<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: inside to outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593905#M564591</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jenn&lt;SPAN style="background-color: #f8fafd;"&gt;ifer,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The inside subnet is 10.10.20.0. There is no problem for PC from inside ping to inside VLAN IPs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;10.10.10.0 is the outside subnet. Again there is no problem for PC from outside ping to outside VLAN IPs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;yes, I have never been able to ping 10.10.10.1(outside) from 10.10.20.0(inside).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The nat hit rate is zero. I believe the problem is caused by nat though I do not see any problem with the commands.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Any idea? Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Mar 2011 10:50:04 GMT</pubDate>
    <dc:creator>josephschung</dc:creator>
    <dc:date>2011-03-04T10:50:04Z</dc:date>
    <item>
      <title>inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593897#M564583</link>
      <description>&lt;P&gt;I am setting up a pair of 5520 in A/S mode but the traffice from inside to outside seems blocked somehow. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa01# sh run &lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.3(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname asa01&lt;/P&gt;&lt;P&gt;enable password LFJ8dTG1HExu/pWQ encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.10.10.2 255.255.255.0 standby 10.10.10.3 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.20.2 255.255.255.0 standby 10.10.20.3 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; description LAN Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone HKST 8&lt;/P&gt;&lt;P&gt;object network 10-10-20-0 &lt;/P&gt;&lt;P&gt; subnet 10.10.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list ICMP standard permit 10.10.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ICMP standard permit 10.10.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 10.10.20.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list global_access extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list global_access extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface folink GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;failover mac address GigabitEthernet0/0 00a0.c969.87c8 00a0.c918.95d8&lt;/P&gt;&lt;P&gt;failover mac address GigabitEthernet0/1 00a0.c969.87c7 00a0.c918.95d7&lt;/P&gt;&lt;P&gt;failover interface ip folink 1.1.1.1 255.255.255.0 standby 1.1.1.2&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic 10-10-20-0 interface dns&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.10.20.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;service resetoutside&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 10.10.20.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.10.20.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username gzobs password tj5.T4O6TYbatGk2 encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:8ff10c17e565a87f0b3f6ab11ce7c5ac&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gzasa01#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Base on the above configuration, I still cannot ping or http. Any idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:00:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593897#M564583</guid>
      <dc:creator>josephschung</dc:creator>
      <dc:date>2019-03-11T20:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593898#M564584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Both your outside and inside interfaces are private ip, so when you say traffic from inside to outside does not work, do you mean towards the Internet? and who is NATing it for you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the inside host, can you ping 10.10.10.1?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 09:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593898#M564584</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-03-03T09:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593899#M564585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have not got the real IPs yet so I put the private IP on the outside interface too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inside hosts cannot ping/http to 10.10.10.1, which is the outside switch VLAN ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 10:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593899#M564585</guid>
      <dc:creator>josephschung</dc:creator>
