<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cannot ping due to nat config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653706#M579993</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Larry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet tracer that you posted in your first message is not quite correct. The packet will not ingress the outside interface with a destination IP of 192.168.3.3, so the results you see there are not valid. Also, there is no ICMP packet with a type of 0 and a code of 8, so you'll see some confusing packet tracer output sometimes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are trying to get the hosts on the inside to send a ping to something on the Internet, correct? If so, please post this packet-tracer output instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer in inside icmp 192.168.3.3 8 0 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, it would be good to setup a quick capture on the inside and outside interfaces to see what part of the ping is failing (i.e. echo request or echo reply).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Mar 2011 17:23:40 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2011-03-11T17:23:40Z</dc:date>
    <item>
      <title>cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653702#M579989</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been tasked with cleaning up some old client configs. One site has an issue that it cannot ping anything outside even though all of the necessary acls are in place. Packet Tracer gave me this, but I don't know how to interpret what is wrong. Any help is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside icmp 4.2.2.2 0 8 192.168.3.3 detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7dfbc80, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=23089, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.3.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;Result: ALLOW &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd8a0d220, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2, user_data=0xd613bd50, cs_id=0x0, flags=0x0, protocol=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7dfe3b8, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1148, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: INSPECT &lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7dfe030, priority=66, domain=inspect-icmp-error, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=78, user_data=0xd7dfdf18, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd86ee000, priority=12, domain=ipsec-tunnel-flow, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=84, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7daf808, priority=0, domain=host-limit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=182, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Result: DROP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (12.x.y.138 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 30, untranslate_hits = 1&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xd7e28440, priority=1, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=182, user_data=0xd7e282e8, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653702#M579989</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2019-03-11T20:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653703#M579990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please share your translation statements that is configured on the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;sh run global&lt;/P&gt;&lt;P&gt;sh run static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if there is any reference to ACL from the above output, please also share. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Mar 2011 03:23:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653703#M579990</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-03-11T03:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653704#M579991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run nat&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run static&lt;/P&gt;&lt;P&gt;static (inside,outside) 12.x.y.139 192.168.3.4 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run global&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Mar 2011 03:28:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653704#M579991</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-03-11T03:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653705#M579992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;think I'll open a TAC case on this one&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Mar 2011 03:57:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653705#M579992</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-03-11T03:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653706#M579993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Larry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet tracer that you posted in your first message is not quite correct. The packet will not ingress the outside interface with a destination IP of 192.168.3.3, so the results you see there are not valid. Also, there is no ICMP packet with a type of 0 and a code of 8, so you'll see some confusing packet tracer output sometimes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are trying to get the hosts on the inside to send a ping to something on the Internet, correct? If so, please post this packet-tracer output instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer in inside icmp 192.168.3.3 8 0 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, it would be good to setup a quick capture on the inside and outside interfaces to see what part of the ping is failing (i.e. echo request or echo reply).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Mar 2011 17:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653706#M579993</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-03-11T17:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653707#M579994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="color: #ff9900; font-size: 12pt; "&gt;Nice Catch!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll setup the captures and post. The packet tracer works, but this doesn't&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# ping 4.2.2.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 4.2.2.2, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# ping inside 4.2.2.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 4.2.2.2, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer in inside icmp 192.168.3.3 8 0 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.3.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_in extended permit ip any any log &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (12.x.y.138 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 17993, untranslate_hits = 950&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 192.168.3.3/0 to 12.x.y.138/61849 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 47720, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Mar 2011 18:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653707#M579994</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-03-11T18:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653708#M579995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Larry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on that output it looks like something upstream might be filtering the ICMP packets. Are there any other hops that these pings go through that you have access to so you can check for ACLs? If not, does your ISP allow ICMP to pass?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The captures you setup should confirm this for you as well. I'm guessing you'll see the echo requests go out the outside interface, but no response ever comes back. It would be good to get pings working from the ASA itself before you worry about getting traffic from your internal hosts out through the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Mar 2011 18:13:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653708#M579995</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-03-11T18:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653709#M579996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are the captures. Right now I'm restricted to pinging from the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# ping inside 4.2.2.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 4.2.2.2, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh cap capout&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;5 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 02:59:11.223682 802.1Q vlan#2 P0 192.168.3.253 &amp;gt; 4.2.2.2: icmp: echo request &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 02:59:13.219684 802.1Q vlan#2 P0 192.168.3.253 &amp;gt; 4.2.2.2: icmp: echo request &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 02:59:15.219669 802.1Q vlan#2 P0 192.168.3.253 &amp;gt; 4.2.2.2: icmp: echo request &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 02:59:17.219654 802.1Q vlan#2 P0 192.168.3.253 &amp;gt; 4.2.2.2: icmp: echo request &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 02:59:19.219623 802.1Q vlan#2 P0 192.168.3.253 &amp;gt; 4.2.2.2: icmp: echo request &lt;/P&gt;&lt;P&gt;5 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh cap capin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh access-list capin-acl&lt;/P&gt;&lt;P&gt;access-list capin-acl; 2 elements; name hash: 0x3fc459e9&lt;/P&gt;&lt;P&gt;access-list capin-acl line 1 extended permit ip host 4.2.2.2 any log debugging interval 300 (hitcnt=0) 0xc451331e &lt;/P&gt;&lt;P&gt;access-list capin-acl line 2 extended permit ip any host 4.2.2.2 log debugging interval 300 (hitcnt=0) 0x2464646b &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh access-list capout-acl&lt;/P&gt;&lt;P&gt;access-list capout-acl; 2 elements; name hash: 0x1862133e&lt;/P&gt;&lt;P&gt;access-list capout-acl line 1 extended permit ip host 4.2.2.2 any log debugging interval 300 (hitcnt=0) 0x22af6efe &lt;/P&gt;&lt;P&gt;access-list capout-acl line 2 extended permit ip any host 4.2.2.2 log debugging interval 300 (hitcnt=5) 0x1a23f569 &lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh cap&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all [Buffer Full - 524155 bytes] &lt;/P&gt;&lt;P&gt;capture capin type raw-data access-list capin-acl interface inside [Capturing - 0 bytes] &lt;/P&gt;&lt;P&gt;capture capout type raw-data access-list capout-acl interface outside [Capturing - 670 bytes] &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Mar 2011 18:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653709#M579996</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-03-11T18:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653710#M579997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Larry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on those captures, something between your ASA and 4.2.2.2 is blocking ICMP packets. You'll notice nothing ever comes back to your outside interface, which means either the echo request is not reaching the server (most likely), or something is blocking the echo reply packet as it is heading back toward your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you don't manage any of the next hop devices in the path, I would suggest contacting your ISP and asking if this is expected behavior for their network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Mar 2011 18:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653710#M579997</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-03-11T18:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653711#M580001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Many thanks for your input--it truly helped ! &lt;/EM&gt;&lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our client will be calling his ISP to resolve this issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Larry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Mar 2011 18:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653711#M580001</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-03-11T18:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: cannot ping due to nat config</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653712#M580006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, it turns out it is not the ISP...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have any icmp permit statements on your ASA, that stops the ability to ping out on the Internet from the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can't even ping the directly connected isp router if there is an icmp permit statement present&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems icmp permit mucks with the traces as well&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i proved this time and again simply by taking those statements out and pinging successfully and putting them back in and having pings fail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my thanks go out to TAC Costa Rica for uncovering the true cause of this issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Mar 2011 19:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-due-to-nat-config/m-p/1653712#M580006</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-03-12T19:32:20Z</dc:date>
    </item>
  </channel>
</rss>

