 object-group DMZtoInsideDomainUDP &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ remark Deny all other access from DMZ to Inside&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ extended deny ip 192.168.40.0 255.255.255.0 10.0.0.0 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ extended deny ip 192.168.40.0 255.255.255.0 10.0.10.0 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ remark Allow all other DMZ traffic out&lt;/PRE&gt;&lt;PRE&gt;access-list ACL_DMZ extended permit ip 192.168.40.0 255.255.255.0 any &lt;/PRE&gt;&lt;PRE&gt;access-list Tunnel_Group_splitTunnelAcl standard permit 10.0.0.0 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;access-list outside_cryptomap_1 extended permit ip 10.0.0.0 255.255.255.0 object Remote_inside_drs &lt;/PRE&gt;&lt;PRE&gt;access-list Remote_splitTunnelAcl standard permit 10.0.0.0 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;access-list Remote_splitTunnelAcl standard permit 192.168.40.0 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;access-list vpn-access extended permit ip 192.168.40.0 255.255.255.0 10.0.5.0 255.255.255.0 &lt;/PRE&gt;&lt;PRE&gt;access-list outside_cryptomap extended permit ip 10.0.0.0 255.255.255.0 object Remote_inside_drs &lt;/PRE&gt;&lt;PRE&gt;pager lines 24&lt;/PRE&gt;&lt;PRE&gt;logging asdm informational&lt;/PRE&gt;&lt;PRE&gt;mtu outside 1500&lt;/PRE&gt;&lt;PRE&gt;mtu inside 1500&lt;/PRE&gt;&lt;PRE&gt;mtu VOIP 1500&lt;/PRE&gt;&lt;PRE&gt;mtu DMZ 1500&lt;/PRE&gt;&lt;PRE&gt;mtu management 1500&lt;/PRE&gt;&lt;PRE&gt;no failover&lt;/PRE&gt;&lt;PRE&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/PRE&gt;&lt;PRE&gt;no asdm history enable&lt;/PRE&gt;&lt;PRE&gt;arp timeout 14400&lt;/PRE&gt;&lt;PRE&gt;arp permit-nonconnected&lt;/PRE&gt;&lt;PRE&gt;nat (inside,outside) source static inside_IP_RANGE inside_IP_RANGE destination static NETWORK_OBJ_10.0.5.0_25 NETWORK_OBJ_10.0.5.0_25 no-proxy-arp&lt;/PRE&gt;&lt;PRE&gt;nat (inside,outside) source static NETWORK_OBJ_10.0.0.0_24 NETWORK_OBJ_10.0.0.0_24 destination static Remote_inside_drs Remote_inside_drs no-proxy-arp route-lookup&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;object network FCIC-Exchange&lt;/PRE&gt;&lt;PRE&gt; nat (inside,outside) static y.y.56.204&lt;/PRE&gt;&lt;PRE&gt;object network SpamFilter&lt;/PRE&gt;&lt;PRE&gt; nat (inside,outside) static x.x.131.113&lt;/PRE&gt;&lt;PRE&gt;object network FCIC-WEB-02&lt;/PRE&gt;&lt;PRE&gt; nat (DMZ,outside) static x.x.131.114&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/PRE&gt;&lt;PRE&gt;access-group ACL_OUT in interface outside&lt;/PRE&gt;&lt;PRE&gt;access-group ACL_DMZ in interface DMZ&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;router rip&lt;/PRE&gt;&lt;PRE&gt; passive-interface default&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;route outside 0.0.0.0 0.0.0.0 y.y.56.206 1&lt;/PRE&gt;&lt;PRE&gt;timeout xlate 3:00:00&lt;/PRE&gt;&lt;PRE&gt;timeout pat-xlate 0:00:30&lt;/PRE&gt;&lt;PRE&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/PRE&gt;&lt;PRE&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/PRE&gt;&lt;PRE&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/PRE&gt;&lt;PRE&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/PRE&gt;&lt;PRE&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/PRE&gt;&lt;PRE&gt;timeout floating-conn 0:00:00&lt;/PRE&gt;&lt;PRE&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/PRE&gt;&lt;PRE&gt;user-identity default-domain LOCAL&lt;/PRE&gt;&lt;PRE&gt;http server enable&lt;/PRE&gt;&lt;PRE&gt;http 192.168.1.0 255.255.255.0 management&lt;/PRE&gt;&lt;PRE&gt;http 0.0.0.0 0.0.0.0 outside&lt;/PRE&gt;&lt;PRE&gt;http 10.0.0.0 255.255.255.0 inside&lt;/PRE&gt;&lt;PRE&gt;no snmp-server location&lt;/PRE&gt;&lt;PRE&gt;no snmp-server contact&lt;/PRE&gt;&lt;PRE&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/PRE&gt;&lt;PRE&gt; &lt;/PRE&gt;&lt;PRE&gt;*** removed crypto&lt;/PRE&gt;&lt;PRE&gt; &lt;/PRE&gt;&lt;PRE&gt;telnet 192.168.0.99 255.255.255.255 outside&lt;/PRE&gt;&lt;PRE&gt;telnet timeout 5&lt;/PRE&gt;&lt;PRE&gt;ssh timeout 5&lt;/PRE&gt;&lt;PRE&gt;console timeout 0&lt;/PRE&gt;&lt;PRE&gt;management-access inside&lt;/PRE&gt;&lt;PRE&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/PRE&gt;&lt;PRE&gt;dhcpd enable management&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;threat-detection basic-threat&lt;/PRE&gt;&lt;PRE&gt;threat-detection statistics access-list&lt;/PRE&gt;&lt;PRE&gt;no threat-detection statistics tcp-intercept&lt;/PRE&gt;&lt;PRE&gt; &lt;/PRE&gt;&lt;PRE&gt;***removed tunnel info&lt;/PRE&gt;&lt;PRE&gt; &lt;/PRE&gt;&lt;PRE&gt;username test password **** encrypted privilege 15&lt;/PRE&gt;&lt;PRE&gt; &lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;class-map inspection_default&lt;/PRE&gt;&lt;PRE&gt; match default-inspection-traffic&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;policy-map type inspect dns preset_dns_map&lt;/PRE&gt;&lt;PRE&gt; parameters&lt;/PRE&gt;&lt;PRE&gt; message-length maximum client auto&lt;/PRE&gt;&lt;PRE&gt; message-length maximum 512&lt;/PRE&gt;&lt;PRE&gt;policy-map global_policy&lt;/PRE&gt;&lt;PRE&gt; class inspection_default&lt;/PRE&gt;&lt;PRE&gt; inspect dns preset_dns_map &lt;/PRE&gt;&lt;PRE&gt; inspect ftp &lt;/PRE&gt;&lt;PRE&gt; inspect h323 h225 &lt;/PRE&gt;&lt;PRE&gt; inspect h323 ras &lt;/PRE&gt;&lt;PRE&gt; inspect rsh &lt;/PRE&gt;&lt;PRE&gt; inspect rtsp &lt;/PRE&gt;&lt;PRE&gt; inspect esmtp &lt;/PRE&gt;&lt;PRE&gt; inspect sqlnet &lt;/PRE&gt;&lt;PRE&gt; inspect skinny &lt;/PRE&gt;&lt;PRE&gt; inspect sunrpc &lt;/PRE&gt;&lt;PRE&gt; inspect xdmcp &lt;/PRE&gt;&lt;PRE&gt; inspect sip &lt;/PRE&gt;&lt;PRE&gt; inspect netbios &lt;/PRE&gt;&lt;PRE&gt; inspect tftp &lt;/PRE&gt;&lt;PRE&gt; inspect ip-options &lt;/PRE&gt;&lt;PRE&gt; inspect icmp &lt;/PRE&gt;&lt;PRE&gt; inspect http &lt;/PRE&gt;&lt;PRE&gt; inspect ipsec-pass-thru &lt;/PRE&gt;&lt;PRE&gt;!