<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cannot ping interfaces in Switching</title>
    <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388772#M281277</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that the ASA uses 8.3 code and that uses a completely different NAT than previous versions - are you comfortable with that NAT because i haven't used it before but i should be able to sort it out. Basically i think the easiest thing would be to simply reconnect the 2921 to the inside interface of the ASA but we would need to readdress the inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, lets do the router first. If you could answer the following - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) you only have these routes on the router - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 172.20.16.0 255.255.255.0 10.10.10.2 permanent&lt;/P&gt;&lt;P&gt;ip route 192.168.4.0 255.255.255.0 10.10.10.2 permanent&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your diagram i expected to see a default route so i'm not sure how 192.168.2.x clients get to the internet ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Can you confirm that the only internal networks that need routing are - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.20.60.0/24 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.2.0/24 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the 2) is correct then the only change we need to make on the router is to remove those 2 routes and simply add a default ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.10.10.1&amp;nbsp;&amp;nbsp; &amp;lt;-- which will be the new inside interface of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but i need both 1) and 2) answering first. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also important to note you will need an outage to do this work and you have to do it all together so we also need to sort out the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Dec 2013 20:18:35 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2013-12-03T20:18:35Z</dc:date>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388755#M281260</link>
      <description>&lt;P&gt;Ok.. Good day, I have an ASA 5510 and a 2921 -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ASA is used for VPN and Internet&lt;/P&gt;&lt;P&gt;My 2921 is used to connect different subnets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have an attached diagram&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a directly connected interface on 2921-10.10.10.1 to the ASA 10.10.10.2&lt;/P&gt;&lt;P&gt;Also on the 2921 i have a subnet 192.168.2.0 and 10.20.30.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have trunk link on my switch 2950 from the 2921... The ASA is aslo connected to the switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the ASA &lt;/P&gt;&lt;P&gt;Int0/0 66.xxx.xxx.xxx internet&lt;/P&gt;&lt;P&gt;Int0/1 10.20.60.2 - Gateway for computers&lt;/P&gt;&lt;P&gt;Int0/2 10.10.10.2 - connected to 2921&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the 2921 &lt;/P&gt;&lt;P&gt;gig0/1 10.10.10.1 - connected to ASA&lt;/P&gt;&lt;P&gt;gig0/1.20 sub-if 192.168.2.1 &lt;/P&gt;&lt;P&gt;gig0/1.30 sub-if 10.20.30.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have connected some static routes to get from 10.20.60.0 to 192.168.2.0&lt;/P&gt;&lt;P&gt;I cannot ping 10.10.10.2 from my PC &lt;/P&gt;&lt;P&gt;I cannot ping 10.20.60.2 from my 2921&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would appreciate any ideas for configuration help...&amp;nbsp; And redesign... &lt;/P&gt;&lt;P&gt;What cannot happen is for us to use the 2921 for vpn and internet..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,,, see image.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 00:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388755#M281260</guid>
      <dc:creator>Roger Richards</dc:creator>
      <dc:date>2019-03-08T00:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388756#M281261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Roger,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config from routing perspective looks good, now since in both cases you are trying to ping the IP configured on the ASA firewall I wonder if there is a stealth rule thats dropping that traffic.(I am not an expert though with ASA, I would check that first). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you have set the rule to allow ICMP between these subnets can you try&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1&amp;gt; Pinging from your PC to 10.10.10.1&lt;/P&gt;&lt;P&gt;2&amp;gt; From 2921 to ping your PC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another suggestion would be since this probles is related to ASA you could post this in the Security section to get the security experts to help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Umesh &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 17:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388756#M281261</guid>
      <dc:creator>Umesh Shetty</dc:creator>
