<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cannot ping from ASAv to VratsaASA and host on another LAN. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541572#M1086857</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1304994"&gt;@$monster$&lt;/a&gt; is this a lab scenario?&lt;/P&gt;
&lt;P&gt;The outside interfaces of both ASAs are on different networks, there needs to be a router (inet) to route between these different networks and you need to sort out your default routes on the ASAs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why can't you change the NAT to the Vratsa ASA IP address?&lt;/P&gt;</description>
    <pubDate>Fri, 28 Jan 2022 20:22:02 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-01-28T20:22:02Z</dc:date>
    <item>
      <title>Cannot ping from ASAv to VratsaASA and host on another LAN.</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541546#M1086852</link>
      <description>&lt;P&gt;Hi guys, would appreciate a little help from you.&lt;BR /&gt;&lt;BR /&gt;So my task here is to make the 2 ASA's from a different subnet to be able pinging each other and to be able pinging the end host. My final goal is the host with anyIP which has 172.16.10.100 255.255.255.0 172.16.10.100 to be able logging into the Web Server on 10.45.2.80, public ip of the Server is 45.2.3.12(which is the OUTSIDE interface of New Your ASA) and traffic needs to go from NYASA to V-ASA.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Here is the configuration of the New Your ASA:&lt;/STRONG&gt;&lt;BR /&gt;==============================================================================================&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;no mac-address auto&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 45.2.3.12 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;shutdown&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;no ip address&lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network OUT-IP&lt;BR /&gt;host 45.2.3.12&lt;BR /&gt;access-list OUTSIDE extended permit icmp any object OUT-IP &lt;BR /&gt;access-list OUTSIDE extended permit icmp object OUT-IP any &lt;BR /&gt;pager lines 23&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu DMZ 1500 &lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;access-group OUTSIDE in interface OUTSIDE&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 172.16.10.0 1&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 172.16.0.0 1&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 45.2.4.0 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map default_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp &lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ip-options &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect rtsp &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect tftp &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;inspect dns preset_dns_map &lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect h323 h225 &lt;BR /&gt;inspect h323 ras &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect esmtp &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect skinny &lt;BR /&gt;inspect icmp &lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home reporting anonymous prompt 1&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;profile License&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination transport-method http&lt;/P&gt;
&lt;P&gt;==============================================================================================&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Here is the configuration of the Vratsa ASA:&lt;/STRONG&gt;&lt;BR /&gt;=============================================================================================&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 45.2.4.56 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.45.2.1 255.255.255.0 &lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name cisci.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network WEB-SERVER-PORTFORWARD&lt;BR /&gt;host 10.45.2.80&lt;BR /&gt;object network DMZ&lt;BR /&gt;host 10.45.2.80&lt;BR /&gt;object network OUT-IP&lt;BR /&gt;host 45.2.4.56&lt;BR /&gt;access-list test extended permit tcp any object WEB-SERVER-PORTFORWARD eq www &lt;BR /&gt;access-list test extended permit tcp object WEB-SERVER-PORTFORWARD any eq www &lt;BR /&gt;access-list test extended permit ip any host 10.45.2.80 &lt;BR /&gt;access-list test extended permit ip object WEB-SERVER-PORTFORWARD any &lt;BR /&gt;access-list test extended permit icmp object OUT-IP any &lt;BR /&gt;access-list test extended permit icmp any object OUT-IP &lt;BR /&gt;access-list dmz_inside extended permit icmp host 10.45.2.80 any &lt;BR /&gt;access-list dmz_inside extended permit icmp any host 10.45.2.80 &lt;BR /&gt;access-list dmz_inside extended permit icmp host 10.45.2.1 host 10.45.2.80 &lt;BR /&gt;pager lines 23&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;!&lt;BR /&gt;object network WEB-SERVER-PORTFORWARD&lt;BR /&gt;nat (DMZ,OUTSIDE) static 45.2.3.12&lt;BR /&gt;object network DMZ&lt;BR /&gt;nat (OUTSIDE,DMZ) dynamic interface&lt;BR /&gt;access-group test in interface OUTSIDE&lt;BR /&gt;access-group dmz_inside in interface DMZ&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 45.2.3.0 1&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 172.16.10.0 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;access-list test extended permit tcp any object WEB-SERVER-PORTFORWARD eq www &lt;BR /&gt;access-list test extended permit tcp object WEB-SERVER-PORTFORWARD any eq www &lt;BR /&gt;access-list test extended permit ip any host 10.45.2.80 &lt;BR /&gt;access-list test extended permit ip object WEB-SERVER-PORTFORWARD any &lt;BR /&gt;access-list test extended permit icmp object OUT-IP any &lt;BR /&gt;access-list test extended permit icmp any object OUT-IP &lt;BR /&gt;access-list dmz_inside extended permit icmp host 10.45.2.80 any &lt;BR /&gt;access-list dmz_inside extended permit icmp any host 10.45.2.80 &lt;BR /&gt;access-list dmz_inside extended permit icmp host 10.45.2.1 host 10.45.2.80 &lt;BR /&gt;pager lines 23&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;!&lt;BR /&gt;object network WEB-SERVER-PORTFORWARD&lt;BR /&gt;nat (DMZ,OUTSIDE) static 45.2.3.12&lt;BR /&gt;object network DMZ&lt;BR /&gt;nat (OUTSIDE,DMZ) dynamic interface&lt;BR /&gt;access-group test in interface OUTSIDE&lt;BR /&gt;access-group dmz_inside in interface DMZ&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 45.2.3.0 1&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 172.16.10.0 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ip-options &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect rtsp &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect tftp &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;inspect dns preset_dns_map &lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect h323 h225 &lt;BR /&gt;inspect h323 ras &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect esmtp &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect skinny &lt;BR /&gt;inspect icmp &lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;profile License&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination transport-method http&lt;BR /&gt;Cryptochecksum:2f054c8ff106a12f87782bedef444f36&lt;BR /&gt;: end&lt;BR /&gt;==============================================================================================&lt;BR /&gt;This has been a real pain to find a solution and do not know how to proceed, if there is any way to let me know how the communication should be done I'll really be happy.&lt;BR /&gt;&lt;BR /&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 19:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541546#M1086852</guid>