&lt;/PRE&gt;&lt;PRE&gt;service-policy global_policy global&lt;/PRE&gt;&lt;PRE&gt;prompt hostname context &lt;/PRE&gt;&lt;PRE&gt;call-home reporting anonymous&lt;/PRE&gt;&lt;PRE&gt;password encryption aes&lt;/PRE&gt;&lt;PRE&gt;Cryptochecksum:****&lt;/PRE&gt;&lt;PRE&gt;: end&lt;/PRE&gt;&lt;PRE&gt;no asdm history enable&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 14:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242062#M347829</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2013-06-20T14:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242063#M347830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at your Static NAT configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network FCIC-Exchange&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static y.y.56.204&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SpamFilter&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static x.x.131.113&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network FCIC-WEB-02&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (DMZ,outside) static x.x.131.114&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not quite sure why I am not seeing any &lt;STRONG&gt;"host x.x.x.x"&lt;/STRONG&gt; configurations for those &lt;STRONG&gt;"object network"&lt;/STRONG&gt; in the above configuration. Just the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; portion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, looking at your &lt;STRONG&gt;"show arp"&lt;/STRONG&gt; output and comparing it to the IP address which I presume are the servers local IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;gw(config)# show arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside x.x.56.206 000a.41db.ad80 25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside WebFilter 0017.5400.c15a 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 10.0.0.130 2892.4a25.644a 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside FS-01 0004.23dd.efd0 9&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 10.0.0.144 0800.0f69.f3a9 11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 10.0.0.138 0800.0f4f.5649 13&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 10.0.0.165 0015.17e5.d56f 14&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VOIP 10.0.10.2 0800.0f4e.39e6 14&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ 192.168.40.204 0004.23b8.f713 8&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;10.0.0.35&lt;/LI&gt;&lt;LI&gt;10.0.0.36&lt;/LI&gt;&lt;LI&gt;192.168.40.218&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, none of those IP addresses are in the ARP table. Which basically means that either&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The ASA hasnt seen any traffic from them&lt;/LI&gt;&lt;LI&gt;You have not generated any traffic towards them from the ASA&lt;/LI&gt;&lt;LI&gt;No traffic has gotten through the ASA towards those servers&lt;/LI&gt;&lt;LI&gt;Or that traffic from the Internet hasnt reached your ASA at all&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; If during the test you would want to confirm if any traffic from the Internet is coming towards these 3 servers then you could configure traffic capture on the ASA with these configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CAP-EXCHANGE permit ip any host y.y.56.204&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CAP-EXCHANGE permit ip host y.y.56.204 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CAP-SPAM permit ip any host x.x.131.113&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CAP-SPAM permit ip host x.x.131.113 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CAP-WEB permit ip any host x.x.131.114&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CAP-WEB permit ip host x.x.131.114 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture CAP-EXCHANGE type raw-data access-list CAP-EXCHANGE interface outside buffer 1000000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture CAP-SPAM type raw-data access-list CAP-SPAM interface outside buffer 1000000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture CAP-WEB type raw-data access-list CAP-WEB interface outside buffer 1000000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could then use the following command to view if any data is being captured during tests&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could view the contents of the captures on the CLI with the following commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture CAP-EXCHANGE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture CAP-SPAM &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture CAP-WEB &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If testing from the Internet producses no data for these captures then there is probably some problem between your ASA and the ISP. Naturally if you are using these NAT IP addresses with the old firewall and then just replace the firewall with a new one the MAC address for those public IP addresses change and there might be problems with the ARP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would still want to know if we are talking about public IP addresses that are actually these&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Subnets x.x.131.212 255.255.255.248 and y.y.56.200 255.255.255.248&lt;/LI&gt;&lt;LI&gt;IP addresses used for Static NAT &lt;UL&gt;&lt;LI&gt;y.y.56.204 is part of one of the above subnets&lt;/LI&gt;&lt;LI&gt;x.x.131.113 is NOT part of either of the above subnets&lt;/LI&gt;&lt;LI&gt;x.x.131.114 is NOT part of either of the above subnets&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But since you say that the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output says allowed it would seem configuration are correct and they do seem to be. The main question is why didnt we see the servers IP/MAC address in the ARP output? Why dont 2 of the Static NAT public IP addresses match the 2 subnets you have given?