<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 Traceroute Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195776#M359823</link>
    <description>&lt;P&gt;Problem: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traceroutes return all ***'s after default gateway IP until they complete.&amp;nbsp; Logging onto an wireless access-point not behind the ASA has the traceroutes completing as expected with each hop showing IP and response.&amp;nbsp;&amp;nbsp; I am testing from a linux machine at this time. Tests from a windows machine show the same results. Traceroute examples and ASA config below.&amp;nbsp; Please let me know any further information I can provide you and thanks in advance for your assistance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[root@Xwing ~]# traceroute -I 4.2.2.2&lt;/P&gt;&lt;P&gt;traceroute to 4.2.2.2 (4.2.2.2), 30 hops max, 60 byte packets&lt;/P&gt;&lt;P&gt; 1&amp;nbsp; 192.168.3.1 (192.168.3.1)&amp;nbsp; 2.268 ms&amp;nbsp; 2.572 ms&amp;nbsp; 3.178 ms&lt;/P&gt;&lt;P&gt; 2&amp;nbsp; Darkside (192.168.2.1)&amp;nbsp; 6.902 ms&amp;nbsp; 7.735 ms&amp;nbsp; 7.971 ms&lt;/P&gt;&lt;P&gt; 3&amp;nbsp; 162.192.96.142 (162.192.96.142)&amp;nbsp; 8.699 ms&amp;nbsp; 9.180 ms&amp;nbsp; 9.669 ms&lt;/P&gt;&lt;P&gt; 4&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 5&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 6&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 7&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 8&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 9&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;10&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;11&amp;nbsp; b.resolvers.Level3.net (4.2.2.2)&amp;nbsp; 45.867 ms&amp;nbsp; 46.576 ms&amp;nbsp; 47.186 ms&lt;/P&gt;&lt;P&gt;[root@Xwing ~]# traceroute -I bbc.co.uk&lt;/P&gt;&lt;P&gt;traceroute to bbc.co.uk (212.58.253.67), 30 hops max, 60 byte packets&lt;/P&gt;&lt;P&gt; 1&amp;nbsp; 192.168.3.1 (192.168.3.1)&amp;nbsp; 2.515 ms&amp;nbsp; 2.809 ms&amp;nbsp; 3.381 ms&lt;/P&gt;&lt;P&gt; 2&amp;nbsp; Darkside (192.168.2.1)&amp;nbsp; 7.362 ms&amp;nbsp; 7.876 ms&amp;nbsp; 8.309 ms&lt;/P&gt;&lt;P&gt; 3&amp;nbsp; 162.192.96.142 (162.192.96.142)&amp;nbsp; 8.950 ms&amp;nbsp; 9.556 ms&amp;nbsp; 9.904 ms&lt;/P&gt;&lt;P&gt; 4&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 5&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 6&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 7&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 8&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 9&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;10&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;11&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;12&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;13&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;14&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;15&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;16&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;17&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;18&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;19&amp;nbsp; www-vip.cwwtf.bbc.co.uk (212.58.253.67)&amp;nbsp; 149.238 ms&amp;nbsp; 149.812 ms&amp;nbsp; 150.293 ms&lt;/P&gt;&lt;P&gt;[root@Xwing ~]# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;darkside# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.0(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname darkside&lt;/P&gt;&lt;P&gt;enable password ********** encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;passwd ******** encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;ip local pool vpn_users 192.168.4.1-192.168.4.5 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;boot system disk0:/asa902-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network obj-192.168.2.0&lt;/P&gt;&lt;P&gt; subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.4.0&lt;/P&gt;&lt;P&gt; subnet 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list Split_Tunnel_List extended permit ip 192.168.2.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any traceroute &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.2.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging console alerts&lt;/P&gt;&lt;P&gt;logging buffered warnings&lt;/P&gt;&lt;P&gt;logging trap informational&lt;/P&gt;&lt;P&gt;logging facility 22&lt;/P&gt;&lt;P&gt;logging host inside 192.168.2.5&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 10 burst-size 5&lt;/P&gt;&lt;P&gt;icmp permit any unreachable outside&lt;/P&gt;&lt;P&gt;icmp permit any echo outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any time-exceeded outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-192.168.2.0 obj-192.168.2.0 destination static obj-192.168.4.0 obj-192.168.4.0 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group acl_outside in interface outside&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.2.100 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet 192.168.3.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 30&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd dns 4.2.2.2 4.2.2.1&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;dhcpd address 192.168.2.100-192.168.2.131 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-3.1.02040-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-linux-3.1.02040-k9.pkg 2&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 28800&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ssl-client &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Split_Tunnel_List&lt;/P&gt;&lt;P&gt;tunnel-group vpn_users type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group vpn_users general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpn_users&lt;/P&gt;&lt;P&gt;tunnel-group vpn_users webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias Me enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map class-tracert&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection decrement-ttl&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:07fb98ed98653b80e1e52af20e0762ab&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;darkside#&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:16:40 GMT</pubDate>
