<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA cannot ping from one subnet to another?  No access to Ex in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988116#M401231</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A relevant part of your config is missing. On the end there should be the following part:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; class inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect ftp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect h323 h225 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect h323 ras &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect ip-options &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect netbios &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect rsh &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect rtsp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect sqlnet &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect sunrpc &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect tftp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect xdmcp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect icmp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ! &amp;lt;------ Is this line there?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The line "inspect icmp" is needed to ping through the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should the subnets 192.168.2.0/24 and 192.168.3.0/24 go through the ASA to the internet? Then the NAT has to be expanded:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;nat (inside) 10 192.168.0.0 255.255.252.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now the real challenge:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA should not be the default-gateway for the devices in the 192.168.0.0/24 subnet. That is possible, but makes your network overcomplicated and you will have problems to troubleshoot it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can't separate the ASA with a Layer3-switch from the main network it's best to put the static routes for 192.168.2.0/24 and 192.168.3.0/24 on every device in the 192.1668.0.0/24 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason for that is that the ASA by default doesn't allow hairpinning where traffic enters and leaves through the same interface (inside in your case). That can be configured, but the ASA is not the device that is designed for that task.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Aug 2012 06:06:55 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2012-08-06T06:06:55Z</dc:date>
    <item>
      <title>ASA cannot ping from one subnet to another?  No access to Exchange?</title>
      <link>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988114#M401229</link>
      <description>&lt;P&gt;Hello all!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to the forum, and new to the world of Cisco, so please go easy on me! &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been tasked with replacing our company eSoft router with a Cisco ASA 5505 with the upgraded security license.&amp;nbsp;&amp;nbsp; I have been working on the configuration for a couple of weeks now, after reading hundreds of forum posts, watching youtube videos, and endless google searching, and despite my best efforts I am still having an issue I can’t figure out. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a couple of subnets, that when the ASA is connected, I cannot ping, nor can they get to the internet or our Exchange server. At this point I’m not sure if it’s an access rule issue, NAT issue, or DNS issue. I am hoping that a quick look at my network layout and ASA config will reveal the answer to one of you more experienced guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the network layout: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA: 192.168.0.2 (Primary Gateway)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.0.0 (Primary facility, ASA is the gateway)&lt;/P&gt;&lt;P&gt;192.168.2.0 (Second facility, connected via Verizon point-to-point) &lt;/P&gt;&lt;P&gt;192.168.3.0 (Third facility, connected via Verizon point-to-point)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal DNS Servers: 192.168.0.3, 192.168.2.231&lt;/P&gt;&lt;P&gt;External DNS Servers: 216.86.207.2, 216.86.207.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exchange Server: 192.168.0.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not want the traffic separated on the subnets, I should be able to ping any of the workstations on any subnet from any other subnet I am on, and they should be able to reach each other on any port for file/printer sharing, etc.&amp;nbsp; This being the case, I do not need to configure separate VLANs for each subnet do I? I’d rather keep things as simple as possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the ASA Config:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname Firewall&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.0.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 216.86.214.58 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;name-server 216.86.207.2&lt;/P&gt;&lt;P&gt;name-server 216.86.207.3&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp any any eq ftp &lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp any any eq domain &lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list outbound extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq https &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool SSLClientPool 192.168.0.60-192.168.0.65 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 10 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.0.15 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https 192.168.0.8 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 216.86.214.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.0.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.0.6 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 216.86.207.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone can help me get this going I would be greatly appreciative!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your time and efforts!&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" height="1" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988114#M401229</guid>
      <dc:creator>weedtarded</dc:creator>
      <dc:date>2019-03-11T23:38:25Z</dc:date>
    </item>
    <item>
      <title>ASA cannot ping from one subnet to another?  No access to Exchan</title>
      <link>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988115#M401230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the ASA are you able to ping an public ip address?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 05:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988115#M401230</guid>
      <dc:creator>John Peterson</dc:creator>
      <dc:date>2012-08-06T05:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA cannot ping from one subnet to another?  No access to Ex</title>
