I assume that the 192.168.93.0 is the network directly connected to the ASA. There is something missing, remember that the network you are trying to reach is also on a high security level.. or on the same security level... so it needs a translation as well.... lets assume that the network behind the second firewall is 10.10.10.0/24, so on the first firewall you will need the following configuration
static (inside,inside) 10.10.10.0 10.10.10.0
and on the second firewall you will need the following line in order to avoid nat on the second firewall when going to the 93 network
access-list nat0 permit ip 10.10.10.0 255.255.255.0 192.168.93.0 255.255.255.0
nat (inside) 0 access-list nat0
The ICMP is working because it doesnt care about the sequence of ICMP messages, if you put the inspection, it will die.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...