<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Basic Ping Failing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-basic-ping-failing/m-p/1909323#M458774</link>
    <description>&lt;P&gt;Hi All, Just bought a ASA to start learning about Firewalls and run in to some basic ping issues...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Home network is like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISP - &amp;gt; Netgear Router (192.168.1.250) -&amp;gt; PC (192.168.1.10)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;gt; CiscoASA 'Outside Interface' Vlan 1000 (192.168.1.1) Configured on eth 0/6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then on the ASA eth 0/6 is a server , This is configured as a 'Inside Interface' Vlan 2000 (10.0.0.1) .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server IP conneted to eth 0/1 is 10.0.0.100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the ASA i can ping everything fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i want to do is be able to connect from my PC (192.168.1.10) to the server (10.0.0.100)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The netgear router has a static route telling it the 10.0.0.x network is located on the gateway of 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASDM is receiving the pings from the PC but it looks like it is being denied &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The error message is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;Deny inbound icmp src inside:10.0.0.100 dst inside:10.0.0.1 (type 8, code 0)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see the below config , Can you advise what i need to do to get everything working ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="color: #000000; text-align: -webkit-auto; word-wrap: break-word; white-space: pre-wrap;"&gt;: Saved
:
ASA Version 8.4(3) 
!
hostname ciscoasa
!
interface Ethernet0/0
 switchport access vlan 1000
!
interface Ethernet0/1
 shutdown
!
interface Ethernet0/2
 shutdown
!
interface Ethernet0/3
 shutdown
!
interface Ethernet0/4
 shutdown
!
interface Ethernet0/5
 shutdown
!
interface Ethernet0/6
 switchport access vlan 2000
!
interface Ethernet0/7
 shutdown
!
interface Vlan1
 no nameif
 no security-level
 no ip address
!
interface Vlan1000
 nameif outside
 security-level 0
 ip address 192.168.1.1 255.255.255.0 
!
interface Vlan2000
 nameif inside
 security-level 100
 ip address 10.0.0.1 255.255.255.0 
!
ftp mode passive
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside,outside) source static any interface
route outside 0.0.0.0 0.0.0.0 192.168.1.250 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http 192.168.1.0 255.255.255.0 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
&amp;nbsp; message-length maximum client auto
&amp;nbsp; message-length maximum 512
policy-map global_policy
 class inspection_default
&amp;nbsp; inspect dns preset_dns_map 
&amp;nbsp; inspect ftp 
&amp;nbsp; inspect h323 h225 
&amp;nbsp; inspect h323 ras 
&amp;nbsp; inspect ip-options 
&amp;nbsp; inspect netbios 
&amp;nbsp; inspect rsh 
&amp;nbsp; inspect rtsp 
&amp;nbsp; inspect skinny&amp;nbsp; 
&amp;nbsp; inspect esmtp 
&amp;nbsp; inspect sqlnet 
&amp;nbsp; inspect sunrpc 
&amp;nbsp; inspect tftp 
&amp;nbsp; inspect sip&amp;nbsp; 
&amp;nbsp; inspect xdmcp 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
&amp;nbsp; no active
&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;
&amp;nbsp; destination address email callhome@cisco.com
&amp;nbsp; destination transport-method http
&amp;nbsp; subscribe-to-alert-group diagnostic
&amp;nbsp; subscribe-to-alert-group environment
&amp;nbsp; subscribe-to-alert-group inventory periodic monthly
&amp;nbsp; subscribe-to-alert-group configuration periodic monthly
&amp;nbsp; subscribe-to-alert-group telemetry periodic daily
: end
no asdm history enable&lt;/PRE&gt;</description>
    <pubDate>Mon, 11 Mar 2019 22:35:35 GMT</pubDate>
    <dc:creator>Vishal112</dc:creator>
    <dc:date>2019-03-11T22:35:35Z</dc:date>
    <item>
      <title>ASA Basic Ping Failing</title>
      <link>https://community.cisco.com/t5/network-security/asa-basic-ping-failing/m-p/1909323#M458774</link>
      <description>&lt;P&gt;Hi All, Just bought a ASA to start learning about Firewalls and run in to some basic ping issues...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Home network is like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISP - &amp;gt; Netgear Router (192.168.1.250) -&amp;gt; PC (192.168.1.10)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;gt; CiscoASA 'Outside Interface' Vlan 1000 (192.168.1.1) Configured on eth 0/6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then on the ASA eth 0/6 is a server , This is configured as a 'Inside Interface' Vlan 2000 (10.0.0.1) .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server IP conneted to eth 0/1 is 10.0.0.100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the ASA i can ping everything fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i want to do is be able to connect from my PC (192.168.1.10) to the server (10.0.0.100)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The netgear router has a static route telling it the 10.0.0.x network is located on the gateway of 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASDM is receiving the pings from the PC but it looks like it is being denied &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The error message is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;Deny inbound icmp src inside:10.0.0.100 dst inside:10.0.0.1 (type 8, code 0)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see the below config , Can you advise what i need to do to get everything working ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="color: #000000; text-align: -webkit-auto; word-wrap: break-word; white-space: pre-wrap;"&gt;: Saved
:
ASA Version 8.4(3) 
!
