<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to ping across VPN Tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4442095#M1082630</link>
    <description>&lt;P&gt;As we have been saying from every reply - have you checked other end is the same rules in place to pingback&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Remote: 172.16.129.253 --&amp;gt; Office: 172.16.10.186 Does not work&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On another side when they initiate ping, do you see Logs in your FW?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 30 Jul 2021 21:26:45 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2021-07-30T21:26:45Z</dc:date>
    <item>
      <title>Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441150#M1082567</link>
      <description>&lt;P&gt;The have a site-to-site VPN up and passing traffic on my ASA. I can RDP from one site to the other but if I do a ping, I get no replies.&lt;/P&gt;&lt;P&gt;I assume it's something on the ASA that's blocking it but I just don't know what it is.&lt;/P&gt;&lt;P&gt;Any help would be great&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 14:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441150#M1082567</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-07-29T14:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441165#M1082570</link>
      <description>&lt;P&gt;Do you have ICMP allowed ? by nature FW Drop ICMP. or end host has FW where you pinging.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;check this ICMP rule like example : ( also hope you have inspect icmp)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list Outside_access_in extended permit icmp any any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 15:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441165#M1082570</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-07-29T15:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441170#M1082571</link>
      <description>&lt;P&gt;Yeah I have these two rules&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit ip any any&lt;BR /&gt;access-list outside_access_in_1 extended permit icmp any any&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 15:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441170#M1082571</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-07-29T15:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441181#M1082572</link>
      <description>&lt;P&gt;is this allowed both the sides&amp;nbsp; ? if yes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then you need to troubleshoot, ping continous with ping -t and observe the logs in FW see where it dropping,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet tracer is good, but i like to live traffic than simulation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 15:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441181#M1082572</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-07-29T15:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441185#M1082573</link>
      <description>&lt;P&gt;Yeah I tried packet tracer with a&amp;nbsp;continuous ping running and it comes back good&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 15:45:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441185#M1082573</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-07-29T15:45:51Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441235#M1082579</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt; noted, please also check for "inspect icmp" in your policy-map.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 17:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441235#M1082579</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-07-29T17:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441286#M1082583</link>
      <description>&lt;P&gt;You need to check both the side Logs, May be one side leaving is this allowed other side ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 18:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441286#M1082583</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-07-29T18:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441304#M1082584</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;By default ASA global security policy denys icmp from originating from a lower level interface to a higher level interface, so in this case when you initiate icmp from one asa to another the returning echo-reply will be denied, So to alow this you can append a access-list as already stated or allow inspection through the global policy of the asa&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;example:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect icmp&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 18:52:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441304#M1082584</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2021-07-29T18:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441311#M1082586</link>
