<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: unable to ping outside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488462#M812579</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Halijenn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for help,my problem is "i can't ping through pix" but the same network i can reach if i ping form outside interface, my topology is as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.0.0.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 23.0.0.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.23.15.0/24&lt;/P&gt;&lt;P&gt;----------FIREWALL---------------------ROUTER 1-----------------------ROUTER 2-------------------AT&amp;amp;T ROUTER(no access on this router)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .13&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i don't find any problem with access-list, could u tell me is their anything i can do so i can ping through firewall, i can ping router2's 172.23.15.13 ip address from outside interface of pix but not from inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 01 Jun 2010 06:31:46 GMT</pubDate>
    <dc:creator>hyundai_mum</dc:creator>
    <dc:date>2010-06-01T06:31:46Z</dc:date>
    <item>
      <title>unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488460#M812577</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my inside interface user can't ping outside interface even after i have configured acl which allow ping and also icmp response, configured icmp inspection also.find below configuration of pix 515E which is running ios version 8.0(3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 8.0(3)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FWALL&lt;/P&gt;&lt;P&gt;enable password f1/B5iV9rJ.dvsDE encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt;description P2P link&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif outside1&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 24.0.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt;description LAN interface&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.10.11 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt;description Internet Gateway&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif outside2&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 25.0.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;boot system flash:/pix803.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone IST 5 30&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list icmpacl extended permit icmp any 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit ip 192.168.10.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging host inside 192.168.10.11&lt;/P&gt;&lt;P&gt;mtu outside1 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside2 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm-603.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group icmpacl in interface outside1&lt;/P&gt;&lt;P&gt;access-group acl_inside in interface inside&lt;/P&gt;&lt;P&gt;route outside1 0.0.0.0 0.0.0.0 24.0.0.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.23.15.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map icmp-class&lt;/P&gt;&lt;P&gt;match access-list icmpacl&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;class icmp-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:d1afb781f4e40a7c4f8963cd853f94d9&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;FWALL#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;omitted unnecessary config,not using interface ethernet2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hasmukh&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:52:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488460#M812577</guid>
      <dc:creator>hyundai_mum</dc:creator>
      <dc:date>2019-03-11T17:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488461#M812578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You won't be able to ping the outside interface ip address of the PIX from internal LAN as it is not supported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From internal LAN, you can only ping the PIX inside interface, as well as ping through the PIX, ie: you can ping the next hop ip address from the outside interface (24.0.0.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With PIX/ASA, you can only ping the directly connected interface, ie: from internal LAN, you can only ping the inside interface, and from outside, you can only ping the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 May 2010 10:06:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488461#M812578</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-31T10:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488462#M812579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Halijenn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for help,my problem is "i can't ping through pix" but the same network i can reach if i ping form outside interface, my topology is as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.0.0.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 23.0.0.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.23.15.0/24&lt;/P&gt;&lt;P&gt;----------FIREWALL---------------------ROUTER 1-----------------------ROUTER 2-------------------AT&amp;amp;T ROUTER(no access on this router)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .13&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i don't find any problem with access-list, could u tell me is their anything i can do so i can ping through firewall, i can ping router2's 172.23.15.13 ip address from outside interface of pix but not from inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2010 06:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488462#M812579</guid>
