<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Traffic for inside network not going through firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689386#M535873</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just tried something. I added:&lt;/P&gt;&lt;P&gt; static (inside,outside) 10.1.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it started to ping and I can telnet now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I do this for all the IPs without doing a statement for every host?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 Jul 2011 14:17:25 GMT</pubDate>
    <dc:creator>jomar050485</dc:creator>
    <dc:date>2011-07-15T14:17:25Z</dc:date>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689377#M535862</link>
      <description>&lt;P&gt;I don't know what's going on. I can't ping or access any internal host with the IP 10.1.1.X. If I ping from the inside interface, it works. If i ping from the outside interface, it doesn't work. What's the deal? That network works anywhere internally but not past the asa. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 10.15.81.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.15.81.10 10.10.81.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.81.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.81.254&lt;/P&gt;&lt;P&gt;EXternal router--------------------ASA-----------------------Internal Router----Remote Router---10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp; ping inside 10.1.1.1&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;ciscoasa# ping outside 10.1.1.1&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(8)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.15.81.10 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.81.9 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.13.81.198 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.10.81.127 eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 10.10.2.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 10.10.1.0 255.255.255.0 host 10.10.81.1&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip host 10.10.1.29 host 10.10.106.2&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip host 10.10.1.29 any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip host 10.10.1.27 host 10.10.81.115&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.10.81.15 eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any host 10.10.81.141&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip 10.10.1.0 255.255.255.0 host 10.10.81.118&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip 10.81.15.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list gesupport extended permit ip 192.168.190.8 255.255.255.252 193.37.92.240 255.255.255.252&lt;/P&gt;&lt;P&gt;access-list natge1 extended permit ip host 10.10.81.99 193.37.92.240 255.255.255.252&lt;/P&gt;&lt;P&gt;access-list natge2 extended permit ip host 10.10.81.109 193.37.92.240 255.255.255.252&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.10.81.0 255.255.255.0 10.10.106.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_120 extended permit ip 10.10.81.0 255.255.255.0 10.10.106.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-508.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.127 10.10.81.127 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.144 10.10.81.144 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.118 10.10.81.118 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.1 10.10.81.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.149 10.10.81.149 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.152 10.10.81.152 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.195 10.10.81.195 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.190.9&amp;nbsp; access-list natge1&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.190.10&amp;nbsp; access-list natge2&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.106.2 10.10.106.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.106.103 10.10.106.103 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.15 10.10.81.15 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.99 10.10.81.99 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.115 10.10.81.115 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.81.141 10.10.81.141 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.15.81.1 1&lt;/P&gt;&lt;P&gt;route inside 10.81.0.0 255.255.0.0 10.10.81.1 1&lt;/P&gt;&lt;P&gt;route inside 10.10.107.0 255.255.255.0 10.10.81.1 1&lt;/P&gt;&lt;P&gt;route inside 10.10.106.0 255.255.255.0 10.10.81.1 1&lt;/P&gt;&lt;P&gt;route inside 10.10.79.0 255.255.255.0 10.10.81.1 1&lt;/P&gt;&lt;P&gt;route inside 10.10.78.0 255.255.255.0 10.10.81.1 1&lt;/P&gt;&lt;P&gt;route inside 10.1.1.0 255.255.255.0 10.10.81.1 1&lt;/P&gt;&lt;P&gt;route management 0.0.0.0 0.0.0.0 10.13.81.1 2&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 10.10.81.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash sha&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp policy 30 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 30 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 30 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 30 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 30 lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 management&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:0f976dddf4ec25a6ad927e9a0cbc0b48&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689377#M535862</guid>
      <dc:creator>jomar050485</dc:creator>
      <dc:date>2019-03-11T20:59:30Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689378#M535863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;EXTERNALROUTER#traceroute 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Tracing the route to 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt;&amp;nbsp; 3&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt;&amp;nbsp; 4&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt;&amp;nbsp; 5&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt;&amp;nbsp; 6&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt;&amp;nbsp; 7&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt;&amp;nbsp; 8&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt;&amp;nbsp; 9&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt; 10&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt; 11&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt; 12&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt; 13&amp;nbsp; *&amp;nbsp; *&amp;nbsp; *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EXTERNALROUTER#show ip route 10.1.1.1&lt;/P&gt;&lt;P&gt;Routing entry for 10.1.1.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp; Known via "static", distance 1, metric 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; Redistributing via bgp 65001&lt;/P&gt;&lt;P&gt;&amp;nbsp; Advertised by bgp 65001&lt;/P&gt;&lt;P&gt;&amp;nbsp; Routing Descriptor Blocks:&lt;/P&gt;&lt;P&gt;&amp;nbsp; * 10.15.81.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Route metric is 0, traffic share count is 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EXTERNALROUTER#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 13:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689378#M535863</guid>
