<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: The output interface as &amp;quot;np identity ifc&amp;quot;, and ping fail in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610804#M1090100</link>
    <description>&lt;P&gt;in your first post you did a packet tracer 134.251.80.53 8 0 134.251.87.253&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA# packet-tracer input dxc_mgmt icmp 134.251.80.53 8 0 134.251.87.253$&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group dxc_mgmt_access_in in interface dxc_mgmt
access-list dxc_mgmt_access_in remark 20190612 ITO Network request Send ICMP to network devices #019313
access-list dxc_mgmt_access_in extended permit icmp object-group grp_Mgmt_NMS object-group DM_INLINE_NETWORK_2 log default
object-group network grp_Mgmt_NMS
network-object host 134.251.80.207
network-object host 134.251.80.52
network-object host 134.251.80.53
network-object host 134.251.80.54
network-object host 134.251.80.8
network-object host 134.251.80.6
network-object host 134.251.80.200
object-group network DM_INLINE_NETWORK_2
network-object 134.251.78.144 255.255.255.240
network-object 134.251.87.224 255.255.255.224
network-object 134.251.87.96 255.255.255.224
network-object 172.30.0.0 255.255.255.128
network-object 113.21.86.32 255.255.255.248
Additional Information:
Forward Flow based lookup yields rule:
in id=0x2aaac9c446e0, priority=13, domain=permit, deny=false
hits=838, user_data=0x2aaabdb3c540, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
&lt;STRONG&gt;src ip/id=134.251.80.53, mask=255.255.255.255, icmp-type=0, tag=any
dst ip/id=134.251.87.224, mask=255.255.255.224, icmp-code=0, tag=any, dscp=0x0&lt;/STRONG&gt;
input_ifc=dxc_mgmt, output_ifc=any&lt;/PRE&gt;
&lt;P&gt;however you dst ip seem to be different it showing up as 134.251.87.224 not 134.251.87.253&lt;/P&gt;</description>
    <pubDate>Mon, 16 May 2022 11:14:05 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2022-05-16T11:14:05Z</dc:date>
    <item>
      <title>The output interface as "np identity ifc", and ping failed</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610249#M1090074</link>
      <description>&lt;P&gt;Hi sir&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I use an IP 134.251.87.253 134.251.87.254 as a server IPs behind the firewall ASA.&lt;/P&gt;&lt;P&gt;Both servers' gateway IP is 134.251.87.237, which is a port IP on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can ping&amp;nbsp;134.251.87.253 134.251.87.254&amp;nbsp; from the ASA.&lt;/P&gt;&lt;P&gt;But from other subnets, I can only ping&amp;nbsp;134.251.87.253, cannot ping&amp;nbsp;134.251.87.254.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do the packet-tracer for both:&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input dxc_mgmt icmp 134.251.80.53 8 0 134.251.87.253$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaacbfa8540, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=4463289, user_data=0x2aaacab68c90, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaca26f740, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=10241882003, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 134.251.87.253 using egress ifc RC_eNavi&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dxc_mgmt_access_in in interface dxc_mgmt&lt;BR /&gt;access-list dxc_mgmt_access_in remark 20190612 ITO Network request Send ICMP to network devices #019313&lt;BR /&gt;access-list dxc_mgmt_access_in extended permit icmp object-group grp_Mgmt_NMS object-group DM_INLINE_NETWORK_2 log default&lt;BR /&gt;object-group network grp_Mgmt_NMS&lt;BR /&gt;network-object host 134.251.80.207&lt;BR /&gt;network-object host 134.251.80.52&lt;BR /&gt;network-object host 134.251.80.53&lt;BR /&gt;network-object host 134.251.80.54&lt;BR /&gt;network-object host 134.251.80.8&lt;BR /&gt;network-object host 134.251.80.6&lt;BR /&gt;network-object host 134.251.80.200&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object 134.251.78.144 255.255.255.240&lt;BR /&gt;network-object 134.251.87.224 255.255.255.224&lt;BR /&gt;network-object 134.251.87.96 255.255.255.224&lt;BR /&gt;network-object 172.30.0.0 255.255.255.128&lt;BR /&gt;network-object 113.21.86.32 