<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5505 behind Cisco router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593965#M595683</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the fast reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still the same problem though &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Dec 30 2010&lt;/TD&gt;&lt;TD&gt;14:40:09&lt;/TD&gt;&lt;TD&gt;106014&lt;/TD&gt;&lt;TD&gt;172.16.30.3&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;4.2.2.2&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Deny inbound icmp src inside:172.16.30.3 dst Internet:4.2.2.2 (type 8, code 0)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Dec 30 2010&lt;/TD&gt;&lt;TD&gt;14:40:09&lt;/TD&gt;&lt;TD&gt;106007&lt;/TD&gt;&lt;TD&gt;172.16.30.3&lt;/TD&gt;&lt;TD&gt;51631&lt;/TD&gt;&lt;TD&gt;DNS&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Deny inbound UDP from 172.16.30.3/51631 to 10.10.10.1/53 due to DNS Query&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems like there's still a ACL issue according to the log, can't figure out what the problem is though &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can't see the command in running or in show nat though, should I be able to see that I have typed in no nat-control?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Dec 2010 13:46:58 GMT</pubDate>
    <dc:creator>JohanKardell</dc:creator>
    <dc:date>2010-12-30T13:46:58Z</dc:date>
    <item>
      <title>Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593963#M595679</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to set up a Cisco ASA behind a Cisco router which is fronting the internet connection.&lt;/P&gt;&lt;P&gt;The Cisco router is facing the ASA with an adress of 10.10.10.1 (on the Cisco router) and 10.10.10.2 (on the Cisco ASA).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Cisco ASA can ping the internet connection, no problem there, but&amp;nbsp; when I'm trying to ping from my computer connected to the ASA on an&amp;nbsp; Inside interface (172.16.30.0/24) I&amp;nbsp; seem to get stuck, I can't ping internet&amp;nbsp; (4.2.2.2 which is a DNS, I know) or the 10.10.10.0&amp;nbsp; network.&lt;/P&gt;&lt;P&gt;On the cisco router I have set up a static route to 172.16.30.0 network.&lt;/P&gt;&lt;P&gt;And&amp;nbsp; If i remove the security level on the Internet (outside) interface of&amp;nbsp; the ASA to match the Lan (inside) interface (sec. lev. 100, on both inside / outside) everything&amp;nbsp; works&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the default (sec. level 0 on outside and 100 on inside) I do however get this message in the Cisco ASA log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Dec 30 2010&lt;/TD&gt;&lt;TD&gt;13:16:24&lt;/TD&gt;&lt;TD&gt;106014&lt;/TD&gt;&lt;TD&gt;172.16.30.5&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;4.2.2.2&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Deny inbound icmp src inside:172.16.30.5 dst Internet:4.2.2.2 (type 8, code 0)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Dec 30 2010&lt;/TD&gt;&lt;TD&gt;13:16:22&lt;/TD&gt;&lt;TD&gt;106007&lt;/TD&gt;&lt;TD&gt;172.16.30.5&lt;/TD&gt;&lt;TD&gt;56294&lt;/TD&gt;&lt;TD&gt;DNS&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Deny inbound UDP from 172.16.30.5/56294 to 10.10.10.1/53 due to DNS Query&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Dec 30 2010&lt;/TD&gt;&lt;TD&gt;13:16:27&lt;/TD&gt;&lt;TD&gt;106007&lt;/TD&gt;&lt;TD&gt;172.16.30.5&lt;/TD&gt;&lt;TD&gt;60698&lt;/TD&gt;&lt;TD&gt;DNS&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Deny inbound UDP from 172.16.30.5/60698 to 10.10.10.1/53 due to DNS Query&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Dec 30 2010&lt;/TD&gt;&lt;TD&gt;13:16:27&lt;/TD&gt;&lt;TD&gt;106007&lt;/TD&gt;&lt;TD&gt;172.16.30.5&lt;/TD&gt;&lt;TD&gt;53920&lt;/TD&gt;&lt;TD&gt;DNS&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Deny inbound UDP from 172.16.30.5/53920 to 10.10.10.1/53 due to DNS Query&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried to set up the ACL to permit everything from everything, don't help.. please help me, this is my latest ACL, which I think should work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/1/5/8/9851-ACL.png" alt="ACL.png" class="jive-image-thumbnail jive-image" height="332" width="775" /&gt;&lt;/P&gt;&lt;P&gt;I haven't set up any Nat rules on the ASA though, not sure if this is any issue...? (But I'm nating on the Cisco router)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outprint from my log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/2/5/8/9852-LOG.png" alt="LOG.png" class="jive-image-thumbnail jive-image" height="270" width="1015" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANKS for any help!!!!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593963#M595679</guid>
      <dc:creator>JohanKardell</dc:creator>