    <dc:creator>dbeidleii</dc:creator>
    <dc:date>2019-03-12T01:16:40Z</dc:date>
    <item>
      <title>ASA 5505 Traceroute Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195776#M359823</link>
      <description>&lt;P&gt;Problem: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traceroutes return all ***'s after default gateway IP until they complete.&amp;nbsp; Logging onto an wireless access-point not behind the ASA has the traceroutes completing as expected with each hop showing IP and response.&amp;nbsp;&amp;nbsp; I am testing from a linux machine at this time. Tests from a windows machine show the same results. Traceroute examples and ASA config below.&amp;nbsp; Please let me know any further information I can provide you and thanks in advance for your assistance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[root@Xwing ~]# traceroute -I 4.2.2.2&lt;/P&gt;&lt;P&gt;traceroute to 4.2.2.2 (4.2.2.2), 30 hops max, 60 byte packets&lt;/P&gt;&lt;P&gt; 1&amp;nbsp; 192.168.3.1 (192.168.3.1)&amp;nbsp; 2.268 ms&amp;nbsp; 2.572 ms&amp;nbsp; 3.178 ms&lt;/P&gt;&lt;P&gt; 2&amp;nbsp; Darkside (192.168.2.1)&amp;nbsp; 6.902 ms&amp;nbsp; 7.735 ms&amp;nbsp; 7.971 ms&lt;/P&gt;&lt;P&gt; 3&amp;nbsp; 162.192.96.142 (162.192.96.142)&amp;nbsp; 8.699 ms&amp;nbsp; 9.180 ms&amp;nbsp; 9.669 ms&lt;/P&gt;&lt;P&gt; 4&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 5&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 6&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 7&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 8&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 9&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;10&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;11&amp;nbsp; b.resolvers.Level3.net (4.2.2.2)&amp;nbsp; 45.867 ms&amp;nbsp; 46.576 ms&amp;nbsp; 47.186 ms&lt;/P&gt;&lt;P&gt;[root@Xwing ~]# traceroute -I bbc.co.uk&lt;/P&gt;&lt;P&gt;traceroute to bbc.co.uk (212.58.253.67), 30 hops max, 60 byte packets&lt;/P&gt;&lt;P&gt; 1&amp;nbsp; 192.168.3.1 (192.168.3.1)&amp;nbsp; 2.515 ms&amp;nbsp; 2.809 ms&amp;nbsp; 3.381 ms&lt;/P&gt;&lt;P&gt; 2&amp;nbsp; Darkside (192.168.2.1)&amp;nbsp; 7.362 ms&amp;nbsp; 7.876 ms&amp;nbsp; 8.309 ms&lt;/P&gt;&lt;P&gt; 3&amp;nbsp; 162.192.96.142 (162.192.96.142)&amp;nbsp; 8.950 ms&amp;nbsp; 9.556 ms&amp;nbsp; 9.904 ms&lt;/P&gt;&lt;P&gt; 4&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 5&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 6&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 7&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 8&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 9&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;10&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;11&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;12&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;13&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;14&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;15&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;16&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;17&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;18&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;19&amp;nbsp; www-vip.cwwtf.bbc.co.uk (212.58.253.67)&amp;nbsp; 149.238 ms&amp;nbsp; 149.812 ms&amp;nbsp; 150.293 ms&lt;/P&gt;&lt;P&gt;[root@Xwing ~]# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;darkside# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.0(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname darkside&lt;/P&gt;&lt;P&gt;enable password ********** encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;passwd ******** encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;ip local pool vpn_users 192.168.4.1-192.168.4.5 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;boot system disk0:/asa902-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network obj-192.168.2.0&lt;/P&gt;&lt;P&gt; subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.4.0&lt;/P&gt;&lt;P&gt; subnet 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list Split_Tunnel_List extended permit ip 192.168.2.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any traceroute &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.2.