      <dc:creator>hyundai_mum</dc:creator>
      <dc:date>2010-06-01T06:31:46Z</dc:date>
    </item>
    <item>
      <title>Re: unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488463#M812580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me put it like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA can only "talk" with destinations/sources that is on the interface closer to that said source/destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You cannot talk from/to inside ineterface with a destination which is available from the outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2010 06:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488463#M812580</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-06-01T06:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488464#M812581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;STRONG&gt;Latosiewicz,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;yes i can't talk any destination from inside interface which i can talk from outside interface, so the problem is my LAN users can't reach any destination.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;any suggestions&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;thanks&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2010 06:59:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488464#M812581</guid>
      <dc:creator>hyundai_mum</dc:creator>
      <dc:date>2010-06-01T06:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488465#M812582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it your LAN users or the ASA itself having problems accessing those hosts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Show us some logging, informational level would be a start.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2010 07:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488465#M812582</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-06-01T07:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488466#M812583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need to add NAT as well:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside1) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2010 08:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488466#M812583</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-06-01T08:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488467#M812584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;STRONG&gt;halijenn,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;i configured suggested nat config but still same problem, find below show run output to help u understand where i am wrong.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;&lt;/H5&gt;&lt;H5&gt;FW-HyundaiHMM# show run&lt;/H5&gt;&lt;H5&gt;: Saved&lt;/H5&gt;&lt;H5&gt;:&lt;/H5&gt;&lt;H5&gt;PIX Version 8.0(3)&lt;/H5&gt;&lt;H5&gt;!&lt;/H5&gt;&lt;H5&gt;hostname FW-HyundaiHMM&lt;/H5&gt;&lt;H5&gt;enable password *************** encrypted&lt;/H5&gt;&lt;H5&gt;names&lt;/H5&gt;&lt;H5&gt;dns-guard&lt;/H5&gt;&lt;H5&gt;!&lt;/H5&gt;&lt;H5&gt;interface Ethernet0&lt;/H5&gt;&lt;H5&gt; description P2P link&lt;/H5&gt;&lt;H5&gt; speed 100&lt;/H5&gt;&lt;H5&gt; duplex full&lt;/H5&gt;&lt;H5&gt; nameif outside1&lt;/H5&gt;&lt;H5&gt; security-level 0&lt;/H5&gt;&lt;H5&gt; ip address 24.0.0.2 255.255.255.0&lt;/H5&gt;&lt;H5&gt;!&lt;/H5&gt;&lt;H5&gt;interface Ethernet1&lt;/H5&gt;&lt;H5&gt; description LAN interface&lt;/H5&gt;&lt;H5&gt; speed 100&lt;/H5&gt;&lt;H5&gt; duplex full&lt;/H5&gt;&lt;H5&gt; nameif inside&lt;/H5&gt;&lt;H5&gt; security-level 100&lt;/H5&gt;&lt;H5&gt; ip address 192.168.10.11 255.255.255.0&lt;/H5&gt;&lt;H5&gt;!&lt;/H5&gt;&lt;H5&gt;interface Ethernet2&lt;/H5&gt;&lt;H5&gt; description Internet Gateway&lt;/H5&gt;&lt;H5&gt; speed 100&lt;/H5&gt;&lt;H5&gt; duplex full&lt;/H5&gt;&lt;H5&gt; nameif outside2&lt;/H5&gt;&lt;H5&gt; security-level 0&lt;/H5&gt;&lt;H5&gt; ip address 25.0.0.1 255.255.255.0&lt;/H5&gt;&lt;H5&gt;!&lt;/H5&gt;&lt;H5&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/H5&gt;&lt;H5&gt;boot system flash:/pix803.bin&lt;/H5&gt;&lt;H5&gt;ftp mode passive&lt;/H5&gt;&lt;H5&gt;clock timezone IST 5 30&lt;/H5&gt;&lt;H5&gt;same-security-traffic permit inter-interface&lt;/H5&gt;&lt;H5&gt;access-list icmpacl extended permit icmp any 192.168.10.0 255.255.255.0&lt;/H5&gt;&lt;H5&gt;access-list acl_inside extended permit ip 192.168.10.0 255.255.255.0 any&lt;/H5&gt;&lt;H5&gt;pager lines 24&lt;/H5&gt;&lt;H5&gt;logging enable&lt;/H5&gt;&lt;H5&gt;logging asdm informational&lt;/H5&gt;&lt;H5&gt;logging host inside 172.23.15.33&lt;/H5&gt;&lt;H5&gt;mtu outside1 1500&lt;/H5&gt;&lt;H5&gt;mtu inside 1500&lt;/H5&gt;&lt;H5&gt;mtu outside2 1500&lt;/H5&gt;&lt;H5&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/H5&gt;&lt;H5&gt;asdm image flash:/asdm-603.bin&lt;/H5&gt;&lt;H5&gt;no asdm history enable&lt;/H5&gt;&lt;H5&gt;arp timeout 14400&lt;/H5&gt;&lt;H5&gt;global (outside1) 1 interface&lt;/H5&gt;&lt;H5&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;/H5&gt;&lt;H5&gt;access-group icmpacl in interface outside1&lt;/H5&gt;&lt;H5&gt;access-group acl_inside in interface inside&lt;/H5&gt;&lt;H5&gt;route outside1 0.0.0.0 