<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ping to internet from workstation behind ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713736#M534524</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to implement ICMP inspectiong to your global policy &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Aug 2011 10:43:52 GMT</pubDate>
    <dc:creator>Tim Schneider</dc:creator>
    <dc:date>2011-08-01T10:43:52Z</dc:date>
    <item>
      <title>Ping to internet from workstation behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713734#M534522</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been struggling with this issue.&amp;nbsp; I have a ASA 5505.&amp;nbsp; I want to be able to ping from my workstation to some address, lets say &lt;A href="http://www.yahoo.com" target="_blank"&gt;www.yahoo.com&lt;/A&gt;.&amp;nbsp; My workstation is connected to Ethernet 0/2.&amp;nbsp; I have tried playing around with the ACL but am not able to accomplish this.&amp;nbsp; Here is my config&amp;nbsp; could somebody please help:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name home.7vnmotorsports.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;name 192.168.3.8 XBOX description XBOX Console&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.3.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;no forward interface Vlan1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name home.CLMXTR.com&lt;BR /&gt;object-group service XBOX-TCP tcp&lt;BR /&gt;description XBOX TCP Port&lt;BR /&gt;port-object eq 3074&lt;BR /&gt;access-list outside_access_in extended permit tcp any host XBOX object-group XBOX-TCP &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host inside 192.168.3.100&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;ip audit name Reset attack action reset&lt;BR /&gt;ip audit interface outside Reset&lt;BR /&gt;ip audit attack action alarm reset&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.3.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.100-192.168.1.131 inside&lt;BR /&gt;dhcpd dns 192.168.1.1 interface inside&lt;BR /&gt;dhcpd domain home.CLMXR23.com interface inside&lt;BR /&gt;dhcpd update dns both interface inside&lt;BR /&gt;dhcpd option 3 ip 192.168.1.1 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat shun except ip-address 192.168.1.0 255.255.255.0&lt;BR /&gt;threat-detection scanning-threat shun duration 3600&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:06:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713734#M534522</guid>
      <dc:creator>tpalumbo</dc:creator>
      <dc:date>2019-03-11T21:06:16Z</dc:date>
    </item>
    <item>
      <title>Ping to internet from workstation behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713735#M534523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need to add the following access-list to allow return traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it should work fine after that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 06:14:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713735#M534523</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-01T06:14:18Z</dc:date>
    </item>
    <item>
      <title>Ping to internet from workstation behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713736#M534524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to implement ICMP inspectiong to your global policy &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 10:43:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713736#M534524</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2011-08-01T10:43:52Z</dc:date>
    </item>
    <item>
      <title>Ping to internet from workstation behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713737#M534525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you all for the answers.&amp;nbsp; Of the two above solutions, what is the difference, which one is better?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, should I upgrade the software to 8.4?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 13:48:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713737#M534525</guid>
      <dc:creator>tpalumbo</dc:creator>
      <dc:date>2011-08-01T13:48:26Z</dc:date>
    </item>
    <item>
      <title>Ping to internet from workstation behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713738#M534526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Both the options does the same thing, there is no difference for ping traffic, you can try any. Upgrading the software is your call, if you are facing any issues, you may otherwise you can stay on same code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 13:58:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713738#M534526</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-01T13:58:33Z</dc:date>
    </item>
    <item>
      <title>Ping to internet from workstation behind ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713739#M534527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you Varun.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a thread or do you know if the ASA 5505 can me implemented with DynDNS?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 14:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-to-internet-from-workstation-behind-asa-5505/m-p/1713739#M534527</guid>
      <dc:creator>tpalumbo</dc:creator>
      <dc:date>2011-08-01T14:04:20Z</dc:date>
    </item>
  </channel>
</rss>

