<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inside hosts cannot ping external hosts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inside-hosts-cannot-ping-external-hosts/m-p/1363108#M729746</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I've changed the public facing IPs... so the 172.16.10.252 would indeed need a device between it and the Internet to get out -- I figured that would be assumed (as you mentioned) since I could ping google.com from the firewall.&amp;nbsp; The big issue was that I could not do the same from an internal (behind the firewall) host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suppose that I've misunderstood the purpose of the nat-control command.&amp;nbsp; I am using non-routable IPs internally on the vlan201 interface.&amp;nbsp; There will also be other interfaces brought up which will also utilize non-routable addresses.&amp;nbsp; So...&amp;nbsp; do I need to use nat-control.&amp;nbsp;&amp;nbsp; Would you only NOT use nat-control when the global IP is the same as the internal IP (i.e.&amp;nbsp; if I had a host with an Internet facing IP of 209.208.207.6 and its IP behind the firewall was also 209.208.207.6) ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Feb 2010 21:12:06 GMT</pubDate>
    <dc:creator>lssc_cisco</dc:creator>
    <dc:date>2010-02-23T21:12:06Z</dc:date>
    <item>
      <title>Inside hosts cannot ping external hosts</title>
      <link>https://community.cisco.com/t5/network-security/inside-hosts-cannot-ping-external-hosts/m-p/1363106#M729726</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've configured an ASA5520 and setup a single host on the inside to test connectivity.&amp;nbsp; I can ping external/Internet addresses fine from the firewall (i.e. I can ping google from the firewall), however, I cannot ping external IPs from the host inside/behind the firewall.&amp;nbsp; I can ping the firewall fine from the host... so this looks to be a NAT issue.&amp;nbsp; You'll see in the config below that I've setup a static NAT for the internal host... so shouldn't that work?&amp;nbsp; As soon as I enabled 'nat-control' I was able to get out.&amp;nbsp; However, if I disable nat-control, I cannot.&amp;nbsp; Without enabling nat-control, what can I change in the config below?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.0(8)&lt;BR /&gt;!&lt;BR /&gt;hostname fw1&lt;BR /&gt;enable password *********** encrypted&lt;BR /&gt;passwd ********** encrypted&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 172.16.10.252 255.255.255.128&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; speed 1000&lt;BR /&gt; duplex full&lt;BR /&gt; nameif vlan201&lt;BR /&gt; security-level 80&lt;BR /&gt; ip address 10.5.10.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.10.1.3 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring 1 Sun Apr 2:00 last Sun Oct 2:00&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 172.16.10.211 eq http&lt;/P&gt;&lt;P&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu vlan201 1500&lt;BR /&gt;asdm image disk0:/asdm-508.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;static (vlan201,outside) 172.16.10.211 10.5.10.211 netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 172.16.10.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;BR /&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.10.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 15&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd lease 3600&lt;BR /&gt;dhcpd ping_timeout 50&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns maximum-length 512&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-hosts-cannot-ping-external-hosts/m-p/1363106#M729726</guid>
      <dc:creator>lssc_cisco</dc:creator>
      <dc:date>2019-03-11T17:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: Inside hosts cannot ping external hosts</title>
      <link>https://community.cisco.com/t5/network-security/inside-hosts-cannot-ping-external-hosts/m-p/1363107#M729730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;lssc_cisco wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've configured an ASA5520 and setup a single host on the inside to test connectivity.&amp;nbsp; I can ping external/Internet addresses fine from the firewall (i.e. I can ping google from the firewall), however, I cannot ping external IPs from the host inside/behind the firewall.&amp;nbsp; I can ping the firewall fine from the host... so this looks to be a NAT issue.&amp;nbsp; You'll see in the config below that I've setup a static NAT for the internal host... so shouldn't that work?&amp;nbsp; As soon as I enabled 'nat-control' I was able to get out.&amp;nbsp; However, if I disable nat-control, I cannot.&amp;nbsp; Without enabling nat-control, what can I change in the config below?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 172.16.10.252 255.255.255.128&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; speed 1000&lt;BR /&gt; duplex full&lt;BR /&gt; nameif vlan201&lt;BR /&gt; security-level 80&lt;BR /&gt; ip address 10.5.10.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;i&lt;BR /&gt;!&lt;BR /&gt;f&lt;BR /&gt;static (vlan201,outside) 172.16.10.211 10.5.10.211 netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am a little confused by the addressing. Neither the outside or inside interfaces are using addressing that is routable on the internet. Have you changed the outside address for security reasons in this post. If not does a device further upstream NAT the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the inside, if it really is using 10.5.10.x address then you can't disable nat-control unless a device further upstream is set to NAT all packets to a public IP address. 10.5.10.x is a private address so somewhere it has to be natted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 20:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-hosts-cannot-ping-external-hosts/m-p/1363107#M729730</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-02-23T20:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: Inside hosts cannot ping external hosts</title>
      <link>https://community.cisco.com/t5/network-security/inside-hosts-cannot-ping-external-hosts/m-p/1363108#M729746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I've changed the public facing IPs... so the 172.16.10.252 would indeed need a device between it and the Internet to get out -- I figured that would be assumed (as you mentioned) since I could ping google.com from the firewall.&amp;nbsp; The big issue was that I could not do the same from an internal (behind the firewall) host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suppose that I've misunderstood the purpose of the nat-control command.&amp;nbsp; I am using non-routable IPs internally on the vlan201 interface.&amp;nbsp; There will also be other interfaces brought up which will also utilize non-routable addresses.&amp;nbsp; So...&amp;nbsp; do I need to use nat-control.&amp;nbsp;&amp;nbsp; Would you only NOT use nat-control when the global IP is the same as the internal IP (i.e.&amp;nbsp; if I had a host with an Internet facing IP of 209.208.207.6 and its IP behind the firewall was also 209.208.207.6) ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 21:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-hosts-cannot-ping-external-hosts/m-p/1363108#M729746</guid>
      <dc:creator>lssc_cisco</dc:creator>
      <dc:date>2010-02-23T21:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: Inside hosts cannot ping external hosts</title>
      <link>https://community.cisco.com/t5/network-security/inside-hosts-cannot-ping-external-hosts/m-p/1363109#M729756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;lssc_cisco wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I've changed the public facing IPs... so the 172.16.10.252 would indeed need a device between it and the Internet to get out -- I figured that would be assumed (as you mentioned) since I could ping google.com from the firewall.&amp;nbsp; The big issue was that I could not do the same from an internal (behind the firewall) host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suppose that I've misunderstood the purpose of the nat-control command.&amp;nbsp; I am using non-routable IPs internally on the vlan201 interface.&amp;nbsp; There will also be other interfaces brought up which will also utilize non-routable addresses.&amp;nbsp; So...&amp;nbsp; do I need to use nat-control.&amp;nbsp;&amp;nbsp; Would you only NOT use nat-control when the global IP is the same as the internal IP (i.e.&amp;nbsp; if I had a host with an Internet facing IP of 209.208.207.6 and its IP behind the firewall was also 209.208.207.6) ??&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat-control disables NAT but if you are using private IPs then you can't disable NAT if you want to NAT private IP address to the outside interface of your firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your internal hosts were assigned public IPs then you would not need NAT. To be honest turning off NAT is far more relevant when you use the firewall for internal firewalling ie. in a data centre or a campus LAN and on both sides of the firewall are private addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 21:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-hosts-cannot-ping-external-hosts/m-p/1363109#M729756</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-02-23T21:42:48Z</dc:date>
    </item>
  </channel>
</rss>

