<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5510 cannot PING from INSIDE to OUTSIDE in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972206#M440173</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the packet tracer, you can actually specify an inside &lt;STRONG&gt;host&lt;/STRONG&gt;, instead of the inside &lt;STRONG&gt;interface&lt;/STRONG&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Jul 2012 13:20:08 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-07-03T13:20:08Z</dc:date>
    <item>
      <title>ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972196#M440159</link>
      <description>&lt;P&gt;Hey guys, I cannot seem to determine exacly why I am not able to ping from the inside to outside using the standard 100/0 security levels respectively.&lt;/P&gt;&lt;P&gt;I am dynamic natting the inside to the outside interface, something I don't usually do but cannot see why ICMP's are not passing through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Packet trace tool says there is something in the ACL but there really isn't.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions on what I should look for? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there simply an issue of Natting to the WAN interface on a 5510?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got the latest 8.4 on there.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972196#M440159</guid>
      <dc:creator>johnaceti</dc:creator>
      <dc:date>2019-03-11T23:25:21Z</dc:date>
    </item>
    <item>
      <title>ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972197#M440160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you enabled ICMP inspection?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 12:44:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972197#M440160</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-02T12:44:35Z</dc:date>
    </item>
    <item>
      <title>ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972198#M440161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes, I tried it both ways.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 13:14:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972198#M440161</guid>
      <dc:creator>johnaceti</dc:creator>
      <dc:date>2012-07-02T13:14:02Z</dc:date>
    </item>
    <item>
      <title>ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972199#M440162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you share your configuration with us?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 13:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972199#M440162</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-07-02T13:17:57Z</dc:date>
    </item>
    <item>
      <title>ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972200#M440163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.X.X.X 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.60.3 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa844-1-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name XXXXXXXXXXX.org&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object network obj-192.168.197.0&lt;/P&gt;&lt;P&gt; subnet 192.168.197.0 255.255.255.192&lt;/P&gt;&lt;P&gt;object network SERVERX-server&lt;/P&gt;&lt;P&gt; host 192.168.53.150&lt;/P&gt;&lt;P&gt;object service obj-udp-source-eq-5008-eq-5008&lt;/P&gt;&lt;P&gt; service udp source eq 5008 destination eq 5008 &lt;/P&gt;&lt;P&gt;object service obj-udp-eq-5008&lt;/P&gt;&lt;P&gt; service udp source eq 0 destination eq 5008 &lt;/P&gt;&lt;P&gt;object service obj-tcp-source-eq-5008-eq-5008&lt;/P&gt;&lt;P&gt; service tcp source eq 5008 destination eq 5008 &lt;/P&gt;&lt;P&gt;object service obj-tcp-eq-5008&lt;/P&gt;&lt;P&gt; service tcp source eq 0 destination eq 5008 &lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-01&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj-0.0.0.0&lt;/P&gt;&lt;P&gt; host 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-02&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object-group network Inside-Networks&lt;/P&gt;&lt;P&gt; description All Inside networks&lt;/P&gt;&lt;P&gt; network-object inside-172networks 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object inside-192networks 255.255.0.0&lt;/P&gt;&lt;P&gt;object-group network SPECIAL-NET-Networks&lt;/P&gt;&lt;P&gt; description SPECIAL-NET-Subnets&lt;/P&gt;&lt;P&gt; network-object 192.168.53.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.93.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.94.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.95.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object icmp &lt;/P&gt;&lt;P&gt; service-object icmp echo&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object icmp &lt;/P&gt;&lt;P&gt; service-object icmp echo&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_2 any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Access to SERVERX Server&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any object SERVERX-server eq 5008 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Access to SERVERX&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object SERVERX-server eq 5008 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any log &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip any any log &lt;/P&gt;&lt;P&gt;access-list inside_nat_outbound extended permit udp object SERVERX-server eq 5008 any eq 5008 &lt;/P&gt;&lt;P&gt;access-list inside_nat_outbound extended permit tcp object SERVERX-server eq 5008 any eq 5008 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.197.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 extended permit object-group DM_INLINE_SERVICE_1 any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool VPNUSERS 192.168.197.1-192.168.197.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-649.