      <dc:date>2013-11-19T17:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388757#M281262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I cannot ping 10.10.10.2 from my PC &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I cannot ping 10.20.60.2 from my 2921&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;You won't be able to because on the ASA this is a restriction by design ie you cannot ping another interface across the ASA.&amp;nbsp; You can obviously ping through the ASA ie. in one interface and out another (as long as your rulebase allows it) but if the destination IP of the packet is another ASA interface this will be blocked. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what you are seeing is correct behaviour. Do you have a connectivity problem or was it just a query you had ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 19:48:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388757#M281262</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-11-19T19:48:10Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388758#M281263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not connectivity issues but probems with provisioning some avaya phones using DHCP on W2K8 server . Just basically needed to do intervlan routing with the 2921 but we still need the ASA connected as default gateway. Sooooooooo....... i need lots of help. Maybe on a different forum. But thats how this all started. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 17:23:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388758#M281263</guid>
      <dc:creator>Roger Richards</dc:creator>
      <dc:date>2013-11-20T17:23:26Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388759#M281264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Maybe on a different forum&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;If it's a problem with the phones then maybe the VOIP forums but if it is the network layout then this is the right forum. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is network layout etc. can you perhaps specify exactly what you want to be able to do and then we may be able to help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 18:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388759#M281264</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-11-20T18:00:10Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388760#M281265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt; I got everything working. That "untagpvidonly" is a avaya command.&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;My real issue is I can ping anything on the 192.168.2.0 subnet but I cant actually login to any devices. If I can resolve that, it'll be great. Take another look at the attached diagram and tell what can I do. If I put my pc with a gateway address of 10.20.60.1 I can log into my phone call server, If I put my pc with 10.20.60.2 , it just hangs there&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 20:50:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388760#M281265</guid>
      <dc:creator>Roger Richards</dc:creator>
      <dc:date>2013-11-27T20:50:07Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388761#M281266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is 10.20.60.1 ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 21:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388761#M281266</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-11-27T21:01:45Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388762#M281267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry I forgot to include 10.20.60.1. Its a sub interface on the 2921, and its dot1q is 10. Vlan 10. I coudnt see how else I colud have routed to the 192.168.2.0 network. and both subnet has ip helper pointing to a dhcp server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 21:11:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388762#M281267</guid>
      <dc:creator>Roger Richards</dc:creator>
      <dc:date>2013-11-27T21:11:27Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388763#M281268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the way you have it now is the way to do it ie. use the 2921 to route the internal vlans and only use the ASA when you need to go to the internet or use the vpn. If you wanted to use the ASA to route the vlans then you would need additional configuration on it and i can't see the advantage of doing that unless you have security issues ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this make sense ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 21:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388763#M281268</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-11-27T21:19:42Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388764#M281269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perfect sense... Thanks again jon.... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Nov 2013 18:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388764#M281269</guid>
      <dc:creator>Roger Richards</dc:creator>