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those are obvious big question marks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would presume at this point that the problem is related to your setup between the ASA and the its gateway device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 15:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242063#M347830</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-20T15:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242064#M347832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;Sorry for the confusion.&amp;nbsp; We do have two public IP subnets.&amp;nbsp; Just for the sake of clarity, lets call them:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;11.11.131.112 255.255.255.248 gateway 11.11.131.118&lt;/P&gt;&lt;P&gt;10.10.56.200 255.255.255.248 gateway 10.10.56.206&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;11.11.131.13 and 11.11.131.114 are both servers in the second public IP subnet that we were assigned.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our existing firwall is set up with an outside IP of 10.10.56.201 and is routed through 10.10.56.206.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are able to access out servers in the second subnet while the existing PIX 515E is in place, but as soon as we put in the new 5515-X, we lose access.&amp;nbsp; I'm not able to ping any of my outside IPs, in either subnet, once the new firewall is plugged in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We had our ISP clear their ARP tables last night after we switched out the firewall, but it didn't seem to help at all.&amp;nbsp; Our connection from them goes through a Cisco 2950 and they said that both public subnets are configured on the port they have assigned us.&amp;nbsp; From the 2950, we go to a 5 port gigabit switch and then to our firewall.&amp;nbsp; The switch is there so that we can use an outside IP for testing and also for our TeleWorker server to access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This whole thing has just completely stumped me.&amp;nbsp; I assumed that there must be something wrong with my access-lists and that was what was causing the problems, but when I do the packet trace, it comes up as Ok.&amp;nbsp; &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are matching host records for those nat records, they are near the top of the config.&amp;nbsp; I'm not sure why it splits them out like that when I do a show run.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network FCIC-Exchange&lt;BR /&gt;nat (inside,outside) static y.y.56.204&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network SpamFilter&lt;BR /&gt;nat (inside,outside) static x.x.131.113&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network FCIC-WEB-02&lt;BR /&gt;nat (DMZ,outside) static x.x.131.114&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network FCIC-Exchange&lt;BR /&gt;host 10.0.0.35&lt;BR /&gt;object network SpamFilter&lt;BR /&gt;host 10.0.0.36&lt;BR /&gt;object network FCIC-WEB-02&lt;BR /&gt;host 192.168.40.218&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 15:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242064#M347832</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2013-06-20T15:39:51Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242065#M347835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are the original &lt;STRONG&gt;"object network"&lt;/STRONG&gt; in the configuration yes, but I cant find any with the &lt;STRONG&gt;FCIC&lt;/STRONG&gt; in front of the &lt;STRONG&gt;"object network"&lt;/STRONG&gt; name. Just the version with the &lt;STRONG&gt;"Exchange"&lt;/STRONG&gt; and &lt;STRONG&gt;"WEB-02"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you confirm if the single Static NAT that has the public IP address that is part of the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interfaces directly connected subnet is working? The &lt;STRONG&gt;"Exchange"&lt;/STRONG&gt; one I mean?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If its just the secondary subnet that is not working then I would suggest that you ask the ISP to remove that subnet from their gateway interface and configure a route for it pointing towards the ASA &lt;STRONG&gt;"outside"&lt;/STRONG&gt; IP address. After that there can be no problems related to the ARP atleast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also ask them to share current ARP table related to your public IP addresses after the change so you can confirm that those are correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the mentioned traffic capture configurations would be able to confirm if you are getting any traffic from the ISP after the firewall change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 16:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242065#M347835</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-20T16:00:07Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242066#M347837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;I had removed the FCIC from all of the server names when I was sanitizing my config, but obviously missed it in the NAT section.