<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing ping from outside to DMZ host of ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190361#M351324</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL is part of the NAT0 configuration. By itself it doesnt do anything. Notice that its used in the "nat" configuration line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the whole configuration I suggested was this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-NAT0 permit ip 192.168.69.0 255.255.255.0 192.168.11.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 0 access-list DMZ-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First we configured the NAT0 ACL and then attached it to a NAT0 configuration command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL basically tells the ASA what traffic it should NOT NAT. When we look at the ACL it defines the source network as 192.168.69.0/24 (DMZ) and the destination network as 192.168.11.0/24 (OUTSIDE). The same operation works OUTSIDE -&amp;gt; DMZ direction which you were&amp;nbsp; actually testing. There are some situations where you might actually&amp;nbsp; need to add a NAT0 configuration on the OUTSIDE interface too but at the&amp;nbsp; moment its not needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "xlate" you listed shouldnt be related to ICMP you were testing at all. This is because we specifically told the ASA that do not NAT traffic between these networks. Furthermore we were testing traffic from OUTSIDE to DMZ and there is no PAT configuration for that direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 21 Apr 2013 17:41:18 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-04-21T17:41:18Z</dc:date>
    <item>
      <title>Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190354#M351317</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For learning purposes i need to allow ping to host in the DMZ from switch which is connected to outside interface of switch.&lt;/P&gt;&lt;P&gt;ASA has direct connection to this switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried these ACL&amp;nbsp; but ping to DMZ host does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL extended permit icmp any host 192.168.69.4 echo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ACL in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190354#M351317</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T01:32:23Z</dc:date>
    </item>
    <item>
      <title>Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190355#M351318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you are talking about the same ASA5505 as yesterday? Can you share the current configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you will probably require either a NAT0 or Static Identity NAT configuration for the DMZ if you want to ping hosts on the DMZ from the OUTSIDE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you mention also what is the IP address of the device from which you try to ping the DMZ host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What type of switch do you have in front of the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Apr 2013 17:07:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190355#M351318</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-21T17:07:20Z</dc:date>
    </item>
    <item>
      <title>Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190356#M351319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch is 3550 running OSPF.&lt;/P&gt;&lt;P&gt;Yes ASA is 5505 home LAB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch interface connected to ASA outside interface has IP of 192.168.11.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sh access-list&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;/P&gt;&lt;P&gt;access-list facebook; 2 elements; name hash: 0x3b7b2306&lt;/P&gt;&lt;P&gt;access-list facebook line 1 extended deny tcp host 192.168.69.4 any eq www log informational interval 300 (hitcnt=28) 0x8d983222&lt;/P&gt;&lt;P&gt;access-list facebook line 2 extended permit tcp any any eq www log informational interval 300 (hitcnt=1641) 0x667cad07&lt;/P&gt;&lt;P&gt;access-list ACL; 1 elements; name hash: 0xdd71d952&lt;/P&gt;&lt;P&gt;access-list ACL line 1 extended permit icmp any host 192.168.69.4 echo (hitcnt=0) 0xa4ac9e3a&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; $&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 11&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.52.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan11&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.11.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan12&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.69.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;regex facebook "\.facebook\.com"&lt;/P&gt;&lt;P&gt;boot system disk0:/asa825-k8.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.52.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan11&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.11.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan12&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.69.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;regex facebook "\.facebook\.com"&lt;/P&gt;&lt;P&gt;boot system disk0:/asa825-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone MST -7&lt;/P&gt;&lt;P&gt;clock summer-time MST recurring&lt;/P&gt;&lt;P&gt;access-list facebook extended deny tcp host 192.168.69.4 any eq www log&lt;/P&gt;&lt;P&gt;access-list facebook extended permit tcp any any eq www log&lt;/P&gt;&lt;P&gt;access-list ACL extended permit icmp any host 192.168.69.4 echo&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm debugging&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-649.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 192.168.69.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group ACL in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.11.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL extended permit icmp any host 192.168.69.4 echo&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm debugging&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-649.