      <dc:date>2013-11-29T18:40:04Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388765#M281270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Jon, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got another Issue. How can I use the 2921 for the internet ,my ASA has the 10.20.60.2 &amp;lt;-- as the gateway for my computers and also my 2921 has the interface 10.20.60.1 interface also? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i appreciate any information given.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 17:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388765#M281270</guid>
      <dc:creator>admiralrich</dc:creator>
      <dc:date>2013-12-03T17:54:19Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388766#M281271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This could get a bit complicated but not necessarily. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your ASA has 2 internal connections, one to the switch and one to the 2921. But it only really needs the one connection to the 2921.&amp;nbsp; So all vlans internally are routed off the 2921 and you only go to the firewall for VPN and internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However that would mean changes to the 2921 and more importantly the ASA. The current ASA inside interface is on the 10.20.60.x network whereas it would move to the 10.10.10.0/31. This would mean a route change on the 2921 but potentially a fair bit more config on the ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before you did any of that thoug, on the ASA you have this route - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.20.2.0 255.255.255.0 172.20.16.11 inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what is the 172.20.2.x network and what device is 172.20.16.11 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 18:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388766#M281271</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-12-03T18:33:40Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388767#M281272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thats a network on the other side on the vpn. I couldnt get to it from the 2921&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 18:38:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388767#M281272</guid>
      <dc:creator>admiralrich</dc:creator>
      <dc:date>2013-12-03T18:38:16Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388768#M281273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is a network on the other side of the VPN then why does the ASA have a route pointing back into your network ie. the route is reachable via the inside interface of the ASA not the outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not trying to be difficult but if i am to suggest changes i need to make sure i don't stop things working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 18:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388768#M281273</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-12-03T18:50:19Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388769#M281274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry Jon, my apologeeez.. that was an experimentl route... it does not&amp;nbsp; serve a perpose. I do and will appreciate if i can get this task done.&amp;nbsp; It would solve my problems. (well at least the ones here)&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG ___jive_emoticon_name="laugh" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 18:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388769#M281274</guid>
      <dc:creator>admiralrich</dc:creator>
      <dc:date>2013-12-03T18:55:09Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388770#M281275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No problem. Can you post the configs of the 2921 and the ASA and i can then have a look and suggest how to reorganize it so all vlans are routed off the 2921 and the ASA is just for internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note when you post remove any sensitive info from the ASA such as public IPs etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 19:04:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388770#M281275</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-12-03T19:04:11Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388771#M281276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;THIS IS THE ASA:&lt;/P&gt;&lt;P&gt;ciscoasa-stx# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.3(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa-stx&lt;/P&gt;&lt;P&gt;domain-name stt.vidol.gov&lt;/P&gt;&lt;P&gt;enable password lb70NCTEuCJ09Sct encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif Vipowernet&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 66.xx.xx.xx&amp;nbsp; 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.20.60.2 255.255.254.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif Voice&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif 2921&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.10.2 255.255.254.