<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interf in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125124#M395631</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; OUTSIDE&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group INSIDE_access_in in interface INSIDE&lt;BR /&gt;access-list INSIDE_access_in extended permit ip 10.96.4.0 255.255.254.0 any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE) 1 10.96.4.0 255.255.254.0&lt;BR /&gt;&amp;nbsp; match ip INSIDE 10.96.4.0 255.255.254.0 OUTSIDE any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (109.228.40.128 [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 113010, untranslate_hits = 15&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.96.4.10/0 to 109.228.40.128/18454 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE) 1 10.96.4.0 255.255.254.0&lt;BR /&gt;&amp;nbsp; match ip INSIDE 10.96.4.0 255.255.254.0 INSIDE any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 476687075, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: OUTSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the results. Could you explain te output as well. Thank-you &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Nov 2012 20:56:25 GMT</pubDate>
    <dc:creator>Colourful</dc:creator>
    <dc:date>2012-11-13T20:56:25Z</dc:date>
    <item>
      <title>ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interface</title>
      <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125122#M395624</link>
      <description>&lt;P&gt;Hi , Any help would be appreciated. I am unable to ping external address, which are directly nating through to internal hosts (Internal hosts are pingable)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ICMP FIXUP enabled. See running config below. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)26 &amp;lt;context&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;hostname &lt;BR /&gt;names&lt;BR /&gt;name 10.96.4.18 DBServer01_INSIDE &lt;/P&gt;&lt;P&gt;name 109.228.40.132 DBServer01_OUTSIDE&lt;/P&gt;&lt;P&gt;name 194.105.64.0 Office&lt;BR /&gt;name 81.136.138.157 A1 &lt;/P&gt;&lt;P&gt;name 217.41.66.241 A2&lt;BR /&gt;name 10.96.4.19 WebServer01_SSL01_INSIDE&lt;BR /&gt;name 109.228.40.133 WebServer01_SSL01_OUTSIDE&lt;BR /&gt;name 10.96.4.20 WebServer01_SSL02_INSIDE&lt;BR /&gt;name 109.228.40.134 WebServer01_SSL02_OUTSIDE&lt;BR /&gt;name 10.96.4.21 WebServer01_SSL03_INSIDE&lt;BR /&gt;name 109.228.40.135 WebServer01_SSL03_OUTSIDE&lt;BR /&gt;name 92.238.216.230 OfficeExternal&lt;BR /&gt;name 10.96.4.150 WebServer01_SSL04_INSIDE&lt;BR /&gt;name 109.228.40.136 WebServer01_SSL04_OUTSIDE&lt;BR /&gt;name 10.96.4.151 WebServer01_SSL05_INSIDE&lt;BR /&gt;name 109.228.40.137 WebServer01_SSL05_OUTSIDE&lt;BR /&gt;name 10.96.4.152 WebServer01_SSL06_INSIDE&lt;BR /&gt;name 109.228.40.138 WebServer01_SSL06_OUTSIDE&lt;BR /&gt;name 10.96.4.153 WebServer01_SSL07_INSIDE&lt;BR /&gt;name 109.228.40.139 WebServer01_SSL07_OUTSIDE&lt;BR /&gt;name 10.96.4.154 WebServer01_SSL08_INSIDE&lt;BR /&gt;name 109.228.40.140 WebServer01_SSL08_OUTSIDE&lt;BR /&gt;name 10.96.4.155 WebServer01_SSL09_INSIDE&lt;BR /&gt;name 109.228.40.141 WebServer01_SSL09_OUTSIDE&lt;BR /&gt;name 10.96.4.156 WebServer01_SSL10_INSIDE&lt;BR /&gt;name 109.228.40.142 WebServer01_SSL10_OUTSIDE&lt;BR /&gt;name 10.96.4.157 WebServer01_SSL11_INSIDE&lt;BR /&gt;name 109.228.40.143 WebServer01_SSL11_OUTSIDE&lt;BR /&gt;name 10.96.4.158 WebServer01_SSL12_INSIDE&lt;BR /&gt;name 109.228.40.144 WebServer01_SSL12_OUTSIDE&lt;BR /&gt;name 10.96.4.159 WebServer01_SSL13_INSIDE&lt;BR /&gt;name 109.228.40.145 WebServer01_SSL13_OUTSIDE&lt;BR /&gt;name 217.174.252.254 TEMP_MRCOOL&lt;BR /&gt;name 88.208.249.143 TEMP_MRWIBBLE&lt;BR /&gt;name 109.228.40.146 WebServer01_SSL14_OUTSIDE&lt;BR /&gt;name 109.228.40.147 WebServer01_SSL15_OUTSIDE&lt;BR /&gt;name 109.228.40.148 WebServer01_SSL16_OUTSIDE&lt;BR /&gt;name 109.228.40.149 WebServer01_SSL17_OUTSIDE&lt;BR /&gt;name 109.228.40.150 WebServer01_SSL18_OUTSIDE&lt;BR /&gt;name 109.228.40.151 WebServer01_SSL19_OUTSIDE&lt;BR /&gt;name 109.228.40.152 WebServer01_SSL20_OUTSIDE&lt;BR /&gt;name 109.228.40.153 WebServer01_SSL21_OUTSIDE&lt;BR /&gt;name 109.228.40.154 WebServer01_SSL22_OUTSIDE&lt;BR /&gt;name 109.228.40.155 WebServer01_SSL23_OUTSIDE&lt;BR /&gt;name 109.228.40.156 WebServer01_SSL24_OUTSIDE&lt;BR /&gt;name 109.228.40.157 WebServer01_SSL25_OUTSIDE&lt;BR /&gt;name 109.228.40.158 WebServer01_SSL26_OUTSIDE&lt;BR /&gt;name 109.228.40.159 WebServer01_SSL27_OUTSIDE&lt;BR /&gt;name 109.228.40.160 WebServer01_SSL28_OUTSIDE&lt;BR /&gt;name 109.228.40.161 WebServer01_SSL29_OUTSIDE&lt;BR /&gt;name 109.228.40.162 WebServer01_SSL30_OUTSIDE&lt;BR /&gt;name 109.228.40.163 WebServer01_SSL31_OUTSIDE&lt;BR /&gt;name 109.228.40.164 WebServer01_SSL32_OUTSIDE&lt;BR /&gt;name 109.228.40.165 WebServer01_SSL33_OUTSIDE&lt;BR /&gt;name 109.228.40.166 WebServer01_SSL34_OUTSIDE&lt;BR /&gt;name 109.228.40.167 WebServer01_SSL35_OUTSIDE&lt;BR /&gt;name 10.96.4.160 WebServer01_SSL14_INSIDE&lt;BR /&gt;name 10.96.4.161 WebServer01_SSL15_INSIDE&lt;BR /&gt;name 10.96.4.162 WebServer01_SSL16_INSIDE&lt;BR /&gt;name 10.96.4.163 WebServer01_SSL17_INSIDE&lt;BR /&gt;name 10.96.4.164 WebServer01_SSL18_INSIDE&lt;BR /&gt;name 10.96.4.165 WebServer01_SSL19_INSIDE&lt;BR /&gt;name 10.96.4.166 WebServer01_SSL20_INSIDE&lt;BR /&gt;name 10.96.4.167 WebServer01_SSL21_INSIDE&lt;BR /&gt;name 10.96.4.168 WebServer01_SSL22_INSIDE&lt;BR /&gt;name 10.96.4.169 WebServer01_SSL23_INSIDE&lt;BR /&gt;name 10.96.4.170 WebServer01_SSL24_INSIDE&lt;BR /&gt;name 10.96.4.171 WebServer01_SSL25_INSIDE&lt;BR /&gt;name 10.96.4.172 WebServer01_SSL26_INSIDE&lt;BR /&gt;name 10.96.4.173 WebServer01_SSL27_INSIDE&lt;BR /&gt;name 10.96.4.174 WebServer01_SSL28_INSIDE&lt;BR /&gt;name 10.96.4.175 WebServer01_SSL29_INSIDE&lt;BR /&gt;name 10.96.4.176 WebServer01_SSL30_INSIDE&lt;BR /&gt;name 10.96.4.177 WebServer01_SSL31_INSIDE&lt;BR /&gt;name 10.96.4.178 WebServer01_SSL32_INSIDE&lt;BR /&gt;name 10.96.4.179 WebServer01_SSL33_INSIDE&lt;BR /&gt;name 10.96.4.180 WebServer01_SSL34_INSIDE&lt;BR /&gt;name 10.96.4.181 WebServer01_SSL35_INSIDE&lt;BR /&gt;name 109.228.40.130 WebServer01_OUTSIDE_130 &lt;BR /&gt;name 109.228.40.190 WebServer01_OUTSIDE_190 &lt;BR /&gt;name 10.96.4.17 WebServer02_INSIDE_17 &lt;BR /&gt;name 109.228.40.131 WebServer02_OUTSIDE_131&lt;BR /&gt;name 109.228.40.191 WebServer02_OUTSIDE_191 &lt;BR /&gt;name 10.96.4.16 WebServer01_INSIDE_16 &lt;BR /&gt;name 10.96.4.204 WebServer01_INSIDE_204 &lt;BR /&gt;name 10.96.4.205 WebServer02_INSIDE_205 S&lt;BR /&gt;name 212.84.187.172 TEMP_PORTABLESPACE&lt;BR /&gt;name 194.105.69.38 NMS5 &lt;BR /&gt;name 109.228.32.41 NMS0&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.405&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.96.4.1 255.255.254.0 standby 10.96.4.2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.3010&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 109.228.40.128 255.255.255.0 standby 109.228.40.129&lt;BR /&gt;!&lt;BR /&gt;object-group service PLESK_PORTS tcp&lt;BR /&gt;port-object eq ftp-data&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;port-object eq domain&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq imap4&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object eq 465&lt;BR /&gt;port-object eq 587&lt;BR /&gt;port-object eq 990&lt;BR /&gt;port-object eq 993&lt;BR /&gt;port-object eq 995&lt;BR /&gt;port-object eq 5432&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 8447&lt;BR /&gt;port-object eq 8880&lt;BR /&gt;port-object eq 9080&lt;BR /&gt;port-object eq 11443&lt;BR /&gt;port-object eq 11444&lt;BR /&gt;port-object eq 5666&lt;BR /&gt;object-group network PLESK_SERVERS&lt;BR /&gt;network-object host WebServer01_OUTSIDE_130&lt;BR /&gt;network-object host WebServer02_OUTSIDE_131&lt;BR /&gt;network-object host DBServer01_OUTSIDE&lt;BR /&gt;network-object host WebServer01_OUTSIDE_190&lt;BR /&gt;network-object host WebServer02_OUTSIDE_191&lt;BR /&gt;object-group network AOffice&lt;BR /&gt;network-object host AOffice02&lt;BR /&gt;network-object host AOffice01&lt;BR /&gt;object-group service MANAGEMENT_PORTS tcp&lt;BR /&gt;port-object eq 3306&lt;BR /&gt;port-object eq ssh&lt;BR /&gt;object-group service WebPorts tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq imap4&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;port-object eq 465&lt;BR /&gt;port-object eq 585&lt;BR /&gt;port-object eq 993&lt;BR /&gt;port-object eq 995&lt;BR /&gt;object-group network WebServers&lt;BR /&gt;network-object host WebServer01_SSL01_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL02_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL03_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL04_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL05_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL06_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL07_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL08_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL09_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL10_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL11_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL12_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL13_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL14_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL15_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL16_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL17_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL18_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL19_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL20_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL21_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL22_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL23_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL24_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL25_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL26_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL27_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL28_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL29_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL30_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL31_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL32_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL33_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL34_OUTSIDE&lt;BR /&gt;network-object host WebServer01_SSL35_OUTSIDE&lt;BR /&gt;object-group network soVision&lt;BR /&gt;network-object Office 255.255.255.248&lt;BR /&gt;network-object host OfficeExternal&lt;BR /&gt;object-group service so_360DR tcp&lt;BR /&gt;port-object eq 6060&lt;BR /&gt;port-object eq 6061&lt;BR /&gt;object-group network TEMP_OLDSERVERS&lt;BR /&gt;network-object host TEMP_MRCOOL&lt;BR /&gt;network-object host TEMP_MRWIBBLE&lt;BR /&gt;network-object host TEMP_PORTABLESPACE&lt;BR /&gt;object-group service DNS tcp-udp&lt;BR /&gt;description DNS Access Ports&lt;BR /&gt;port-object eq domain&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network NagiosMonitoring&lt;BR /&gt;network-object host WebServer01_OUTSIDE_130&lt;BR /&gt;network-object host WebServer02_OUTSIDE_131&lt;BR /&gt;network-object host DBServer01_OUTSIDE&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended deny ip any any inactive&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit tcp any object-group PLESK_SERVERS object-group PLESK_PORTS&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit object-group TCPUDP any object-group WebServers object-group DNS&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN remark SSH Access to servers from soVision&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit tcp object-group soVision object-group PLESK_SERVERS object-group MANAGEMENT_PORTS&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit tcp object-group AOffice object-group PLESK_SERVERS object-group MANAGEMENT_PORTS&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit tcp any object-group WebServers object-group WebPorts&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit tcp Office 255.255.255.248 object-group PLESK_SERVERS object-group so_360DR&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit ip object-group TEMP_OLDSERVERS any&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit object-group TCPUDP any object-group PLESK_SERVERS object-group DNS&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit tcp host Office object-group NagiosMonitoring eq 5666&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit tcp host NMS0 object-group NagiosMonitoring eq 5666&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit icmp host Office object-group NagiosMonitoring echo-reply&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit icmp host Office object-group NagiosMonitoring unreachable&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit icmp host Office object-group NagiosMonitoring time-exceeded&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit icmp host NMS0 object-group NagiosMonitoring echo-reply&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit icmp host NMS0 object-group NagiosMonitoring echo&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit icmp host NMS0 object-group NagiosMonitoring time-exceeded&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit icmp host NMS0 object-group NagiosMonitoring unreachable&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit udp host NMS0 object-group NagiosMonitoring eq 5666&lt;BR /&gt;access-list OUTSIDE_ACCESS_IN extended permit icmp host Office object-group NagiosMonitoring echo&lt;BR /&gt;access-list INSIDE_access_in extended permit ip 10.96.4.0 255.255.254.0 any&lt;BR /&gt;access-list OUTSIDE_access_in extended permit icmp host NMS5 any&lt;BR /&gt;access-list OUTSIDE_access_in extended permit icmp host NMS0 any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging monitor informational&lt;BR /&gt;logging buffered informational&lt;BR /&gt;logging trap notifications&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (OUTSIDE) 1 interface&lt;BR /&gt;nat (INSIDE) 1 10.96.4.0 255.255.254.0&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL03_OUTSIDE WebServer01_SSL03_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL04_OUTSIDE WebServer01_SSL04_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL05_OUTSIDE WebServer01_SSL05_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL06_OUTSIDE WebServer01_SSL06_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL07_OUTSIDE WebServer01_SSL07_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL09_OUTSIDE WebServer01_SSL09_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL10_OUTSIDE WebServer01_SSL10_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL11_OUTSIDE WebServer01_SSL11_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL12_OUTSIDE WebServer01_SSL12_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL13_OUTSIDE WebServer01_SSL13_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL08_OUTSIDE WebServer01_SSL08_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_OUTSIDE_130 WebServer01_INSIDE_16 netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer02_OUTSIDE_131 WebServer02_INSIDE_17 netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL01_OUTSIDE WebServer01_SSL01_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL02_OUTSIDE WebServer01_SSL02_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) DBServer01_OUTSIDE DBServer01_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL14_OUTSIDE WebServer01_SSL14_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL15_OUTSIDE