<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Basics: v8.6 not passing traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179173#M351430</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to configure this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit xxx.44.38.44 255.255.255.248 OUTSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturaly replace the "x" with the actual public network address. After this try the ICMP from the ASA to the outside PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be able to ICMP/PING the Router behind the ASA from the Public network you would need a Static NAT for the Router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provided you have a public IP address to spare for this you could configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-ROUTER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.112.64.222&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (INSIDE_SIT,OUTSIDE) static &lt;SPARE public="" ip=""&gt;&lt;/SPARE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Apr 2013 14:13:33 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-04-19T14:13:33Z</dc:date>
    <item>
      <title>ASA Basics: v8.6 not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179168#M351425</link>
      <description>&lt;P&gt;Access-list ALL IP any any&lt;/P&gt;&lt;P&gt;Access-list all ICMP any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ALL applied to all interfaces, in and out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;traffic not passing through&lt;/P&gt;&lt;P&gt;from ASA ping external IPs work via some interfaces and not other&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need your help to get the traffic through the ASA.&lt;/P&gt;&lt;P&gt;Any instrctions required?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179168#M351425</guid>
      <dc:creator>S.Srivas_2</dc:creator>
      <dc:date>2019-03-12T01:31:38Z</dc:date>
    </item>
    <item>
      <title>ASA Basics: v8.6 not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179169#M351426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure you have configured NAT for all users?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the ASA configuraitons?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 12:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179169#M351426</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-19T12:26:41Z</dc:date>
    </item>
    <item>
      <title>ASA Basics: v8.6 not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179170#M351427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Please find listed is the config below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh runn&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.6(1)2 &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password /Omn2PFOBnGlk6iW encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif OUTSIDE&lt;BR /&gt; security-level 10&lt;BR /&gt; ip address XXX.44.38.44 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; shutdown&lt;BR /&gt; nameif OUTSIDE_notyet&lt;BR /&gt; security-level 99&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; nameif INSIDE_SIT&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.112.64.1 255.255.248.0 &lt;BR /&gt;!&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; nameif INSIDE_UAT_notyet&lt;BR /&gt; security-level 1&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif NetMGT&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;boot system disk0:/asa861-2-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj-Switch-10.98.74.2&lt;BR /&gt; host 10.98.74.2&lt;BR /&gt;object network obj-HMC-1-10.74.132.22&lt;BR /&gt; host 10.74.132.22&lt;BR /&gt;object network obj-CSM-10.74.132.21&lt;BR /&gt; host 10.74.132.21&lt;BR /&gt;access-list ALL extended permit ip any any &lt;BR /&gt;access-list ALL extended permit icmp any any &lt;BR /&gt;access-list ALL extended permit tcp any any &lt;BR /&gt;access-list ALL extended permit udp any any &lt;BR /&gt;access-list ALL extended permit icmp any any echo &lt;BR /&gt;access-list ALL extended permit icmp any any echo-reply &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu OUTSIDE_notyet 1500&lt;BR /&gt;mtu INSIDE_SIT 1500&lt;BR /&gt;mtu INSIDE_UAT_notyet 1500&lt;BR /&gt;mtu NetMGT 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-66114.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network obj-Switch-10.98.74.2&lt;BR /&gt; nat (INSIDE_SIT,OUTSIDE) static YYY.111.27.8&lt;BR /&gt;object network obj-HMC-1-10.74.132.22&lt;BR /&gt; nat (INSIDE_SIT,OUTSIDE) static YYY.111.27.9&lt;BR /&gt;object network obj-CSM-10.74.132.21&lt;BR /&gt; nat (INSIDE_SIT,OUTSIDE) static YYY.111.27.10&lt;BR /&gt;access-group ALL in interface OUTSIDE&lt;BR /&gt;access-group ALL out interface OUTSIDE&lt;BR /&gt;access-group ALL in interface INSIDE_SIT&lt;BR /&gt;access-group ALL out interface INSIDE_SIT&lt;BR /&gt;access-group ALL in interface NetMGT&lt;BR /&gt;access-group ALL out interface NetMGT&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 XXX.44.38.41 1&lt;BR /&gt;route INSIDE_SIT 10.74.132.0 255.255.255.0 10.112.64.222 1&lt;BR /&gt;route INSIDE_SIT YYY.111.27.0 255.255.255.248 10.112.64.222 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 NetMGT&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 NetMGT&lt;BR /&gt;dhcpd enable NetMGT&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption des-sha1&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Cryptochecksum:b1ec95bb23b2a7fbc3177b8774527f15&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;ciscoasa# sh ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.6(1)2 &lt;BR /&gt;Device Manager Version 6.6(1)&lt;/P&gt;&lt;P&gt;Compiled on Fri 01-Jun-12 02:16 by builders&lt;BR /&gt;System image file is "disk0:/asa861-2-smp-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;ciscoasa up 7 mins 35 secs&lt;/P&gt;&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5512, 4096 MB RAM, CPU Clarkdale 2793 MHz, 1 CPU (2 cores)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASA: 2048 MB RAM, 1 CPU (1 core)&lt;BR /&gt;Internal ATA Compact Flash, 4096MB&lt;BR /&gt;BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-55xx on-board accelerator (revision 0x1)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Boot microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CNPx-MC-BOOT-2.00&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL/IKE microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CNPx-MC-SSL-PLUS-0014&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPSec microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CNPx-MC-IPSEC-MAIN-0014&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of