<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help!! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help/m-p/837005#M974212</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank for your response. I try it But it did not work. All traffic is still dropping it. First I will send it my entire configuration file. This file has the real addresses use it in my network. Please understand me, Innitialy I changed my real addresses for protect my information, but I think I should make a mistake in that process. Also, I just configure the NAT with the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (trust,untrust) 10.31.1.0 10.31.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tthe NAT with The entire configuration with NAT is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FwCorporativo&lt;/P&gt;&lt;P&gt;domain-name tecnoval.com.mx&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif trust&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.31.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif untrust&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.30.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; nameif wan&lt;/P&gt;&lt;P&gt; security-level 25&lt;/P&gt;&lt;P&gt; ip address 10.30.10.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.10.10.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;banner exec ****************&lt;/P&gt;&lt;P&gt;banner exec Firewall&lt;/P&gt;&lt;P&gt;banner exec Welcome...&lt;/P&gt;&lt;P&gt;banner exec ****************&lt;/P&gt;&lt;P&gt;banner login ***************&lt;/P&gt;&lt;P&gt;banner login Firewall&lt;/P&gt;&lt;P&gt;banner login Welcome...&lt;/P&gt;&lt;P&gt;banner login ***************&lt;/P&gt;&lt;P&gt;banner motd ****************&lt;/P&gt;&lt;P&gt;banner motd Firewall&lt;/P&gt;&lt;P&gt;banner motd Welcome...&lt;/P&gt;&lt;P&gt;banner motd ****************&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring 1 Sun May 2:00 last Sun Sep 2:00&lt;/P&gt;&lt;P&gt;dns domain-lookup trust&lt;/P&gt;&lt;P&gt;dns domain-lookup untrust&lt;/P&gt;&lt;P&gt;dns domain-lookup wan&lt;/P&gt;&lt;P&gt;dns domain-lookup dmz&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 201.147.189.82&lt;/P&gt;&lt;P&gt; name-server 200.33.146.193&lt;/P&gt;&lt;P&gt; name-server 200.23.242.193&lt;/P&gt;&lt;P&gt; domain-name tecnoval.com.mx&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu trust 1500&lt;/P&gt;&lt;P&gt;mtu untrust 1500&lt;/P&gt;&lt;P&gt;mtu wan 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface trust&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface untrust&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface wan&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface dmz&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;no monitor-interface trust&lt;/P&gt;&lt;P&gt;no monitor-interface untrust&lt;/P&gt;&lt;P&gt;no monitor-interface wan&lt;/P&gt;&lt;P&gt;no monitor-interface dmz&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any trust&lt;/P&gt;&lt;P&gt;icmp permit any untrust&lt;/P&gt;&lt;P&gt;icmp permit any wan&lt;/P&gt;&lt;P&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (untrust,trust) 10.30.1.0 10.30.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (trust,untrust) 10.31.1.0 10.31.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group 100 in interface trust&lt;/P&gt;&lt;P&gt;access-group 100 out interface trust&lt;/P&gt;&lt;P&gt;access-group 100 in interface untrust&lt;/P&gt;&lt;P&gt;access-group 100 out interface untrust&lt;/P&gt;&lt;P&gt;access-group 100 in interface wan&lt;/P&gt;&lt;P&gt;access-group 100 out interface wan&lt;/P&gt;&lt;P&gt;access-group 100 in interface dmz&lt;/P&gt;&lt;P&gt;access-group 100 out interface dmz&lt;/P&gt;&lt;P&gt;route untrust 0.0.0.0 0.0.0.0 10.30.1.251 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;username admin password 0732hiKtM/dsJXqn encrypted privilege 15&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.30.1.14 255.255.255.255 untrust&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.30.1.14 255.255.255.255 untrust&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 5&lt;/P&gt;&lt;P&gt;management-access untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 11 Oct 2007 17:18:28 GMT</pubDate>
    <dc:creator>carlosarturoa</dc:creator>
    <dc:date>2007-10-11T17:18:28Z</dc:date>
    <item>
      <title>Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/836999#M974204</link>
