cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
330
Views
0
Helpful
1
Replies

PAT on ASA 5510 dosent seem to be working.

sboivin
Level 1
Level 1

Could someone take a look at my sh run and see if you can find any problems.

________________________________

ciscoasa# sh run

: Saved

:

ASA Version 7.0(2)

names

!

interface Ethernet0/0

nameif outside

security-level 0

ip address 64.*.*.* 255.255.254.0

!

interface Ethernet0/1

nameif inside

security-level 100

ip address 192.168.1.1 255.255.255.0

!

interface Ethernet0/2

shutdown

no nameif

no security-level

no ip address

!

interface Ethernet0/3

shutdown

no nameif

no security-level

no ip address

!

interface Management0/0

shutdown

no nameif

no security-level

no ip address

!

enable password 8Ry2Yjssssss4 encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

hostname ciscoasa

ftp mode passive

access-list acl_inside extended permit ip 192.168.1.0 255.255.255.0 any

access-list acl_inside extended deny ip any any

pager lines 24

mtu outside 1500

mtu inside 1500

no failover

monitor-interface outside

monitor-interface inside

no asdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 1 192.168.1.0 255.255.255.0

access-group acl_inside in interface inside

route inside 0.0.0.0 0.0.0.0 64.*.*.* 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00

timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout uauth 0:05:00 absolute

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp

telnet timeout 5

ssh timeout 5

console timeout 0

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map global_policy

class inspection_default

inspect dns maximum-length 512

inspect ftp

inspect h323 h225

inspect h323 ras

inspect netbios

inspect rsh

inspect rtsp

inspect skinny

inspect esmtp

inspect sqlnet

inspect sunrpc

inspect tftp

inspect sip

inspect xdmcp

!

service-policy global_policy global

Cryptochecksum:d41d8cd98f00b204e9800998ecf8427e

: end

ciscoasa#

_________________________

The interface e0/1 is connected to a switch my pc is connected to the switch also. My pc 192.168.1.100 can ping e0/1 but not e0/0. My router can ping my pc e0/1 and my gateway from my isp.

1 Reply 1

lgijssel
Level 9
Level 9

Please remove the access-group as below and try again:

no access-group acl_inside in interface inside

Regards,

Leo