WebServer01_SSL15_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL16_OUTSIDE WebServer01_SSL16_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL17_OUTSIDE WebServer01_SSL17_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL18_OUTSIDE WebServer01_SSL18_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL19_OUTSIDE WebServer01_SSL19_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL20_OUTSIDE WebServer01_SSL20_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL21_OUTSIDE WebServer01_SSL21_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL22_OUTSIDE WebServer01_SSL22_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL23_OUTSIDE WebServer01_SSL23_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL24_OUTSIDE WebServer01_SSL24_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL25_OUTSIDE WebServer01_SSL25_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL26_OUTSIDE WebServer01_SSL26_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL27_OUTSIDE WebServer01_SSL27_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL28_OUTSIDE WebServer01_SSL28_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL29_OUTSIDE WebServer01_SSL29_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL30_OUTSIDE WebServer01_SSL30_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL31_OUTSIDE WebServer01_SSL31_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL32_OUTSIDE WebServer01_SSL32_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL33_OUTSIDE WebServer01_SSL33_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL34_OUTSIDE WebServer01_SSL34_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_SSL35_OUTSIDE WebServer01_SSL35_INSIDE netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer02_OUTSIDE_191 WebServer02_INSIDE_205 netmask 255.255.255.255&lt;BR /&gt;static (INSIDE,OUTSIDE) WebServer01_OUTSIDE_190 WebServer01_INSIDE_204 netmask 255.255.255.255&lt;BR /&gt;access-group OUTSIDE_ACCESS_IN in interface OUTSIDE&lt;BR /&gt;access-group INSIDE_access_in in interface INSIDE&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 109.228.40.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;aaa-server TACACS protocol tacacs+&lt;BR /&gt;aaa-server TACACS (OUTSIDE) host 213.171.217.136&lt;BR /&gt;key *****&lt;BR /&gt;aaa-server TACACS (OUTSIDE) host 213.171.201.38&lt;BR /&gt;key *****&lt;BR /&gt;aaa authentication ssh console TACACS LOCAL&lt;BR /&gt;aaa authentication http console TACACS LOCAL&lt;BR /&gt;aaa authentication enable console TACACS LOCAL&lt;BR /&gt;aaa authorization command TACACS LOCAL&lt;BR /&gt;aaa authorization exec authentication-server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nosnmp-server location&lt;BR /&gt;no snmp-server conta&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jake&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125122#M395624</guid>
      <dc:creator>Colourful</dc:creator>
      <dc:date>2019-03-12T00:23:00Z</dc:date>
    </item>
    <item>
      <title>ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interf</title>
      <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125123#M395627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jake,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp 10.96.4.10 8 0 4.2.2.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provide us the full output,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 20:40:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125123#M395627</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-13T20:40:11Z</dc:date>
    </item>
    <item>
      <title>ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interf</title>
      <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125124#M395631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; OUTSIDE&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group INSIDE_access_in in interface INSIDE&lt;BR /&gt;access-list INSIDE_access_in extended permit ip 10.96.4.0 255.255.254.0 any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE) 1 10.96.4.0 255.255.254.0&lt;BR /&gt;&amp;nbsp; match ip INSIDE 10.96.4.0 255.255.254.0 OUTSIDE any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (109.228.40.128 [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 113010, untranslate_hits = 15&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.96.4.10/0 to 109.228.40.128/18454 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE) 1 10.96.4.0 255.255.254.0&lt;BR /&gt;&amp;nbsp; match ip INSIDE 10.96.4.0 255.255.254.0 INSIDE any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 476687075, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: OUTSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the results. Could you explain te output as well. Thank-you &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 20:56:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125124#M395631</guid>
      <dc:creator>Colourful</dc:creator>
      <dc:date>2012-11-13T20:56:25Z</dc:date>
    </item>
    <item>
      <title>ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interf</title>