      <description>&lt;P&gt;Hi...&lt;/P&gt;&lt;P&gt;I?ve configured my Cisco ASA 5510 Firewall with four subnets. Each one for different purposes, described as following:&lt;/P&gt;&lt;P&gt;100.130.101.0/24 network. Named UnTrust network is use it for all user inside the office.&lt;/P&gt;&lt;P&gt;100.131.101.0/24 network. Named Trust network is dedicated to be the network of my application servers (ERP, Accounting, Sales, etc.).&lt;/P&gt;&lt;P&gt;100.130.100.0/24 network. Named WAN network is dedicated to receive all frame relay link?s. This links composed my Private Wide Area Network, interconnecting all my brunches.&lt;/P&gt;&lt;P&gt;100.100.100.0/24 network. Name DMZ network is use for all external links and routers, like Internet and Providers.&lt;/P&gt;&lt;P&gt;When I make a ping from UnTrust network to any other interface of my Firewall, I can?t receive the echo-reply. Although, I?ve configured ICMP for all interfaces and I have Policies any to any for incoming and outgoing packages in all interfaces. Somebody knows what is it probably my problem? I think I?m missing some parameter. But I can?t find any resource in Internet about this matter. Thank a lot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.D. My Configuration File is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname Firewall&lt;/P&gt;&lt;P&gt;domain-name anything.com&lt;/P&gt;&lt;P&gt;enable password verysecret encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif trust&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 100.131.101.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif untrust&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 100.130.101.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; nameif wan&lt;/P&gt;&lt;P&gt; security-level 25&lt;/P&gt;&lt;P&gt; ip address 100.130.100.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 100.100.100.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd verysecret encrypted&lt;/P&gt;&lt;P&gt;banner exec ****************&lt;/P&gt;&lt;P&gt;banner exec Firewall&lt;/P&gt;&lt;P&gt;banner exec ****************&lt;/P&gt;&lt;P&gt;banner exec Welcome...&lt;/P&gt;&lt;P&gt;banner login ***************&lt;/P&gt;&lt;P&gt;banner login Firewall&lt;/P&gt;&lt;P&gt;banner login ***************&lt;/P&gt;&lt;P&gt;banner login Welcome...&lt;/P&gt;&lt;P&gt;banner motd ****************&lt;/P&gt;&lt;P&gt;banner motd Firewall&lt;/P&gt;&lt;P&gt;banner motd ****************&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:18:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/836999#M974204</guid>
      <dc:creator>carlosarturoa</dc:creator>
      <dc:date>2019-03-11T11:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/837000#M974205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;More&lt;/P&gt;&lt;P&gt;banner motd Welcome...&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring 1 Sun May 2:00 last Sun Sep 2:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name anything.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu trust 1500&lt;/P&gt;&lt;P&gt;mtu untrust 1500&lt;/P&gt;&lt;P&gt;mtu wan 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface trust&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface untrust&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface wan&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface dmz&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;monitor-interface trust&lt;/P&gt;&lt;P&gt;monitor-interface untrust&lt;/P&gt;&lt;P&gt;monitor-interface wan&lt;/P&gt;&lt;P&gt;monitor-interface dmz&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any trust&lt;/P&gt;&lt;P&gt;icmp permit any untrust&lt;/P&gt;&lt;P&gt;icmp permit any wan&lt;/P&gt;&lt;P&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group 100 in interface trust&lt;/P&gt;&lt;P&gt;access-group 100 out interface trust&lt;/P&gt;&lt;P&gt;access-group 100 in interface untrust&lt;/P&gt;&lt;P&gt;access-group 100 out interface untrust&lt;/P&gt;&lt;P&gt;access-group 100 in interface wan&lt;/P&gt;&lt;P&gt;access-group 100 out interface wan&lt;/P&gt;&lt;P&gt;access-group 100 in interface dmz&lt;/P&gt;&lt;P&gt;access-group 100 out interface dmz&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;username administrator password verysecret encrypted privilege 15&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 100.130.101.14 255.255.255.255 untrust&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 100.130.101.14 255.255.255.255 untrust&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 5&lt;/P&gt;&lt;P&gt;management-access untrust&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2007 18:25:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/837000#M974205</guid>
      <dc:creator>carlosarturoa</dc:creator>