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging console alerts&lt;/P&gt;&lt;P&gt;logging buffered warnings&lt;/P&gt;&lt;P&gt;logging trap informational&lt;/P&gt;&lt;P&gt;logging facility 22&lt;/P&gt;&lt;P&gt;logging host inside 192.168.2.5&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 10 burst-size 5&lt;/P&gt;&lt;P&gt;icmp permit any unreachable outside&lt;/P&gt;&lt;P&gt;icmp permit any echo outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any time-exceeded outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,any) source static obj-192.168.2.0 obj-192.168.2.0 destination static obj-192.168.4.0 obj-192.168.4.0 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group acl_outside in interface outside&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.2.100 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet 192.168.3.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 30&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd dns 4.2.2.2 4.2.2.1&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;dhcpd address 192.168.2.100-192.168.2.131 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-3.1.02040-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-linux-3.1.02040-k9.pkg 2&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 28800&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ssl-client &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Split_Tunnel_List&lt;/P&gt;&lt;P&gt;tunnel-group vpn_users type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group vpn_users general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpn_users&lt;/P&gt;&lt;P&gt;tunnel-group vpn_users webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias Me enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map class-tracert&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection decrement-ttl&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:07fb98ed98653b80e1e52af20e0762ab&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;darkside#&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195776#M359823</guid>
      <dc:creator>dbeidleii</dc:creator>
      <dc:date>2019-03-12T01:16:40Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traceroute Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195777#M359824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA appears on the traceroute, the rest is hidden probably because that's how the manager of the ASA's DW configured it.&lt;/P&gt;&lt;P&gt;Some people configure their devices to don't reply to traceroutes in order to remain "hidden".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or maybe there is another firewall in the path and is not allowing that traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either way, your ASA is properly configured to at least appear on the trace. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 04:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195777#M359824</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-20T04:15:47Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traceroute Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195778#M359825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you are having a great day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all lets set the basics:&lt;/P&gt;&lt;P&gt;Linux and Cisco devices will send UDP packets&amp;nbsp; to a pseudorandom port to build the network map, the reply will be an UDP ICMP Port-Unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Windows use ICMP messages,with a TTL of 1 and then incrementing hop by hop. the reply will be a TTL Exceeded.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So Far so good right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So on the Scenario you are showing us we can see the traceroute working as we can reach the destination but looks like some devices responses are not reaching us.. Why is that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well that is because we have the ASA in place and those particular ICMP message codes are not permited by default &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So let's do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Julio permit icmp any any eq time-exceeded&lt;/P&gt;&lt;P&gt;access-list Julio permit icmp any any eq unreachabl&lt;SPAN style="font-size: 10pt;"&gt;e&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-group Julio in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hope that I could help &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Julio Carvajal &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Advanced Security Trainer&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 04:58:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195778#M359825</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-20T04:58:13Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traceroute Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195779#M359826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jocamare, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; This ASA is on my home network and sits behind my AT&amp;amp;T router-gateway. I can plug directly into the AT&amp;amp;T device and traceroutes work completely fine. They just don't work behind the ASA.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I have the ICMP allows already in my outside interface ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any traceroute &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;darkside(config)# sh run access-group &lt;/P&gt;&lt;P&gt;access-group acl_outside in interface outside&lt;/P&gt;&lt;P&gt;darkside(config)# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any other ideas?&amp;nbsp; I'm at a loss on my end as to why it's not working. I get 3 hops on my traceroute already with the ASA as hop 2 and the ISP's equipment as hop 3. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 11:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195779#M359826</guid>