accelerators: 1&lt;BR /&gt;Baseboard Management Controller (revision 0x1) Firmware Version: 2.4&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; 0: Int: Internal-Data0/0&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is b0fa.eb97.fc1e, irq 11&lt;BR /&gt; 1: Ext: GigabitEthernet0/0&amp;nbsp; : address is b0fa.eb97.fc22, irq 10&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; 2: Ext: GigabitEthernet0/1&amp;nbsp; : address is b0fa.eb97.fc1f, irq 10&lt;BR /&gt; 3: Ext: GigabitEthernet0/2&amp;nbsp; : address is b0fa.eb97.fc23, irq 5&lt;BR /&gt; 4: Ext: GigabitEthernet0/3&amp;nbsp; : address is b0fa.eb97.fc20, irq 5&lt;BR /&gt; 5: Ext: GigabitEthernet0/4&amp;nbsp; : address is b0fa.eb97.fc24, irq 10&lt;BR /&gt; 6: Ext: GigabitEthernet0/5&amp;nbsp; : address is b0fa.eb97.fc21, irq 10&lt;BR /&gt; 7: Int: Internal-Data0/1&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0000.0001.0002, irq 0&lt;BR /&gt; 8: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0&lt;BR /&gt; 9: Int: Internal-Data0/2&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is 0000.0001.0003, irq 0&lt;BR /&gt;10: Ext: Management0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : address is b0fa.eb97.fc1e, irq 0&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Maximum VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 50&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;VPN-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;VPN-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Security Contexts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;GTP/GPRS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Premium Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Other VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 250&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Total VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 250&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Shared License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Advanced Endpoint Assessment&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;UC Phone Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Total UC Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Botnet Traffic Filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Intercompany Media Engine&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;IPS Module&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;This platform has a Base license.&lt;/P&gt;&lt;P&gt;Serial Number: FCH1705J532&lt;BR /&gt;Running Permanent Activation Key: 0x3705fa5d 0xa8b89a15 0xa5a1f9dc 0xede83004 0x8137d49b &lt;BR /&gt;Configuration register is 0x1&lt;BR /&gt;Configuration has not been modified since last system restart.&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp; &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 12:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179170#M351427</guid>
      <dc:creator>S.Srivas_2</dc:creator>
      <dc:date>2013-04-19T12:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Basics: v8.6 not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179171#M351428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The are some oddities/problems with the configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First I would suggest changing the "security-level" values to something more basic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also it seems to me that you are lacking some NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example the Dynamic PAT for basic Internet access for the LAN networks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DEFAULT-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.74.132.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.112.64.0 255.255.248.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (INSIDE_SIT,OUTSIDE) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you have some "object" and "nat" configurations for a local address that I dont see in your "route" commands or interface network ranges. Specifically this one&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-Switch-10.98.74.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.98.74.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (INSIDE_SIT,OUTSIDE) static YYY.111.27.8&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see a network including the address 10.98.72.2 anywhere on the above ASA configurations? There is no route for it and there is no interface configured which has that address space.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also even though you have opened all traffic I would suggest the following configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also recomend removing these ACL. Partly because they are not needed, partly because they pose a security risk.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group ALL in interface OUTSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group ALL out interface OUTSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group ALL out interface INSIDE_SIT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 13:21:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179171#M351428</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-19T13:21:05Z</dc:date>
    </item>
    <item>
      <title>ASA Basics: v8.6 not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179172#M351429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed the security levels. For now I am interested in passing traffic through and will look at the static NAT later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem I have at the moment, if I ping from outside PC (gatewway) via interface inside-sit local link to router 10.112.64.222, it does not work, telnet does not work too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC(xxx.44.38.41)-----(outside XXX.44.38.44)------&amp;gt;ASA------(inside_SIT 10.112.64.1)----------&amp;gt;router (10.112.64.222)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Strangely, I can ping from the outside pc (.41) to outside interface (.44) but ASA cannot ping the outside PC (.41)!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The new config listing is given below. Appreciate your help on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh runn&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.6(1)2 &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password /Omn2PFOBnGlk6iW encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif OUTSIDE&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address XXX.44.38.44 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; shutdown&lt;BR /&gt; nameif OUTSIDE_notyet&lt;BR /&gt; security-level 5&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; nameif INSIDE_SIT&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.112.64.1 255.255.248.0 &lt;BR /&gt;!