0.0.0.0 24.0.0.1 1&lt;/H5&gt;&lt;H5&gt;timeout xlate 3:00:00&lt;/H5&gt;&lt;H5&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/H5&gt;&lt;H5&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/H5&gt;&lt;H5&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/H5&gt;&lt;H5&gt;timeout uauth 0:05:00 absolute&lt;/H5&gt;&lt;H5&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/H5&gt;&lt;H5&gt;http server enable&lt;/H5&gt;&lt;H5&gt;http 172.23.15.0 255.255.255.0 inside&lt;/H5&gt;&lt;H5&gt;no snmp-server location&lt;/H5&gt;&lt;H5&gt;no snmp-server contact&lt;/H5&gt;&lt;H5&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/H5&gt;&lt;H5&gt;telnet timeout 5&lt;/H5&gt;&lt;H5&gt;ssh 172.23.15.0 255.255.255.0 outside1&lt;/H5&gt;&lt;H5&gt;ssh 192.168.10.0 255.255.255.0 inside&lt;/H5&gt;&lt;H5&gt;ssh timeout 30&lt;/H5&gt;&lt;H5&gt;ssh version 2&lt;/H5&gt;&lt;H5&gt;console timeout 0&lt;/H5&gt;&lt;H5&gt;threat-detection basic-threat&lt;/H5&gt;&lt;H5&gt;threat-detection statistics access-list&lt;/H5&gt;&lt;H5&gt;!&lt;/H5&gt;&lt;H5&gt;class-map icmp-class&lt;/H5&gt;&lt;H5&gt; match access-list icmpacl&lt;/H5&gt;&lt;H5&gt;class-map inspection_default&lt;/H5&gt;&lt;H5&gt; match default-inspection-traffic&lt;/H5&gt;&lt;H5&gt;!&lt;/H5&gt;&lt;H5&gt;!&lt;/H5&gt;&lt;H5&gt;policy-map global_policy&lt;/H5&gt;&lt;H5&gt; class inspection_default&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect ftp&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect h323 h225&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect h323 ras&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect rsh&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect rtsp&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect esmtp&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect sqlnet&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect skinny&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect sunrpc&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect xdmcp&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect sip&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect netbios&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect tftp&lt;/H5&gt;&lt;H5&gt; class icmp-class&lt;/H5&gt;&lt;H5&gt;&amp;nbsp; inspect icmp&lt;/H5&gt;&lt;H5&gt;!&lt;/H5&gt;&lt;H5&gt;service-policy global_policy global&lt;/H5&gt;&lt;H5&gt;prompt hostname context&lt;/H5&gt;&lt;H5&gt;Cryptochecksum:4269272b4e0cc053d147f503f9655065&lt;/H5&gt;&lt;H5&gt;: end&lt;/H5&gt;&lt;H5&gt;FW-HyundaiHMM#&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-weight: normal;"&gt;thanks for all yr help&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2010 12:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488467#M812584</guid>
      <dc:creator>hyundai_mum</dc:creator>
      <dc:date>2010-06-01T12:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488468#M812585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you perform "clear xlate" after adding the nat/global statements? if not, please perform "&lt;STRONG&gt;clear xlate&lt;/STRONG&gt;".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you might also want to add icmp inspection globally:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try to ping the following from inside host and advise if it's successfull:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ping 24.0.0.1&lt;BR /&gt;ping 23.0.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2010 12:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488468#M812585</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-06-01T12:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488469#M812586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;STRONG&gt;halijenn,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it was great help,thanks u very much............................................................&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it did't understand two things, why do i need to run clear xlate cmd and why we have to inspect icmp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hasmukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2010 13:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488469#M812586</guid>
      <dc:creator>hyundai_mum</dc:creator>
      <dc:date>2010-06-01T13:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: unable to ping outside interface</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488470#M812587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ''clear xlate'' command is to clear the translation table on the PIX/ASA.&lt;/P&gt;&lt;P&gt;If you're modifying the NAT configuration somehow, you should refresh the dynamic NAT table with the ''clear xlate'' command.&lt;/P&gt;&lt;P&gt;Alternative if you don't want to refresh the entire table you can clear specific IPs from the table with the ''clear xlate local x.x.x.x'' command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ''inspect icmp'' command is needed for the ASA to keep track of the ICMP connection and therefore allow the PING echo-reply back.&lt;/P&gt;&lt;P&gt;The ASA by default inspects only TCP and UDP traffic to allow the return packets.&lt;/P&gt;&lt;P&gt;To be able to inspect ICMP as well you need the command ''inspect icmp''&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2010 13:49:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interface/m-p/1488470#M812587</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-01T13:49:49Z</dc:date>
    </item>
  </channel>
</rss>

