<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5510 not working properly from outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916627#M458752</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do try this command and seem not work. I only can ping the interface 124.xx.190.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do had try with command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; icmp permit any untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still the luck not with me. Ping not work on 124.xxx.179 and others.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Mar 2012 08:01:12 GMT</pubDate>
    <dc:creator>tanpohmeng</dc:creator>
    <dc:date>2012-03-01T08:01:12Z</dc:date>
    <item>
      <title>ASA5510 not working properly from outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916623#M458745</link>
      <description>&lt;P&gt;Hi, I not familiar with the ASA 5510 product. I having trouble since last 24 hours and still cant find out the root cause yet. &lt;/P&gt;&lt;P&gt;Here is my scenario, my network should be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN --- ASA5510 (FW) --- SERVER (192.168.1.0/24)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I face the problem, all the NAT static 1-to-1 is working OK. All my public IP can be ping from outside internet. But the problem happen when I try to telnet to port 80 on each server. I had try telnet from my PC to public IP 124.xxx.179 80, it's work fine, but failed on 124.xxx.180 80, then on 124.xxx.181 80, its work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I do try on my colleague PC, in same network as mine, I face another case where the public IP 124.xxx.179 80 cannot be telnet, but it's ok for 124.xxx.180, then failed on 124.xxx.181 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI.. all our PC can ping to the Public IP and no packet lose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The scenario is very weird, I cant find any other solution as had review my configuration few times.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me to check does my configuration is working perfectly or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. Any advise will do..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname fw-asa&lt;/P&gt;&lt;P&gt;enable password xxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif untrust&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 124.xx.190 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif trust&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.11.203 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST 8&lt;/P&gt;&lt;P&gt;access-list untrust_access_in extended permit icmp any 124.xxx.176 255.255.255.240&lt;/P&gt;&lt;P&gt;access-list untrust_access_in extended permit tcp any 124.xxx.176 255.255.255.240 eq www&lt;/P&gt;&lt;P&gt;access-list untrust_access_in extended permit tcp any 124.xxx.176 255.255.255.240 eq 8080&lt;/P&gt;&lt;P&gt;access-list untrust_access_in extended permit tcp any 124.xxx.176 255.255.255.240 eq telnet&lt;/P&gt;&lt;P&gt;access-list trust_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu untrust 1500&lt;/P&gt;&lt;P&gt;mtu trust 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (trust,untrust) 124.xxx.182 192.168.1.122 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (trust,untrust) 124.xxx.178 192.168.1.15 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (trust,untrust) 124.xxx.180 192.168.1.17 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (trust,untrust) 124.xxx.181 192.168.1.18 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (trust,untrust) 124.xxx.186 192.168.1.116 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (trust,untrust) 124.xxx.187 192.168.1.117 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (trust,untrust) 124.xxx.188 192.168.1.118 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (trust,untrust) 124.xxx.189 192.168.1.119 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (trust,untrust) 124.xxx.179 192.168.1.16 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group untrust_access_in in interface untrust&lt;/P&gt;&lt;P&gt;access-group trust_access_in in interface trust&lt;/P&gt;&lt;P&gt;route untrust 0.0.0.0 0.0.0.0 124.xxx.177 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.11.122 255.255.255.255 management&lt;/P&gt;&lt;P&gt;snmp-server host management 192.168.11.254 community *****&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;/P&gt;&lt;P&gt; certificate ca xxx&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;telnet 192.168.11.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.11.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access management&lt;/P&gt;&lt;P&gt;no threat-detection basic-threat&lt;/P&gt;&lt;P&gt;no threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username admin password xxx encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:36:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916623#M458745</guid>
      <dc:creator>tanpohmeng</dc:creator>
      <dc:date>2019-03-11T22:36:02Z</dc:date>
    </item>
    <item>
      <title>ASA5510 not working properly from outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916624#M458747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps some captures would shed some light on the issue. Let's consider the case that you cannot telnet to .180 port 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fw-asa(config)# access-list capout permit tcp any host 124.x.x.180 eq 80&lt;/P&gt;&lt;P&gt;fw-asa(config)# access-list capout permit tcp host 124.x.x.180 eq 80 any&lt;/P&gt;&lt;P&gt;fw-asa(config)# access-list capin permit tcp any host 192.168.1.17 eq 80&lt;/P&gt;&lt;P&gt;fw-asa(config)# access-list capin permit tcp host 192.168.1.17 eq 80 any&lt;/P&gt;&lt;P&gt;fw-asa(config)# end&lt;/P&gt;&lt;P&gt;fw-asa# cap capout access-list capout interface untrust&lt;/P&gt;&lt;P&gt;fw-asa# cap capin access-list capin interface trust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** Now try to telnet to .180 from your PC on the outside and post the following output: **&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fw-asa# show cap capout&lt;/P&gt;&lt;P&gt;fw-asa# show cap capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; You can replace the 'any' above with the IP of your PC. Also, remember to turn off the captures after grabbing the output. You can do this by doing a 'no cap capout' and 'no cap capin'. You can remove the access-lists by using the 'no' form of these as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this makes sense to you.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Joey&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Feb 2012 18:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916624#M458747</guid>
