<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 To Internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884008#M437438</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Joffroi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you insure you have enabled all 4 interfaces (physical, virtual) and that you can ping the default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;E.g &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;int eth 0/0&lt;/P&gt;&lt;P&gt;no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping 99.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you also make sure a host can ping 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 May 2012 19:44:44 GMT</pubDate>
    <dc:creator>craig bache</dc:creator>
    <dc:date>2012-05-08T19:44:44Z</dc:date>
    <item>
      <title>ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884006#M437436</link>
      <description>&lt;P&gt;I first want to apologize for coming here with what I feel is a simple question. I'm a little embarrased on how rusty my Cisco knowledge has gotten. I'm trying to get a laptop connect to an ASA 5505 to be able to browse the web. I've tried following basic instructions on doing this through the console because I didn't get much luck with the ASDM.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My internet port that the firewall is connected to does have a static IP of 99.66.167.69 assigned to it with a gateway of 99.66.167.70.&amp;nbsp; The port also has two DNS servers I'll call A.A.A.A and B.B.B.B if I need that information. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is what I currently have as my config. Any help on resolving this would be greatly appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;====================================================&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasas&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; switchport access vlan 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 192.168.1.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 99.66.167.69 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 99.66.167.70 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:225af90f110a58bbc8d98e50c545608d&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:03:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884006#M437436</guid>
      <dc:creator>Joffroi85</dc:creator>
      <dc:date>2019-03-11T23:03:57Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884007#M437437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Joffroi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to ping 4.2.2.2 from the ASA and the default gateway?? are you able to ping it from a host on the inside? Add icmp isnpection before pinging.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 19:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884007#M437437</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-05-08T19:16:18Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884008#M437438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Joffroi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you insure you have enabled all 4 interfaces (physical, virtual) and that you can ping the default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;E.g &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;int eth 0/0&lt;/P&gt;&lt;P&gt;no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping 99.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you also make sure a host can ping 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 19:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884008#M437438</guid>
      <dc:creator>craig bache</dc:creator>
      <dc:date>2012-05-08T19:44:44Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884009#M437439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the ASA, I am able to ping 99.66.167.69 and 4.2.2.2. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the computer I had plugged to the ASA, I was not able to ping 192.168.1.1. Unfortunately, I had to step away from the lap to check that laptop for now. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the interfaces have had "no shutdown" applied. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 20:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884009#M437439</guid>
      <dc:creator>Joffroi85</dc:creator>
      <dc:date>2012-05-08T20:10:09Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884010#M437440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please apply these captures and ping again, just wanna check if ASA is forwarding the packets at all or not?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit ip any host 4.2.2.2&lt;/P&gt;&lt;P&gt;access-list cap permit ip host 4.2.2.2 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list cap interface inside&lt;/P&gt;&lt;P&gt;capture capo access-list cap interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also apply:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after that, try pinging 4.2.2.2 again, and collect the output of :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show cap capin&lt;/P&gt;&lt;P&gt;show cap capo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would be very helpful in troubleshooting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 20:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884010#M437440</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-05-08T20:22:56Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884011#M437441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the delay. &lt;/P&gt;&lt;P&gt;Varun, I followed the commands you suggested.&amp;nbsp; After apply the following settings....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-list cap permit ip any host 4.2.2.2&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-list cap permit ip host 4.2.2.2 any&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;capture capin access-list cap interface inside&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;capture capo access-list cap interface outside&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-list outside_access_in permit icmp any any&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;these are my results:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Ping 99.66.167.69 from computer hooked to console port.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; ping 99.66.167.69&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 99.66.167.69, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Ping 192.168.1.1 from computer hooked to console port&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;100% success rate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Ping 4.2.2.2 from computer connected to console port.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; ping 4.2.2.