hostname ciscoasa
!
interface Ethernet0/0
 switchport access vlan 1000
!
interface Ethernet0/1
 shutdown
!
interface Ethernet0/2
 shutdown
!
interface Ethernet0/3
 shutdown
!
interface Ethernet0/4
 shutdown
!
interface Ethernet0/5
 shutdown
!
interface Ethernet0/6
 switchport access vlan 2000
!
interface Ethernet0/7
 shutdown
!
interface Vlan1
 no nameif
 no security-level
 no ip address
!
interface Vlan1000
 nameif outside
 security-level 0
 ip address 192.168.1.1 255.255.255.0 
!
interface Vlan2000
 nameif inside
 security-level 100
 ip address 10.0.0.1 255.255.255.0 
!
ftp mode passive
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside,outside) source static any interface
route outside 0.0.0.0 0.0.0.0 192.168.1.250 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http 192.168.1.0 255.255.255.0 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
&amp;nbsp; message-length maximum client auto
&amp;nbsp; message-length maximum 512
policy-map global_policy
 class inspection_default
&amp;nbsp; inspect dns preset_dns_map 
&amp;nbsp; inspect ftp 
&amp;nbsp; inspect h323 h225 
&amp;nbsp; inspect h323 ras 
&amp;nbsp; inspect ip-options 
&amp;nbsp; inspect netbios 
&amp;nbsp; inspect rsh 
&amp;nbsp; inspect rtsp 
&amp;nbsp; inspect skinny&amp;nbsp; 
&amp;nbsp; inspect esmtp 
&amp;nbsp; inspect sqlnet 
&amp;nbsp; inspect sunrpc 
&amp;nbsp; inspect tftp 
&amp;nbsp; inspect sip&amp;nbsp; 
&amp;nbsp; inspect xdmcp 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
&amp;nbsp; no active
&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;
&amp;nbsp; destination address email callhome@cisco.com
&amp;nbsp; destination transport-method http
&amp;nbsp; subscribe-to-alert-group diagnostic
&amp;nbsp; subscribe-to-alert-group environment
&amp;nbsp; subscribe-to-alert-group inventory periodic monthly
&amp;nbsp; subscribe-to-alert-group configuration periodic monthly
&amp;nbsp; subscribe-to-alert-group telemetry periodic daily
: end
no asdm history enable&lt;/PRE&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:35:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basic-ping-failing/m-p/1909323#M458774</guid>
      <dc:creator>Vishal112</dc:creator>
      <dc:date>2019-03-11T22:35:35Z</dc:date>
    </item>
    <item>
      <title>ASA Basic Ping Failing</title>
      <link>https://community.cisco.com/t5/network-security/asa-basic-ping-failing/m-p/1909324#M458779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Vishal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add the following on the CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fixup protocol ICMP&lt;/P&gt;&lt;P&gt;access-list out_in permit icmp host&amp;nbsp; 192.168.1.10&amp;nbsp; host 10.0.0.100&lt;/P&gt;&lt;P&gt;acess-group out_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Feb 2012 21:36:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-basic-ping-failing/m-p/1909324#M458779</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-27T21:36:02Z</dc:date>
    </item>
  </channel>
</rss>