      <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125125#M395635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jake,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The output will show all the steps the ASA will use in order to allow or deny the traffic,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can see the ACL allows the traffic, there is a NAT in between so it is performing the right NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the source IP address you are comming from?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 21:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125125#M395635</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-13T21:03:52Z</dc:date>
    </item>
    <item>
      <title>ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interf</title>
      <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125126#M395637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jcarvaja,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attempting to come from the following external address:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;194.105.64.4&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Whis is currently covered in the "OFFICE" name.&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 21:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125126#M395637</guid>
      <dc:creator>Colourful</dc:creator>
      <dc:date>2012-11-13T21:17:19Z</dc:date>
    </item>
    <item>
      <title>ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interf</title>
      <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125127#M395641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;EM style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;194.105.64.4??? &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;W&lt;/EM&gt;&lt;EM style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;here is that??? I mean that is on the outside interface of the ASA so something is wrong in here.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;You only have 2 interfaces&lt;/EM&gt;, none of them make difference to the 194? Do you see the problem?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 21:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125127#M395641</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-13T21:36:49Z</dc:date>
    </item>
    <item>
      <title>ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interf</title>
      <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125128#M395645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; That is an external site out the Outside interface. So - I'm attempting to ping an internal address from the 194.105.64.4 address but get no response. And no - I can't see any issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 22:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125128#M395645</guid>
      <dc:creator>Colourful</dc:creator>
      <dc:date>2012-11-13T22:13:30Z</dc:date>
    </item>
    <item>
      <title>ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interf</title>
      <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125129#M395647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jake,&lt;/P&gt;&lt;P&gt;I'm attempting to ping an internal address from the 194.105.64.4 .... witch address???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 22:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125129#M395647</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-13T22:31:53Z</dc:date>
    </item>
    <item>
      <title>ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interf</title>
      <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125130#M395650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Carva,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm attempting to ping WEBSERVER01_Outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; static (INSIDE,OUTSIDE) WebServer01_OUTSIDE_130 WebServer01_INSIDE_16 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which has the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal -&amp;nbsp; 10.96.4.16&lt;/P&gt;&lt;P&gt;External - 109.228.40.130&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So there is a one to one nat between these addresses. I can ping the internal fine - from the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jake&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 22:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125130#M395650</guid>
      <dc:creator>Colourful</dc:creator>
      <dc:date>2012-11-13T22:42:56Z</dc:date>
    </item>
    <item>
      <title>ICMP/Ping Traffic Not being Allowed Through (ASA) Outside Interf</title>
      <link>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125131#M395654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_ACCESS_IN permit icmp any host 109.228.40.130&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still cannot ping it do&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside icmp &lt;EM style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;194.105.64.4 8 0 109.228.40.130&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 22:59:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-ping-traffic-not-being-allowed-through-asa-outside/m-p/2125131#M395654</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-13T22:59:44Z</dc:date>
    </item>
  </channel>
</rss>

