<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Weird behavior in ASA5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502791#M745814</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A couple of things worth checking to see what is really failing and then we can work our way up from there...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) From that host can you resolve DNS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - What is that host's DNS server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Does 'nslookup google.com' work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Does 'nslookup google.com 4.2.2.2' work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Do you see any SYSLOGS generated on the ASA related to that hosts IP address 10.0.0.6?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Does that host (10.0.0.6) have the right arp entry for 10.0.0.1?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - On the host issue 'arp -an' and compare the value (if any) for 10.0.0.1 to the interface MAC address seen on the ASA if you run the command 'show interface Ethernet0/1'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) If this is a recent migration, the upstream router (your ISP) may have the wrong MAC address listed for the translated address of 10.0.0.6. You can try reloading the upstream router to clear this condition. (An enhance bug was filed to help prevent this issue in the future, it is not yet integrated into any code tho... CSCsy85614 ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know the results of the above points and if the above helps you track down the issue,please marked this question as 'resolved'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Magnus.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 24 Jul 2010 00:59:08 GMT</pubDate>
    <dc:creator>Magnus Mortensen</dc:creator>
    <dc:date>2010-07-24T00:59:08Z</dc:date>
    <item>
      <title>Weird behavior in ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502790#M745812</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My company recently switched from PIX506E to ASA5510.&lt;/P&gt;&lt;P&gt;ASA5510 works good except the pc wich static IP cannot browse Internet and ping outside ip. (All fixed IP pc except Windows PDC 10.0.0.6)&lt;/P&gt;&lt;P&gt;PC with dynamic IP assigned by Windows Server is OK.&lt;/P&gt;&lt;P&gt;Could you take a look at the following config of ASA5510?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(2)&lt;BR /&gt;!&lt;BR /&gt;hostname xxxxx&lt;BR /&gt;domain-name xxxxxxxxxx&lt;BR /&gt;enable password xxxxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.2.0 vpn-donhill description Igor place&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address xxxxxxxxxx 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 10.10.0.100 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa822-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name aerosml.com&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq 3389&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq smtp&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq pop3&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq https&lt;BR /&gt;access-list acl_outside extended permit icmp any any&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq 3389&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq www&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq 2550&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq 4550&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq 5550&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq 5552&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq 6550&lt;BR /&gt;access-list acl_outside extended permit tcp any host xxxxxxxx eq 2250&lt;BR /&gt;access-list acl_outside extended permit ip any host xxxxxxxx &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 192.168.8.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 vpn-donhill 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap_20 extended permit ip 10.0.0.0 255.255.255.0 192.168.8.0 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap_40 extended permit ip 10.0.0.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap_60 extended permit ip 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 10.0.0.0 255.255.255.0 vpn-donhill 255.255.255.0&lt;BR /&gt;access-list split_tunnel_list standard permit 10.0.0.0 255.255.255.0&lt;BR /&gt;no pager&lt;BR /&gt;logging console debugging&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool RemoteClient 192.168.100.1-192.168.100.254 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-631.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 10 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) xxxxxxxx 10.0.0.101 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) xxxxxxxx 10.0.0.6 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) xxxxxxxx 10.0.0.220 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) xxxxxxxx 10.0.0.5 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) xxxxxxxx 10.0.0.8 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) xxxxxxxx 10.0.0.34 netmask 255.255.255.255&lt;BR /&gt;access-group acl_outside in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxxxxxxx 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server AD protocol kerberos&lt;BR /&gt;aaa-server AD (inside) host 10.0.0.6&lt;BR /&gt; kerberos-realm xxxxxxxx&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 1 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map outside_dyn_map 1 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 60 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map outside_dyn_map 60 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer xxxxxxxx&lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 20 match address outside_cryptomap_20&lt;BR /&gt;crypto map outside_map 20 set peer xxxxxxxx&lt;BR /&gt;crypto map outside_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 20 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 20 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 40 match address outside_cryptomap_40&lt;BR /&gt;crypto map outside_map 40 set peer xxxxxxxx&lt;BR /&gt;crypto map outside_map 40 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 40 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 40 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 60 match address outside_cryptomap_60&lt;BR /&gt;crypto map outside_map 60 set peer xxxxxxxx&lt;BR /&gt;crypto map outside_map 60 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 60 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map 60 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp identity hostname&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.0.0.6 source inside&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy aeros internal&lt;BR /&gt;group-policy aeros attributes&lt;BR /&gt; dns-server value 10.0.0.6 4.2.2.1&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value split_tunnel_list&lt;BR /&gt; default-domain value aerosml.local&lt;BR /&gt;tunnel-group aeros type remote-access&lt;BR /&gt;tunnel-group aeros general-attributes&lt;BR /&gt; address-pool RemoteClient&lt;BR /&gt; default-group-policy aeros&lt;BR /&gt;tunnel-group aeros ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt; isakmp ikev1-user-authentication none&lt;BR /&gt;tunnel-group xxxxxxxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxxxxxxx ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group xxxxxxxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxxxxxxx ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group xxxxxxxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxxxxxxx ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group xxxxxxxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxxxxxxx ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:1cb5688063c1db68a04379dae2491f55&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502790#M745812</guid>