      <description>&lt;P&gt;So I added this and still seeing the same thing&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect icmp&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 19:07:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441311#M1082586</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-07-29T19:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441313#M1082587</link>
      <description>&lt;P&gt;Here is my config.. Maybe there is something else that I am missing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ALX-Backup# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number: JMX1210L1E7&lt;BR /&gt;: Hardware: ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1600 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(7)32&lt;BR /&gt;!&lt;BR /&gt;hostname ALX-Backup&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;name 172.16.0.0 AustinCorporate&lt;BR /&gt;name 10.5.0.0 Ashburn&lt;BR /&gt;name 172.16.128.0 ASIAlex&lt;BR /&gt;name 10.40.3.4 ONRTS1&lt;BR /&gt;dns-guard&lt;BR /&gt;ip local pool VPN_Users 172.17.7.2-172.17.7.254 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;speed 1000&lt;BR /&gt;duplex full&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 50.x.x.x 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;speed 1000&lt;BR /&gt;duplex full&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.254.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;duplex full&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.128.2 255.255.128.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa917-32-k8.bin&lt;BR /&gt;boot system disk0:/asa917-21-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 10.250.2.10&lt;BR /&gt;name-server 10.250.2.11&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network AustinCorporate&lt;BR /&gt;subnet 172.16.0.0 255.255.128.0&lt;BR /&gt;object network ASIAlex&lt;BR /&gt;subnet 172.16.128.0 255.255.128.0&lt;BR /&gt;object network obj-10.4.8.0&lt;BR /&gt;subnet 10.4.8.0 255.255.255.192&lt;BR /&gt;object network obj-10.1.0.0&lt;BR /&gt;subnet 10.1.0.0 255.255.0.0&lt;BR /&gt;object network obj-10.0.0.0&lt;BR /&gt;subnet 10.0.0.0 255.255.255.0&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network 0.us.pool.ntp.org&lt;BR /&gt;host 129.250.35.251&lt;BR /&gt;object network 1.us.pool.ntp.org&lt;BR /&gt;host 208.53.158.34&lt;BR /&gt;object network 2.us.pool.ntp.org&lt;BR /&gt;host 173.255.246.13&lt;BR /&gt;object network 3.us.pool.ntp.org&lt;BR /&gt;host 169.237.206.190&lt;BR /&gt;object network time.windows.com&lt;BR /&gt;host 104.41.150.68&lt;BR /&gt;object network NETWORK_OBJ_172.16.0.0_17&lt;BR /&gt;subnet 172.16.0.0 255.255.128.0&lt;BR /&gt;object network AusOnrvpn-172.17.0.0&lt;BR /&gt;subnet 172.17.0.0 255.255.128.0&lt;BR /&gt;object network OnrAusvpn-10.41.0.0&lt;BR /&gt;subnet 10.41.0.0 255.255.0.0&lt;BR /&gt;object service Debug&lt;BR /&gt;service tcp destination range 4020 4022&lt;BR /&gt;description Debug&lt;BR /&gt;object network AzureASIUS-10.100.13.0&lt;BR /&gt;subnet 10.100.13.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_172.16.128.0&lt;BR /&gt;host 172.16.128.0&lt;BR /&gt;object network NETWORK_OBJ_172.16.128.0_17&lt;BR /&gt;subnet 172.16.128.0 255.255.128.0&lt;BR /&gt;object network ASI_VPN-172.17.7.0&lt;BR /&gt;subnet 172.17.7.0 255.255.255.0&lt;BR /&gt;description VPN Network&lt;BR /&gt;object network Duo&lt;BR /&gt;host 54.241.191.167&lt;BR /&gt;object network Azure_Network&lt;BR /&gt;subnet 10.250.0.0 255.255.0.0&lt;BR /&gt;object network ASIVPN&lt;BR /&gt;subnet 172.17.7.0 255.255.255.0&lt;BR /&gt;object network obj-inside&lt;BR /&gt;subnet 172.16.0.0 255.255.128.0&lt;BR /&gt;object network 172.16.10.115&lt;BR /&gt;host 172.16.10.115&lt;BR /&gt;object network 172.16.10.123&lt;BR /&gt;host 172.16.10.123&lt;BR /&gt;object network 172.16.10.170&lt;BR /&gt;host 172.16.10.170&lt;BR /&gt;object network 172.16.10.179&lt;BR /&gt;host 172.16.10.179&lt;BR /&gt;object network 172.16.10.232&lt;BR /&gt;host 172.16.10.232&lt;BR /&gt;object network 172.16.10.186&lt;BR /&gt;host 172.16.10.186&lt;BR /&gt;object network AnyConnect&lt;BR /&gt;subnet 10.10.0.0 255.255.0.0&lt;BR /&gt;object network Azure_Client_VPN&lt;BR /&gt;subnet 10.201.1.0 255.255.255.0&lt;BR /&gt;object network inside-subnet&lt;BR /&gt;subnet 172.16.128.0 255.255.128.0&lt;BR /&gt;object network NETWORK_OBJ_172.16.0.0&lt;BR /&gt;host 172.16.0.0&lt;BR /&gt;object network 10.99.250.0&lt;BR /&gt;subnet 10.99.250.0 255.255.255.240&lt;BR /&gt;object network 10.160.0.0&lt;BR /&gt;subnet 10.160.0.0 255.255.0.0&lt;BR /&gt;object-group network Threat_Detect&lt;BR /&gt;description Threat_Detect&lt;BR /&gt;network-object object 172.16.10.115&lt;BR /&gt;network-object object 172.16.10.123&lt;BR /&gt;network-object object 172.16.10.170&lt;BR /&gt;network-object object 172.16.10.179&lt;BR /&gt;network-object object 172.16.10.232&lt;BR /&gt;network-object object 172.16.10.186&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt;port-object eq 3389&lt;BR /&gt;object-group service DM_INLINE_TCP_10 tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;object-group network obj-us.pool.ntp.org&lt;BR /&gt;description server IP addresses for us.pool.ntp.org&lt;BR /&gt;network-object object 0.us.pool.ntp.org&lt;BR /&gt;network-object object 1.us.pool.ntp.org&lt;BR /&gt;network-object object 2.us.pool.ntp.org&lt;BR /&gt;network-object object 3.us.pool.ntp.org&lt;BR /&gt;network-object object time.windows.com&lt;BR /&gt;object-group network AzureVPN-Network&lt;BR /&gt;description Azure-Virtual-Networks&lt;BR /&gt;network-object 10.0.1.0 255.255.255.0&lt;BR /&gt;object-group network AzureVPN&lt;BR /&gt;description Azure-VPN-Networks&lt;BR /&gt;network-object 10.0.1.0 255.255.255.0&lt;BR /&gt;object-group network AzureNetworks&lt;BR /&gt;description Azure-Virtual-Networks&lt;BR /&gt;network-object 10.250.0.0 255.255.0.0&lt;BR /&gt;network-object 10.99.250.0 255.255.255.240&lt;BR /&gt;network-object object 10.160.0.0&lt;BR /&gt;object-group network OnpremisesNetworks&lt;BR /&gt;description Onpremises-Networks&lt;BR /&gt;network-object Ashburn 255.255.0.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object AnyConnect&lt;BR /&gt;network-object object Azure_Client_VPN&lt;BR /&gt;network-object object Azure_Network&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object host AustinCorporate&lt;BR /&gt;network-object object ASI_VPN-172.17.7.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;network-object object AnyConnect&lt;BR /&gt;group-object AzureNetworks&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt;network-object AustinCorporate 255.255.128.0&lt;BR /&gt;network-object object AnyConnect&lt;BR /&gt;access-list inside_outbound_nat0_acl extended permit ip any object ASI_VPN-172.17.7.0&lt;BR /&gt;access-list inside_outbound_nat0_acl extended permit ip any 172.16.128.0 255.255.128.0&lt;BR /&gt;access-list inside_outbound_nat0_acl extended permit ip any 10.250.0.0 255.255.0.0&lt;BR /&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 10.40.0.0 255.255.0.0&lt;BR /&gt;access-list VPN_Split standard permit 172.16.128.0 255.255.128.0&lt;BR /&gt;access-list VPN_Split standard permit 172.16.0.0 255.255.128.0&lt;BR /&gt;access-list VPN_Split standard permit 10.250.0.0 255.255.0.0&lt;BR /&gt;access-list VPN_Split standard permit 172.17.7.0 255.255.255.0&lt;BR /&gt;access-list Onramp_vpn_splitTunnelAcl standard permit 10.5.0.0 255.255.0.0&lt;BR /&gt;access-list Onramp_vpn_splitTunnelAcl standard permit 172.16.128.0 255.255.128.0&lt;BR /&gt;access-list Onramp_vpn_splitTunnelAcl standard permit 172.16.0.0 255.255.128.0&lt;BR /&gt;access-list Onramp_vpn_splitTunnelAcl standard permit 10.250.0.0 255.255.0.0&lt;BR /&gt;access-list Onramp_vpn_splitTunnelAcl standard permit 10.40.0.0 255.255.0.0&lt;BR /&gt;access-list Onramp_vpn_splitTunnelAcl standard permit 10.1.0.0 255.255.0.0&lt;BR /&gt;access-list global_mpc extended deny tcp any4 any4&lt;BR /&gt;access-list outside_access_in remark blocking because of RDP Guard and security log info&lt;BR /&gt;access-list outside_access_in extended deny ip object-group Blocked_IPs any4&lt;BR /&gt;access-list outside_access_in extended deny icmp any any&lt;BR /&gt;access-list outside_access_in extended deny ip any4 any4&lt;BR /&gt;access-list outside_access_in remark blocking because of RDP Guard and security log info&lt;BR /&gt;access-list outside_access_in remark OnRamp terminal server&lt;BR /&gt;access-list inside_access_in extended permit icmp any any&lt;BR /&gt;access-list inside_access_in extended permit udp any object-group obj-us.pool.ntp.org eq ntp inactive&lt;BR /&gt;access-list inside_access_in extended permit ip any object-group AzureNetworks&lt;BR /&gt;access-list inside_access_in extended permit ip any 172.17.7.