      <dc:date>2011-03-03T10:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593900#M564586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, can you please remove the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside,outside) source dynamic 10-10-20-0 interface dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And configure the following instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-10.10.20.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subnet 10.10.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate", and try to ping/telnet/http to the switch (10.10.10.1)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 10:37:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593900#M564586</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-03-03T10:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593901#M564587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still does not work. Any idea? Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gzasa01# sh nat &lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source dynamic 10-10-20-0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Nat configuration:&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;object network 10-10-20-0 &lt;BR /&gt; subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;access-list ICMP standard permit 10.10.20.0 255.255.255.0 &lt;BR /&gt;access-list ICMP standard permit 10.10.10.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list outside_access_in extended permit icmp 10.10.20.0 255.255.255.0 any &lt;BR /&gt;access-list global_access extended permit icmp any any &lt;BR /&gt;access-list global_access extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface folink GigabitEthernet0/3&lt;BR /&gt;failover mac address GigabitEthernet0/0 00a0.c969.87c8 00a0.c918.95d8&lt;BR /&gt;failover mac address GigabitEthernet0/1 00a0.c969.87c7 00a0.c918.95d7&lt;BR /&gt;failover interface ip folink 1.1.1.1 255.255.255.0 standby 1.1.1.2&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source dynamic 10-10-20-0 interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 11:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593901#M564587</guid>
      <dc:creator>josephschung</dc:creator>
      <dc:date>2011-03-03T11:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593902#M564588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't see any changes that has been made to the config as I suggested earlier? You still have exactly the same config as before?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, the host that you are trying to ping from, I assume that its default gateway is configured as the ASA inside interface? Are you able to ping the ASA inside interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 11:38:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593902#M564588</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-03-03T11:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593903#M564589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Inside switch VLAN 20&lt;SPAN style="background-color: #f8fafd;"&gt; : 10.10.20.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Inside ASA : primary 10.10.20.2 and stnadby 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside switch VLAN&lt;SPAN style="background-color: #f8fafd;"&gt; 10 : 10.10.10.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;outside ASA : primary 10.10.10.2 and stnadby 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;My client is 10.10.20.11, which is provided by DHCP on the inside switch. Now it try to ping/http 10.10.10.1. All fail!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;This time the config is changed so pls see below...but the results are still the same.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gzasa01# sh run | b object&lt;BR /&gt;object network 10-10-20-0 &lt;BR /&gt; subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;access-list ICMP standard permit 10.10.20.0 255.255.255.0 &lt;BR /&gt;access-list ICMP standard permit 10.10.10.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list outside_access_in extended permit icmp 10.10.20.0 255.255.255.0 any &lt;BR /&gt;access-list global_access extended permit icmp any any &lt;BR /&gt;access-list global_access extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface folink GigabitEthernet0/3&lt;BR /&gt;failover mac address GigabitEthernet0/0 00a0.c969.87c8 00a0.c918.95d8&lt;BR /&gt;failover mac address GigabitEthernet0/1 00a0.c969.87c7 00a0.c918.95d7&lt;BR /&gt;failover interface ip folink 1.1.1.1 255.255.255.0 standby 1.1.1.2&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network 10-10-20-0&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.10.20.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;service resetoutside&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 10.10.20.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;gzasa01#&lt;/P&gt;&lt;P&gt;gzasa01#&lt;/P&gt;&lt;P&gt;gzasa01#&lt;/P&gt;&lt;P&gt;gzasa01# sh nat&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source dynamic 10-10-20-0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;gzasa01#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Also, some asdm log below FYI.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;6|Mar 04 2011 10:02:18|725001: Starting SSL handshake with client inside:10.10.20.11/4300 for TLSv1 session.&lt;BR /&gt;6|Mar 04 2011 10:02:18|725002: Device completed SSL handshake with client inside:10.10.20.11/4300&lt;BR /&gt;6|Mar 04 2011 10:02:18|605005: Login permitted from 10.10.20.11/4300 to inside:10.10.20.2/https for user "gzobs"&lt;BR /&gt;6|Mar 04 2011 10:02:18|725007: SSL session with client inside:10.10.20.11/4300 terminated.