<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco Asa No translation group found!! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598224#M595642</link>
    <description>&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Hello All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;&amp;nbsp; It is 31 of Decemeber 2010, happy new Year.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I have very strange issue:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;&lt;STRONG&gt;Cisco Adaptive Security Appliance Software Version 8.2(1)&lt;BR /&gt;Device Manager Version 6.2(1)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I have also :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;&lt;STRONG&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/STRONG&gt; , because I don’t want to do NAT translation.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;and enable traffic through the firewall without address translation is activated: &lt;STRONG&gt;no nat-control&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; command&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I allow traffic to pass through from outside (security level = 0) to inside (security level = 100) and it is working.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;The strange thing is that I have windows cluster of two Servers with cluster IP address and to ip addresses for the physical servers as you know.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Locally I can ping these interfaces without problem and the users on the local site are happy, I can ping them also from the inside interfaces, and the IP/MAC address list shows on the ASA ARP list.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On the remote sites however, the issue is that I can ping the physical ip of the servers but I cannot ping the ip address of the cluster, ASA gives the following error message on the log:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;3|Dec 31 2010|09:05:16|305005|10.213.12.13||||No translation group found for icmp src outside:Router_172.16.1.2 dst inside:10.213.12.13 (type 8, code 0)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I have exactly the same case with virtual interface of a virtual server on a VMWARE machine. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;HOWEVER everything can work if I ping from the Cluster server or from the virtual machine outside (in the inside network) to any IP address outside the network. If I explain it well in means that If I just pass traffic from the cluster server to outside then pinging and other services from outside-in start working.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Did I miss something in the configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;names&lt;BR /&gt;name XX.XXX.0.0 Remote_PO&lt;BR /&gt;name 172.16.1.2 Router_172.16.1.2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 172.16.1.1 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address XX.XXX.12.200 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address XX.XXX.72.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EEST 2&lt;BR /&gt;clock summer-time EEDT recurring last Sun Mar 3:00 last Sun Oct 4:00&lt;BR /&gt;object-group icmp-type ICMP_GRP&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object Remote_PO 255.255.0.0&lt;BR /&gt; network-object host Router_172.16.1.2&lt;BR /&gt;access-list inside_access_in extended permit icmp any any object-group ICMP_GRP&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list dmz_access_in extended permit icmp any any object-group ICMP_GRP&lt;BR /&gt;access-list outside_access_in extended permit ip object-group DM_INLINE_NETWORK_1 XX.XXX.12.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 Router_172.16.1.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http XX.XXX.12.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet XX.XXX.12.0 255.255.255.0 inside&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 management&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:a5b9f09e919607c4c09f01132b2eebcb&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I also want to mention couple of things, before I did this configuration, ASA was configured in context mode and I change it to single mode. I also delete the startup file to start from scratch.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;&lt;STRONG style="mso-bidi-font-family: Arial; : ; color: #333333; font-size: 10pt; Courier-Bold&amp;amp;quot: ; font-family: &amp;amp;quot; serif&amp;amp;quot: ; , &amp;amp;quot: ; "&gt;copy flash:old_running.cfg startup-config; single mode&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;The second thing is that the local PCs on the network sometimes they are losing connectivity with the firewall, which means I cannot ping the ASA or go to the Internet, only if I change the IP address of the PC.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Any Suggestions will be appreciated&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:29:12 GMT</pubDate>
    <dc:creator>essa.anas</dc:creator>
    <dc:date>2019-03-11T19:29:12Z</dc:date>
    <item>