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip any 10.250.0.0 255.255.0.0 inactive&lt;BR /&gt;access-list inside_access_in extended deny udp any 207.200.46.224 255.255.255.224 eq ntp inactive&lt;BR /&gt;access-list inside_access_in extended permit ip any4 any4&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any object AustinCorporate&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any object-group AzureNetworks&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any object AnyConnect&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any object ASI_VPN-172.17.7.0&lt;BR /&gt;access-list inside_access_in_1 extended permit icmp any any inactive&lt;BR /&gt;access-list inside_access_in_1 extended permit ip any any&lt;BR /&gt;access-list outside_cryptomap extended permit ip 172.16.0.0 255.255.128.0 object-group DM_INLINE_NETWORK_1 inactive&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip 172.16.0.0 255.255.128.0 object-group DM_INLINE_NETWORK_2 inactive&lt;BR /&gt;access-list outside_access_in_1 extended permit ip any any&lt;BR /&gt;access-list outside_cryptomap_4 extended permit ip 172.16.128.0 255.255.128.0 172.16.0.0 255.255.128.0&lt;BR /&gt;access-list outside_cryptomap_4 extended permit ip any object AnyConnect&lt;BR /&gt;access-list outside_cryptomap_5 extended permit ip 172.16.128.0 255.255.128.0 object-group AzureNetworks&lt;BR /&gt;pager lines 25&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-733.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (any,any) source static any any destination static NETWORK_OBJ_172.16.0.0_17 NETWORK_OBJ_172.16.0.0_17 no-proxy-arp&lt;BR /&gt;nat (any,any) source static any any destination static Azure_Network Azure_Network no-proxy-arp&lt;BR /&gt;nat (any,any) source static any any destination static AnyConnect AnyConnect no-proxy-arp&lt;BR /&gt;nat (inside,outside) source static any any no-proxy-arp inactive&lt;BR /&gt;nat (inside,outside) source static ASIAlex ASIAlex destination static NETWORK_OBJ_172.16.0.0 NETWORK_OBJ_172.16.0.0 no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (inside,outside) source static ASIAlex ASIAlex destination static AustinCorporate AustinCorporate no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (inside,outside) source static any any destination static Azure_Network Azure_Network no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_172.16.128.0 NETWORK_OBJ_172.16.128.0 destination static Azure_Network Azure_Network no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (inside,outside) source static ASIAlex ASIAlex destination static Azure_Network Azure_Network no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_172.16.128.0_17 NETWORK_OBJ_172.16.128.0_17 destination static Azure_Network Azure_Network no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_172.16.128.0_17 NETWORK_OBJ_172.16.128.0_17 destination static AustinCorporate AustinCorporate no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_172.16.128.0_17 NETWORK_OBJ_172.16.128.0_17 destination static NETWORK_OBJ_172.16.0.0_17 NETWORK_OBJ_172.16.0.0_17 no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (any,any) source static NETWORK_OBJ_172.16.128.0_17 NETWORK_OBJ_172.16.128.0_17 destination static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_3 no-proxy-arp&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_172.16.128.0_17 NETWORK_OBJ_172.16.128.0_17 destination static DM_INLINE_NETWORK_4 DM_INLINE_NETWORK_4 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network inside-subnet&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in_1 in interface outside&lt;BR /&gt;access-group inside_access_in_1 in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 50.x.x.x 1&lt;BR /&gt;route inside 10.10.0.0 255.255.0.0 172.16.128.10 1&lt;BR /&gt;route inside 10.250.0.0 255.255.0.0 172.16.128.10 1&lt;BR /&gt;route inside AustinCorporate 255.255.128.0 172.16.128.10 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;webvpn&lt;BR /&gt;svc ask enable default webvpn&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server TXUTIL protocol nt&lt;BR /&gt;aaa-server Duo-LDAP protocol ldap&lt;BR /&gt;aaa-server ASHDC1 protocol ldap&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;sysopt connection tcpmss 1300&lt;BR /&gt;no sysopt connection permit-vpn&lt;BR /&gt;service resetinbound&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set TRANS_ESP_3DES_SHA mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal SHA-256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal sha&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer 40.x.x.x&lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal SHA-256 AES256 AES192 AES 3DES DES sha&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime kilobytes 102400000&lt;BR /&gt;crypto map outside_map 2 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 2 set peer 74.x.x.x&lt;BR /&gt;crypto map outside_map 2 set ikev2 ipsec-proposal SHA-256 AES256 AES192 AES 3DES DES sha&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map0 1 match address outside_cryptomap_4&lt;BR /&gt;crypto map outside_map0 1 set peer 74.x.x.x&lt;BR /&gt;crypto map outside_map0 1 set ikev2 ipsec-proposal SHA-256 AES256 AES192 AES 3DES DES sha&lt;BR /&gt;crypto map outside_map0 1 set security-association lifetime kilobytes 86400&lt;BR /&gt;crypto map outside_map0 2 match address outside_cryptomap_5&lt;BR /&gt;crypto map outside_map0 2 set peer 40.x.x.x&lt;BR /&gt;crypto map outside_map0 2 set ikev2 ipsec-proposal