      <dc:date>2007-09-27T18:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/837001#M974208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (trust,untrust) 100.131.101.0 100.131.101.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should allow you to access untrust from trust and vice versa.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2007 18:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/837001#M974208</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-09-27T18:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/837002#M974209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried configuring tha NAT rule described in your comment. But, My ASA still continue blocking all traffic. The NAT rules used area:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) A single NAT rule from Trust to UnTrust&lt;/P&gt;&lt;P&gt;static (Trust,UnTrust) 100.130.101.0 100.131.101.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) A single NAT rule from UnTrust to Trust&lt;/P&gt;&lt;P&gt;static (UnTrust,Trust) 100.131.101.0 100.130.101.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) This last two NAT rules combined &lt;/P&gt;&lt;P&gt;static (UnTrust,Trust) 100.131.101.0 100.130.101.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Trust,UnTrust) 100.130.101.0 100.131.101.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2007 22:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/837002#M974209</guid>
      <dc:creator>carlosarturoa</dc:creator>
      <dc:date>2007-10-10T22:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/837003#M974210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You didn't exactly configure the static that Adam had asked you to use. Look at the global/real address (both set to 10.131.101.0) in the static configuration below. You are technically doing no NAT here with this configuration. Try this static.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (trust,untrust) 100.131.101.0 100.131.101.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2007 23:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/837003#M974210</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2007-10-10T23:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/837004#M974211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank for your response. I try it But it did not work. All traffic is still dropping it. First I will send it my entire configuration file. This file has the real addresses use it in my network. Please understand me, Innitialy I changed my real addresses for protect my information, but I think I should make a mistake in that process. Also, I just configure the NAT with the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (trust,untrust) 10.31.1.0 10.31.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tthe NAT with The entire configuration with NAT is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FwCorporativo&lt;/P&gt;&lt;P&gt;domain-name tecnoval.com.mx&lt;/P&gt;&lt;P&gt;enable password 8da6gU90DFywg4rN encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif trust&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.31.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif untrust&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.30.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; nameif wan&lt;/P&gt;&lt;P&gt; security-level 25&lt;/P&gt;&lt;P&gt; ip address 10.30.10.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.10.10.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 8da6gU90DFywg4rN encrypted&lt;/P&gt;&lt;P&gt;banner exec ****************&lt;/P&gt;&lt;P&gt;banner exec Firewall&lt;/P&gt;&lt;P&gt;banner exec Welcome...&lt;/P&gt;&lt;P&gt;banner exec ****************&lt;/P&gt;&lt;P&gt;banner login ***************&lt;/P&gt;&lt;P&gt;banner login Firewall&lt;/P&gt;&lt;P&gt;banner login Welcome...&lt;/P&gt;&lt;P&gt;banner login ***************&lt;/P&gt;&lt;P&gt;banner motd ****************&lt;/P&gt;&lt;P&gt;banner motd Firewall&lt;/P&gt;&lt;P&gt;banner motd Welcome...&lt;/P&gt;&lt;P&gt;banner motd ****************&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring 1 Sun May 2:00 last Sun Sep 2:00&lt;/P&gt;&lt;P&gt;dns domain-lookup trust&lt;/P&gt;&lt;P&gt;dns domain-lookup untrust&lt;/P&gt;&lt;P&gt;dns domain-lookup wan&lt;/P&gt;&lt;P&gt;dns domain-lookup dmz&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 201.147.189.82&lt;/P&gt;&lt;P&gt; name-server 200.33.146.193&lt;/P&gt;&lt;P&gt; name-server 200.23.242.193&lt;/P&gt;&lt;P&gt; domain-name tecnoval.com.mx&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu trust 1500&lt;/P&gt;&lt;P&gt;mtu untrust 1500&lt;/P&gt;&lt;P&gt;mtu wan 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface trust&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface untrust&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface wan&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface dmz&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;no monitor-interface trust&lt;/P&gt;&lt;P&gt;no monitor-interface untrust&lt;/P&gt;&lt;P&gt;no monitor-interface wan&lt;/P&gt;&lt;P&gt;no monitor-interface dmz&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any trust&lt;/P&gt;&lt;P&gt;icmp permit any untrust&lt;/P&gt;&lt;P&gt;icmp permit any wan&lt;/P&gt;&lt;P&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (untrust,trust) 10.30.1.0 10.30.