<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can't Ping FROM ASA Unit to Inet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206642#M350132</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have an interesting issue I can't figure out. My setup is simple; &amp;lt;inside network (192.168.1.x)&amp;gt; -------&amp;gt; ASA---------&amp;gt; Inet.&lt;/P&gt;&lt;P&gt;Clients on the 192.168.1.x subnet can ping 4.2.2.2 and get icmp replies with no problem. However, if I try to do an extended ping from the ASA unit itself I get nothing. What am I missing? Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 173.163.x.x &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif public&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface Vlan50&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;boot system disk0:/asdm-631.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 4.2.2.2&lt;/P&gt;&lt;P&gt; domain-name xxxxx&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.2.0&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.0&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.3.0&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.9&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.9-01&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.12&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.9-02&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.22&lt;/P&gt;&lt;P&gt;object-group network obj_any&lt;/P&gt;&lt;P&gt;object-group network obj_any-01&lt;/P&gt;&lt;P&gt;object-group network inside&lt;/P&gt;&lt;P&gt; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network vpnclients&lt;/P&gt;&lt;P&gt; network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 173.163.161.1 eq smtp &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 173.163.161.1 eq https &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 173.163.161.2 eq https &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 173.163.161.1 eq imap4 &lt;/P&gt;&lt;P&gt;access-list smtp extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list smtp extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list smtp extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 173.163.x.x eq 9676 &lt;/P&gt;&lt;P&gt;access-list split-tunnel extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_20_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Throttle extended permit ip 192.168.5.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list Throttle extended permit ip any 192.168.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended permit tcp host 172.16.1.2 host 192.168.1.4 eq ldap &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended permit tcp host 172.16.1.2 host 192.168.1.9 eq smtp &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended permit tcp host 172.16.1.2 host 192.168.1.9 eq 995 &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended permit tcp host 172.16.1.2 host 192.168.1.2 eq 9676 &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended deny ip 172.16.1.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_30_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list test webtype permit tcp 192.168.1.0 255.255.255.0 log default&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffer-size 10000&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap warnings&lt;/P&gt;&lt;P&gt;logging history errors&lt;/P&gt;&lt;P&gt;logging asdm notifications&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.7&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.3 format emblem&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.44&lt;/P&gt;&lt;P&gt;logging debug-trace&lt;/P&gt;&lt;P&gt;logging permit-hostdown&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu public 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;ip local pool xxxxxx 192.168.2.0-192.168.2.253 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-621.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 2 173.163.x.x netmask 255.255.255.248&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (public) 2 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.1.9 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https 192.168.1.9 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface imap4 192.168.1.9 imap4 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 173.163.x.x https 192.168.1.12 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 173.163.161.3 172.16.1.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group smtp in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ_INSIDE in interface DMZ&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 173.163.161.6 1&lt;/P&gt;&lt;P&gt;route inside 10.10.1.0 255.255.255.0 192.168.1.201 1&lt;/P&gt;&lt;P&gt;route inside 10.10.10.0 255.255.255.0 192.168.1.46 1&lt;/P&gt;&lt;P&gt;route inside 10.10.20.0 255.255.255.0 192.168.1.201 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server VpnUsers protocol radius&lt;/P&gt;&lt;P&gt;aaa-server VpnUsers (inside) host 192.168.1.4&lt;/P&gt;&lt;P&gt; timeout 5&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; key E2:8Fbgyhbs&lt;/P&gt;&lt;P&gt;aaa-server AD_Auth protocol nt&lt;/P&gt;&lt;P&gt;aaa-server AD_Auth (inside) host 192.168.1.4&lt;/P&gt;&lt;P&gt; nt-auth-domain-controller 192.168.1.4&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 74.212.x.x 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;snmp-server host inside 192.168.1.2 community 53cur3-n3t&lt;/P&gt;&lt;P&gt;snmp-server host inside 192.168.1.7 community 53cur3-n3t&lt;/P&gt;&lt;P&gt;snmp-server host outside 74.212.x.xcommunity L3t-th3-l1ght-1n&lt;/P&gt;&lt;P&gt;snmp-server location DC Server Room&lt;/P&gt;&lt;P&gt;snmp-server contact Dan Steier&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sysopt connection tcpmss 1300&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto ipsec df-bit clear-df inside&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 60 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 60 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 60 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 80 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 80 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 80 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 80 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 100 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 100 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 100 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 100 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 120 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 120 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 120 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 120 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 140 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 140 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 140 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 140 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address outside_20_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set peer 74.42.x.x&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 30 match address outside_30_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 30 set peer 66.152.x.x &lt;/P&gt;&lt;P&gt;crypto map outside_map 30 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 10&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 74.212.x.