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.20.80.100 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa831-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone AST -4&lt;/P&gt;&lt;P&gt;dns domain-lookup Inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 10.20.60.21&lt;/P&gt;&lt;P&gt; name-server 172.20.16.3&lt;/P&gt;&lt;P&gt; domain-name stt.vidol.gov&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network STT&lt;/P&gt;&lt;P&gt; subnet 172.20.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description St. Thomas Office&lt;/P&gt;&lt;P&gt;object network A_66.xx.xx.xx.105&lt;/P&gt;&lt;P&gt; host 66.xx.xx.xx.105&lt;/P&gt;&lt;P&gt;object network PublicServer_NAT1&lt;/P&gt;&lt;P&gt; host 10.20.60.39&lt;/P&gt;&lt;P&gt;object service ClockLink&lt;/P&gt;&lt;P&gt; service tcp source eq 5074 destination eq 5074&lt;/P&gt;&lt;P&gt; description Clock Link Management Software&lt;/P&gt;&lt;P&gt;object network A_66.xx.xx.xx.107&lt;/P&gt;&lt;P&gt; host 66.xx.xx.xx.107&lt;/P&gt;&lt;P&gt;object service rdp&lt;/P&gt;&lt;P&gt; service tcp destination eq 3389&lt;/P&gt;&lt;P&gt; description Remote Desktop Protocol&lt;/P&gt;&lt;P&gt;object network VoIP-STT-Network&lt;/P&gt;&lt;P&gt; subnet 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network VoIP-STX-Network&lt;/P&gt;&lt;P&gt; subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network STTNET&lt;/P&gt;&lt;P&gt; subnet 172.20.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description STT NETWORK&lt;/P&gt;&lt;P&gt;object network STXET&lt;/P&gt;&lt;P&gt; subnet 10.20.60.0 255.255.254.0&lt;/P&gt;&lt;P&gt; description STX NETWORK&lt;/P&gt;&lt;P&gt;object network outside&lt;/P&gt;&lt;P&gt; host 66.xx.xx.xx.106&lt;/P&gt;&lt;P&gt;object network inside&lt;/P&gt;&lt;P&gt; host 10.20.60.2&lt;/P&gt;&lt;P&gt;object network Public-66.xx.xx.xx.108&lt;/P&gt;&lt;P&gt; host 66.xx.xx.xx.108&lt;/P&gt;&lt;P&gt;object service TCP8080&lt;/P&gt;&lt;P&gt; service tcp source eq 8080&lt;/P&gt;&lt;P&gt;object network VC_66.xx.xx.xx.109&lt;/P&gt;&lt;P&gt; host 66.xx.xx.xx.109&lt;/P&gt;&lt;P&gt;object network Clock82&lt;/P&gt;&lt;P&gt; host 10.20.61.82&lt;/P&gt;&lt;P&gt;object network Clock83&lt;/P&gt;&lt;P&gt; host 10.20.61.83&lt;/P&gt;&lt;P&gt;object network Clock81&lt;/P&gt;&lt;P&gt; host 10.20.61.81&lt;/P&gt;&lt;P&gt;object network Clocks&lt;/P&gt;&lt;P&gt; range 10.20.61.81 10.20.61.83&lt;/P&gt;&lt;P&gt; description Clocks&lt;/P&gt;&lt;P&gt;object network Polycom&lt;/P&gt;&lt;P&gt; host 10.20.60.8&lt;/P&gt;&lt;P&gt;object network PRTG&lt;/P&gt;&lt;P&gt; host 10.20.60.35&lt;/P&gt;&lt;P&gt;object network prtg1&lt;/P&gt;&lt;P&gt; host 10.20.60.35&lt;/P&gt;&lt;P&gt;object network Object_Clock81&lt;/P&gt;&lt;P&gt; host 10.20.61.81&lt;/P&gt;&lt;P&gt;object network Object_Clock_6401&lt;/P&gt;&lt;P&gt; host 10.20.61.81&lt;/P&gt;&lt;P&gt;object network Object_Clock_6402&lt;/P&gt;&lt;P&gt; host 10.20.61.82&lt;/P&gt;&lt;P&gt;object network Object_Clock_6403&lt;/P&gt;&lt;P&gt; host 10.20.61.83&lt;/P&gt;&lt;P&gt;object network Voice1&lt;/P&gt;&lt;P&gt; host 192.168.2.1&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host 172.20.21.4&lt;/P&gt;&lt;P&gt; network-object 172.20.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object 10.20.60.0 255.255.254.0&lt;/P&gt;&lt;P&gt; network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_3&lt;/P&gt;&lt;P&gt; network-object 10.20.60.0 255.255.254.0&lt;/P&gt;&lt;P&gt; network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_4&lt;/P&gt;&lt;P&gt; network-object 10.20.60.0 255.255.254.0&lt;/P&gt;&lt;P&gt; network-object object VoIP-STX-Network&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_6&lt;/P&gt;&lt;P&gt; network-object object STT&lt;/P&gt;&lt;P&gt; network-object object VoIP-STT-Network&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_8&lt;/P&gt;&lt;P&gt; network-object host 125.210.221.172&lt;/P&gt;&lt;P&gt; network-object host 220.231.141.29&lt;/P&gt;&lt;P&gt;object-group service POLLY tcp&lt;/P&gt;&lt;P&gt; port-object eq h323&lt;/P&gt;&lt;P&gt; port-object eq sip&lt;/P&gt;&lt;P&gt; port-object eq 1731&lt;/P&gt;&lt;P&gt; port-object range 3230 3235&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object tcp-udp destination eq domain&lt;/P&gt;&lt;P&gt; service-object tcp destination eq www&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt;object-group service web tcp&lt;/P&gt;&lt;P&gt; port-object eq 8081&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_7&lt;/P&gt;&lt;P&gt; network-object host 10.20.61.81&lt;/P&gt;&lt;P&gt; network-object host 10.20.61.82&lt;/P&gt;&lt;P&gt; network-object host 10.20.61.83&lt;/P&gt;&lt;P&gt;object-group service ExtClkLnk tcp&lt;/P&gt;&lt;P&gt; port-object eq 5402&lt;/P&gt;&lt;P&gt;access-list Vipowernet_access_in extended deny ip object-group DM_INLINE_NETWORK_8 any inactive&lt;/P&gt;&lt;P&gt;access-list Vipowernet_access_in extended permit ip object-group DM_INLINE_NETWORK_3 any&lt;/P&gt;&lt;P&gt;access-list Vipowernet_access_in extended deny tcp any object PRTG eq 8081 inactive&lt;/P&gt;&lt;P&gt;access-list Vipowernet_access_in extended deny tcp any object Polycom eq www inactive&lt;/P&gt;&lt;P&gt;access-list Vipowernet_access_in extended permit tcp host 