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (trust,untrust) 10.31.1.0 10.31.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group 100 in interface trust&lt;/P&gt;&lt;P&gt;access-group 100 out interface trust&lt;/P&gt;&lt;P&gt;access-group 100 in interface untrust&lt;/P&gt;&lt;P&gt;access-group 100 out interface untrust&lt;/P&gt;&lt;P&gt;access-group 100 in interface wan&lt;/P&gt;&lt;P&gt;access-group 100 out interface wan&lt;/P&gt;&lt;P&gt;access-group 100 in interface dmz&lt;/P&gt;&lt;P&gt;access-group 100 out interface dmz&lt;/P&gt;&lt;P&gt;route untrust 0.0.0.0 0.0.0.0 10.30.1.251 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;username admin password 0732hiKtM/dsJXqn encrypted privilege 15&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.30.1.14 255.255.255.255 untrust&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.30.1.14 255.255.255.255 untrust&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 5&lt;/P&gt;&lt;P&gt;management-access untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2007 17:16:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/837004#M974211</guid>
      <dc:creator>carlosarturoa</dc:creator>
      <dc:date>2007-10-11T17:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/837005#M974212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank for your response. I try it But it did not work. All traffic is still dropping it. First I will send it my entire configuration file. This file has the real addresses use it in my network. Please understand me, Innitialy I changed my real addresses for protect my information, but I think I should make a mistake in that process. Also, I just configure the NAT with the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (trust,untrust) 10.31.1.0 10.31.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tthe NAT with The entire configuration with NAT is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FwCorporativo&lt;/P&gt;&lt;P&gt;domain-name tecnoval.com.mx&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif trust&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.31.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif untrust&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.30.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; nameif wan&lt;/P&gt;&lt;P&gt; security-level 25&lt;/P&gt;&lt;P&gt; ip address 10.30.10.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.10.10.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;banner exec ****************&lt;/P&gt;&lt;P&gt;banner exec Firewall&lt;/P&gt;&lt;P&gt;banner exec Welcome...&lt;/P&gt;&lt;P&gt;banner exec ****************&lt;/P&gt;&lt;P&gt;banner login ***************&lt;/P&gt;&lt;P&gt;banner login Firewall&lt;/P&gt;&lt;P&gt;banner login Welcome...&lt;/P&gt;&lt;P&gt;banner login ***************&lt;/P&gt;&lt;P&gt;banner motd ****************&lt;/P&gt;&lt;P&gt;banner motd Firewall&lt;/P&gt;&lt;P&gt;banner motd Welcome...&lt;/P&gt;&lt;P&gt;banner motd ****************&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring 1 Sun May 2:00 last Sun Sep 2:00&lt;/P&gt;&lt;P&gt;dns domain-lookup trust&lt;/P&gt;&lt;P&gt;dns domain-lookup untrust&lt;/P&gt;&lt;P&gt;dns domain-lookup wan&lt;/P&gt;&lt;P&gt;dns domain-lookup dmz&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 201.147.189.82&lt;/P&gt;&lt;P&gt; name-server 200.33.146.193&lt;/P&gt;&lt;P&gt; name-server 200.23.242.193&lt;/P&gt;&lt;P&gt; domain-name tecnoval.com.mx&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu trust 1500&lt;/P&gt;&lt;P&gt;mtu untrust 1500&lt;/P&gt;&lt;P&gt;mtu wan 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface trust&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface untrust&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface wan&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface dmz&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;no monitor-interface trust&lt;/P&gt;&lt;P&gt;no monitor-interface untrust&lt;/P&gt;&lt;P&gt;no monitor-interface wan&lt;/P&gt;&lt;P&gt;no monitor-interface dmz&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any trust&lt;/P&gt;&lt;P&gt;icmp permit any untrust&lt;/P&gt;&lt;P&gt;icmp permit any wan&lt;/P&gt;&lt;P&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (untrust,trust) 10.30.1.0 10.30.