      <dc:creator>aerosml866</dc:creator>
      <dc:date>2019-03-11T18:15:41Z</dc:date>
    </item>
    <item>
      <title>Re: Weird behavior in ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502791#M745814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A couple of things worth checking to see what is really failing and then we can work our way up from there...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) From that host can you resolve DNS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - What is that host's DNS server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Does 'nslookup google.com' work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Does 'nslookup google.com 4.2.2.2' work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Do you see any SYSLOGS generated on the ASA related to that hosts IP address 10.0.0.6?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Does that host (10.0.0.6) have the right arp entry for 10.0.0.1?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - On the host issue 'arp -an' and compare the value (if any) for 10.0.0.1 to the interface MAC address seen on the ASA if you run the command 'show interface Ethernet0/1'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) If this is a recent migration, the upstream router (your ISP) may have the wrong MAC address listed for the translated address of 10.0.0.6. You can try reloading the upstream router to clear this condition. (An enhance bug was filed to help prevent this issue in the future, it is not yet integrated into any code tho... CSCsy85614 ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know the results of the above points and if the above helps you track down the issue,please marked this question as 'resolved'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Magnus.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Jul 2010 00:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502791#M745814</guid>
      <dc:creator>Magnus Mortensen</dc:creator>
      <dc:date>2010-07-24T00:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: Weird behavior in ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502792#M745822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This could be a translation issue, you might be going out using nat exmption (nat 0).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the dhcp assigned ip addresses that don't work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Jul 2010 00:59:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502792#M745822</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-07-24T00:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: Weird behavior in ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502793#M745828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue seems to be with&amp;nbsp; your ISP router having wrong ARP entry for the public IP addresses that are mapped to the devices with static IP addresses on the inside. I would suggest you reboot the ISP router (or talk to ISP and have them flush the ARP Cache) and see if that fixes the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Jul 2010 00:59:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502793#M745828</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-24T00:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: Weird behavior in ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502794#M745836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;After I talked with Telepacific, ISP, it looks like it's not corrupt arp.&lt;/P&gt;&lt;P&gt;Arp will eventully flushed out with TTL and no changes made for static ip pcs.&lt;/P&gt;&lt;P&gt;When I load ASDM, the Remote Desktop firewall rule to one of static IP pc shows hit count of 0.&lt;/P&gt;&lt;P&gt;It sounds more like translation issue.&lt;/P&gt;&lt;P&gt;I am not sure of my config cause I experienced there is always little different setup from version to version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your proposal of 1 and 3 all works fine.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jul 2010 00:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502794#M745836</guid>
      <dc:creator>aerosml866</dc:creator>
      <dc:date>2010-07-28T00:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Weird behavior in ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502795#M745845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it feels me it more like translation issue.&lt;/P&gt;&lt;P&gt;DHCP server is 10.0.0.6&lt;/P&gt;&lt;P&gt;One of the fixed IP pc is 10.0.0.34 which has public IP assigned to it with static command.&lt;/P&gt;&lt;P&gt;Remote RDP to it does not work and ASDM shows no hit!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jul 2010 00:46:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502795#M745845</guid>
      <dc:creator>aerosml866</dc:creator>
      <dc:date>2010-07-28T00:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: Weird behavior in ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502796#M745849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, you are not seeing any hit counts for the access-lists corresponding to these public IP's? If that is the case, the firewall is not seeing any packets on the outside interface for those IP's. Can you try adding a generic rule for one of the IP's (access-list &lt;NAME&gt; line 1 permit ip any host &lt;IP address=""&gt;) and try to ping that public IP from the outside world? If that works, we know for sure that the ISP is sending the packets towards your ISP. If you do not see any hit count increase even after adding the above line, that means the ISP is not forwarding anything for that host in which case, you might have to go back to the ISP and have them do some investigation.&lt;/IP&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jul 2010 05:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/weird-behavior-in-asa5510/m-p/1502796#M745849</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-28T05:41:28Z</dc:date>
    </item>
  </channel>
</rss>