AES256 sha&lt;BR /&gt;crypto map outside_map0 2 set ikev2 pre-shared-key&lt;BR /&gt;crypto map outside_map0 2 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map outside_map0 2 set security-association lifetime kilobytes 102400000&lt;BR /&gt;crypto map outside_map0 interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2&lt;BR /&gt;enrollment terminal&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint3&lt;BR /&gt;enrollment terminal&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint onrvpntp&lt;BR /&gt;enrollment terminal&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;keypair ASDM_TrustPoint0&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0-1&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;enrollment terminal&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint4&lt;BR /&gt;enrollment terminal&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint5&lt;BR /&gt;keypair ASDM_TrustPoint5&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint0&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;no threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ssl server-version tlsv1-only&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-3.1.14018-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-macosx-i386-3.1.14018-k9.pkg 2&lt;BR /&gt;anyconnect image disk0:/anyconnect-linux-64-3.1.14018-k9.pkg 3&lt;BR /&gt;anyconnect profiles ASIVPN_MFA_Client_Profile disk0:/asivpn_mfa_client_profile.xml&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt;dns-server value 10.40.3.1&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl&lt;BR /&gt;default-domain value ASI&lt;BR /&gt;group-policy Onramp_vpn internal&lt;BR /&gt;group-policy Onramp_vpn attributes&lt;BR /&gt;dns-server value 10.40.2.1 10.40.3.1&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value VPN_Split&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-idle-timeout none&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;group-policy GroupPolicy_74.x.x.x internal&lt;BR /&gt;group-policy GroupPolicy_74.x.x.x attributes&lt;BR /&gt;vpn-tunnel-protocol ikev2&lt;BR /&gt;group-policy GroupPolicy_74.x.x.x internal&lt;BR /&gt;group-policy GroupPolicy_74.x.x.x attributes&lt;BR /&gt;vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt;group-policy GroupPolicy_40.x.x.x internal&lt;BR /&gt;group-policy GroupPolicy_40.x.x.x attributes&lt;BR /&gt;vpn-tunnel-protocol ikev2&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;group-policy GroupPolicy_MFA internal&lt;BR /&gt;group-policy GroupPolicy_MFA attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 10.250.2.10 10.250.2.11&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value VPN_Split&lt;BR /&gt;default-domain value asi.local&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value ASIVPN_MFA_Client_Profile type user&lt;BR /&gt;group-policy GroupPolicy_74.x.x.x internal&lt;BR /&gt;group-policy GroupPolicy_74.x.x.x attributes&lt;BR /&gt;vpn-tunnel-protocol ikev2&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt;default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt;dhcp-server 10.40.3.1&lt;BR /&gt;tunnel-group MFAVPN type remote-access&lt;BR /&gt;tunnel-group MFAVPN general-attributes&lt;BR /&gt;address-pool VPN_Users&lt;BR /&gt;authentication-server-group ASHDC1&lt;BR /&gt;secondary-authentication-server-group Duo-LDAP use-primary-username&lt;BR /&gt;default-group-policy GroupPolicy_MFA&lt;BR /&gt;tunnel-group MFAVPN webvpn-attributes&lt;BR /&gt;group-alias ASI-VPN-ONR disable&lt;BR /&gt;group-alias ASIOnrVPN disable&lt;BR /&gt;group-alias ASIVPN disable&lt;BR /&gt;group-alias ASIVPN-Backup enable&lt;BR /&gt;group-alias ASIVPNONR disable&lt;BR /&gt;group-alias MFA disable&lt;BR /&gt;group-alias MFA-VPN disable&lt;BR /&gt;group-alias MFA-VPN-Test disable&lt;BR /&gt;tunnel-group 74.x.x.x type ipsec-l2l&lt;BR /&gt;tunnel-group 74.x.x.x general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_74.x.x.x&lt;BR /&gt;tunnel-group 74.x.x.x ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key&lt;BR /&gt;ikev2 remote-authentication pre-shared-key&lt;BR /&gt;ikev2 local-authentication pre-shared-key&lt;BR /&gt;tunnel-group 74.x.x.x type ipsec-l2l&lt;BR /&gt;tunnel-group 74.x.x.x general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_74.x.x.x&lt;BR /&gt;tunnel-group 74.x.x.x ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;ikev2 remote-authentication pre-shared-key&lt;BR /&gt;ikev2 local-authentication pre-shared-key&lt;BR /&gt;tunnel-group 74.x.x.x type ipsec-l2l&lt;BR /&gt;tunnel-group 74.x.x.x general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_74.x.x.x&lt;BR /&gt;tunnel-group 74.x.x.x ipsec-attributes&lt;BR /&gt;ikev2 remote-authentication pre-shared-key&lt;BR /&gt;ikev2 local-authentication pre-shared-key&lt;BR /&gt;tunnel-group 40.x.x.x type ipsec-l2l&lt;BR /&gt;tunnel-group 40.x.x.x general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_40.x.x.x&lt;BR /&gt;tunnel-group 40.x.x.x ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;ikev2 remote-authentication pre-shared-key&lt;BR /&gt;ikev2 local-authentication pre-shared-key&lt;BR /&gt;no tunnel-group-map enable peer-ip&lt;BR /&gt;!