      <dc:date>2019-03-11T19:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593964#M595680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please add "no nat-control" on the ASA, and it will resolve the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2010 12:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593964#M595680</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-30T12:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593965#M595683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the fast reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still the same problem though &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Dec 30 2010&lt;/TD&gt;&lt;TD&gt;14:40:09&lt;/TD&gt;&lt;TD&gt;106014&lt;/TD&gt;&lt;TD&gt;172.16.30.3&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;4.2.2.2&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Deny inbound icmp src inside:172.16.30.3 dst Internet:4.2.2.2 (type 8, code 0)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Dec 30 2010&lt;/TD&gt;&lt;TD&gt;14:40:09&lt;/TD&gt;&lt;TD&gt;106007&lt;/TD&gt;&lt;TD&gt;172.16.30.3&lt;/TD&gt;&lt;TD&gt;51631&lt;/TD&gt;&lt;TD&gt;DNS&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Deny inbound UDP from 172.16.30.3/51631 to 10.10.10.1/53 due to DNS Query&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems like there's still a ACL issue according to the log, can't figure out what the problem is though &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can't see the command in running or in show nat though, should I be able to see that I have typed in no nat-control?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2010 13:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593965#M595683</guid>
      <dc:creator>JohanKardell</dc:creator>
      <dc:date>2010-12-30T13:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593966#M595684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think this is a perfect opportunity to use the Packet tracer feature.&lt;/P&gt;&lt;P&gt;I see you are using the ASDM to configure the firewall.&lt;/P&gt;&lt;P&gt;It is under one of the menues.&lt;/P&gt;&lt;P&gt;you can use it to se why the packet fails and what rule is causing the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A little tip, check what interface you are sending the packet from everytime you try. the interface might revert back to a default interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS I see you are just a couple of km from me.&lt;/P&gt;&lt;P&gt;so if you still have problems after the packet-tracer, drop me a line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2010 14:58:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593966#M595684</guid>
      <dc:creator>hobbe</dc:creator>
      <dc:date>2010-12-30T14:58:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593967#M595685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;should I be able to see that I have typed in no nat-control?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;yes with show run nat-control&lt;/P&gt;&lt;P&gt;Did you leave levels of 100 and 0 or same levels for 2 interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as Hobbe told packet tracer is the tool you need to point out the cause.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2010 15:53:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593967#M595685</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-12-30T15:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593968#M595686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks! Still seems to be problem though, I'll post you a message Hobbe, thanks for the help Cadetalain, I still have problems when I'm on diffrent security levels, probably a simple error of some sort, kind of new on Cisco ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2010 19:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593968#M595686</guid>
      <dc:creator>JohanKardell</dc:creator>
      <dc:date>2010-12-30T19:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593969#M595688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are inside and Internet the same securit level by any chance?&lt;/P&gt;&lt;P&gt;If so make the Internet lower security then the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the CLI if you issue&lt;/P&gt;&lt;P&gt;sh nameif&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that should show you the security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post the output of&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp 172.16.30.5 8 0 4.2.2.2 det&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2010 23:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593969#M595688</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-30T23:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593970#M595690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, outside is 0 and inside 100 &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt; uploading my config ...