      <dc:creator>johuggin</dc:creator>
      <dc:date>2012-02-28T18:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not working properly from outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916625#M458749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for late reply,&lt;/P&gt;&lt;P&gt;I had success work out the Static NAT which is working.&lt;/P&gt;&lt;P&gt;access-list untrust_access_in extended permit tcp any host 124.xxx.180 eq www&lt;/P&gt;&lt;P&gt;access-list untrust_access_in extended permit tcp any host 124.xxx.179 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (trust,untrust) tcp 124.xxx.180 www 192.168.1.17 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (trust,untrust) tcp 124.xxx.179 www 192.168.1.16 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And it's working fine.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in this way, I could not solve the ping as the NAT does not go through for ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2012 06:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916625#M458749</guid>
      <dc:creator>tanpohmeng</dc:creator>
      <dc:date>2012-03-01T06:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not working properly from outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916626#M458750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi &lt;/P&gt;&lt;P&gt;try this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after you inspect icmp , you should get ping works &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2012 07:49:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916626#M458750</guid>
      <dc:creator>clin</dc:creator>
      <dc:date>2012-03-01T07:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not working properly from outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916627#M458752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do try this command and seem not work. I only can ping the interface 124.xx.190.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do had try with command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; icmp permit any untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still the luck not with me. Ping not work on 124.xxx.179 and others.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2012 08:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916627#M458752</guid>
      <dc:creator>tanpohmeng</dc:creator>
      <dc:date>2012-03-01T08:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not working properly from outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916628#M458754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; are the rest servers pingable ? i mean somehow icmp could be blokced by windows firewall. did you try to ping these servers from internal ?&lt;/P&gt;&lt;P&gt;otherwise&amp;nbsp; you try below &lt;/P&gt;&lt;P&gt;access-list untrust_access_in extended permit icmp any host 124.xxx.180&lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2012 08:09:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916628#M458754</guid>
      <dc:creator>clin</dc:creator>
      <dc:date>2012-03-01T08:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not working properly from outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916629#M458755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the rest of server not pingable from outside. If ping from internal to the server inside IP, then its work fine.&lt;/P&gt;&lt;P&gt;yes, the access-list do had implement as suggest but still failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe there is something missing in my static NAT as I set are&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;static (trust,untrust) tcp 124.xxx.180 www 192.168.1.17 www netmask 255.255.255.255&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;static (trust,untrust) tcp 124.xxx.179 www 192.168.1.16 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and not in&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;static (trust,untrust) 124.xxx.180 192.168.1.17 netmask 255.255.255.255&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;static (trust,untrust) 124.xxx.179 192.168.1.16 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wonder does there is a way to have static NAT which allow ICMP to go through?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2012 08:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916629#M458755</guid>
      <dc:creator>tanpohmeng</dc:creator>
      <dc:date>2012-03-01T08:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not working properly from outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916630#M458756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; actually , you are not depolying really NAT due to you defined protocal argument "TCP".&lt;/P&gt;&lt;P&gt;you just use static NAT form to handle a PAT translation.&lt;/P&gt;&lt;P&gt;yes , if you move "TCP" just like you presented secondary CLI , ICMP will works properly , that's really NAT.&lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2012 08:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916630#M458756</guid>
      <dc:creator>clin</dc:creator>
      <dc:date>2012-03-01T08:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not working properly from outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916631#M458757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the explanation..&lt;/P&gt;&lt;P&gt;Look like I can close this topic for the moment first..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all the contribution &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2012 05:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-working-properly-from-outside/m-p/1916631#M458757</guid>
      <dc:creator>tanpohmeng</dc:creator>
      <dc:date>2012-03-05T05:01:43Z</dc:date>
    </item>
  </channel>
</rss>