255.255.255.248&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac9c446e0, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=838, user_data=0x2aaabdb3c540, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=134.251.80.53, mask=255.255.255.255, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=134.251.87.224, mask=255.255.255.224, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac7f1c970, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=735229489, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaca2434a0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=156575230, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input dxc_mgmt icmp 134.251.80.53 8 0 134.251.87.254$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaacbfa8540, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=4449627, user_data=0x2aaacab68c90, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaca26f740, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=10241875173, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 134.251.87.254 using egress ifc identity&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaca16ac60, priority=121, domain=permit, deny=false&lt;BR /&gt;hits=6729135, user_data=0x0, cs_id=0x0, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=identity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac7f1c970, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=735229265, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaca2434a0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=156575138, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: CLUSTER-REDIRECT&lt;BR /&gt;Subtype: cluster-redirect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaca1ebe10, priority=208, domain=cluster-redirect, deny=false&lt;BR /&gt;hits=12628019, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=identity&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaca1a9180, priority=66, domain=inspect-icmp, deny=false&lt;BR /&gt;hits=7041469, user_data=0x2aaac97ed3d0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=identity&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaca242fb0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=44449213, user_data=0x2aaac97ec890, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=dxc_mgmt, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 111925142, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: dxc_mgmt&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For 134.251.87.254:&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc , which is weird.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For&amp;nbsp;134.251.87.253:&lt;/P&gt;&lt;P&gt;output-interface: RC_eNavi, which is expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also execute the command "show asp table routing" and find,&lt;/P&gt;&lt;P&gt;ASA# show asp table routing | i 134.251.87&lt;BR /&gt;in 134.251.87.254 255.255.255.255 identity &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;in 134.251.87.126 255.255.255.255 identity&lt;BR /&gt;in 134.251.87.238 255.255.255.255 identity&lt;BR /&gt;in 134.251.87.125 255.255.255.255 identity&lt;BR /&gt;in 134.251.87.237 255.255.255.255 identity&lt;BR /&gt;in 134.251.87.224 255.255.255.224 RC_eNavi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone can help me to why&amp;nbsp;output-interface: NP Identity Ifc, which is the box self AFAIK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you a lot. Matthew&lt;/P&gt;</description>
      <pubDate>Sat, 14 May 2022 18:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610249#M1090074</guid>
      <dc:creator>matthewik.lee</dc:creator>
      <dc:date>2022-05-14T18:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610373#M1090081</link>
      <description>&lt;P&gt;the NAT change the Outlet interface or routing is missing for server&amp;nbsp;&lt;BR /&gt;ping success&amp;nbsp;&lt;BR /&gt;phase3 route-lookup select&amp;nbsp;&lt;STRONG&gt;RC_eNavi&lt;BR /&gt;&lt;BR /&gt;ping NOT success&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;phase3 route-lookup select&lt;STRONG&gt;&amp;nbsp;identity&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;NAT select&amp;nbsp;&lt;STRONG&gt;identity&lt;/STRONG&gt;&lt;BR /&gt;SO you need&amp;nbsp;&lt;BR /&gt;in NAT command enable &lt;STRONG&gt;route-lookup&lt;BR /&gt;&lt;BR /&gt;OR&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;there is overlap in subnet you use for&amp;nbsp;management&amp;nbsp;and Server subnet.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;if above is not solve issue&amp;nbsp;&lt;BR /&gt;and traffic to Server is UDP&amp;nbsp;&lt;BR /&gt;&lt;FONT color="#00FF00"&gt;clear conn&lt;/FONT&gt; &lt;FONT color="#FF0000"&gt;&amp;lt;- use IP of server.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 May 2022 16:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610373#M1090081</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-15T16:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610413#M1090083</link>