&lt;/P&gt;&lt;P&gt;This is my output for the packetracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall01# packet-tracer input inside icmp 172.16.30.5 8 0 4.2.2.2 det&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd49676d8, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5843, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd496d758, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=123, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd496c768, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=23, user_data=0xd496c698, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xd50e30a8, priority=0, domain=host-limit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 123, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: output and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.10.10.1 using egress ifc outside&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 0014.a9c2.1469 hits 441&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;maybe I have missed specifing it somewhere, which interface is which?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my setup, sorry for the awful drawing :):&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/4/8/9847-Routers.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;####################&lt;/P&gt;&lt;P&gt;####THE "ISP ROUTER"&lt;/P&gt;&lt;P&gt;####################&lt;/P&gt;&lt;P&gt;hostname InterNetRouter&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging message-counter syslog&lt;BR /&gt;enable secret 5 ABCDEFGIHJKL&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authentication ppp default local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint example&lt;BR /&gt; enrollment terminal pem&lt;BR /&gt; revocation-check crl&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint dyndns&lt;BR /&gt; enrollment terminal pem&lt;BR /&gt; revocation-check none&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain example&lt;BR /&gt;crypto pki certificate chain dyndns&lt;BR /&gt;XXXXX&lt;BR /&gt;XXXXX&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; quit&lt;BR /&gt;dot11 syslog&lt;BR /&gt;ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;ip domain name ABCDEFGIHJKL&lt;BR /&gt;ip name-server 4.2.2.2&lt;BR /&gt;ip ddns update method dyndns&lt;BR /&gt; HTTP&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; add &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ABCDEFGIHJKL"&gt;https://ABCDEFGIHJKL&lt;/A&gt;&lt;BR /&gt;!&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;vpdn enable&lt;BR /&gt;!&lt;BR /&gt;vpdn-group VPN&lt;BR /&gt;! Default PPTP VPDN group&lt;BR /&gt; accept-dialin&lt;BR /&gt;&amp;nbsp; protocol pptp&lt;BR /&gt;&amp;nbsp; virtual-template 1&lt;BR /&gt;!&lt;BR /&gt;no virtual-template subinterface&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username ABCDEFGIHJKL privilege 15 secret ABCDEFGIHJKL&lt;BR /&gt;! &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt; log config&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt; description *** vlan 10/FE0 to CISCO ASA ***&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt; description *** Dialer1/FE4 Internet ***&lt;BR /&gt; no ip address&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; pppoe enable group global&lt;BR /&gt; pppoe-client dial-pool-number 1&lt;BR /&gt;!&lt;BR /&gt;interface Virtual-Template1&lt;BR /&gt; ip unnumbered Dialer1&lt;BR /&gt; peer default ip address pool VPNUSERS&lt;BR /&gt; no keepalive&lt;BR /&gt; ppp encrypt mppe auto&lt;BR /&gt; ppp authentication ms-chap ms-chap-v2&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;&amp;nbsp; description *** vlan 10/FE0 to CISCO ASA ***&lt;BR /&gt; ip address 10.10.10.1 255.255.255.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface Dialer1&lt;BR /&gt; description *** Dialer1/FE4&amp;nbsp; Internet ***&lt;BR /&gt; ip ddns update hostname ABCDEFGIHJKL&lt;BR /&gt; ip ddns update dyndns&lt;BR /&gt; ip address negotiated&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; encapsulation ppp&lt;BR /&gt; dialer pool 1&lt;BR /&gt; ppp authentication pap callin&lt;BR /&gt; ppp pap sent-username ABCDEFGIHJKL&lt;BR /&gt; ppp ipcp route default&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route 10.10.10.0 255.255.255.0 10.10.10.2&lt;BR /&gt;ip route 172.16.30.0 255.255.255.0 10.10.10.2&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip dns server&lt;BR /&gt;ip nat source list LAN pool LAN&lt;BR /&gt;ip nat inside source list LAN interface Dialer1 overload&lt;BR /&gt;ip nat inside source static 10.10.10.1 interface Dialer1&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended LAN&lt;BR /&gt; permit ip 172.16.30.0 0.0.0.255 any&lt;BR /&gt; permit ip 10.10.10.0 0.0.0.255 any&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;##############&lt;/P&gt;&lt;P&gt;### THE ASA&lt;/P&gt;&lt;P&gt;##############&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;ASA Version 8.0(3) &lt;BR /&gt;!&lt;BR /&gt;hostname Firewall01&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password ABCDEFGHIJK encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.16.30.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.10.10.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;passwd ABCDEFGHIJK encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list inside_access_in extended permit ip 172.16.30.0 255.255.255.0 10.0.0.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list Internet_access_in extended permit ip 10.0.0.0 255.255.255.0 172.16.30.0 255.255.255.0 &lt;BR /&gt;access-list Internet_access_in extended permit ip 172.16.30.0 255.255.255.0 10.0.0.