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 192.168.69.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group ACL in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.11.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 DMZ&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name CN=ciscoasa&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 DMZ&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name CN=ciscoasa&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; certificate cda15b51&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308201cf 30820138 a0030201 020204cd a15b5130 0d06092a 864886f7 0d010105&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0500302c 3111300f 06035504 03130863 6973636f 61736131 17301506 092a8648&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 86f70d01 09021608 63697363 6f617361 301e170d 31333034 30333033 33313134&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5a170d32 33303430 31303333 3131345a 302c3111 300f0603 55040313 08636973&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 636f6173 61311730 1506092a 864886f7 0d010902 16086369 73636f61 73613081&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100c5 04be4392&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 051ff956 1786981c 6acbe7ed 880bc95a 1c846bf4 19e381f7 f1e8d0d0 e340f86f&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e94ec55b a1714de8 19976ae4 e9196c52 7791873c 794d2eec 4ae90aa5 5b40282c&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3aac7fbb 2a2a2e36 77906a25 a3874d98 7f51e370 266068d8 f5adbd97 bd204ce0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 61943442 ae73ce78 4f2b0daa 53374044 07f4df39 eed0e80c 2b92af02 03010001&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 300d0609 2a864886 f70d0101 05050003 8181001e 41c1636b c86357f6 94585bc0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2fe4bf2f b9f0cc4a 108f3cbf 830ebe54 fb6c87e6 04ad11a4 3fec5ced 5f6f9784&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9f423788 c7de4b5b b7226d81 262ee3b6 ff0adffe 4e49ed7a 42c74d4b f52f0456&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1b8feb3f f19efdc5 adaced62 c4bd7180 107feb06 8658937e 8cb2a154 7486de37&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9b00c44c d17f967e 5fbe4584 c71fd389 55d670&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.0.0 DMZ&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 64.59.144.19&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.52.5-192.168.52.15 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.69.3-192.168.69.20 DMZ&lt;/P&gt;&lt;P&gt;dhcpd enable DMZ&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 192.168.11.1&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username mintoo password AILiHuRWFGgkbsI5 encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map facebook&lt;/P&gt;&lt;P&gt; match access-list facebook&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map type inspect http test&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; match request header host regex facebook&lt;/P&gt;&lt;P&gt;&amp;nbsp; reset log&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt; class facebook&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http test&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection decrement-ttl&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:2583356a780418d5fb8a4cc9f7053826&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is full config of ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Apr 2013 17:11:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190356#M351319</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-04-21T17:11:43Z</dc:date>
    </item>
    <item>
      <title>Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190357#M351320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will probably need for example NAT0 / NAT Exempt configuration on the DMZ interface for these networks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-NAT0 permit ip 192.168.69.0 255.255.255.0 192.168.11.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 0 access-list DMZ-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should make it so that the DMZ network can reach the OUTSIDE network with its original IP addresses. Also OUTSIDE should be able to connect to DMZ also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Apr 2013 17:16:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190357#M351320</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-21T17:16:38Z</dc:date>
    </item>
    <item>
      <title>Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190358#M351321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured ASA&amp;nbsp; with above two commands still unable to ping 192.168.69.4&amp;nbsp; from switch.&lt;/P&gt;&lt;P&gt;Do i need to do anything else on ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Apr 2013 17:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190358#M351321</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-04-21T17:22:36Z</dc:date>
    </item>
    <item>
      <title>Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190359#M351322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You said that the 3550 was running OSPF. So you are using it as a L3 switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the L3 Switch have a route for the network 192.168.69.0/24 pointing towards the ASA OUTSIDE IP address of 192.168.11.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Apr 2013 17:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190359#M351322</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-21T17:24:21Z</dc:date>
    </item>
    <item>