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (trust,untrust) 10.31.1.0 10.31.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group 100 in interface trust&lt;/P&gt;&lt;P&gt;access-group 100 out interface trust&lt;/P&gt;&lt;P&gt;access-group 100 in interface untrust&lt;/P&gt;&lt;P&gt;access-group 100 out interface untrust&lt;/P&gt;&lt;P&gt;access-group 100 in interface wan&lt;/P&gt;&lt;P&gt;access-group 100 out interface wan&lt;/P&gt;&lt;P&gt;access-group 100 in interface dmz&lt;/P&gt;&lt;P&gt;access-group 100 out interface dmz&lt;/P&gt;&lt;P&gt;route untrust 0.0.0.0 0.0.0.0 10.30.1.251 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;username admin password 0732hiKtM/dsJXqn encrypted privilege 15&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.30.1.14 255.255.255.255 untrust&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.30.1.14 255.255.255.255 untrust&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 5&lt;/P&gt;&lt;P&gt;management-access untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2007 17:18:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/837005#M974212</guid>
      <dc:creator>carlosarturoa</dc:creator>
      <dc:date>2007-10-11T17:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/837006#M974213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no static (untrust,trust) 10.30.1.0 10.30.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2007 17:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/837006#M974213</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-10-11T17:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/837007#M974214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did it but it still do not work. From console I get the following output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FwCorporativo(config)# no static (untrust,trust) 10.30.1.0 10.30.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;FwCorporativo(config)# &lt;/P&gt;&lt;P&gt;FwCorporativo# ping&lt;/P&gt;&lt;P&gt;Interface: trust&lt;/P&gt;&lt;P&gt;Target IP address: 10.30.1.14&lt;/P&gt;&lt;P&gt;Repeat count: [5]&lt;/P&gt;&lt;P&gt;Datagram size: [100]&lt;/P&gt;&lt;P&gt;Timeout in seconds: [2]&lt;/P&gt;&lt;P&gt;Extended commands [n]: y&lt;/P&gt;&lt;P&gt;Verbose? [no]:&lt;/P&gt;&lt;P&gt;Validate reply data? [no]:&lt;/P&gt;&lt;P&gt;Data pattern [0xabcd]:&lt;/P&gt;&lt;P&gt;Sweep range of sizes [n]:&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 10.30.1.14, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;FwCorporativo# ping&lt;/P&gt;&lt;P&gt;Interface: untrust&lt;/P&gt;&lt;P&gt;Target IP address: 10.30.1.14&lt;/P&gt;&lt;P&gt;Repeat count: [5]&lt;/P&gt;&lt;P&gt;Datagram size: [100]&lt;/P&gt;&lt;P&gt;Timeout in seconds: [2]&lt;/P&gt;&lt;P&gt;Extended commands [n]: y&lt;/P&gt;&lt;P&gt;Verbose? [no]:&lt;/P&gt;&lt;P&gt;Validate reply data? [no]:&lt;/P&gt;&lt;P&gt;Data pattern [0xabcd]:&lt;/P&gt;&lt;P&gt;Sweep range of sizes [n]:&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 10.30.1.14, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2007 17:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/837007#M974214</guid>
      <dc:creator>carlosarturoa</dc:creator>
      <dc:date>2007-10-11T17:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/837008#M974215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try pinging from a host on the trust network, not from the firewall trust interface like you did above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edit: You could also ping from a machine in the untrust network to a machine in the trust network, not from the untrust interface in the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2007 18:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/837008#M974215</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-10-11T18:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: Help!!</title>
      <link>https://community.cisco.com/t5/network-security/help/m-p/837009#M974216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thak you, everything is working fine...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2007 18:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help/m-p/837009#M974216</guid>
      <dc:creator>carlosarturoa</dc:creator>
      <dc:date>2007-10-11T18:29:40Z</dc:date>
    </item>
  </channel>
</rss>