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 10&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.5.10-192.168.5.200 public&lt;/P&gt;&lt;P&gt;dhcpd dns 208.67.220.220 208.67.222.222 interface public&lt;/P&gt;&lt;P&gt;dhcpd enable public&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;tftp-server inside 192.168.1.7 c:\tftp-root&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy phccabington internal&lt;/P&gt;&lt;P&gt;group-policy phccabington attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.1.4 192.168.1.6&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.4 192.168.1.6&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split-tunnel&lt;/P&gt;&lt;P&gt; default-domain value phcc.int&lt;/P&gt;&lt;P&gt;group-policy phccvpn internal&lt;/P&gt;&lt;P&gt;group-policy phccvpn attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.1.4 192.168.1.6&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.4 192.168.1.6&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split-tunnel&lt;/P&gt;&lt;P&gt; default-domain value&lt;/P&gt;&lt;P&gt;username password A5oXdNd3.3sEhzYt encrypted privilege 0&lt;/P&gt;&lt;P&gt;username admin password Qyt908tEpeoOu0oA encrypted&lt;/P&gt;&lt;P&gt;username d password IdYn1VlBhGzwvlxo encrypted privilege 15&lt;/P&gt;&lt;P&gt;username d attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy phccabington&lt;/P&gt;&lt;P&gt;username lstech password ucUIkhrdvF2Z0BY9 encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;tunnel-group phccvpn type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group phccvpn general-attributes&lt;/P&gt;&lt;P&gt; address-pool phccabington&lt;/P&gt;&lt;P&gt; authentication-server-group PhccVpnUsers&lt;/P&gt;&lt;P&gt; default-group-policy phccvpn&lt;/P&gt;&lt;P&gt;tunnel-group phccvpn ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;tunnel-group 74.42.x.x type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 74.42.x.xipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;tunnel-group 66.152.x.x type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 66.152.x.x ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map CM-Public&lt;/P&gt;&lt;P&gt; match access-list Throttle&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map PM-BWcontrol&lt;/P&gt;&lt;P&gt; class CM-Public&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 1000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 5000000&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:41:31 GMT</pubDate>
    <dc:creator>Danny Steier</dc:creator>
    <dc:date>2019-03-12T01:41:31Z</dc:date>
    <item>
      <title>Can't Ping FROM ASA Unit to Inet</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206642#M350132</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have an interesting issue I can't figure out. My setup is simple; &amp;lt;inside network (192.168.1.x)&amp;gt; -------&amp;gt; ASA---------&amp;gt; Inet.&lt;/P&gt;&lt;P&gt;Clients on the 192.168.1.x subnet can ping 4.2.2.2 and get icmp replies with no problem. However, if I try to do an extended ping from the ASA unit itself I get nothing. What am I missing? Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 173.163.x.x &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif public&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface Vlan50&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;boot system disk0:/asdm-631.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 4.2.2.2&lt;/P&gt;&lt;P&gt; domain-name xxxxx&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.2.0&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.0&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.3.0&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.9&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.9-01&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.12&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.9-02&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.22&lt;/P&gt;&lt;P&gt;object-group network obj_any&lt;/P&gt;&lt;P&gt;object-group network obj_any-01&lt;/P&gt;&lt;P&gt;object-group network inside&lt;/P&gt;&lt;P&gt; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network vpnclients&lt;/P&gt;&lt;P&gt; network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 173.163.161.1 eq smtp &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 173.163.161.1 eq https &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 173.163.161.2 eq https &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 173.163.161.1 eq imap4 &lt;/P&gt;&lt;P&gt;access-list smtp extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list smtp extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list smtp extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 173.163.x.x eq 9676 &lt;/P&gt;&lt;P&gt;access-list split-tunnel extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_20_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Throttle extended permit ip 192.168.5.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list Throttle extended permit ip any 192.168.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended permit tcp host 172.16.1.2 host 192.168.1.4 eq ldap &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended permit tcp host 172.16.1.2 host 192.168.1.9 eq smtp &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended permit tcp host 172.16.1.2 host 192.168.1.9 eq 995 &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended permit tcp host 172.16.1.2 host 192.168.1.2 eq 9676 &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended deny ip 172.16.1.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list DMZ_INSIDE extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_30_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list test webtype permit tcp 192.168.1.0 255.255.255.0 log default&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffer-size 10000&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap warnings&lt;/P&gt;&lt;P&gt;logging history errors&lt;/P&gt;&lt;P&gt;logging asdm notifications&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.7&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.3 format emblem&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.44&lt;/P&gt;&lt;P&gt;logging debug-trace&lt;/P&gt;&lt;P&gt;logging permit-hostdown&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu public 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;ip local pool xxxxxx 192.168.2.0-192.168.2.253 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-621.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 2 173.163.x.x netmask 255.255.255.248&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (public) 2 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.1.9 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https 192.168.1.9 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface imap4 192.168.1.9 imap4 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 173.163.x.x https 192.168.1.12 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 173.163.161.3 172.16.1.