<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ping through the Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548599#M607915</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tom,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Also add the following command,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 10.0.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if that helps.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nash.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Nov 2010 08:52:11 GMT</pubDate>
    <dc:creator>apothula</dc:creator>
    <dc:date>2010-11-17T08:52:11Z</dc:date>
    <item>
      <title>Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548592#M607908</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've received my ASA5510 and i'm trying to allow Ping through the Firewall between DMZ-LAN and LAN-DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list "ICMP_LAN" permit icmp,echo,echoreply&amp;nbsp; any any&lt;/P&gt;&lt;P&gt;access-list "ICMP_DMZ" permit icmp,echo,echoreply&amp;nbsp; any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I applied the access-list in each interface :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ICMP_LAN permit in interface LAN&lt;/P&gt;&lt;P&gt;access-group ICMP_DMZ permit in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it doesnt work , Packet tracert report that the packet is dropped by the default ACL which Deny All Traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Ideas? Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:02:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548592#M607908</guid>
      <dc:creator>beaujoire</dc:creator>
      <dc:date>2019-03-11T19:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548593#M607909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version of ASA code are you running? Is there any NAT that should apply to this flow?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post a sanitized copy of the packet tracer output and any syslogs generated when you try to ping?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Oct 2010 16:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548593#M607909</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-10-29T16:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548594#M607910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. allow inspect in the policy-map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. check if you have any icmp LAN statement&lt;/P&gt;&lt;P&gt; you can check that in the show run or show run icmp or show run | in icmp&lt;/P&gt;&lt;P&gt; if you have any then remove it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Oct 2010 16:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548594#M607910</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-10-29T16:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548595#M607911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Sorry to be late for my reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use ASA 8.2 v and ASDM 6.2. I have no ICMP LAN statement.&lt;/P&gt;&lt;P&gt;I've joined logs from packet tracert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface LAN : 172.16.1.254&lt;/P&gt;&lt;P&gt;PC LAN : 172.16.1.1/16&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface DMZ : 10.1.1.1&lt;/P&gt;&lt;P&gt;Private Interface for DMZ server : 10.1.1.2&lt;/P&gt;&lt;P&gt;PC DMZ : 194.x.x.x/29 ( public IP)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static NAT is enable to translate :&lt;/P&gt;&lt;P&gt;10.1.1.2 --&amp;gt; 194.x.x.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping from DMZ to LAN is the Problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 16:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548595#M607911</guid>
      <dc:creator>beaujoire</dc:creator>
      <dc:date>2010-11-10T16:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548596#M607912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you post a sanitized config here? We can get a better picture of where things are going wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 16:27:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548596#M607912</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-11-10T16:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548597#M607913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hope you are NOT trying to ping from 10.1.1.2 to 172.16.1.254 - This will not work and it is by design. You cannot ping the far side interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, if you are pinging from 10.1.1.2 to 172.16.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and if you have&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 172.16.1.0 172.16.1.0 net 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with the icmp allow acl on the LAN and DMZ interfaces it should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just for testing purpose throw the ACL to allow ip any any between these two test hosts 10.1.1.2 to 172.16.1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable logging&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered debug&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh logg | i 10.1.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Nov 2010 00:11:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548597#M607913</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-11-11T00:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548598#M607914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok I've added :&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 172.16.1.0 172.16.1.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping from 10.1.1.2 to 172.16.1.1 works on packet tracert but doesn't work with ping command.&lt;/P&gt;&lt;P&gt;ping from 172.16.1.1 to 10.1.1.2 doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I joined my running config and packet tracert logs.I am a bit lost ; i begin with cisco firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Nov 2010 16:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548598#M607914</guid>
      <dc:creator>beaujoire</dc:creator>
      <dc:date>2010-11-16T16:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548599#M607915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tom,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Also add the following command,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 10.0.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if that helps.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nash.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 08:52:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548599#M607915</guid>
      <dc:creator>apothula</dc:creator>
      <dc:date>2010-11-17T08:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548600#M607916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Nash,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I add your command but same problem ..&lt;/P&gt;&lt;P&gt;When i ping 172.16.1.1 to 10.1.1.2 on Packet Tracert, the Packet is still drop at NAT step.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 15:44:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548600#M607916</guid>
