<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to Ping internet site using source IP of DMZ interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213109#M350049</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding this is not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think it hasnt been possible at any point when the "packet-tracer" command has been available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why would you even want to use the IP address as the source?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 12 May 2013 14:00:23 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-12T14:00:23Z</dc:date>
    <item>
      <title>Unable to Ping internet site using source IP of DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213108#M350048</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From ASA while using the IPs which are behind the DMZ&amp;nbsp; i can ping the internet sites while using DMZ as interface and source IP of switch which is behind the DMZ fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when i try to&amp;nbsp; ping using packet tracer using DMZ&amp;nbsp; interface as source and also IP of DMZ interface as source IP ping fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where 192.168.69.2 is IP of DMZ interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp;&amp;nbsp; packet-tracer input DMZ icmp 192.168.69.2 8 8 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: DMZ&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to know how can i allow ping using DMZ interface as source IP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213108#M350048</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T01:42:09Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping internet site using source IP of DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213109#M350049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding this is not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think it hasnt been possible at any point when the "packet-tracer" command has been available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why would you even want to use the IP address as the source?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 14:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213109#M350049</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T14:00:23Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping internet site using source IP of DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213110#M350055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was just trying all options to know if this is allowed or not.&lt;/P&gt;&lt;P&gt;So it seems it is not allowed by default or thats how ASA is designed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 14:02:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213110#M350055</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-12T14:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Ping internet site using source IP of DMZ interfac</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213111#M350059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In general the ASA when communicating to the different networks it uses the interface connected to that network or the interface behind which that network is located.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the ASA doesn't really allow traffic across the box to the other side to an ASA interface (other than in very specific cases like VPN + Device management connections)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure if this is documented anywhere. It certainly isnt mentioned in the Command Reference which would be a logical place. Then again it wouldnt be the first time that very specific and potentially important informatin was left out of public documentation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I personally just avoid using any ASA interface IP with the "packet-tracer" and to be honest you are usually testing user traffic that is naturally coming from a different source IP address anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like to look which ports the ASA uses to listen to services you can use the command (minimum software 8.0(2) needed)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show asp table socket&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to see the connections formed by the ASA and to the ASA use the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show conn all | inc Identity&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 14:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213111#M350059</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T14:13:31Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping internet site using source IP of DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213112#M350064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree somethings which you only learn through experience that not are in cisco documentation.&lt;/P&gt;&lt;P&gt;It also applies to Routing and switching.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i access the ASA throguh ASDM and did &lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show conn all | inc Identity&lt;/P&gt;&lt;P&gt;UDP outside 192.168.11.1:123 NP Identity Ifc 192.168.11.2:65535, idle 0:01:50, bytes 96, flags -&lt;/P&gt;&lt;P&gt;TCP outside 192.168.98.10:65323 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 531, flags UfrOB&lt;/P&gt;&lt;P&gt;TCP outside 192.168.98.10:65322 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 521, flags UfrOB&lt;/P&gt;&lt;P&gt;TCP outside 192.168.98.10:65321 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 406, flags UfrOB&lt;/P&gt;&lt;P&gt;TCP outside 192.168.98.10:65319 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 536, flags UfrOB&lt;/P&gt;&lt;P&gt;TCP outside 192.168.98.10:65313 NP Identity Ifc 192.168.11.2:443, idle 0:00:00, bytes 50003, flags UOB&lt;/P&gt;&lt;P&gt;TCP outside 192.168.98.10:65310 NP Identity Ifc 192.168.11.2:443, idle 0:00:04, bytes 34278, flags UOB&lt;/P&gt;&lt;P&gt;TCP outside 192.168.5.2:25844 NP Identity Ifc 192.168.11.2:22, idle 0:00:00, bytes 157719, flags UOB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After few mins when i did &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show conn all | inc Identity&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does not show anything&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but when i do sh conn all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show conn all&lt;/P&gt;&lt;P&gt;3 in use, 201 most used&lt;/P&gt;&lt;P&gt;TCP outside 192.168.98.10:65313 NP Identity Ifc 192.168.11.2:443, idle 0:00:00, bytes 335675, flags UOB&lt;/P&gt;&lt;P&gt;TCP outside 192.168.98.10:65310 NP Identity Ifc 192.168.11.2:443, idle 0:00:02, bytes 61900, flags UOB&lt;/P&gt;&lt;P&gt;TCP outside 192.168.5.2:25844 NP Identity Ifc 192.168.11.2:22, idle 0:00:00, bytes 201287, flags UOB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is shows 2 connections via ASDM.