66.248.189.100 object-group DM_INLINE_NETWORK_7 eq 5402&lt;/P&gt;&lt;P&gt;access-list Vipowernet_cryptomap extended permit ip object-group DM_INLINE_NETWORK_2 object-group DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended permit ip object STXET object STTNET&lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended permit ip host 10.20.61.1 any&lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended permit object-group DM_INLINE_SERVICE_2 host 10.20.60.81 any&lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended deny ip host 10.20.60.81 any&lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended permit ip object-group DM_INLINE_NETWORK_4 any&lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list 2921_access_in extended permit ip any any log&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 10.20.60.0 255.255.254.0 172.20.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list DOF extended permit ip any 172.20.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vidolas extended permit ip host 10.20.60.251 host 172.20.16.109&lt;/P&gt;&lt;P&gt;access-list vidolas extended permit ip host 172.20.16.109 host 10.20.60.251&lt;/P&gt;&lt;P&gt;access-list STX-STT extended permit ip object STXET object STTNET&lt;/P&gt;&lt;P&gt;access-list STX-STT extended permit ip object STTNET object STXET&lt;/P&gt;&lt;P&gt;access-list block extended deny ip host 23.15.5.113 any&lt;/P&gt;&lt;P&gt;access-list voice-to-lan extended permit ip 10.20.60.0 255.255.254.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap notifications&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging host Inside 10.20.60.35&lt;/P&gt;&lt;P&gt;logging host Inside 172.20.16.87&lt;/P&gt;&lt;P&gt;logging permit-hostdown&lt;/P&gt;&lt;P&gt;mtu Vipowernet 1500&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu Voice 1500&lt;/P&gt;&lt;P&gt;mtu 2921 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any Vipowernet&lt;/P&gt;&lt;P&gt;icmp permit any Inside&lt;/P&gt;&lt;P&gt;icmp permit any Voice&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-631.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (Inside,any) source static any any destination static DM_INLINE_NETWORK_6 DM_INLINE_NETWORK_6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (management,Vipowernet) dynamic interface&lt;/P&gt;&lt;P&gt;object network Polycom&lt;/P&gt;&lt;P&gt; nat (Inside,Vipowernet) static 66.xx.xx.xx.108&lt;/P&gt;&lt;P&gt;object network prtg1&lt;/P&gt;&lt;P&gt; nat (Inside,Vipowernet) static 66.xx.xx.xx.109&lt;/P&gt;&lt;P&gt;object network Object_Clock_6401&lt;/P&gt;&lt;P&gt; nat (Inside,Vipowernet) static interface service tcp 5402 6401&lt;/P&gt;&lt;P&gt;object network Object_Clock_6402&lt;/P&gt;&lt;P&gt; nat (Inside,Vipowernet) static interface service tcp 5402 6402&lt;/P&gt;&lt;P&gt;object network Object_Clock_6403&lt;/P&gt;&lt;P&gt; nat (Inside,Vipowernet) static interface service tcp 5402 6403&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (Inside,Vipowernet) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group Vipowernet_access_in in interface Vipowernet&lt;/P&gt;&lt;P&gt;access-group Inside_access_in in interface Inside&lt;/P&gt;&lt;P&gt;access-group 2921_access_in in interface 2921&lt;/P&gt;&lt;P&gt;route Vipowernet 0.0.0.0 0.0.0.0 66.xx.xx.xx.105 1&lt;/P&gt;&lt;P&gt;route 2921 10.20.30.0 255.255.254.0 10.10.10.1 1&lt;/P&gt;&lt;P&gt;route Inside 172.20.2.0 255.255.255.0 172.20.16.11 1&lt;/P&gt;&lt;P&gt;route 2921 192.168.2.0 255.255.255.0 10.10.10.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization exec authentication-server&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.20.60.0 255.255.254.0 Inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map Vipowernet_map0 1 match address Vipowernet_cryptomap&lt;/P&gt;&lt;P&gt;crypto map Vipowernet_map0 1 set peer 66.xx.xx.xxx.170&lt;/P&gt;&lt;P&gt;crypto&amp;nbsp; map Vipowernet_map0 1 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5&amp;nbsp; ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5&amp;nbsp; ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map Vipowernet_map0 interface Vipowernet&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer 66.xx.xx.xx.170&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; enrollment url &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://stxdc3:80/certsrv"&gt;http://stxdc3:80/certsrv&lt;/A&gt;&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; enrollment url &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://stxdc3:80/CertSrv"&gt;http://stxdc3:80/CertSrv&lt;/A&gt;&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint2&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; enrollment url &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://stxdc3:80/CertEnroll"&gt;http://stxdc3:80/CertEnroll&lt;/A&gt;&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint3&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; enrollment url &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://stxdc3:80/certsrv"&gt;http://stxdc3:80/certsrv&lt;/A&gt;&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint4&lt;/P&gt;&lt;P&gt; enrollment terminal&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto isakmp enable Vipowernet&lt;/P&gt;&lt;P&gt;crypto isakmp enable Voice&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 15&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 28800&lt;/P&gt;&lt;P&gt;telnet 172.20.16.0 255.255.255.0 Vipowernet&lt;/P&gt;&lt;P&gt;telnet 10.20.61.1 255.255.255.255 Inside&lt;/P&gt;&lt;P&gt;telnet 10.20.60.0 255.255.254.0 Inside&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 Inside&lt;/P&gt;&lt;P&gt;telnet 172.20.16.