<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ping to Switch in DMZ not working from Edge Switch in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209707#M357628</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that before you added that ACL rule/line, the network 192.168.69.0/24 had the following NAT rules on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-NAT0 extended permit ip 192.168.69.0 255.255.255.0 192.168.11.0 255.255.255.0 log &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 0 access-list DMZ-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.69.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short the above states&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;For traffic between 192.168.69.0/24 and 192.168.10.0/24 is NOT NATed (applies to which ever network opens the connection)&lt;/LI&gt;&lt;LI&gt;For traffic from network 192.168.69.0/24 towards any other network the Dynamic PAT is applied and the source address is PATed to the "outside" interface IP address&lt;/LI&gt;&lt;LI&gt;Naturally also any connection attempted from any other "outside" network wont match any NAT rule and get dropped on the ASA&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as you can see the only network for which NO NAT will be done is the remote network 192.168.11.0/24 which is the network between the ASA and Switch-2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice now that the network between Switch-2 and Switch-1 is the network 192.168.10.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you issue the PING command on the Switch-1 towards the DMZ IP address it will use the source address 192.168.10.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So since the ASA doesnt have a NAT0 rule for traffic between networks 192.168.69.0/24 and 192.168.10.0/24 then the ICMP wont succeed even if we have the routing otherwise fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you added the ACL I suggested the ASA knows that it shouldnt apply any NAT between those 2 networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 11 May 2013 15:29:23 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-11T15:29:23Z</dc:date>
    <item>
      <title>Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209700#M357621</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is my home Lab setup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sw1----trunk ----ospf&amp;nbsp; sw2-------direct conenction to ASA------DMZ&amp;nbsp; ------SW3 -------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch3 has SVI IP 192.168.69.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the IP 169.168.69.1 from sw2 as this has default static route to ASA outside interface IP address.&lt;/P&gt;&lt;P&gt;But i can not ping IP 192.168.69.1 from SW1 need to why ?&lt;/P&gt;&lt;P&gt;is this default behaviour?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On switch 1 i add the static route 192.168.69.0 255.255.255.0 192.168.11.1&lt;/P&gt;&lt;P&gt;Where 192.168.11.1&amp;nbsp; is interface IP of Sw2 which has direct connection to ASA outside Interface IP ---192.168.11.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also i define Loopback IP 192.167.77.1&amp;nbsp; on Sw3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This IP i can ping from Sw1&amp;nbsp; but IP 192.168.69.1 i can not ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I define below static route of Sw1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.77.0 255.255.255.0 192.168.10.2&lt;/P&gt;&lt;P&gt;where 10.2 is vlan 10 IP&amp;nbsp; on Sw2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: mahesh parmar&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:41:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209700#M357621</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T01:41:49Z</dc:date>
    </item>
    <item>
      <title>Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209701#M357622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not 100% sure on the setup. Would it be possible to see the configurations of each device in the homelab?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 May 2013 11:19:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209701#M357622</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-11T11:19:59Z</dc:date>
    </item>
    <item>
      <title>Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209702#M357623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have attached the config of all the 4 devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3550A&amp;nbsp;&amp;nbsp; ---------------switch1&lt;/P&gt;&lt;P&gt;3550b------------------switch2&lt;/P&gt;&lt;P&gt;switch------------------switch 3&amp;nbsp; direct connection to DMZ&amp;nbsp; of ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 May 2013 13:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209702#M357623</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-11T13:58:20Z</dc:date>
    </item>
    <item>
      <title>Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209703#M357624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the output of "show ip route" from the SW1?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you say that you have the following static route on SW1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.69.0 255.255.255.0 192.168.11.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldnt the gateway IP perhaps be 192.168.10.2 instead of 192.168.11.1?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might also need some NAT0 rules added on teh DMZ.NAT0 ACL on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 May 2013 14:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209703#M357624</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-11T14:52:54Z</dc:date>
    </item>
    <item>