      <dc:creator>dbeidleii</dc:creator>
      <dc:date>2013-03-20T11:07:09Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traceroute Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195780#M359827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you add this and test:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="margin: 0px 10px 10px; padding: 5px; background-color: #e5e5e5; border: 1px dotted #808080; overflow-x: scroll; white-space: pre-wrap; color: #666666; font-size: 12px; line-height: 15px;"&gt;&lt;STRONG&gt;icmp unreachable rate-limit 30 burst-size 5&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 16:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195780#M359827</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-20T16:44:41Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traceroute Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195781#M359829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Julio, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I have added the line you requested and there was no change in my ability to traceroute. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;darkside# config t&lt;/P&gt;&lt;P&gt;darkside(config)# icmp unreachable rate-limit 30 burst-size 5&lt;/P&gt;&lt;P&gt;darkside(config)# &lt;/P&gt;&lt;P&gt;darkside#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:root@DeathStar"&gt;root@DeathStar&lt;/A&gt;:~# traceroute -I 4.2.2.2&lt;/P&gt;&lt;P&gt;traceroute to 4.2.2.2 (4.2.2.2), 30 hops max, 60 byte packets&lt;/P&gt;&lt;P&gt; 1&amp;nbsp; Darkside (192.168.2.1)&amp;nbsp; 0.702 ms&amp;nbsp; 0.890 ms&amp;nbsp; 0.891 ms&lt;/P&gt;&lt;P&gt; 2&amp;nbsp; 162.192.96.142 (162.192.96.142)&amp;nbsp; 2.733 ms&amp;nbsp; 2.878 ms *&lt;/P&gt;&lt;P&gt; 3&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 4&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 5&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 6&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 7&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 8&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt; 9&amp;nbsp; * * *&lt;/P&gt;&lt;P&gt;10&amp;nbsp; b.resolvers.Level3.net (4.2.2.2)&amp;nbsp; 61.059 ms&amp;nbsp; 62.027 ms&amp;nbsp; 62.031 ms&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 17:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195781#M359829</guid>
      <dc:creator>dbeidleii</dc:creator>
      <dc:date>2013-03-20T17:08:44Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traceroute Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195782#M359831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way you could capture the ICMP unreachable port messages on the outside interface to determine if the ASA is indeed receiving those packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 17:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195782#M359831</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-20T17:12:20Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traceroute Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195783#M359833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, this time looks like related to the ASA. The "&lt;EM&gt;they-are-hidding&lt;/EM&gt;" theory is still valid though&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From my experiences with windows, you will only need "&lt;STRONG&gt;access-list acl_outside extended permit icmp any any time-exceeded&lt;/STRONG&gt;", you should even see hitcounts in that rule when doing a "&lt;STRONG&gt;show access-list acl_outside&lt;/STRONG&gt;".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried to allow all ICMP? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like, "&lt;STRONG&gt;access-list acl_outside extended permit icmp any any" &lt;/STRONG&gt;?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 20:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195783#M359833</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-20T20:09:54Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traceroute Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195784#M359835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jorell,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP is already enabled and we are using right now a linux machine to test,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are waiting for the captures to determine what is going on&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 20:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195784#M359835</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-20T20:31:47Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traceroute Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195785#M359837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Is there any command - ip verify reverse-path in the configuration. If yes, please disable that and check. I had the same problem and after removing that, i could see the hops in the traceroute. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 06:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traceroute-problem/m-p/2195785#M359837</guid>
      <dc:creator>nagammai.shanmugham</dc:creator>
      <dc:date>2013-08-01T06:45:46Z</dc:date>
    </item>
  </channel>
</rss>