&lt;BR /&gt;6|Mar 04 2011 10:02:18|302014: Teardown TCP connection 68 for inside:10.10.20.11/4300 to identity:10.10.20.2/443 duration 0:00:00 bytes 12989 TCP Reset-O&lt;BR /&gt;6|Mar 04 2011 10:02:18|106015: Deny TCP (no connection) from 10.10.20.11/4300 to 10.10.20.2/443 flags FIN ACK&amp;nbsp; on interface inside&lt;BR /&gt;6|Mar 04 2011 10:02:28|302013: Built inbound TCP connection 69 for inside:10.10.20.11/4301 (10.10.20.11/4301) to identity:10.10.20.2/443 (10.10.20.2/443)&lt;BR /&gt;6|Mar 04 2011 10:02:28|725001: Starting SSL handshake with client inside:10.10.20.11/4301 for TLSv1 session.&lt;BR /&gt;6|Mar 04 2011 10:02:28|725002: Device completed SSL handshake with client inside:10.10.20.11/4301&lt;BR /&gt;6|Mar 04 2011 10:02:28|605005: Login permitted from 10.10.20.11/4301 to inside:10.10.20.2/https for user "gzobs"&lt;BR /&gt;6|Mar 04 2011 10:02:28|725007: SSL session with client inside:10.10.20.11/4301 terminated.&lt;BR /&gt;6|Mar 04 2011 10:02:28|302014: Teardown TCP connection 69 for inside:10.10.20.11/4301 to identity:10.10.20.2/443 duration 0:00:00 bytes 12936 TCP Reset-O&lt;BR /&gt;6|Mar 04 2011 10:02:28|106015: Deny TCP (no connection) from 10.10.20.11/4301 to 10.10.20.2/443 flags FIN ACK&amp;nbsp; on interface inside&lt;BR /&gt;5|Mar 04 2011 10:03:12|111008: User 'enable_15' executed the 'clear xlate' command.&lt;BR /&gt;5|Mar 04 2011 10:03:18|111001: Begin configuration: console writing to memory&lt;BR /&gt;5|Mar 04 2011 10:03:23|111004: console end configuration: OK&lt;BR /&gt;5|Mar 04 2011 10:03:23|111008: User 'enable_15' executed the 'write' command.&lt;BR /&gt;5|Mar 04 2011 10:03:23|111010: User 'enable_15', running 'CLI' from IP 0.0.0.0, executed 'write'&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Thanks a lot Jennifer!&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 02:14:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593903#M564589</guid>
      <dc:creator>josephschung</dc:creator>
      <dc:date>2011-03-04T02:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593904#M564590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please check if the ping actually arrive at the ASA inside interface?&lt;/P&gt;&lt;P&gt;I don't see any attempt to reach 10.10.10.1 at all from the logs provided.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest that you run a packet capture on the ASA inside interface to see if you are seeing the ping actually makes it to the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 10:11:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593904#M564590</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-03-04T10:11:30Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593905#M564591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jenn&lt;SPAN style="background-color: #f8fafd;"&gt;ifer,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The inside subnet is 10.10.20.0. There is no problem for PC from inside ping to inside VLAN IPs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;10.10.10.0 is the outside subnet. Again there is no problem for PC from outside ping to outside VLAN IPs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;yes, I have never been able to ping 10.10.10.1(outside) from 10.10.20.0(inside).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The nat hit rate is zero. I believe the problem is caused by nat though I do not see any problem with the commands.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Any idea? Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 10:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593905#M564591</guid>
      <dc:creator>josephschung</dc:creator>
      <dc:date>2011-03-04T10:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593906#M564592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the reason why you can ping ASA inside interface from 10.10.20.0 is because they are directly connected and in the same subnet, and same reason for the outside interface. When you are trying to ping across the ASA from inside to outside, the subnet is different, hence you would need to check if default gateway is set correctly, etc. However, to confirm the packet is actually getting to the ASA when you actually ping from inside host to outside host is by doing a packet capture on the ASA inside interface. This will confirm that the packet arrives at the ASA. The NAT translation has no hit count, that typically means that the ASA is not even seeing the packet or somehow drop the packet. So to confirm pls run packet capture as you test the ping.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 12:41:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593906#M564592</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-03-04T12:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593907#M564593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The packet capture shows that packets are not reaching even the inside interface.&lt;SPAN style="background-color: #f8fafd;"&gt; The truth is I made a silly mistake that pointing the default gateway wrongly. Sorry for the trouble and thanks again for your help.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Enjoy the day!&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Mar 2011 05:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside/m-p/1593907#M564593</guid>
      <dc:creator>josephschung</dc:creator>
      <dc:date>2011-03-07T05:01:29Z</dc:date>
    </item>
  </channel>
</rss>