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;telnet timeout 30&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access Inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host number-of-rate 2&lt;/P&gt;&lt;P&gt;threat-detection statistics port number-of-rate 2&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol number-of-rate 2&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp server 10.20.60.21 source Inside prefer&lt;/P&gt;&lt;P&gt;ntp server 172.20.16.3 source Inside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username Admin password 44WTHkc9M2sg5m4p encrypted privilege 15&lt;/P&gt;&lt;P&gt;username Ruser1 password IrO5kN5XfPlLpQcH encrypted&lt;/P&gt;&lt;P&gt;tunnel-group 66.xx.xx.xx.170 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 66.xx.xx.xx.170 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command perfmon&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command ping&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command who&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command failover&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command packet-tracer&lt;/P&gt;&lt;P&gt;privilege show level 5 mode exec command import&lt;/P&gt;&lt;P&gt;privilege show level 5 mode exec command running-config&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command reload&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command mode&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command firewall&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command asp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command cpu&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command interface&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command clock&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command dns-hosts&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command access-list&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vlan&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ip&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ipv6&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command failover&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command asdm&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command arp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command route&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ospf&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command aaa-server&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command aaa&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command eigrp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command crypto&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ssh&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command dhcpd&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpn&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command blocks&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command wccp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command dynamic-filter&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command webvpn&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command module&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command uauth&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command compression&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command interface&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command clock&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command access-list&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command logging&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command ip&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command failover&lt;/P&gt;&lt;P&gt;privilege show level 5 mode configure command asdm&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command arp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command route&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command aaa-server&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command aaa&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command crypto&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command ssh&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command dhcpd&lt;/P&gt;&lt;P&gt;privilege show level 5 mode configure command privilege&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command dns-hosts&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command arp&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command aaa-server&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command