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging console notifications&lt;BR /&gt;logging asdm notifications&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;asdm image disk0:/asdm-625-53.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 101 172.16.30.1-172.16.30.200 netmask 255.255.255.0&lt;BR /&gt;global (outside) 1 172.16.30.0 netmask 255.255.255.0&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 172.16.30.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;ssh 172.16.30.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd domain DOMAINET.se&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.16.30.2-172.16.30.33 inside&lt;BR /&gt;dhcpd dns 10.10.10.1 interface inside&lt;BR /&gt;dhcpd lease 432000 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;username admin password ABCDEFGHIJK encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;!&lt;BR /&gt;privilege cmd level 3 mode exec command perfmon&lt;BR /&gt;privilege cmd level 3 mode exec command ping&lt;BR /&gt;privilege cmd level 3 mode exec command who&lt;BR /&gt;privilege cmd level 3 mode exec command logging&lt;BR /&gt;privilege cmd level 3 mode exec command failover&lt;BR /&gt;privilege cmd level 3 mode exec command packet-tracer&lt;BR /&gt;privilege show level 5 mode exec command import&lt;BR /&gt;privilege show level 5 mode exec command running-config&lt;BR /&gt;privilege show level 3 mode exec command reload&lt;BR /&gt;privilege show level 3 mode exec command mode&lt;BR /&gt;privilege show level 3 mode exec command firewall&lt;BR /&gt;privilege show level 3 mode exec command asp&lt;BR /&gt;privilege show level 3 mode exec command cpu&lt;BR /&gt;privilege show level 3 mode exec command interface&lt;BR /&gt;privilege show level 3 mode exec command clock&lt;BR /&gt;privilege show level 3 mode exec command dns-hosts&lt;BR /&gt;privilege show level 3 mode exec command access-list&lt;BR /&gt;privilege show level 3 mode exec command logging&lt;BR /&gt;privilege show level 3 mode exec command vlan&lt;BR /&gt;privilege show level 3 mode exec command ip&lt;BR /&gt;privilege show level 3 mode exec command ipv6&lt;BR /&gt;privilege show level 3 mode exec command failover&lt;BR /&gt;privilege show level 3 mode exec command asdm&lt;BR /&gt;privilege show level 3 mode exec command arp&lt;BR /&gt;privilege show level 3 mode exec command route&lt;BR /&gt;privilege show level 3 mode exec command ospf&lt;BR /&gt;privilege show level 3 mode exec command aaa-server&lt;BR /&gt;privilege show level 3 mode exec command aaa&lt;BR /&gt;privilege show level 3 mode exec command eigrp&lt;BR /&gt;privilege show level 3 mode exec command crypto&lt;BR /&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;BR /&gt;privilege show level 3 mode exec command ssh&lt;BR /&gt;privilege show level 3 mode exec command dhcpd&lt;BR /&gt;privilege show level 3 mode exec command vpnclient&lt;BR /&gt;privilege show level 3 mode exec command vpn&lt;BR /&gt;privilege show level 3 mode exec command blocks&lt;BR /&gt;privilege show level 3 mode exec command wccp&lt;BR /&gt;privilege show level 3 mode exec command webvpn&lt;BR /&gt;privilege show level 3 mode exec command module&lt;BR /&gt;privilege show level 3 mode exec command uauth&lt;BR /&gt;privilege show level 3 mode exec command compression&lt;BR /&gt;privilege show level 3 mode configure command interface&lt;BR /&gt;privilege show level 3 mode configure command clock&lt;BR /&gt;privilege show level 3 mode configure command access-list&lt;BR /&gt;privilege show level 3 mode configure command logging&lt;BR /&gt;privilege show level 3 mode configure command ip&lt;BR /&gt;privilege show level 3 mode configure command failover&lt;BR /&gt;privilege show level 5 mode configure command asdm&lt;BR /&gt;privilege show level 3 mode configure command arp&lt;BR /&gt;privilege show level 3 mode configure command route&lt;BR /&gt;privilege show level 3 mode configure command aaa-server&lt;BR /&gt;privilege show level 3 mode configure command aaa&lt;BR /&gt;privilege show level 3 mode configure command crypto&lt;BR /&gt;privilege show level 3 mode configure command ssh&lt;BR /&gt;privilege show level 3 mode configure command dhcpd&lt;BR /&gt;privilege show level 5 mode configure command privilege&lt;BR /&gt;privilege clear level 3 mode exec command dns-hosts&lt;BR /&gt;privilege clear level 3 mode exec command logging&lt;BR /&gt;privilege clear level 3 mode exec command arp&lt;BR /&gt;privilege clear level 3 mode exec command aaa-server&lt;BR /&gt;privilege clear level 3 mode exec command crypto&lt;BR /&gt;privilege cmd level 3 mode configure command failover&lt;BR /&gt;privilege clear level 3 mode configure command logging&lt;BR /&gt;privilege clear level 3 mode configure command arp&lt;BR /&gt;privilege clear level 3 mode configure command crypto&lt;BR /&gt;privilege clear level 3 mode configure command aaa-server&lt;BR /&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANKS A BUNCH FOR ALL THE HELP &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;!!!!!!!!!!! You're forum is great!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 14:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593970#M595690</guid>