&amp;nbsp; I'm sorry about that! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't get many opportunities to test my config live because it brings down our website, but as soon as I can talk my bosses into letting me try again, I will test the ping on my Exchange outside address and run those capture commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll speak to my ISP about changing the way they handle the second subnet.&amp;nbsp; At least that would help narrow down the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll post the results of the capture as soon as I run it.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again for your help with this!&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 16:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242066#M347837</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2013-06-20T16:15:13Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242067#M347839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its naturally the best situation if you had the ISP working with your during the change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main things to confirm would be&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If ISP has configured both of the public subnets on their gateway interface they should make sure that the MAC address visible in their ARP table is the MAC address of the ASA and not the one of PIX firewall&lt;/LI&gt;&lt;LI&gt;You should be able to confirm if any traffic is arriving on your firewall to the Staticly NATed servers by either viewing the ACL hitcount during testing, watching real time logs through ASDM or capturing traffic during the testing&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally I dont know what the PIX firewall configuration was so I cant compare those configurations but there shouldnt really be many things that could be wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One problem related to ARP you see every now and then is that someone has configured &lt;STRONG&gt;"sysopt noproxyarp outside" &lt;/STRONG&gt;on their firewall. This will basically cause that the ASA will only answer to ARP request related to its "outside" interface IP address BUT NOT the IP addresses that are just used in the NAT configurations. Though I dont see this in your configurations so that shouldnt be the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One bug that I ran into once when doing a firewall change for a local town here was that even though I ran a ARP clearing command on the core device, it refused to do anything and I had to actually manually shutdown the customers gateway inteface in your core and bring it back up to get the old ARP table to clear. But this is something that is very very rare I imagine. Your ISP should be more than able to confirm that everything is ok on their end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly it is pretty hard to troubleshoot the situation when you dont have access and view to the devices during the problem situation. Especially after we have gone through some of the basic things already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if this could be something software related for some reason then you could try some other software level next time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 16:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242067#M347839</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-20T16:34:30Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242068#M347840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;I just spoke with someone at our ISP.&amp;nbsp; They said that on our interface on their router, we have one VLAN that is configured for both of our Public IP subnets.&amp;nbsp; They then use layer 2 trunking to get it to a Cisco 2950 at our site.&amp;nbsp; We have one access port on that 2950 and it is configured for both subnets.&lt;/P&gt;&lt;P&gt;The lady I spoke with said that she thinks I need to add a route for each subnet through it's own gateway on the ASA.&amp;nbsp; She couldn't understand how it was currently working on our PIX with all of the traffic routed through the one subnets gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;Shelley&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 17:14:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242068#M347840</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2013-06-20T17:14:35Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242069#M347841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;Here is the info I got from our ISP.