I am not really sure if I follow. Can you clarify what traffic doesnt work and please share more than just the interface configurations.
Also with regards to the PING. If you mean that networks 192.168.40.0/24 and 192.168.5.0/24 cant ping the interface IP address of 192.168.1.2 then this is to be expected. ASA will only let you ICMP the interface behind which the user is located.
So for example user behind DMZ can ping the interface IP address 192.168.1.2. A user behind the HOSecondary interface can ping the interface IP address 192.168.40.10 and so on. You can not PING an interface if the you are doing the PING from behind another interface. ASA wont allow that traffic and there is no configuration command around it.
We need to access for telnet purpose ip address 192.168.5.10 interface from 192.168.40.0 and 192.168.1.0 network users and also we have 8 servers on 192.168.5.0 network some servers able ping from 40 and 1 series but some servers are not able ping .
You should enable management connections on the interface behind which the users needing management connections are. Instead of Telnet I would also suggest using SSH though Telnet could be left in there perhaps incase there is some SSH related problem which would require you to use some other management connection.
Again without your configurations we are blind as to what might be the problem.
ICMP/PING is not always the ideal way to test connections as a lot of times its either blocked at some part of the network or even on the actual hosts/servers.
If you want to go through the ASA configurations for ICMP traffic with one command then you can use the "packet-tracer" command which will tell you if the traffic is allowed by the ASA or not.
In the above command you should insert the following information
<source interface> = The interface "nameif" behind which the <source ip> address is located
<source ip> = The IP address of the host that is sending the ICMP
<destination ip> = The IP address towards which the ICMP is sent.
If you have allowed all traffic with ACLs then the problem is likely to be on the actual hosts.
Notice that if you configure interface with identical (same value) "security-level" values then you will an additional command to permit traffic between the interface. I notice that you have above atleast 2 internal interfaces with the same "security-level 100" if you have traffic between these interface then you need the configuration command
same-security-traffic permit inter-interface
Other option is to change that you dont have identical "security-level" values in which case you need interface ACLs to allow the traffic from lower -> higher "security-level" interface.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...