crypto&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command dynamic-filter&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode configure command failover&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command logging&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command arp&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command crypto&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command aaa-server&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;hpm topN enable&lt;/P&gt;&lt;P&gt;Cryptochecksum:b414a7744b28428be148e7c9b3083d67&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THIS IS THE 2921&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Labrstxrt1#show run&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 4023 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;! Last configuration change at 16:55:18 Caracas Fri Nov 29 2013 by ruser1&lt;/P&gt;&lt;P&gt;version 15.2&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname Labrstxrt1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging buffered 51200 warnings&lt;/P&gt;&lt;P&gt;enable secret 4 weG1bff8xq6vwYSaAhFlBe/uto9gzwL2MYg8LekeXp6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no aaa new-model&lt;/P&gt;&lt;P&gt;clock timezone Caracas -4 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip domain name stt.vidol.gov&lt;/P&gt;&lt;P&gt;no ipv6 cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;multilink bundle-name authenticated&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint TP-self-signed-2781641347&lt;/P&gt;&lt;P&gt; enrollment selfsigned&lt;/P&gt;&lt;P&gt; subject-name cn=IOS-Self-Signed-Certificate-2781641347&lt;/P&gt;&lt;P&gt; revocation-check none&lt;/P&gt;&lt;P&gt; rsakeypair TP-self-signed-2781641347&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki certificate chain TP-self-signed-2781641347&lt;/P&gt;&lt;P&gt; certificate self-signed 01&lt;/P&gt;&lt;P&gt; 3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&lt;/P&gt;&lt;P&gt; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274&lt;/P&gt;&lt;P&gt; 69666963 6174652D 32373831 36343133 3437301E 170D3133 30363135 30303433&lt;/P&gt;&lt;P&gt; 35345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649&lt;/P&gt;&lt;P&gt; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 37383136&lt;/P&gt;&lt;P&gt; 34313334 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281&lt;/P&gt;&lt;P&gt; 8100CFAF D23E606C C51528EA 47F8028A 83570542 09EFCB1F 67410747 F0C94084&lt;/P&gt;&lt;P&gt; AF3129F7 2233EACD 98F1F99C 2BCEC5C3 7C19832B D4C913E0 FC0FF02D 9A4F3082&lt;/P&gt;&lt;P&gt; 8F97FDAE C02F9D94 AA1152C0 EA825EE5 00571372 0E3C6C8E B3FD9457 E15F1192&lt;/P&gt;&lt;P&gt; 563C3B11 1670F621 C683FCC6 A947E4B4 3220EA1E BC011FAC CC84E076 02C9F617&lt;/P&gt;&lt;P&gt; 29D10203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603&lt;/P&gt;&lt;P&gt; 551D2304 18301680 14FDB25B C1F42448 FF76D440 401C0CEE 9D852B3C DD301D06&lt;/P&gt;&lt;P&gt; 03551D0E 04160414 FDB25BC1 F42448FF 76D44040 1C0CEE9D 852B3CDD 300D0609&lt;/P&gt;&lt;P&gt; 2A864886 F70D0101 05050003 81810073 05C06429 C2397277 F4943DEB C59B996C&lt;/P&gt;&lt;P&gt; 66E43213 1B7350EA FBAC44D1 BEF573BF 746B9B6C AE149735 4BBFC01A 93D385D8&lt;/P&gt;&lt;P&gt; 8828787C 68585752 459A247C CD84DE74 F23C35C6 10115568 F2A08FEB 42546A2F&lt;/P&gt;&lt;P&gt; F4203FD7 EE8251FF 17B76913 8CCF5C4F 8062F788 9B087559 93C0305F 91E880A7&lt;/P&gt;&lt;P&gt; 4C0F0662 9656D563 801B5A6E C804FA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;license udi pid CISCO2921/K9 sn FTX1724AM2U&lt;/P&gt;&lt;P&gt;license boot module c2900 technology-package securityk9&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object-group network Clock_6401&lt;/P&gt;&lt;P&gt; host 10.20.61.81&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object-group network Clock_6402&lt;/P&gt;&lt;P&gt; host 10.20.61.82&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object-group network Clock_6403&lt;/P&gt;&lt;P&gt; host 10.20.61.83&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username ruser1 privilege 15 secret 4 AOt2ZJMSG0QC5a/jxOxI9WhUy2Z8zyuyGyQheOp0w2E&lt;/P&gt;&lt;P&gt;username Admin view root secret 4 56jyXs.RSLFQFX5Ebzwqm0eXTwHAtDmINcDLgnOqA16&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;redundancy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Embedded-Service-Engine0/0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; description Internet$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; media-type rj45&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.10&lt;/P&gt;&lt;P&gt; description Data$ETH-LAN$&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 10&lt;/P&gt;&lt;P&gt; ip address 10.20.60.1 255.255.254.0&lt;/P&gt;&lt;P&gt; ip helper-address 10.20.60.21&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.20&lt;/P&gt;&lt;P&gt; description VoiceVlan$ETH-LAN$&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 20&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip helper-address 10.20.60.21&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; description Directly Connected to ASA$ETH-LAN$&lt;/P&gt;&lt;P&gt; ip