&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; nameif INSIDE_UAT_notyet&lt;BR /&gt; security-level 95&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; security-level 90&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif NetMGT&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;boot system disk0:/asa861-2-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj-Switch-10.98.74.2&lt;BR /&gt; host 10.98.74.2&lt;BR /&gt;object network obj-HMC-1-10.74.132.22&lt;BR /&gt; host 10.74.132.22&lt;BR /&gt;object network obj-CSM-10.74.132.21&lt;BR /&gt; host 10.74.132.21&lt;BR /&gt;object-group network DEFAULT-PAT-SOURCE&lt;BR /&gt; network-object 10.74.132.0 255.255.255.0&lt;BR /&gt; network-object 10.112.64.0 255.255.248.0&lt;BR /&gt;access-list ALL extended permit ip any any &lt;BR /&gt;access-list ALL extended permit icmp any any &lt;BR /&gt;access-list ALL extended permit tcp any any &lt;BR /&gt;access-list ALL extended permit udp any any &lt;BR /&gt;access-list ALL extended permit icmp any any echo &lt;BR /&gt;access-list ALL extended permit icmp any any echo-reply &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu OUTSIDE_notyet 1500&lt;BR /&gt;mtu INSIDE_SIT 1500&lt;BR /&gt;mtu INSIDE_UAT_notyet 1500&lt;BR /&gt;mtu NetMGT 1500&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-66114.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network obj-Switch-10.98.74.2&lt;BR /&gt; nat (INSIDE_SIT,OUTSIDE) static YYY.111.27.8&lt;BR /&gt;object network obj-HMC-1-10.74.132.22&lt;BR /&gt; nat (INSIDE_SIT,OUTSIDE) static YYY.111.27.9&lt;BR /&gt;object network obj-CSM-10.74.132.21&lt;BR /&gt; nat (INSIDE_SIT,OUTSIDE) static YYY.111.27.10&lt;BR /&gt;!&lt;BR /&gt;nat (INSIDE_SIT,OUTSIDE) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;BR /&gt;access-group ALL in interface OUTSIDE&lt;BR /&gt;access-group ALL out interface OUTSIDE&lt;BR /&gt;access-group ALL in interface INSIDE_SIT&lt;BR /&gt;access-group ALL out interface INSIDE_SIT&lt;BR /&gt;access-group ALL in interface NetMGT&lt;BR /&gt;access-group ALL out interface NetMGT&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 XXX.44.38.41 1&lt;BR /&gt;route INSIDE_SIT 10.74.132.0 255.255.255.0 10.112.64.222 1&lt;BR /&gt;route INSIDE_SIT 10.98.74.0 255.255.255.0 10.112.64.222 1&lt;BR /&gt;route INSIDE_SIT YYY.111.27.0 255.255.255.248 10.112.64.222 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 NetMGT&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 NetMGT&lt;BR /&gt;dhcpd enable NetMGT&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption des-sha1&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:e5787db25a923493187605b7393efe70&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 14:05:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179172#M351429</guid>
      <dc:creator>S.Srivas_2</dc:creator>
      <dc:date>2013-04-19T14:05:45Z</dc:date>
    </item>
    <item>
      <title>ASA Basics: v8.6 not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179173#M351430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to configure this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit xxx.44.38.44 255.255.255.248 OUTSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturaly replace the "x" with the actual public network address. After this try the ICMP from the ASA to the outside PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be able to ICMP/PING the Router behind the ASA from the Public network you would need a Static NAT for the Router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provided you have a public IP address to spare for this you could configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-ROUTER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.112.64.222&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (INSIDE_SIT,OUTSIDE) static &lt;SPARE public="" ip=""&gt;&lt;/SPARE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 14:13:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179173#M351430</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-19T14:13:33Z</dc:date>
    </item>
    <item>
      <title>ASA Basics: v8.6 not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179174#M351431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have just tried that, but still not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other suggestion?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 14:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179174#M351431</guid>
      <dc:creator>S.Srivas_2</dc:creator>
      <dc:date>2013-04-19T14:39:52Z</dc:date>
    </item>
    <item>
      <title>ASA Basics: v8.6 not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179175#M351432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you specify what is not working as there was multiple things that were not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ASA outside and the PC on outside are in the same subnet they should be able to see eachother directly. Are you sure the PC itself isnt preventing the ICMP? It wouldnt be anything uncommon if the PC has firewall settings preventing this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA you can naturally use the "show arp" command which should list all the host that the ASA sees in directly connected network. If you dont see some host directly connected you can always ping those IP addresses and then re-issue the command "show arp".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you mean that also the connection to the router behind that ASA doesnt work then can you share the NAT configuration you made for it? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also seems you have not added the ICMP inspection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 17:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179175#M351432</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-19T17:15:28Z</dc:date>
    </item>
    <item>
      <title>ASA Basics: v8.6 not passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179176#M351433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It works.&lt;/P&gt;&lt;P&gt;The config was OK. The end stations (Laptop and Switch/Router) routing was not accurate. It is now fied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you Jouni Foress for all the help..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Apr 2013 19:49:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basics-v8-6-not-passing-traffic/m-p/2179176#M351433</guid>
      <dc:creator>S.Srivas_2</dc:creator>
      <dc:date>2013-04-22T19:49:01Z</dc:date>
    </item>
  </channel>
</rss>