      <title>Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209704#M357625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yesterday i already tried with gateway IP of 192.168.10.2&amp;nbsp; it did&amp;nbsp; not work then i used 11.1 as gateway same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today i tried again same thing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3550SMIA(config)#ip route 192.168.69.0 255.255.255.0 192.168.10.2&lt;/P&gt;&lt;P&gt;3550SMIA(config)#end&lt;/P&gt;&lt;P&gt;3550SMIA#ping 192.168.69.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.69.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;3550SMIA#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is sh ip route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3550SMIA# sh ip route&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; o - ODR, P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 192.168.5.3 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100.0.0.0/32 is subnetted, 1 subnets&lt;/P&gt;&lt;P&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100.100.100.100 [110/3] via 192.168.5.3, 5d02h, FastEthernet0/11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.0.0.0/8 is variably subnetted, 2 subnets, 2 masks&lt;/P&gt;&lt;P&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.3.3.3/32 [110/2] via 192.168.5.3, 5d02h, FastEthernet0/11&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.4.4.0/24 is directly connected, Loopback0&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.30.0/24 is directly connected, Vlan30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 64.0.0.0/32 is subnetted, 1 subnets&lt;/P&gt;&lt;P&gt;O E2&amp;nbsp;&amp;nbsp;&amp;nbsp; 64.59.135.150 [110/300] via 192.168.5.3, 5d02h, FastEthernet0/11&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.77.0/24 [1/0] via 192.168.10.2&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.0/24 is directly connected, Vlan10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.0.0/24 is subnetted, 4 subnets&lt;/P&gt;&lt;P&gt;O E2&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.3.0 [110/300] via 192.168.5.3, 5d02h, FastEthernet0/11&lt;/P&gt;&lt;P&gt;O E2&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.2.0 [110/300] via 192.168.5.3, 5d02h, FastEthernet0/11&lt;/P&gt;&lt;P&gt;O E2&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.1.0 [110/300] via 192.168.5.3, 5d02h, FastEthernet0/11&lt;/P&gt;&lt;P&gt;O E2&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.0.0 [110/300] via 192.168.5.3, 5d02h, FastEthernet0/11&lt;/P&gt;&lt;P&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.0/24 [110/3] via 192.168.5.3, 5d02h, FastEthernet0/11&lt;/P&gt;&lt;P&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.98.0/24 [110/2] via 192.168.99.1, 5d02h, FastEthernet0/8&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.99.0/24 is directly connected, FastEthernet0/8&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.20.0/24 is directly connected, Vlan20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.0/31 is subnetted, 1 subnets&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.2 is directly connected, FastEthernet0/11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.6.0/31 is subnetted, 1 subnets&lt;/P&gt;&lt;P&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.6.2 [110/2] via 192.168.5.3, 5d02h, FastEthernet0/11&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.69.0/24 [1/0] via 192.168.10.2&lt;/P&gt;&lt;P&gt;O*E2 0.0.0.0/0 [110/1] via 192.168.5.3, 5d02h, FastEthernet0/11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 May 2013 15:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209704#M357625</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-11T15:01:40Z</dc:date>
    </item>
    <item>
      <title>Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209705#M357626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you add this on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-NAT0 extended permit ip 192.168.69.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then try the ICMP again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 May 2013 15:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209705#M357626</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-11T15:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209706#M357627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As soon i added the statement in ASA ping worked&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3550SMIA#ping 192.168.69.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.69.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please explain me what magic was done by that config ?&lt;/P&gt;&lt;P&gt;it was working fine for 192.168.77.1 but not for 192.168.69.1 need to know why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 May 2013 15:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209706#M357627</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-11T15:19:38Z</dc:date>
    </item>
    <item>
      <title>Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209707#M357628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that before you added that ACL rule/line, the network 192.168.69.0/24 had the following NAT rules on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-NAT0 extended permit ip 192.168.69.0 255.255.255.0 192.168.11.0 255.255.255.0 log &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 0 access-list DMZ-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.69.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short the above states&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;For traffic between 192.168.69.0/24 and 192.168.10.0/24 is NOT NATed (applies to which ever network opens the connection)&lt;/LI&gt;&lt;LI&gt;For traffic from network 192.168.69.0/24 towards any other network the Dynamic PAT is applied and the source address is PATed to the "outside" interface IP address&lt;/LI&gt;&lt;LI&gt;Naturally also any connection attempted from any other "outside" network wont match any NAT rule and get dropped on the ASA&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as you can see the only network for which NO NAT will be done is the remote network 192.168.11.0/24 which is the network between the ASA and Switch-2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice now that the network between Switch-2 and Switch-1 is the network 192.168.10.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you issue the PING command on the Switch-1 towards the DMZ IP address it will use the source address 192.168.10.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So since the ASA doesnt have a NAT0 rule for traffic between networks 192.168.69.0/24 and 192.168.10.0/24 then the ICMP wont succeed even if we have the routing otherwise fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you added the ACL I suggested the ASA knows that it shouldnt apply any NAT between those 2 networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 May 2013 15:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209707#M357628</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-11T15:29:23Z</dc:date>