      <dc:creator>beaujoire</dc:creator>
      <dc:date>2010-11-17T15:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548601#M607917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is with these static commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,LAN) 194.206.235.65 10.1.1.2 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,LAN) 194.206.235.66 10.1.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what this means is that when you want to access the DMZ servers 10.1.1.2 and 10.1.1.3 from the LAN, you will have to do it using the IP addresses 194.206.235.65 and 194.206.235.66 respectively.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now it comes down to your requirement, Do you want to access the DMZ servers from the LAN using their private or public IPs? If it's going to be using the &lt;STRONG&gt;Public IPs&lt;/STRONG&gt;, remove the below command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 172.16.0.0 172.16.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like to do it using the &lt;STRONG&gt;private IPs, &lt;/STRONG&gt;remove the below commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,LAN) 194.206.235.65 10.1.1.2 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,LAN) 194.206.235.66 10.1.1.3 netmask 255.255.255.255 &lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note that if you are accessing the servers using the public IPs, you will have to ping the IP addresses 194.206.235.65 and 194.206.235.66 respectively.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 16:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548601#M607917</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-11-17T16:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548602#M607918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok.I agree.I want to access the DMZ servers from the LAN using their public IPs.&lt;/P&gt;&lt;P&gt;It works now on packet Tracert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But for exemple,when I use Ping command on a PC from LAN and I ping the 194.x.x.x. it doesn't work.&lt;/P&gt;&lt;P&gt;I'm connnected on the ASA interface directly for test. Is it a problem ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 17:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548602#M607918</guid>
      <dc:creator>beaujoire</dc:creator>
      <dc:date>2010-11-17T17:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548603#M607919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if there is a windows or any other firewall on the DMZ servers, please disable and check if you are able to ping those. Also, please apply captures on the ASA to see how packets are flowing and if they are getting dropped:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Nov 2010 02:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548603#M607919</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-11-18T02:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548604#M607920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;ok. done. I Have a gateway problem.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I Continue my configuration and i have another question. ( sorry &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I want to configure NAT for the LAN network. A pc from the LAN must go on the internet with the IP WAN interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I configure this rule :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Global (WAN) 1 interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;NAT (LAN) 1 172.16.0.0 255.255.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The problem is that when I want to access my DMZ public servers from the LAN, The rule above is applied on the DMZ interface too.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;So Comunication between LAN-DMZ does not work anymore. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I just specified the WAN interface in the rule so i don't understand ..&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;should I use some exemptions ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Nov 2010 15:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548604#M607920</guid>
      <dc:creator>beaujoire</dc:creator>
      <dc:date>2010-11-26T15:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548605#M607921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have this line in the config?&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 172.16.1.0 172.16.1.0 net 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need that for source address translation from the inside to dmz.&lt;/P&gt;&lt;P&gt;copy and paste the output of the following and tell us which network has trouble getting where?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;sh run global&lt;/P&gt;&lt;P&gt;sh run static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Nov 2010 19:56:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548605#M607921</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-11-26T19:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548606#M607922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I want to access the DMZ servers from the LAN using their public IPs. (I follow comment from Prapanch Ramamoorthy)&lt;BR /&gt;So I removed this line :&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 172.16.1.0 172.16.1.0 net 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output of the following command :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Show run nat &lt;BR /&gt;NAT (LAN) 0 access-list LAN_nat0_outbound&lt;BR /&gt;NAT (LAN) 1 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run global &lt;BR /&gt;global (WAN) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run static&lt;BR /&gt;static (DMZ,LAN) 194.x.x.x 10.1.1.2 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,LAN) 194.x.x.y 10.1.1.3 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,WAN) 194.x.x.x 10.1.1.2 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,WAN) 194.x.x.y 10.1.1.3 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 17:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548606#M607922</guid>
      <dc:creator>beaujoire</dc:creator>
      <dc:date>2010-11-30T17:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Ping through the Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548607#M607923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, does this work now?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 172.16.1.0 172.16.1.0 net 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT (LAN) 0 access-list LAN_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above two are the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Dec 2010 03:20:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-through-the-firewall/m-p/1548607#M607923</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-01T03:20:46Z</dc:date>
    </item>
  </channel>
</rss>