      <title>Cisco Asa No translation group found!!</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598224#M595642</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Hello All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;&amp;nbsp; It is 31 of Decemeber 2010, happy new Year.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I have very strange issue:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;&lt;STRONG&gt;Cisco Adaptive Security Appliance Software Version 8.2(1)&lt;BR /&gt;Device Manager Version 6.2(1)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I have also :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;&lt;STRONG&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/STRONG&gt; , because I don’t want to do NAT translation.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;and enable traffic through the firewall without address translation is activated: &lt;STRONG&gt;no nat-control&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; command&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I allow traffic to pass through from outside (security level = 0) to inside (security level = 100) and it is working.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;The strange thing is that I have windows cluster of two Servers with cluster IP address and to ip addresses for the physical servers as you know.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Locally I can ping these interfaces without problem and the users on the local site are happy, I can ping them also from the inside interfaces, and the IP/MAC address list shows on the ASA ARP list.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; On the remote sites however, the issue is that I can ping the physical ip of the servers but I cannot ping the ip address of the cluster, ASA gives the following error message on the log:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;3|Dec 31 2010|09:05:16|305005|10.213.12.13||||No translation group found for icmp src outside:Router_172.16.1.2 dst inside:10.213.12.13 (type 8, code 0)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I have exactly the same case with virtual interface of a virtual server on a VMWARE machine. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;HOWEVER everything can work if I ping from the Cluster server or from the virtual machine outside (in the inside network) to any IP address outside the network. If I explain it well in means that If I just pass traffic from the cluster server to outside then pinging and other services from outside-in start working.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Did I miss something in the configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;names&lt;BR /&gt;name XX.XXX.0.0 Remote_PO&lt;BR /&gt;name 172.16.1.2 Router_172.16.1.2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 172.16.1.1 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address XX.XXX.12.200 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address XX.XXX.72.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EEST 2&lt;BR /&gt;clock summer-time EEDT recurring last Sun Mar 3:00 last Sun Oct 4:00&lt;BR /&gt;object-group icmp-type ICMP_GRP&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object Remote_PO 255.255.0.0&lt;BR /&gt; network-object host Router_172.16.1.2&lt;BR /&gt;access-list inside_access_in extended permit icmp any any object-group ICMP_GRP&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list dmz_access_in extended permit icmp any any object-group ICMP_GRP&lt;BR /&gt;access-list outside_access_in extended permit ip object-group DM_INLINE_NETWORK_1 XX.XXX.12.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 Router_172.16.1.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http XX.XXX.12.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet XX.XXX.12.0 255.255.255.0 inside&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 management&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:a5b9f09e919607c4c09f01132b2eebcb&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I also want to mention couple of things, before I did this configuration, ASA was configured in context mode and I change it to single mode. I also delete the startup file to start from scratch.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Times New Roman;"&gt;&lt;STRONG style="mso-bidi-font-family: Arial; : ; color: #333333; font-size: 10pt; Courier-Bold&amp;amp;quot: ; font-family: &amp;amp;quot; serif&amp;amp;quot: ; , &amp;amp;quot: ; "&gt;copy flash:old_running.cfg startup-config; single mode&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;The second thing is that the local PCs on the network sometimes they are losing connectivity with the firewall, which means I cannot ping the ASA or go to the Internet, only if I change the IP address of the PC.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Any Suggestions will be appreciated&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598224#M595642</guid>
      <dc:creator>essa.anas</dc:creator>
      <dc:date>2019-03-11T19:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Asa No translation group found!!</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598225#M595643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To pass traffic from low security level to high security level, you would need to configure either static NAT 1:1 or NAT exemption (NAT 0 with ACL). The NAT 0 that you configure is dynamic NAT 0 and only works from high to low security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do not want to NAT anything from inside subnet then I would suggest that you configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip &lt;SPAN style="color: #333333; font-size: 10pt;"&gt;10.213.12.0 255.255.255.0 any&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please also remove the NAT 0 without ACL:&lt;/P&gt;&lt;P&gt;no &lt;SPAN style="color: #333333; font-size: 10pt;"&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate" after configuring the above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 07:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598225#M595643</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-31T07:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Asa No translation group found!!</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598226#M595644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why is nat 0 needit at all if it has configured "no nat-control"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 08:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598226#M595644</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2010-12-31T08:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Asa No translation group found!!