&lt;BR /&gt;class-map tunnel&lt;BR /&gt;match flow ip destination-address&lt;BR /&gt;match tunnel-group 64.x.x.x&lt;BR /&gt;class-map global-class&lt;BR /&gt;match access-list global_mpc&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map tunnel2&lt;BR /&gt;match flow ip destination-address&lt;BR /&gt;match tunnel-group 74.x.x.x&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns migrated_dns_map_1&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;class global-class&lt;BR /&gt;ips inline fail-open&lt;BR /&gt;class class-default&lt;BR /&gt;user-statistics accounting&lt;BR /&gt;policy-map limit&lt;BR /&gt;class tunnel&lt;BR /&gt;police output 2097000 1500&lt;BR /&gt;class tunnel2&lt;BR /&gt;priority&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:77602046e4f8932fdc310afe0e1a6b4c&lt;BR /&gt;: end&lt;BR /&gt;ALX-Backup#&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 19:09:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441313#M1082587</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-07-29T19:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441732#M1082605</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/914580"&gt;@jf1134&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;I can RDP from one site to the other &lt;STRONG&gt;but if I do a ping, I get no replies&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Yeah I tried packet tracer with&lt;STRONG&gt; a continuous ping running and it comes back good&lt;/STRONG&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Confusing! - Can you elaborate where are you trying to ping from, the asa itself or a host behind the asa&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 11:18:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441732#M1082605</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2021-07-30T11:18:37Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441774#M1082606</link>
      <description>&lt;P&gt;I am trying to ping from hosts in my office to hosts in the other office.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 12:50:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441774#M1082606</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-07-30T12:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441885#M1082612</link>
      <description>&lt;P&gt;Can we get the Source IP and Destination IP ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when you sending ping is this leaving your FW - what is the results on other side ? do you have access on other side ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 15:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441885#M1082612</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-07-30T15:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441965#M1082621</link>
      <description>&lt;P&gt;So now I can ping from my office location to the remote location but I am unable to ping from the remote location to the office location.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Office: 172.16.10.186&amp;nbsp; --&amp;gt; Remote: 172.16.129.253 Works&lt;/P&gt;&lt;P&gt;Remote: 172.16.129.253 --&amp;gt; Office: 172.16.10.186 Does not work&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 17:13:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4441965#M1082621</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-07-30T17:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4442095#M1082630</link>
      <description>&lt;P&gt;As we have been saying from every reply - have you checked other end is the same rules in place to pingback&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Remote: 172.16.129.253 --&amp;gt; Office: 172.16.10.186 Does not work&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On another side when they initiate ping, do you see Logs in your FW?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 21:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4442095#M1082630</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-07-30T21:26:45Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4442102#M1082631</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;Apply ICMP inspection on the global policy Of the remote ASA.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 21:42:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-across-vpn-tunnel/m-p/4442102#M1082631</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2021-07-30T21:42:03Z</dc:date>
    </item>
  </channel>
</rss>

