<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic L2L VPN, but the ping fails. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132663#M1072761</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Diagram.jpg" style="width: 438px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/81098iF09E89395A99B9D2/image-dimensions/438x663?v=v2" width="438" height="663" role="button" title="Diagram.jpg" alt="Diagram.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Configured an L2L VPN, but the ping fail.&lt;/P&gt;&lt;P&gt;Can you see what's the problem??&lt;/P&gt;&lt;P&gt;Please check the files&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 09 Aug 2020 09:00:59 GMT</pubDate>
    <dc:creator>JustTakeTheFirstStep</dc:creator>
    <dc:date>2020-08-09T09:00:59Z</dc:date>
    <item>
      <title>L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132663#M1072761</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Diagram.jpg" style="width: 438px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/81098iF09E89395A99B9D2/image-dimensions/438x663?v=v2" width="438" height="663" role="button" title="Diagram.jpg" alt="Diagram.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Configured an L2L VPN, but the ping fail.&lt;/P&gt;&lt;P&gt;Can you see what's the problem??&lt;/P&gt;&lt;P&gt;Please check the files&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Aug 2020 09:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132663#M1072761</guid>
      <dc:creator>JustTakeTheFirstStep</dc:creator>
      <dc:date>2020-08-09T09:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132665#M1072762</link>
      <description>The output seems to confirm that you are sending and receiving packets.&lt;BR /&gt;Is 172.29.2.1 the IP address of the peer ASA? Ping through the ASA to another device rather than the ASA itself.</description>
      <pubDate>Sun, 09 Aug 2020 08:59:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132665#M1072762</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-09T08:59:09Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132667#M1072763</link>
      <description>Attach the diagram.&lt;BR /&gt;2.1 is the inside IP of the ASA.&lt;BR /&gt;In addition, the BR-4 image is also attached, so please check it.</description>
      <pubDate>Sun, 09 Aug 2020 09:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132667#M1072763</guid>
      <dc:creator>JustTakeTheFirstStep</dc:creator>
      <dc:date>2020-08-09T09:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132668#M1072764</link>
      <description>&lt;P&gt;So you are testing from HQ?&lt;BR /&gt;&lt;BR /&gt;You should always test connectivity of a VPN, by connecting to a device on the inside of the ASA, rather than test "to" the ASA. However you can configure the command "management-access INSIDE" (assuming the interface name is INSIDE) to permit icmp and ssh, http management via the inside interface over a VPN tunnel.&lt;BR /&gt;&lt;BR /&gt;So can you ping a device on the inside of the ASA? The switch 172.29.2.13?&lt;/P&gt;</description>
      <pubDate>Sun, 09 Aug 2020 09:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132668#M1072764</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-09T09:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132673#M1072765</link>
      <description>&lt;P&gt;SangHai-OF-ASA# sh int ip b&lt;BR /&gt;GigabitEthernet1/1 58.246.2.50 YES CONFIG up up&lt;BR /&gt;GigabitEthernet1/2 172.29.2.1 YES CONFIG up up&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SangHai-OF-ASA# ping 172.29.2.13&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 172.29.2.13, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;/P&gt;&lt;DIV&gt;&lt;DIV class="gtx-trans-icon"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 09 Aug 2020 09:18:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132673#M1072765</guid>
      <dc:creator>JustTakeTheFirstStep</dc:creator>
      <dc:date>2020-08-09T09:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132675#M1072766</link>
      <description>&lt;P&gt;Ok, so that confirms the tunnel is up and working for traffic "through" the ASA.&lt;BR /&gt;As previously mentioned you would need the "management-access &amp;lt;interface&amp;gt;" command configured to be able to ping the ASA itself over the VPN tunnel.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Aug 2020 09:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132675#M1072766</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-09T09:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132677#M1072767</link>
      <description>SangHai-OF-ASA(config)# management-access inside&lt;BR /&gt;But still the ping fails.</description>
      <pubDate>Sun, 09 Aug 2020 10:07:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132677#M1072767</guid>
      <dc:creator>JustTakeTheFirstStep</dc:creator>
      <dc:date>2020-08-09T10:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132682#M1072768</link>
      <description>You are going to have to provide more information in order to help you.&lt;BR /&gt;Was the source of the ping the PC connect to the inside of the HQ ASA or from the HQ ASA itself?&lt;BR /&gt;Do you filter traffic from pinging the remote ASA with the "icmp" command?&lt;BR /&gt;I assume the interface you are attempting to ping is named "inside"?&lt;BR /&gt;</description>
      <pubDate>Sun, 09 Aug 2020 10:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132682#M1072768</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-09T10:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132686#M1072769</link>
      <description>&lt;P&gt;SW(172.29.2.13) - BR ASA ------------------ HQ ASA - PC172.16.0.0&lt;/P&gt;&lt;P&gt;plz help me&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Aug 2020 11:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132686#M1072769</guid>
      <dc:creator>JustTakeTheFirstStep</dc:creator>