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 4.2.2.2, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Results of show cap capin&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;15 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 16:44:28.681468 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 16:44:30.677973 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 16:44:32.677928 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 16:44:34.678004 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 16:44:36.677943 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 16:45:15.972087 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 16:45:17.967937 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 16:45:19.967952 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 16:45:21.967906 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 16:45:23.967921 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 16:48:15.667873 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 16:48:17.657955 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 16:48:19.657985 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 16:48:21.657940 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15: 16:48:23.657924 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;15 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Results show cap capo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 16:48:15.667888 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 16:48:17.657955 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 16:48:19.657985 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 16:48:21.657940 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 16:48:23.657924 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;5 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Ping 99.66.167.69 from computer connected to ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Request Timed out 100% of time&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Ping 4.2.2.2 from computer connected to ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;100% success&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Ping 192.168.1.1 from comptuer connected to ASA&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Request Timed out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, I noticed I was still connected to a wireless network upon pinging.&amp;nbsp; I turned that off and now get a response "192.168.43.75:Destination Unreachanble" when I ping any address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2012 22:06:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884011#M437441</guid>
      <dc:creator>Joffroi85</dc:creator>
      <dc:date>2012-05-09T22:06:53Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884012#M437442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Joffroi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure about how you are connecting, because all you just need to test with is, connect the laptop directly to the inside interface of the ASA using an ethernet cable and then assign the laptop an ip 192.168.1.2, and then ping 4.2.2.2, is this how you exactly tested?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2012 22:40:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884012#M437442</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-05-09T22:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884013#M437445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did assign 192.168.1.2 to my laptop.&lt;/P&gt;&lt;P&gt;When I ping 4.2.2.2 or 99.66.167.69 I get the Reply from 192.168.43.75: Destination unreachable error.&lt;/P&gt;&lt;P&gt;I can ping 192.168.1.1 though&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where is the 192.168.43.75 coming from? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my latest config file just for the record&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname UUFkcASA&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 99.66.167.69 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list cap extended permit ip any host 4.2.2.2&lt;/P&gt;&lt;P&gt;access-list cap extended permit ip host 4.2.2.2 any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 99.66.167.70 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:e6d997e51654139d99b017e8f62f4cc7&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2012 22:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884013#M437445</guid>
      <dc:creator>Joffroi85</dc:creator>
      <dc:date>2012-05-09T22:48:31Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884014#M437447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need to find it out on the laptop, check the ipconfig on the command promp, what all network adapters are activated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2012 22:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884014#M437447</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-05-09T22:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884015#M437449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I went ahead and changed to a unix laptop.&amp;nbsp; My other laptop may have corporte settings interfering.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using DHCP, my laptop assignes itself a 169.254.83.145 IP address. &lt;/P&gt;&lt;P&gt;I went ahead and changed that to 192.168.1.2 as stated above. For 99.66.167.69 and 4.2.2.2 I still get a Host is down message.&amp;nbsp; I am able to ping 192.168.1.1 from the laptop though. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do DNS address play a role into any of this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 14:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884015#M437449</guid>
      <dc:creator>Joffroi85</dc:creator>
      <dc:date>2012-05-10T14:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884016#M437451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joffroi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS does not take a play role on this as you are not performing any Domain name resolution, you are just trying to access a host on the outside by its public ip address (4.2.2.2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I want you to add:&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;policy-map global_policy&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;class inspection_default&lt;/P&gt;&lt;P&gt; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to ping one more time if this does not work please do the following:&lt;/P&gt;&lt;P&gt;I want the Ifconfig or Ipconfig from the machine?&lt;/P&gt;&lt;P&gt;I want a packet-tracer.. On the ASA do &lt;STRONG style="text-decoration: underline;"&gt;packet-tracer input inside icmp 192.168.1.2 8 0 4.2.2.2&lt;/STRONG&gt; and provide me the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI using an ASA you will not be able to ping a distant interface, what is that?&lt;/P&gt;&lt;P&gt;As an example from that PC 168.1.2 you can ping the inside interface but the outside or dmz or any other interface besides the inside will be a distant interface. This is a security meassure that the ASA uses!!!.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;DO Rate all the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 17:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884016#M437451</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-05-10T17:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884017#M437452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;99.66.167.69 is the static IP address assigned by the ISP for the port the ASA is connected to.&lt;/P&gt;&lt;P&gt;I followed your suggestions above but was unable to execute the inspect icmp command. I added the first two. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below are the results for the packet-tracer. I'll track down a thumbdrive to transfer the output of the ifconfig if you still need it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point, is it maybe easier for me to start over and try another set of instructions like this?&lt;A href="http://www.youtube.com/watch?v=RYr3Vpm5uWA"&gt;http://www.youtube.com/watch?v=RYr3Vpm5uWA&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Results&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; packet-tracer input inside icmp 192.168.1.2 8 0 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (99.66.167.69 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 192.168.1.2/0 to 99.66.167.69/59409 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 42, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all the help thus far guys. It really is appreciated &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 18:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884017#M437452</guid>