</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598227#M595645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat-control is only for traffic from inside (high security level) to outside (low security level). For traffic from low to high security level, you still require to configure 1:1 translation whether it is static 1:1 or NAT 0 with ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the reference guide for nat-control:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/no.html#wp1746857"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/no.html#wp1746857&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quoted from the doc:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;"NAT control requires that packets traversing from&amp;nbsp; an inside interface to an outside interface match a NAT rule; for any&amp;nbsp; host on the inside network to access a host on the outside network, you&amp;nbsp; must configure NAT to translate the inside host address."&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 08:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598227#M595645</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-31T08:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Asa No translation group found!!</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598228#M595646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay&lt;/P&gt;&lt;P&gt;But the return traffic from a flow initiated by an inside host will be permited without any nat, in case of disabling nat-control (thats because the connection exists)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My understanding of disabling nat-control was that there will be no nat requirement at all for any bidirectional communication.&lt;/P&gt;&lt;P&gt;In the old software version &amp;lt;7.0 there was by default a requirement of nat-ing the flows from a higher to a lower - and that couldnt be disabled.And this feature makes it more flexible (nat-control)&lt;/P&gt;&lt;P&gt;But there was not specified anyway that after disabling nat-control there is still a requirement to do nat exempt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 08:34:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598228#M595646</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2010-12-31T08:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Asa No translation group found!!</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598229#M595647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I lab a setup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router0 .11 ------inside 10.10.10/24------.10&amp;nbsp; pix .10 -------- outside 11.11.11/24 ---------.11&amp;nbsp; Router1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;default route thoward the pix from R1 and R2&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;access-list permit ip any any on both interfaces of the pix&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here it is :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall# sh conn&lt;BR /&gt;2 in use, 4 most used&lt;BR /&gt;ICMP outside 11.11.11.11:6 inside 10.10.10.11:0, idle 0:00:01, bytes 360&lt;BR /&gt;ICMP outside 11.11.11.11:6 inside 10.10.10.11:0, idle 0:00:01, bytes 360&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R1#ping 10.10.10.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.10.10.11, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 132/148/208 ms&lt;BR /&gt;R1#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall# sh ip address&lt;BR /&gt;System IP Addresses:&lt;BR /&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Subnet mask&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&lt;BR /&gt;Ethernet0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11.11.11.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; manual&lt;BR /&gt;Ethernet1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; manual&lt;/P&gt;&lt;P&gt;pixfirewall# sh run access-list&lt;BR /&gt;access-list out extended permit ip any any&lt;BR /&gt;access-list in extended permit ip any any&lt;BR /&gt;pixfirewall# &lt;BR /&gt;pixfirewall# &lt;BR /&gt;pixfirewall# sh run access-group&lt;BR /&gt;access-group in in interface inside&lt;BR /&gt;access-group out in interface outside&lt;BR /&gt;pixfirewall#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%PIX-5-111005: console end configuration: OK&lt;BR /&gt;%PIX-7-609001: Built local-host outside:11.11.11.11&lt;BR /&gt;%PIX-7-609001: Built local-host inside:10.10.10.11&lt;BR /&gt;%PIX-6-302020: Built inbound ICMP connection for faddr 11.11.11.11/12 gaddr 10.10.10.11/0 laddr 10.10.10.11/0&lt;BR /&gt;%PIX-6-302020: Built outbound ICMP connection for faddr 11.11.11.11/12 gaddr 10.10.10.11/0 laddr 10.10.10.11/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall# sh run nat&lt;BR /&gt;pixfirewall# sh run global&lt;BR /&gt;pixfirewall# sh run static&lt;BR /&gt;pixfirewall# sh xlate&lt;BR /&gt;0 in use, 0 most used&lt;BR /&gt;pixfirewall#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 08:48:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598229#M595647</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2010-12-31T08:48:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Asa No translation group found!!</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598230#M595648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are right. If you disable nat-control, and have no NAT statement at all on the interfaces, then you are not required to configure NAT exemption either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So when nat-control is disabled, you don't need to configure "nat (inside) 0 0.0.0.0 0.0.0.0", traffic from all interfaces would be able to pass without any nat statement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 12:15:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-no-translation-group-found/m-p/1598230#M595648</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-31T12:15:56Z</dc:date>
    </item>
  </channel>
</rss>