address 10.10.10.1 255.255.254.0&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http access-class 23&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip route 172.20.16.0 255.255.255.0 10.10.10.2 permanent&lt;/P&gt;&lt;P&gt;ip route 192.168.4.0 255.255.255.0 10.10.10.2 permanent&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line 2&lt;/P&gt;&lt;P&gt; no activation-character&lt;/P&gt;&lt;P&gt; no exec&lt;/P&gt;&lt;P&gt; transport preferred none&lt;/P&gt;&lt;P&gt; transport input all&lt;/P&gt;&lt;P&gt; transport output pad telnet rlogin lapb-ta mop udptn v120 ssh&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 23 in&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler allocate 20000 1000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; Thanks&lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 20:04:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388771#M281276</guid>
      <dc:creator>admiralrich</dc:creator>
      <dc:date>2013-12-03T20:04:36Z</dc:date>
    </item>
    <item>
      <title>Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388772#M281277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that the ASA uses 8.3 code and that uses a completely different NAT than previous versions - are you comfortable with that NAT because i haven't used it before but i should be able to sort it out. Basically i think the easiest thing would be to simply reconnect the 2921 to the inside interface of the ASA but we would need to readdress the inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, lets do the router first. If you could answer the following - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) you only have these routes on the router - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 172.20.16.0 255.255.255.0 10.10.10.2 permanent&lt;/P&gt;&lt;P&gt;ip route 192.168.4.0 255.255.255.0 10.10.10.2 permanent&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your diagram i expected to see a default route so i'm not sure how 192.168.2.x clients get to the internet ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Can you confirm that the only internal networks that need routing are - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.20.60.0/24 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.2.0/24 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the 2) is correct then the only change we need to make on the router is to remove those 2 routes and simply add a default ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.10.10.1&amp;nbsp;&amp;nbsp; &amp;lt;-- which will be the new inside interface of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but i need both 1) and 2) answering first. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also important to note you will need an outage to do this work and you have to do it all together so we also need to sort out the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 20:18:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388772#M281277</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-12-03T20:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388773#M281278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Those address&amp;nbsp; are on the other side of the VPN. couldnt get to them from the 2921. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) And Yes... only&amp;nbsp; two internal thats needs routing,, maybe more in the future..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 20:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388773#M281278</guid>
      <dc:creator>admiralrich</dc:creator>
      <dc:date>2013-12-03T20:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping interfaces</title>
      <link>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388774#M281279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right, well that't the router sorted then. Once we have done all this the 192.168.2.x network will be able to get to the internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it's just a question of sorting out the ASA.&amp;nbsp; Basically we need to have the inside interface readdressed to 10.10.10.2 and the 2921 interface on the ASA shutdown with no ip address.&amp;nbsp; I think it's a good idea to use the inside interfce because the NAT statements refer to that interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you would need to reconnect the 2921 to the inside interface of the ASA and readdress. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But like i say i'm not familiar with the ASA NAT config so i need to have a look at it with the docs just to work out if there are any gotchas. How comfortable are you with the ASA config in terms of NAT ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's not that complicated it's just i can't give you an immediate answer unless you know it well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 20:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/cannot-ping-interfaces/m-p/2388774#M281279</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-12-03T20:40:05Z</dc:date>
    </item>
  </channel>
</rss>