      <dc:creator>Joffroi85</dc:creator>
      <dc:date>2012-05-10T18:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884018#M437453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add the following command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Fixup protocol ICMP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give it a try,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet tracer shows that everything is fine.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 18:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884018#M437453</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-05-10T18:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884019#M437454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I entered that command and got this response:&lt;/P&gt;&lt;P&gt;(config)# fixup protocol ICMP&lt;/P&gt;&lt;P&gt;INFO: converting 'fixup protocol icmp ' to MPF commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From my laptop where I assigned the 192.168.1.3 IP address, I am still unable to ping 4.2.2.2 or browse the web. Below is the ifconfig&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ifconfig&lt;/P&gt;&lt;P&gt;lo0: flags=8049&lt;UP&gt; mtu 16384&lt;/UP&gt;&lt;/P&gt;&lt;P&gt; options=3&lt;RXCSUM&gt;&lt;/RXCSUM&gt;&lt;/P&gt;&lt;P&gt; inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 &lt;/P&gt;&lt;P&gt; inet 127.0.0.1 netmask 0xff000000 &lt;/P&gt;&lt;P&gt; inet6 ::1 prefixlen 128 &lt;/P&gt;&lt;P&gt;gif0: flags=8010&lt;POINTOPOINT&gt; mtu 1280&lt;/POINTOPOINT&gt;&lt;/P&gt;&lt;P&gt;stf0: flags=0&amp;lt;&amp;gt; mtu 1280&lt;/P&gt;&lt;P&gt;en0: flags=8863&lt;UP&gt; mtu 1500&lt;/UP&gt;&lt;/P&gt;&lt;P&gt; options=2b&lt;RXCSUM&gt;&lt;/RXCSUM&gt;&lt;/P&gt;&lt;P&gt; ether 00:1f:f3:53:da:5f &lt;/P&gt;&lt;P&gt; inet6 fe80::21f:f3ff:fe53:da5f%en0 prefixlen 64 scopeid 0x4 &lt;/P&gt;&lt;P&gt; inet 192.168.1.3 netmask 0xffff0000 broadcast 192.168.255.255&lt;/P&gt;&lt;P&gt; media: autoselect (100baseTX &lt;FULL-DUPLEX&gt;)&lt;/FULL-DUPLEX&gt;&lt;/P&gt;&lt;P&gt; status: active&lt;/P&gt;&lt;P&gt;en1: flags=8823&lt;UP&gt; mtu 1500&lt;/UP&gt;&lt;/P&gt;&lt;P&gt; ether 00:1f:5b:c4:02:6a &lt;/P&gt;&lt;P&gt; media: autoselect (&lt;UNKNOWN type=""&gt;)&lt;/UNKNOWN&gt;&lt;/P&gt;&lt;P&gt; status: inactive&lt;/P&gt;&lt;P&gt;fw0: flags=8863&lt;UP&gt; mtu 4078&lt;/UP&gt;&lt;/P&gt;&lt;P&gt; lladdr 00:1f:f3:ff:fe:60:16:f2 &lt;/P&gt;&lt;P&gt; media: autoselect &lt;FULL-DUPLEX&gt;&lt;/FULL-DUPLEX&gt;&lt;/P&gt;&lt;P&gt; status: inactive&lt;/P&gt;&lt;P&gt;vboxnet0: flags=8842&lt;BROADCAST&gt; mtu 1500&lt;/BROADCAST&gt;&lt;/P&gt;&lt;P&gt; ether 00:76:62:00:00:00 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its pretty frustrating reading that everything looks fine. I was really hoping I missed 2-3 cruicial lines for a quick fix. Is it possible that it could be something with how my IT department set up the port? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can get internet working on my laptop if I connect directly to the port and manually set the static IP, gateway, DNS1, DNS2 and subnet address so probably not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 19:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884019#M437454</guid>
      <dc:creator>Joffroi85</dc:creator>
      <dc:date>2012-05-10T19:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884020#M437455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jofrroi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is connected between the ASA and the PC, and also from the ASA and the Internet (ISP router)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also create the following capture:&lt;/P&gt;&lt;P&gt;capture asp type-asp all circular-buffer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then do a clear :&lt;/P&gt;&lt;P&gt;clear cap capo&lt;/P&gt;&lt;P&gt;clear cap capin&lt;/P&gt;&lt;P&gt;clear cap asp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try to ping and provide the following:&lt;/P&gt;&lt;P&gt;cap asp | inc&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2 &lt;/P&gt;&lt;P&gt;cap capin&lt;/P&gt;&lt;P&gt;cap capo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 20:02:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884020#M437455</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-05-10T20:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884021#M437456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just have ethernet going from my laptop to the ASA and then the ASA connect via ethernet to the port on the wall which has the assigned 99.66.167.69 IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Below are my results:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ASA5505(config)# capture asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;ASA5505(config)# cap capin&lt;/P&gt;&lt;P&gt;ASA5505(config)# cap capo&lt;/P&gt;&lt;P&gt;ASA5505(config)# ping 4.2.2.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 4.2.2.2, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5505(config)# show capture asp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;ASA5505(config)# show cap capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 15:07:49.326978 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 15:07:51.326170 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 15:07:53.326124 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 15:07:55.326185 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 15:07:57.326155 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;5 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5505(config)# show cap capo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 15:07:49.326978 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 15:07:51.326170 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 15:07:53.326124 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 15:07:55.326185 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 15:07:57.326155 802.1Q vlan#2 P0 99.66.167.69 &amp;gt; 4.2.2.2: icmp: echo request&lt;/P&gt;&lt;P&gt;5 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;EDIT: I fixed my capture asp command, did a reping, and got the information below:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA5505(config)# show capture asp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 packet captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 15:12:37.516925 802.1Q vlan#2 P0 99.66.167.67.138 &amp;gt; 99.66.167.71.138:&amp;nbsp; udp 201 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;1 packet shown&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 20:14:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884021#M437456</guid>
      <dc:creator>Joffroi85</dc:creator>
      <dc:date>2012-05-10T20:14:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 To Internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884022#M437457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I redid everything this morning with no luck. I compiled a new post to have all my new information a little more outlined and organized here: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2148826"&gt;https://supportforums.cisco.com/thread/2148826&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all the time you put in to trying to help me. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2012 16:02:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-internet/m-p/1884022#M437457</guid>
      <dc:creator>Joffroi85</dc:creator>
      <dc:date>2012-05-14T16:02:04Z</dc:date>
    </item>
  </channel>
</rss>