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Protocol&amp;nbsp; Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Age (min)&amp;nbsp; Hardware Addr&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp; Interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 10.10.56.205&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; xxxx.de26.8073&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 10.10.56.204&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 10.10.56.203&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 10.10.56.202&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 10.10.56.201&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 11.11.131.114&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 11.11.131.113&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configs on our router (Access port to the cx)&lt;/P&gt;&lt;P&gt;interface Vlanxxxx&lt;/P&gt;&lt;P&gt;description &lt;/P&gt;&lt;P&gt;ip address 11.11.131.118 255.255.255.248 secondary&lt;/P&gt;&lt;P&gt;ip address 10.10.56.206 255.255.255.248&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 18:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242069#M347841</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2013-06-20T18:24:31Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242070#M347842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I understood correctly then theres basically a L3 gateway in the ISP core that holds both public subnets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To use Ciscos configuration format, it might look something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet1/1.xxxx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Customer A&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; encapsulation dot1q xxxx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 1.1.1.1 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 2.2.2.1 255.255.255.248 secondary&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What the ISP could do to eliminate any ARP problems of using multiple public subnets is&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Remove the &lt;STRONG&gt;"secondary"&lt;/STRONG&gt; subnet&lt;/LI&gt;&lt;LI&gt;Add a route for the &lt;STRONG&gt;"secondary"&lt;/STRONG&gt; subnet towards the current ASA "outside" interface&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet1/1.xxxx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Customer A&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; encapsulation dot1q xxxx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 1.1.1.1 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 2.2.2.0 255.255.255.248 1.1.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the Internet works for users after replacing the PIX with the ASA we know that ASA can forward traffic to the ISP and to the Internet. So the problem might be related to either old ARP table markings that arent removed OR there is just something wrong with the ASA even though I am not sure what it could be if its not any of the things I mention already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Multiple subnets shouldnt be any problem nor should be having the single default route poiting to the gateway address of only one of the public subnet. Just as an example one of our customers, they have around 15-20 public subnets on their ASA used for NAT and some others in their internal network and there is no problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess its possible that I might be missing something also. Though I have given examples on how to troubleshoot this during the switching of the firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully it gets sorted out the next time &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 18:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242070#M347842</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-20T18:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242071#M347843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Judging by the &lt;STRONG&gt;"show ip arp"&lt;/STRONG&gt; output it seems that you have PIX which is using most of the public IP addresses as NAT IP addresses and there also some other device behind the ISPs link (in your network) that is configured with a public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Protocol&amp;nbsp; Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Age (min)&amp;nbsp; Hardware Addr&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp; Interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet&amp;nbsp; 10.10.56.205&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; xxxx.de26.8073&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet&amp;nbsp; 10.10.56.204&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet&amp;nbsp; 10.10.56.203&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet&amp;nbsp; 10.10.56.202&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet&amp;nbsp; 10.10.56.201&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet&amp;nbsp; 11.11.131.114&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet&amp;nbsp; 11.11.131.113&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; yyyy.46e8.c09d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically the &lt;STRONG&gt;"yyyy.46e8.c09d"&lt;/STRONG&gt; should change into something different when the firewall is switched.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though, I guess there is even a possibility to configure this same MAC address on your ASAs "outside" interface which would mean that even if the old ARP table markings would stay on the ISP side, there should be no problem as the MAC is unchanged.