      <dc:date>2020-08-09T11:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132687#M1072770</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/462631"&gt;@JustTakeTheFirstStep&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;SW(172.29.2.13) - BR ASA ------------------ HQ ASA - PC172.16.0.0&lt;/P&gt;
&lt;P&gt;plz help me&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;You previously confirmed you could ping the switch 172.29.2.13, so it's working&lt;/P&gt;</description>
      <pubDate>Sun, 09 Aug 2020 12:16:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132687#M1072770</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-09T12:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132688#M1072771</link>
      <description>No. That is not an tried to ping the 172.29 network from HQ. The 172.29 network does not ping with HQ. You check hostname</description>
      <pubDate>Sun, 09 Aug 2020 12:29:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132688#M1072771</guid>
      <dc:creator>JustTakeTheFirstStep</dc:creator>
      <dc:date>2020-08-09T12:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132691#M1072772</link>
      <description>&lt;P&gt;In your output text files you are running ping/traceroute from the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;VPN-ASA-HQ# ping 172.29.2.1 &lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 172.29.2.1, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;&lt;BR /&gt;VPN-ASA-HQ# traceroute 172.29.2.1&lt;BR /&gt;&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Tracing the route to 172.29.2.1&lt;BR /&gt;&lt;BR /&gt;1 172.30.1.2 1 msec 1 msec 1 msec&lt;BR /&gt;2 * *&lt;/PRE&gt;
&lt;P&gt;...so the source will not be from an IP address defined in the crypto ACL - therefore traffic will not be encrypted. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In you last message you said "SW(172.29.2.13) - BR ASA ------------------ HQ ASA - PC172.16.0.0" which is not testing from the ASA (as per your logs). The information you are providing is confusing, not helpful and doesn't help me help you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Test a VPN by sending traffic "through" the VPN, to a device behind the peer ASA.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Aug 2020 12:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132691#M1072772</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-08-09T12:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132701#M1072775</link>
      <description>&lt;P&gt;Do you have routing /default route configured on the switches behind the ASAs? If yes, do the routes point to, the ASA or somewhere else?&lt;/P&gt;
&lt;P&gt;If you are testing ping over VPN from the ASA, as Rob has mentioned you need the command management-access &amp;lt;interface&amp;gt; (where interface is the name of the source interface) and make sure the IP or subnet of that interface is allowed over the VPN in the crypto ACL.&amp;nbsp; Then when pinging from the ASA specify the source interface...for example &lt;STRONG&gt;ping inside 172.29.2.13&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You are missing "inspect ICMP" command in the policy map on the Sanghai ASA and it doesn't look like you have a policy map configured on the HQ ASA.&amp;nbsp; I suggest adding inspect ICMP to Sanghai and copy paste the Sanghai policy map to the HQ ASA. and then test. (see red text below)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;class-map inspection_default&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;match default-inspection-traffic&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;policy-map type inspect dns preset_dns_map&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;parameters&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;message-length maximum client auto&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;message-length maximum 512&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;no tcp-inspection&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;class inspection_default&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect dns preset_dns_map &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect ftp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect h323 h225 &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect h323 ras &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect rsh &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect rtsp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect esmtp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect sqlnet &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect skinny &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect sunrpc &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect xdmcp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect sip &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect netbios &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect tftp &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;inspect ip-options &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;inspect icmp&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;service-policy global_policy global&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Aug 2020 13:22:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4132701#M1072775</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-08-09T13:22:51Z</dc:date>
    </item>
    <item>
      <title>Re: L2L VPN, but the ping fails.</title>
      <link>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4137297#M1073082</link>
      <description>Hi.&lt;BR /&gt;Thank you for your interest in my question.&lt;BR /&gt;I don't know why, but L2L works fine now.&lt;BR /&gt;I think maybe backbone routing is the problem.&lt;BR /&gt;I've modified the settings many times so I don't know exactly what was causing it.&lt;BR /&gt;God bless you</description>
      <pubDate>Tue, 18 Aug 2020 07:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/l2l-vpn-but-the-ping-fails/m-p/4137297#M1073082</guid>
      <dc:creator>JustTakeTheFirstStep</dc:creator>
      <dc:date>2020-08-18T07:58:39Z</dc:date>
    </item>
  </channel>
</rss>