    </item>
    <item>
      <title>Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209708#M357629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before i added the ACL&amp;nbsp; as you told ping to 192.168.77.1 was working.&lt;/P&gt;&lt;P&gt;Here is debug info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# ICMP echo request from outside:192.168.10.1 to DMZ:192.168.77.1 ID=114 seq=0 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from DMZ:192.168.77.1 to outside:192.168.10.1 ID=114 seq=0 len=72&lt;/P&gt;&lt;P&gt;ICMP echo request from outside:192.168.10.1 to DMZ:192.168.77.1 ID=114 seq=1 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from DMZ:192.168.77.1 to outside:192.168.10.1 ID=114 seq=1 len=72&lt;/P&gt;&lt;P&gt;ICMP echo request from outside:192.168.10.1 to DMZ:192.168.77.1 ID=114 seq=2 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from DMZ:192.168.77.1 to outside:192.168.10.1 ID=114 seq=2 len=72&lt;/P&gt;&lt;P&gt;ICMP echo request from outside:192.168.10.1 to DMZ:192.168.77.1 ID=114 seq=3 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from DMZ:192.168.77.1 to outside:192.168.10.1 ID=114 seq=3 len=72&lt;/P&gt;&lt;P&gt;ICMP echo request from outside:192.168.10.1 to DMZ:192.168.77.1 ID=114 seq=4 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from DMZ:192.168.77.1 to outside:192.168.10.1 ID=114 seq=4 len=72&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please explain why this was working?Here it shows outside IP as 192.168.10.1&amp;nbsp; even though we have no&lt;/P&gt;&lt;P&gt;NAT between 192.168.69.0 and 192.168.11.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also when you say&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short the above states&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;For traffic between 192.168.69.0/24 and 192.168.10.0/24 is NOT NATed (applies to which ever network opens the connection)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt; does this mean 192.168.69.0 and 11.0?As before we added the New ACL today there was no NAT between 192.168.69.0 and 11.0 subnets?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 May 2013 16:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209708#M357629</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-11T16:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209709#M357631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the explanation about 192.168.77.1 we will again have to look at the NAT configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll again refer to the configuration that was before we added anything&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-NAT0 extended permit ip 192.168.69.0 255.255.255.0 192.168.11.0 255.255.255.0 log &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 0 access-list DMZ-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.69.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see in the above&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;There is NAT0 configuration for the network 192.168.69.0/24 to network 192.168.11.0/24 and it works in both directions&lt;/LI&gt;&lt;LI&gt;The Dynamic PAT configurations ONLY include the source network 192.168.69.0/24&lt;/LI&gt;&lt;LI&gt;The above means that the ASA has absolutely NO NAT configurations for the network 192.168.77.0/24.&lt;/LI&gt;&lt;LI&gt;Since we have now noticed that there is NO NAT configurations for the loopback network 192.168.77.0/24 we know that the traffic that comes from the loopback network isnt NATed towards the "outside" and it will be accessible as long as the ACLs allow it&lt;/LI&gt;&lt;LI&gt;One important thing to notice is the "nat-control" setting. If this was on (would show on top of the "global" configurations) then every connection would require a proper NAT configuration and without one would not pass the firewal. In other words the loopback networks connections would fail.&amp;nbsp; &lt;UL&gt;&lt;LI&gt;However the default setting for "nat-control" is "no nat-control" and therefore the ASA doesnt require NAT configurations for traffic. And since the loopback network didnt have any NAT configurations ASA let it pass because it was allowed by the other rules of the ASA. Notice that the default setting "no nat-control" wont show in the configuration (because its a default setting)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And in the other case, I had a typing mistake. The network was the wrong as you correctly noticed. The network should have been 192.168.11.0/24 in that sentence that I wrote.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 May 2013 16:27:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209709#M357631</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-11T16:27:33Z</dc:date>
    </item>
    <item>
      <title>Ping to Switch in DMZ not working from Edge Switch</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209710#M357634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got it now.Seems i need some practice on NAT.&lt;/P&gt;&lt;P&gt;I will keep reading your posts on this forum till i become comfortable with NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 May 2013 16:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-switch-in-dmz-not-working-from-edge-switch/m-p/2209710#M357634</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-05-11T16:40:32Z</dc:date>
    </item>
  </channel>
</rss>