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a command&lt;STRONG&gt; "mac-address"&lt;/STRONG&gt; which you can use under the interface configuration mode. I have not had to use this myself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just as an example, I did this on my home ASA (ASA5505)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config)# interface vlan 10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config-if)# mac-address &lt;SPAN style="color: #ff0000;"&gt;0000.46e8.c09d&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config)# sh interface vlan 10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Interface Vlan10 "WAN", is up, line protocol is up&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; Hardware is EtherSVI, BW 100 Mbps, DLY 100 usec&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Description: WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address &lt;SPAN style="color: #ff0000;"&gt;0000.46e8.c09d&lt;/SPAN&gt;, MTU 1500&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see the interface MAC address is changed and could be for example the MAC of your PIX firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 18:40:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242071#M347843</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-20T18:40:56Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242072#M347844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;Your idea about changing the mac address on the new firewall to match the old one worked!!&amp;nbsp; Unfortunately, after working properly for about 2 hours, I suddenly lost access to my web server again.&amp;nbsp; I could ping all of my other IPs, but not the web server IP.&lt;/P&gt;&lt;P&gt;We ended up having to put the old firewall back in place again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you think of any reason why the 5515-x would suddenly stop allowing traffic through for that one IP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm thinking that it may have been the ISP ARP tables again, but if you can think of any other reason it would have suddenly dropped that traffic let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going to mark your last post as the correct answer because it did get me up and running.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again for all of your help!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shelley&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jun 2013 17:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242072#M347844</guid>
      <dc:creator>shelleylynn</dc:creator>
      <dc:date>2013-06-26T17:43:13Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5515-x multiple public IP address blocks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242073#M347845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well the only thing different between the other servers you have and the Web server having problems is that the server is on the DMZ of the ASA while others are on the INSIDE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though if that was somehow related to the problem then it would probably be something on the actual DMZ rather than on the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess its possible that there is problems on the ISP side also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know if I can suggest anything else at this point other than using the before mentioned ways to troubleshoot the problem or rather determine what is happening with connections to your Web server. The first thing during the problem would be to determine if any traffic was coming towards the server from the Internet. This could be done by looking at the ACL hitcounts, monitoring connection logs, doing packet capture on the ASA itself ,etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also as I have said before, the ISP could always remove the &lt;STRONG&gt;"secondary"&lt;/STRONG&gt; subnet from their gateway Vlan interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlanxxxx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;description &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip address 11.11.131.118 255.255.255.248 secondary&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip address 10.10.56.206 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip redirects&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip unreachables&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip proxy-arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;end&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlanxxxx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; no ip address 11.11.131.118 255.255.255.248 secondary&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 11.11.131.118 255.255.255.248 10.10.56.201&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would rule out any ARP related problems as the ISP would not need to ARP for the destination IP addresses on network 11.11.131.118/29. ISP gateway device would just send traffic destined to that network to the ASA directly. Currently they would be using ARP to determine the MAC address of the destination since the ISP has that network configured directly on their gateway Vlan interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though it still sounds very strange that only one host from this public network range would be expiriencing these problems and everything else was fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be so much easier to troubleshoot if I could see the situation during the actual problem. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; So used to it when I work for an ISP and have access to both the ISP core network and the customer firewalls which I manage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess I could always take a look at the situation on the ASA when you were doing the change and had the problem but somehow I imagine that is not something your boss would want to allow &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jun 2013 18:06:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5515-x-multiple-public-ip-address-blocks/m-p/2242073#M347845</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-26T18:06:27Z</dc:date>
    </item>
  </channel>
</rss>