      <dc:creator>jomar050485</dc:creator>
      <dc:date>2011-07-15T13:09:51Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689379#M535865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jomar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is teh default behavior of firewall, it will not ping from remote interface, only from the interface to which the client machine is connected to. If the 10.1.1.1 machine is statically mapped to then from outside interafce you can ping the public ip For eg:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping outside 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so don't worry everything is fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 13:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689379#M535865</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-15T13:21:13Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689380#M535866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a ICMP permit any any. The network isn't accessible from anywhere past the asa. Pings to all other networks work.&lt;/P&gt;&lt;P&gt;I've even added an" access-list outside_access_in extended permit ip permit any 10.1.1.0 255.255.255.0" and it doesn't work&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 13:25:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689380#M535866</guid>
      <dc:creator>jomar050485</dc:creator>
      <dc:date>2011-07-15T13:25:55Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689381#M535867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jomar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are doing " ping outside 10.1.1.1" it would not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you are pinging from the router, then make sure you have a nat translation for the traffic on the firewall if nat-control is enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access-list is good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 13:33:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689381#M535867</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-15T13:33:04Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689382#M535868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Varun.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't ping it from routers past the asa. Tracert dies when it passes through the ASA. There is not NAT being used..I tried opening the network to everyone..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing we notcied is that the ASA had:&lt;/P&gt;&lt;P&gt;route inside 10.1.1.0 255.255.255.0 10.10.81.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We changed it to:&lt;/P&gt;&lt;P&gt;route inside 10.1.1.0 255.255.255.0 10.10.81.254 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but still not not working. Also, I can't ping past the ASA from 10.1.1.1, ASA is being mean to me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 13:42:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689382#M535868</guid>
      <dc:creator>jomar050485</dc:creator>
      <dc:date>2011-07-15T13:42:47Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689383#M535869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you chcek if you have nat control enabled, do "show run nat-control"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 13:49:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689383#M535869</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-15T13:49:13Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689384#M535871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ciscoasa# show run nat-control&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any other ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 13:51:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689384#M535871</guid>
      <dc:creator>jomar050485</dc:creator>
      <dc:date>2011-07-15T13:51:34Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689385#M535872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Take captures on the ASA and identify why the packets are getting dropped:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-17345"&gt;https://supportforums.cisco.com/docs/DOC-17345&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 14:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689385#M535872</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-15T14:03:00Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689386#M535873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just tried something. I added:&lt;/P&gt;&lt;P&gt; static (inside,outside) 10.1.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it started to ping and I can telnet now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I do this for all the IPs without doing a statement for every host?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 14:17:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689386#M535873</guid>
      <dc:creator>jomar050485</dc:creator>
      <dc:date>2011-07-15T14:17:25Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689387#M535874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jomar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the whole network, you can add :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.1.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it shoudl work after this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 14:22:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689387#M535874</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-15T14:22:32Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689388#M535875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry there is a netmask keyword as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.1.0 10.1.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 14:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689388#M535875</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-15T14:36:39Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689389#M535876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. I think that might have fixed it. I'm trying to get confirmation. Using the capture you provided, I noticed they are using nat. That's why some statements didn't work as well. I'm trying to get them to work on it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 14:52:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689389#M535876</guid>
      <dc:creator>jomar050485</dc:creator>
      <dc:date>2011-07-15T14:52:22Z</dc:date>
    </item>
    <item>
      <title>Traffic for inside network not going through firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689390#M535877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey thats good...let me know if you face any issues...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 17:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-for-inside-network-not-going-through-firewall/m-p/1689390#M535877</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-15T17:01:45Z</dc:date>
    </item>
  </channel>
</rss>