      <link>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988116#M401231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A relevant part of your config is missing. On the end there should be the following part:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; class inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect ftp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect h323 h225 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect h323 ras &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect ip-options &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect netbios &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect rsh &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect rtsp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect sqlnet &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect sunrpc &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect tftp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect xdmcp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect icmp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ! &amp;lt;------ Is this line there?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The line "inspect icmp" is needed to ping through the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should the subnets 192.168.2.0/24 and 192.168.3.0/24 go through the ASA to the internet? Then the NAT has to be expanded:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;nat (inside) 10 192.168.0.0 255.255.252.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now the real challenge:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA should not be the default-gateway for the devices in the 192.168.0.0/24 subnet. That is possible, but makes your network overcomplicated and you will have problems to troubleshoot it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can't separate the ASA with a Layer3-switch from the main network it's best to put the static routes for 192.168.2.0/24 and 192.168.3.0/24 on every device in the 192.1668.0.0/24 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason for that is that the ASA by default doesn't allow hairpinning where traffic enters and leaves through the same interface (inside in your case). That can be configured, but the ASA is not the device that is designed for that task.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 06:06:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988116#M401231</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-06T06:06:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA cannot ping from one subnet to another?  No access to Ex</title>
      <link>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988117#M401232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Karsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for replying so quickly!&amp;nbsp; I have made the suggested&amp;nbsp; configuration changes, but before I put it in place for a live test,&amp;nbsp; could you please clarify something for me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very interesting about&amp;nbsp; the hairpinning situation I have going on...&amp;nbsp; Now, when you say&amp;nbsp; separate the ASA with a Level-3 switch, how exactly do I go about doing&amp;nbsp; that?&amp;nbsp; I have a Cisco SG 300-28 switch that all of the subnets converge to,&amp;nbsp; and the ASA is directly connected to it as well.&amp;nbsp; What kind of&amp;nbsp; configuration changes do I need to make on the switch and ASA to have&amp;nbsp; everything operating properly?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 15:42:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988117#M401232</guid>
      <dc:creator>weedtarded</dc:creator>
      <dc:date>2012-08-06T15:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA cannot ping from one subnet to another?  No access to Ex</title>
      <link>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988118#M401233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Yes, I am able to ping public addresses, but only from workstations connected to the 192.168.0.0/24 subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 15:43:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988118#M401233</guid>
      <dc:creator>weedtarded</dc:creator>
      <dc:date>2012-08-06T15:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA cannot ping from one subnet to another?  No access to Ex</title>
      <link>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988119#M401234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You L3 setup should look like that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'andale mono', times;"&gt;Internet - ASA- IP.1 -new subnet a.b.c.d- IP.2-SG300 - internal subnet1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'andale mono', times;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - internal subnet2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'andale mono', times;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - internal subnet3&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you need:&lt;/P&gt;&lt;P&gt;1a) Reconfigure the ASA inside IP to one of the new subnet (a.b.c.1)&lt;/P&gt;&lt;P&gt;1b) Reconfigure all static routes to internal networks to an IP in that new subnet (a.b.c.2)&lt;/P&gt;&lt;P&gt;2a) create a new VLAN on the SG300 with the new subnet with the IP a.b.c.2&lt;/P&gt;&lt;P&gt;2b) the Port connecting the ASA is configured to that VLAN&lt;/P&gt;&lt;P&gt;2c) The old VLAN of the SG300 gets the old IP (192.168.0.2) of the ASA so that the clients and servers can use their old Default-Gateway&lt;/P&gt;&lt;P&gt;2d) Add Routes to the remote-nets on the SG300&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2012 16:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988119#M401234</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-06T16:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA cannot ping from one subnet to another?  No access to Ex</title>
      <link>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988120#M401235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Karsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I apologize for the delay in getting back to you, but I finally had a chance to kick everyone off of the network this morning and re-configure the main switch.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; THANK YOU SOOO MUCH!!! Everything is working as it should now, and I couldn't have done it without your help.&amp;nbsp; You are truly a great asset to this forum!!&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 19:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988120#M401235</guid>
      <dc:creator>weedtarded</dc:creator>
      <dc:date>2012-08-10T19:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA cannot ping from one subnet to another?  No access to Ex</title>
      <link>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988121#M401236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Fine that it worked! So keep on learning and start to contribute to this forum as well ... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 20:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cannot-ping-from-one-subnet-to-another-no-access-to-exchange/m-p/1988121#M401236</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-10T20:34:35Z</dc:date>
    </item>
  </channel>
</rss>