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,any) source static any any destination static obj-192.168.197.0 obj-192.168.197.0 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic SERVERX-server interface service obj-udp-source-eq-5008-eq-5008 obj-udp-eq-5008&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic SERVERX-server interface service obj-tcp-source-eq-5008-eq-5008 obj-tcp-eq-5008&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj_any-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-02&lt;/P&gt;&lt;P&gt; nat (management,outside) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in_1 in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 207.30.22.97 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http x.x.x.x.0 255.255.254.0 outside&lt;/P&gt;&lt;P&gt;http x.x.x.x.0 255.255.254.0 outside&lt;/P&gt;&lt;P&gt;http 192.168.197.0 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh x.x.x.x.0 255.255.254.0 outside&lt;/P&gt;&lt;P&gt;ssh x.x.x.x.0 255.255.254.0 outside&lt;/P&gt;&lt;P&gt;ssh 192.168.197.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;priority-queue outside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 132.163.4.101 source outside prefer&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy VPNUSERS internal&lt;/P&gt;&lt;P&gt;group-policy VPNUSERS attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.20.167 192.168.93.3&lt;/P&gt;&lt;P&gt; dns-server value 192.168.20.167 192.168.93.3&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; default-domain value XXXXXXXXXXXX.org&lt;/P&gt;&lt;P&gt;username xxxxxxxx password xxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;tunnel-group VPNUSERS type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group VPNUSERS general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPNUSERS&lt;/P&gt;&lt;P&gt; default-group-policy VPNUSERS&lt;/P&gt;&lt;P&gt;tunnel-group VPNUSERS ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group WP-remote type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group WP-remote general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPNUSERS&lt;/P&gt;&lt;P&gt;tunnel-group WP-remote ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:1029ff912312218ed6dff586a112f461&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-649.bin&lt;/P&gt;&lt;P&gt;asdm location SERVERX-server 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 13:31:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972200#M440163</guid>
      <dc:creator>johnaceti</dc:creator>
      <dc:date>2012-07-02T13:31:16Z</dc:date>
    </item>
    <item>
      <title>ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972201#M440164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls remove the following NAT as it is incorrect:&lt;/P&gt;&lt;P&gt;object network obj_any-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any-02&lt;/P&gt;&lt;P&gt; nat (management,outside) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can't PAT to 0.0.0.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, can you pls advise what you are trying to ping to and from?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 13:34:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972201#M440164</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-02T13:34:47Z</dc:date>
    </item>
    <item>
      <title>ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972202#M440169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had made the changes you suggested, I had also changed my NAT to an unused IP one higer then the one on my WAN interface. (which has a .248 mask /29)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using ASDM Ping tool and packet trace tool I am able to ping from the WAN but not the LAN (INSIDE) interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not have a tech on site and inside interface is UP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 15:31:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972202#M440169</guid>
      <dc:creator>johnaceti</dc:creator>
      <dc:date>2012-07-02T15:31:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972203#M440170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;oh Snap!&amp;nbsp; So I checked a previous customers 5510 that I did nearly an identical setup and I KNOW theirs is passing pings from the inside interface. I ran the ASDM packet trace and the ping tool sourcing from the inside IP and that one shows a failure as well even though I know 100% that it IS passing ICMP from the inside network out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it seems there is an issue with the ASDM ping and packet trace tool when I source from the inside interface showing fails.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 16:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972203#M440170</guid>
      <dc:creator>johnaceti</dc:creator>
      <dc:date>2012-07-02T16:10:30Z</dc:date>
    </item>
    <item>
      <title>ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972204#M440171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can't ping from inside &lt;STRONG&gt;interface &lt;/STRONG&gt;towards an outside &lt;STRONG&gt;host&lt;/STRONG&gt;. Please try to ping from an inside &lt;STRONG&gt;host &lt;/STRONG&gt;towards an outside &lt;STRONG&gt;host &lt;/STRONG&gt;and see if that works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 17:53:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972204#M440171</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-02T17:53:53Z</dc:date>
    </item>
    <item>
      <title>ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972205#M440172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Why is that we cannot ping an outside host from an inside interface, isn't that essentially one of the main reasons for the ping and packet trace tool to begin with, so we can test without having someone there with a PC on the interface? If I recall correctly this used to work prior to v8.03&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 11:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972205#M440172</guid>
      <dc:creator>johnaceti</dc:creator>
      <dc:date>2012-07-03T11:59:19Z</dc:date>
    </item>
    <item>
      <title>ASA5510 cannot PING from INSIDE to OUTSIDE</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972206#M440173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the packet tracer, you can actually specify an inside &lt;STRONG&gt;host&lt;/STRONG&gt;, instead of the inside &lt;STRONG&gt;interface&lt;/STRONG&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 13:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-cannot-ping-from-inside-to-outside/m-p/1972206#M440173</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-03T13:20:08Z</dc:date>
    </item>
  </channel>
</rss>