&lt;/P&gt;&lt;P&gt;Do you know after few mins sh conn | inc identity shows no output and sh conn all shows 2 connections to ASDM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 14:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213112#M350064</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-12T14:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Ping internet site using source IP of DMZ interfac</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213113#M350070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets look at the first output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show conn all | inc Identity&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff9900;"&gt;&lt;STRONG&gt;UDP outside 192.168.11.1:123 NP Identity Ifc 192.168.11.2:65535, idle 0:01:50, bytes 96, flags -&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65323 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 531, flags UfrOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65322 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 521, flags UfrOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65321 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 406, flags UfrOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65319 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 536, flags UfrOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65313 NP Identity Ifc 192.168.11.2:443, idle 0:00:00, bytes 50003, flags UOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65310 NP Identity Ifc 192.168.11.2:443, idle 0:00:04, bytes 34278, flags UOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&lt;STRONG&gt;TCP outside 192.168.5.2:25844 NP Identity Ifc 192.168.11.2:22, idle 0:00:00, bytes 157719, flags UOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff9900;"&gt;&lt;STRONG&gt;UDP outside 192.168.11.1:123 NP Identity Ifc 192.168.11.2:65535, idle 0:01:50, bytes 96, flags -&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first seems to be a NTP connection. Its an UDP connection so the default timeout for UDP connection is 2min. As you can see its already been idle 1min 50 seconds so its really closed to being removed from the firewall connection table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65323 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 531, flags UfrOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65322 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 521, flags UfrOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65321 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 406, flags UfrOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65319 NP Identity Ifc 192.168.11.2:443, idle 0:00:58, bytes 536, flags UfrOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the above connections it seems to me that they are TCP connections (possibly part of some TCP connections related to ASDM) Notice the end section with the TCP "flags". From these we can see that the TCP connections are already in the process of being teardown. In other words they are not in use anymore but in the process of being closed and removed from the connection table of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The flags to look out for are&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;r - inside acknowledged FIN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;f - inside FIN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65313 NP Identity Ifc 192.168.11.2:443, idle 0:00:00, bytes 50003, flags UOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&lt;STRONG&gt;TCP outside 192.168.98.10:65310 NP Identity Ifc 192.168.11.2:443, idle 0:00:04, bytes 34278, flags UOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;&lt;STRONG&gt;TCP outside 192.168.5.2:25844 NP Identity Ifc 192.168.11.2:22, idle 0:00:00, bytes 157719, flags UOB&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as you can see with the last 3 connections, they are the same TCP connections that are left in the second output. This is because they seem to be in use still and there is no TCP flags that would indicate they are in the process of being teardown.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see explanation of all the different connection "flags" while&amp;nbsp; issuing the command "show conn all" and checking out the top most&amp;nbsp; portion (example output from my ASA)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config)# sh conn detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Flags: A - awaiting inside ACK to SYN, a - awaiting outside ACK to SYN,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; B - initial SYN from outside, b - TCP state-bypass or nailed, C - CTIQBE media,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - DNS, d - dump, E - outside back connection, F - outside FIN, f - inside FIN,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; G - group, g - MGCP, H - H.323, h - H.225.0, I - inbound data,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - incomplete, J - GTP, j - GTP data, K - GTP t3-response&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; k - Skinny media, M - SMTP data, m - SIP media, n - GUP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; O - outbound data, P - inside back connection, p - Phone-proxy TFTP connection,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; q - SQL*Net data, R - outside acknowledged FIN,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; R - UDP SUNRPC, r - inside acknowledged FIN, S - awaiting inside SYN,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; s - awaiting outside SYN, T - SIP, t - SIP transient, U - up,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; V - VPN orphan, W - WAAS,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; X - inspected by service module&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is also a good page telling the different most common connection flags you see on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://ccnpsecurity.blogspot.fi/2011/11/asa-flags-associated-with-tcp.html" rel="nofollow"&gt;http://ccnpsecurity.blogspot.fi/2011/11/asa-flags-associated-with-tcp.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 15:12:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213113#M350070</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T15:12:16Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping internet site using source IP of DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213114#M350074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also to add,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One other great command related to connections is to use the &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show conn long&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show conn long all&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It shows a lot more information about the connections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;How long the connections has been on the ASA "uptime"&lt;/LI&gt;&lt;LI&gt;What the applied timeout value for the connection is "timeout"&lt;/LI&gt;&lt;LI&gt;Source and Destination NAT. If IP address and the one following in "()" are the same then no nat has been done, or atleast the address hasnt been changed.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 15:24:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213114#M350074</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T15:24:09Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping internet site using source IP of DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213115#M350076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems you provided me lot of useful info today.&lt;/P&gt;&lt;P&gt;I will go through all this info before i move further.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 16:03:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-internet-site-using-source-ip-of-dmz-interface/m-p/2213115#M350076</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-12T16:03:55Z</dc:date>
    </item>
  </channel>
</rss>

