You are using too much ACLs in your configuration. Keep in mind that, by default, traffic from higher security interface (inside) is allowed to lower security interface (outside) without the need for any ACL. The only ACL you need is for traffic comes from outside to inside in the inbound interface direction. The "out" keyword is rarely used and should be avoided as it is only used for specific scenarios. Also, remove the current NAT configs and just create a simple dynamic PAT using Auto-NAT for the inside subnet. Twice NAT is a bit complex and used for specific situations.
I suggest to use the following configs:
access-list Outside_IN extended permit icmp any any echo (Not recommended in production)
access-list Outside_IN extended permit icmp any any echo-reply
access-group Outside-IN in interface outside
object network Inside_Subnet
subnet 172.16.0.0 255.255.255.0
nat (inside,outside) dynamic interface
I also suggest to ping live machines rather than ASA's own interfaces.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...