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group smtp in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ_INSIDE in interface DMZ&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 173.163.161.6 1&lt;/P&gt;&lt;P&gt;route inside 10.10.1.0 255.255.255.0 192.168.1.201 1&lt;/P&gt;&lt;P&gt;route inside 10.10.10.0 255.255.255.0 192.168.1.46 1&lt;/P&gt;&lt;P&gt;route inside 10.10.20.0 255.255.255.0 192.168.1.201 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server VpnUsers protocol radius&lt;/P&gt;&lt;P&gt;aaa-server VpnUsers (inside) host 192.168.1.4&lt;/P&gt;&lt;P&gt; timeout 5&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; key E2:8Fbgyhbs&lt;/P&gt;&lt;P&gt;aaa-server AD_Auth protocol nt&lt;/P&gt;&lt;P&gt;aaa-server AD_Auth (inside) host 192.168.1.4&lt;/P&gt;&lt;P&gt; nt-auth-domain-controller 192.168.1.4&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 74.212.x.x 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;snmp-server host inside 192.168.1.2 community 53cur3-n3t&lt;/P&gt;&lt;P&gt;snmp-server host inside 192.168.1.7 community 53cur3-n3t&lt;/P&gt;&lt;P&gt;snmp-server host outside 74.212.x.xcommunity L3t-th3-l1ght-1n&lt;/P&gt;&lt;P&gt;snmp-server location DC Server Room&lt;/P&gt;&lt;P&gt;snmp-server contact Dan Steier&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sysopt connection tcpmss 1300&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto ipsec df-bit clear-df inside&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 60 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 60 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 60 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 80 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 80 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 80 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 80 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 100 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 100 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 100 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 100 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 120 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 120 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 120 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 120 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 140 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 140 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 140 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 140 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address outside_20_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set peer 74.42.x.x&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 30 match address outside_30_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 30 set peer 66.152.x.x &lt;/P&gt;&lt;P&gt;crypto map outside_map 30 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 10&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 74.212.x.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 10&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.5.10-192.168.5.200 public&lt;/P&gt;&lt;P&gt;dhcpd dns 208.67.220.220 208.67.222.222 interface public&lt;/P&gt;&lt;P&gt;dhcpd enable public&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;tftp-server inside 192.168.1.7 c:\tftp-root&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy phccabington internal&lt;/P&gt;&lt;P&gt;group-policy phccabington attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.1.4 192.168.1.6&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.4 192.168.1.6&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split-tunnel&lt;/P&gt;&lt;P&gt; default-domain value phcc.int&lt;/P&gt;&lt;P&gt;group-policy phccvpn internal&lt;/P&gt;&lt;P&gt;group-policy phccvpn attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.1.4 192.168.1.6&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.4 192.168.1.6&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split-tunnel&lt;/P&gt;&lt;P&gt; default-domain value&lt;/P&gt;&lt;P&gt;username password A5oXdNd3.3sEhzYt encrypted privilege 0&lt;/P&gt;&lt;P&gt;username admin password Qyt908tEpeoOu0oA encrypted&lt;/P&gt;&lt;P&gt;username d password IdYn1VlBhGzwvlxo encrypted privilege 15&lt;/P&gt;&lt;P&gt;username d attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy phccabington&lt;/P&gt;&lt;P&gt;username lstech password ucUIkhrdvF2Z0BY9 encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;tunnel-group phccvpn type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group phccvpn general-attributes&lt;/P&gt;&lt;P&gt; address-pool phccabington&lt;/P&gt;&lt;P&gt; authentication-server-group PhccVpnUsers&lt;/P&gt;&lt;P&gt; default-group-policy phccvpn&lt;/P&gt;&lt;P&gt;tunnel-group phccvpn ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;tunnel-group 74.42.x.x type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 74.42.x.xipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;tunnel-group 66.152.x.x type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 66.152.x.x ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map CM-Public&lt;/P&gt;&lt;P&gt; match access-list Throttle&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map PM-BWcontrol&lt;/P&gt;&lt;P&gt; class CM-Public&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 1000000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 5000000&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:41:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206642#M350132</guid>
      <dc:creator>Danny Steier</dc:creator>
      <dc:date>2019-03-12T01:41:31Z</dc:date>
    </item>
    <item>
      <title>Can't Ping FROM ASA Unit to Inet</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206643#M350133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you copy/paste the exact command used on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA generally controls ICMP messages of all kind towards it interfaces with the command "icmp"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You seem to currently have it block every type of ICMP message from any source address on the "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp deny any outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 16:29:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206643#M350133</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-10T16:29:57Z</dc:date>
    </item>
    <item>
      <title>Can't Ping FROM ASA Unit to Inet</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206644#M350134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The actual "icmp" could be configured like this I guess&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no icmp deny any outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any echo-reply outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any time-exceeded outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any unreachable outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp deny any outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 16:41:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206644#M350134</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-10T16:41:08Z</dc:date>
    </item>
    <item>
      <title>Can't Ping FROM ASA Unit to Inet</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206645#M350135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oops! I didn't see that...wow (feeling really dumb right now). Thanks for pointing out what I overlooked!! I removed it and I can now ping from the ASA.&amp;nbsp; Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 18:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206645#M350135</guid>
      <dc:creator>Danny Steier</dc:creator>
      <dc:date>2013-05-10T18:22:37Z</dc:date>
    </item>
    <item>
      <title>Can't Ping FROM ASA Unit to Inet</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206646#M350136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark the question as answered &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 18:27:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-from-asa-unit-to-inet/m-p/2206646#M350136</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-10T18:27:34Z</dc:date>
    </item>
  </channel>
</rss>

