cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2988
Views
0
Helpful
11
Replies

ASA 5505 ping 8.8.8.8 but no internet access

ibedini
Level 1
Level 1

Hi,

I'm configure my ASA 5505 firewall.

I configure inside like 192.168.0.1 since our pcs are all with ip 192.168.0.X and outside 192.168.1.112 since our router is 192.168.1.1.

I'm able to ping 8.8.8.8 (google) but from my pc I'm not able to reach internet. On my pc I have ip 192.168.0.6 subnet mask 255.255.255.0 and default gateway 192.168.0.1.

Can you help me?

1 Accepted Solution

Accepted Solutions

Hi,

If you are assigning IP addresses through ASA then you can add DNS on it.

If not then the DHCP server assigning IP's should push a DNS server to the PC's.

Regards,

Aditya

Please rate helpful and mark correct answers

View solution in original post

11 Replies 11

Muhammed Safwan
Level 1
Level 1

pls post your running configuration.

Regards,

Safwan

Hi Muhammed,

this are my configurations

!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.0.1 255.255.255.0
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 192.168.1.112 255.255.255.0
!
ftp mode passive
object network obj_any
 subnet 0.0.0.0 0.0.0.0
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
!
object network obj_any
 nat (inside,outside) dynamic interface
route outside 0.0.0.0 0.0.0.0 192.168.1.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication telnet console LOCAL
http server enable
http 192.168.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpoint _SmartCallHome_ServerCA
 no validation-usage
 crl configure
crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0
 enrollment self
 fqdn none
 subject-name CN=192.168.0.1,CN=ciscoasa
 keypair ASDM_LAUNCHER
 crl configure
crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_1
 enrollment self
 fqdn none
 subject-name CN=192.168.0.1,CN=ciscoasa
 keypair ASDM_LAUNCHER
 crl configure

telnet 192.168.0.0 255.255.255.0 inside
telnet timeout 5
no ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcpd auto_config outside
!
dhcpd address 192.168.0.5-192.168.0.36 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl trust-point ASDM_Launcher_Access_TrustPoint_1 inside vpnlb-ip
ssl trust-point ASDM_Launcher_Access_TrustPoint_1 inside
username cisco password 3USUcOPFUiMCO4Jk encrypted
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
prompt hostname context
call-home reporting anonymous

As you are testing the reachability to internet with ping , you have to allow the ping on outside interface with below command.

access-list acl-outside extended permit icmp any any
access-group acl-outside in interface outside

Regards,

Safwan

From my pc I'm able to ping 8.8.8.8 but not ping www.google.com

Aditya Ganjoo
Cisco Employee
Cisco Employee

Hi,

Please use the command:

fixup protocol icmp

Regards,

Aditya

Please rate helpful and mark correct answers

Hi Aditya,

what does the command do?

Hi,

This would enable icmp inspection through ASA so that you do not need to enable access-list for every traffic:

https://supportforums.cisco.com/discussion/11124056/why-enable-icmp-inspection-will-allow-icmp-traffic-pass-asa

Regards,

Aditya

Please rate helpful and mark correct answers

The result of the command is: converting 'fixup protocol icmp ' to MPF commands and change anything

Hi,

Please check your DNS settings on PC.

Manually add a DNS server and then test.

Regards,

Aditya

Please rate helpful and mark correct answers

Adding DNS on my pc, internet works ok. Is there any way to put DNS inside the firewall? We have many pcs and it would be hard to do.

Hi,

If you are assigning IP addresses through ASA then you can add DNS on it.

If not then the DHCP server assigning IP's should push a DNS server to the PC's.

Regards,

Aditya

Please rate helpful and mark correct answers

Review Cisco Networking products for a $25 gift card