      <title>Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190360#M351323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added static route on 3550&lt;/P&gt;&lt;P&gt;here is output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3550SMIB(config)#ip route 192.168.69.0 255.255.255.0&amp;nbsp; 192.168.11.2&lt;/P&gt;&lt;P&gt;3550SMIB(config)#end&lt;/P&gt;&lt;P&gt;3550SMIB#ping 192.168.69.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.69.4, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It worked now.&lt;/P&gt;&lt;P&gt;Can you please explain me what the ACL&amp;nbsp; did which you told me to configure earlier?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did sh xlate on ASA&amp;nbsp; it shows&lt;/P&gt;&lt;P&gt;PAT Global 192.168.11.2(59578) Local 192.168.69.4(55245)&lt;/P&gt;&lt;P&gt;PAT Global 192.168.11.2(4161) Local 192.168.69.4(49848)&lt;/P&gt;&lt;P&gt;PAT Global 192.168.11.2(5316) Local 192.168.69.5(54904)&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems ACL&amp;nbsp; you told me to config has changed the PAT Global IPfrom 192.168.69.2&amp;nbsp; to 192.168.11.2 right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Apr 2013 17:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190360#M351323</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-04-21T17:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190361#M351324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL is part of the NAT0 configuration. By itself it doesnt do anything. Notice that its used in the "nat" configuration line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the whole configuration I suggested was this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-NAT0 permit ip 192.168.69.0 255.255.255.0 192.168.11.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 0 access-list DMZ-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First we configured the NAT0 ACL and then attached it to a NAT0 configuration command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL basically tells the ASA what traffic it should NOT NAT. When we look at the ACL it defines the source network as 192.168.69.0/24 (DMZ) and the destination network as 192.168.11.0/24 (OUTSIDE). The same operation works OUTSIDE -&amp;gt; DMZ direction which you were&amp;nbsp; actually testing. There are some situations where you might actually&amp;nbsp; need to add a NAT0 configuration on the OUTSIDE interface too but at the&amp;nbsp; moment its not needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "xlate" you listed shouldnt be related to ICMP you were testing at all. This is because we specifically told the ASA that do not NAT traffic between these networks. Furthermore we were testing traffic from OUTSIDE to DMZ and there is no PAT configuration for that direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Apr 2013 17:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190361#M351324</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-21T17:41:18Z</dc:date>
    </item>
    <item>
      <title>Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190362#M351325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i do sh access-list on ASA&amp;nbsp; it shows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL; 1 elements; name hash: 0xdd71d952&lt;/P&gt;&lt;P&gt;access-list ACL line 1 extended permit icmp any host 192.168.69.4 echo (hitcnt=37) 0xa4ac9e3a&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-NAT0 line 1 extended permit ip 192.168.69.0 255.255.255.0 192.168.11.0 255.255.255.0 log informational interval 300 (hitcnt=0) 0x6b886366&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; so when i ping from outside hit count increases thats right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the hit count for ACL DMZ&amp;nbsp; will increase ever or they will remain to zero?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also when i do sh nat on asa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface DMZ:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip DMZ 192.168.69.0 255.255.255.0 outside 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip DMZ 192.168.69.0 255.255.255.0 DMZ 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip DMZ 192.168.69.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.11.2 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 251, untranslate_hits = 23&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip DMZ 192.168.69.0 255.255.255.0 DMZ any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.69.2 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here we see translate hit counts 251 does it say here that NAT from DMZ to outside is working or not?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Apr 2013 18:01:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190362#M351325</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-04-21T18:01:59Z</dc:date>
    </item>
    <item>
      <title>Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190363#M351326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding ACLs that are used in NAT configuration will never get hitcounts. So that "0" will most likely stay at "0" all the time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that the NAT rule that you are looking at that has 251 translate_hits is for Dynamic PAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It basically refers to this configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.69.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yes, this rule is still working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you should also notice is that the NAT0 configuration will only apply to traffic between DMZ 192.168.69.0/24 and OUTSIDE 192.168.11.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So when for example DMZ 192.168.69.0/24 contacts some other network behind the OUTSIDE, for example some other network on the 3550 then the traffic will hit the above Dynamic PAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Apr 2013 18:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190363#M351326</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-21T18:09:10Z</dc:date>
    </item>
    <item>
      <title>Allowing ping from outside to DMZ host of ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190364#M351327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks again.&lt;/P&gt;&lt;P&gt;Learning slowly slowly about ASA&amp;nbsp; config witj your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Apr 2013 18:15:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping-from-outside-to-dmz-host-of-asa/m-p/2190364#M351327</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-04-21T18:15:15Z</dc:date>
    </item>
  </channel>
</rss>

