Trying to go from inside to outside

Trying to go from inside network to outside network, I have a 3560 switch connecting to a 2960 switch which connects to 5520 ASA firewall. I have a Single 3560 switch for my outside network connecting to the firewall. When I ping the outside host I dont get response, can someone please help, thanks

Here is my config for the firewall:

5520ASA# sh run : Saved : : Serial Number: JMX1131L1ZU : Hardware:   ASA5520, 2048 MB RAM, CPU Pentium 4 Celeron 2000 MHz : ASA Version 9.1(7) ! hostname 5520ASA domain-name NetworkBell enable password 8Ry2YjIyt7RRXU24 encrypted xlate per-session deny tcp any4 any4 xlate per-session deny tcp any4 any6 xlate per-session deny tcp any6 any4 xlate per-session deny tcp any6 any6 xlate per-session deny udp any4 any4 eq domain xlate per-session deny udp any4 any6 eq domain xlate per-session deny udp any6 any4 eq domain xlate per-session deny udp any6 any6 eq domain names ! interface GigabitEthernet0/0  nameif inside  security-level 100  ip address ! interface GigabitEthernet0/1  nameif outside  security-level 0  ip address ! interface GigabitEthernet0/2  shutdown  no nameif  no security-level  no ip address ! interface GigabitEthernet0/3  shutdown  no nameif  no security-level  no ip address ! interface Management0/0  nameif management  security-level 0  ip address ! ftp mode passive dns server-group DefaultDNS  domain-name NetworkBell object network outside3560  host object network inside3560  host object-group icmp-type ping  icmp-object echo  icmp-object echo-reply access-list outside_access_in extended permit icmp object outside3560 object ins                                                                                        ide3560 object-group ping access-list inside extended permit icmp host host access-list outside extended permit icmp host host pager lines 24 mtu management 1500 mtu inside 1500 mtu outside 1500 no failover icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 no arp permit-nonconnected access-group inside in interface inside access-group inside in interface outside access-group outside_access_in global timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy user-identity default-domain LOCAL http server enable http management no snmp-server location no snmp-server contact crypto ipsec security-association pmtu-aging infinite crypto ca trustpool policy telnet timeout 5 ssh stricthostkeycheck ssh timeout 5 ssh key-exchange group dh-group1-sha1 console timeout 0 threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept ! ! prompt hostname context no call-home reporting anonymous call-home  profile CiscoTAC-1   no active   destination address http   destination address email [email protected]   destination transport-method http   subscribe-to-alert-group diagnostic   subscribe-to-alert-group environment   subscribe-to-alert-group inventory periodic monthly   subscribe-to-alert-group configuration periodic monthly   subscribe-to-alert-group telemetry periodic daily Cryptochecksum:d41d8cd98f00b204e9800998ecf8427e : end 5520ASA# 


You have the access list "inside" on both the inside and outside interfaces

Category: cisco asa Time: 2016-07-29 Views: 0

Related post

iOS development

Android development

Python development

JAVA development

Development language

PHP development

Ruby development


Front-end development


development tools

Open Platform

Javascript development

.NET development

cloud computing


Copyright (C), All Rights Reserved.

processed in 0.222 (s). 12 q(s)