      <dc:creator>$monster$</dc:creator>
      <dc:date>2022-01-28T19:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping from ASAv to VratsaASA and host on another LAN.</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541548#M1086853</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1304994"&gt;@$monster$&lt;/a&gt; on the NY ASA you have 3 default routes, they all appear incorrect, remove them all.&lt;/P&gt;
&lt;PRE&gt;no route OUTSIDE 0.0.0.0 0.0.0.0 172.16.10.0 1&lt;BR /&gt;no route OUTSIDE 0.0.0.0 0.0.0.0 172.16.0.0 1&lt;BR /&gt;no route OUTSIDE 0.0.0.0 0.0.0.0 45.2.4.0 1&lt;/PRE&gt;
&lt;P&gt;Add the correct gateway, I assume the next hop would be 45.2.3.1?&lt;/P&gt;
&lt;PRE&gt;route OUTSIDE 0.0.0.0 0.0.0.0 &lt;STRONG&gt;45.2.3.1&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;The Vsatsa ASA also have incorrect default routes, remove them&lt;/P&gt;
&lt;PRE&gt;no route OUTSIDE 0.0.0.0 0.0.0.0 45.2.3.0 1&lt;BR /&gt;no route OUTSIDE 0.0.0.0 0.0.0.0 172.16.10.0 1&lt;/PRE&gt;
&lt;P&gt;Add the correct next hop, I assume 45.2.4.1?&lt;/P&gt;
&lt;PRE&gt;&lt;STRONG&gt;route OUTSIDE 0.0.0.0 0.0.0.0 45.2.4.1&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 19:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541548#M1086853</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-28T19:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping from ASAv to VratsaASA and host on another LAN.</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541560#M1086854</link>
      <description>&lt;P&gt;Actually the only IP's i've added to the interfaces of the ASA are the following:&lt;BR /&gt;&lt;STRONG&gt;New Your ASA:&lt;/STRONG&gt;&lt;BR /&gt;ciscoasa(config)# sh int ip brief&lt;BR /&gt;Interface IP-Address OK? Method Status Protocol&lt;BR /&gt;GigabitEthernet0/0 45.2.3.12 YES CONFIG up up&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_a66d3e84691e2brpenev_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;Vrasta ASA:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# sh int ip brief&lt;BR /&gt;Interface IP-Address OK? Method Status Protocol&lt;BR /&gt;GigabitEthernet0/0 45.2.4.56 YES CONFIG up up &lt;BR /&gt;GigabitEthernet0/1 10.45.2.1 YES CONFIG up up &lt;BR /&gt;GigabitEthernet0/2 unassigned YES unset administratively down up&lt;BR /&gt;&lt;BR /&gt;The Ip 10.45.2.1 is for the DMZ network.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;And stil cannot ping either of the ASA, here is the result:&lt;BR /&gt;&lt;STRONG&gt;Sending 5, 100-byte ICMP Echos to 45.2.3.1, timeout is 2 seconds:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;?????&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Success rate is 0 percent (0/5)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 19:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541560#M1086854</guid>
      <dc:creator>$monster$</dc:creator>
      <dc:date>2022-01-28T19:56:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping from ASAv to VratsaASA and host on another LAN.</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541564#M1086855</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1304994"&gt;@$monster$&lt;/a&gt; yes, I can see the IP addresses you've added to the outside interfaces, but the default gateways are wrong on both ASAs, they need changing. Determine the local next hop and assign that as the default route on both ASAs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the "inet" cloud doing?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 20:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541564#M1086855</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-28T20:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping from ASAv to VratsaASA and host on another LAN.</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541567#M1086856</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Thank you for your respond. Actually there is nothing in INET, the lab is made on platform eve. Even if I try to go inside the INET it would not let me.&lt;BR /&gt;&lt;BR /&gt;the actual task here is the following:&lt;BR /&gt;=====================================================================================&lt;/P&gt;
&lt;P&gt;The real issue is that we had a WEB server at New York DC (172.16.2.80). The NATed IP address is 45.2.3.12. Recently we moved the WEB server to Vratsa DC. The new IP address of WEB server is 10.45.2.80.&lt;/P&gt;
&lt;P&gt;I am sending the tech support from Vratsa ASA (attached).&lt;/P&gt;
&lt;P&gt;We want to use the same NATed IP (45.2.3.12) address to access the WEB server (from ANY sources). Is it possible and how we can accomplish this. Please advise.&lt;BR /&gt;=====================================================================================&lt;BR /&gt;&lt;BR /&gt;The actual pic of the topology is attached&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 20:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541567#M1086856</guid>
      <dc:creator>$monster$</dc:creator>
      <dc:date>2022-01-28T20:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping from ASAv to VratsaASA and host on another LAN.</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541572#M1086857</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1304994"&gt;@$monster$&lt;/a&gt; is this a lab scenario?&lt;/P&gt;
&lt;P&gt;The outside interfaces of both ASAs are on different networks, there needs to be a router (inet) to route between these different networks and you need to sort out your default routes on the ASAs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why can't you change the NAT to the Vratsa ASA IP address?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 20:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-from-asav-to-vratsaasa-and-host-on-another-lan/m-p/4541572#M1086857</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-28T20:22:02Z</dc:date>
    </item>
  </channel>
</rss>