      <dc:creator>JohanKardell</dc:creator>
      <dc:date>2010-12-31T14:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593971#M595692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Few things I found that you do not need:&lt;/P&gt;&lt;P&gt;You can remove the following:&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;no global (outside) 101 172.16.30.1-172.16.30.200 netmask 255.255.255.0&lt;BR /&gt;no global (outside) 1 172.16.30.0 netmask 255.255.255.0&lt;BR /&gt;no global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd dns 10.10.10.1 interface inside ---&amp;gt; You have configured the outside router as the DNS server address for all inside dhcp clients. Is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, since you say the asa is able to ping 4.2.2.2 may be you can translate all the inside hosts to look like the ASA's outside IP&lt;/P&gt;&lt;P&gt;add these commands:&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.30.0 255.255.25.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you have the access-lists but they are not applied.&amp;nbsp; You also need to add icmp inspection to automatically allow the replies to come back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if this works to ping 4.2.2.2 from an inside host 172.16.30.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 15:06:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593971#M595692</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-31T15:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593972#M595694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IT WORKS :)!!!! THANK YOU!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I added these commands to get the policy map working, correct right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what I've done here is to inspect ftp, tftp, and icmp to global allow it? so the replys can come back? From the lower security level interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall01(config)# class-map inspection_default&lt;BR /&gt;Firewall01(config-cmap)# match default-inspection-traffic &lt;BR /&gt;Firewall01(config-cmap)# exit&lt;BR /&gt;Firewall01(config)# policy-map global_policy&lt;BR /&gt;Firewall01(config-pmap)# class inspection_default&lt;BR /&gt;Firewall01(config-pmap-c)# inspect ftp&lt;BR /&gt;Firewall01(config-pmap-c)# inspect tftp &lt;BR /&gt;Firewall01(config-pmap-c)# inspect icmp &lt;BR /&gt;Firewall01(config-pmap-c)# inspect icmp error &lt;BR /&gt;Firewall01(config-pmap-c)# exit&lt;BR /&gt;Firewall01(config)# service-policy global_policy global&lt;BR /&gt;Firewall01(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why was the global (outside) 1 interface, and&amp;nbsp; no global (outside) 101 in my config, :/? Is this cause I have mixtured around or do you always have to turn this off (Since I have defined outisde interface I mean..)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANK YOU FOR YOUR SUPPORT Poonguzhali!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jan 2011 14:03:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593972#M595694</guid>
      <dc:creator>JohanKardell</dc:creator>
      <dc:date>2011-01-01T14:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593973#M595696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;Wish you and all our other readers a Very Happy New Year 2011!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very glad to hear that. That just made my Jan 1st 2011. First posting for this year.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think those global (outside) lines that I had you remove were added while you tried to get this to work &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to go out looking like 172.16.x.x and the router is properly configured to NAT this traffic while going to the internet. Since you said the ASA was able to ping 4.2.2.2 I was 100% sure the 10.10.10.x address is able to go to the internet and gave you steps nat/global to make your inside 172.16.x.x. look like the ASA's outside 10.10.10.2 address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the policy map yes you are right. That is to automatically allow icmp replies and in case of ftp to open secondary channels for data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Excellent. Pls. mark this thread resolved if you think it is resolved and spin a new thread if you run into any other new problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jan 2011 15:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593973#M595696</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-01-01T15:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 behind Cisco router</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593974#M595698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;, once again, thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jan 2011 14:01:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-behind-cisco-router/m-p/1593974#M595698</guid>
      <dc:creator>JohanKardell</dc:creator>
      <dc:date>2011-01-02T14:01:47Z</dc:date>
    </item>
  </channel>
</rss>