      <description>&lt;P&gt;Is the 134.251.87.254 the ASA interface IP address? could you confirm if the packet tracer command have any of the ASA's interfaces ip address in the source or dest field? Normally this behaviour shows up as "&lt;STRONG&gt;&lt;FONT color="#6a6a6a"&gt;NP Identity Ifc"&lt;/FONT&gt;&lt;/STRONG&gt;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Sun, 15 May 2022 14:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610413#M1090083</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-05-15T14:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610456#M1090085</link>
      <description>&lt;P&gt;Without seeing your ASA configuration, my first thought is that this is a NAT issue.&amp;nbsp; Perhaps proxy-arp is disabled.&amp;nbsp; Would you be able to post your ASA configuration (remember to remove or change any public IPs and remove usernames and passwords.)&lt;/P&gt;</description>
      <pubDate>Sun, 15 May 2022 20:41:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610456#M1090085</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-05-15T20:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610520#M1090089</link>
      <description>&lt;P&gt;Hi Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No interfaces use this IP 134.251.87.254&lt;/P&gt;&lt;P&gt;TWTPCAFW17# sh ip addr | ex una&lt;BR /&gt;System IP Addresses:&lt;BR /&gt;Interface Name IP address Subnet mask Method&lt;BR /&gt;GigabitEthernet0/0 outside 134.251.78.157 255.255.255.240 CONFIG&lt;BR /&gt;GigabitEthernet0/1 inside 134.251.85.227 255.255.255.192 CONFIG&lt;BR /&gt;GigabitEthernet0/2 dxc_mgmt 134.251.84.227 255.255.255.192 CONFIG&lt;BR /&gt;GigabitEthernet0/3.1 RC_SMS 134.251.87.125 255.255.255.224 CONFIG&lt;BR /&gt;GigabitEthernet0/3.2 RC_eNavi 134.251.87.237 255.255.255.224 CONFIG&lt;BR /&gt;GigabitEthernet0/3.3 RC_eDM-AP 172.30.0.126 255.255.255.128 CONFIG&lt;BR /&gt;GigabitEthernet0/7 folink 10.0.0.1 255.255.255.0 unset&lt;BR /&gt;Management0/0 management 192.168.1.1 255.255.255.0 CONFIG&lt;BR /&gt;Current IP Addresses:&lt;BR /&gt;Interface Name IP address Subnet mask Method&lt;BR /&gt;GigabitEthernet0/0 outside 134.251.78.157 255.255.255.240 CONFIG&lt;BR /&gt;GigabitEthernet0/1 inside 134.251.85.227 255.255.255.192 CONFIG&lt;BR /&gt;GigabitEthernet0/2 dxc_mgmt 134.251.84.227 255.255.255.192 CONFIG&lt;BR /&gt;GigabitEthernet0/3.1 RC_SMS 134.251.87.125 255.255.255.224 CONFIG&lt;BR /&gt;GigabitEthernet0/3.2 RC_eNavi 134.251.87.237 255.255.255.224 CONFIG&lt;BR /&gt;GigabitEthernet0/3.3 RC_eDM-AP 172.30.0.126 255.255.255.128 CONFIG&lt;BR /&gt;GigabitEthernet0/7 folink 10.0.0.1 255.255.255.0 unset&lt;BR /&gt;Management0/0 management 192.168.1.1 255.255.255.0 CONFIG&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 01:35:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610520#M1090089</guid>
      <dc:creator>matthewik.lee</dc:creator>
      <dc:date>2022-05-16T01:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610528#M1090090</link>
      <description>&lt;P&gt;Hi config attached. There are NATs but I cannot see any relations to the issue&lt;/P&gt;&lt;P&gt;Thank you Matthew&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 01:54:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610528#M1090090</guid>
      <dc:creator>matthewik.lee</dc:creator>
      <dc:date>2022-05-16T01:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610529#M1090091</link>
      <description>&lt;P&gt;Hi not sure if config attached. Do it again. Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 01:56:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610529#M1090091</guid>
      <dc:creator>matthewik.lee</dc:creator>
      <dc:date>2022-05-16T01:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610670#M1090097</link>
      <description>&lt;P&gt;you doing a packet tracer from dxc_mgmt to RC_eNavi&lt;/P&gt;
&lt;PRE&gt;interface GigabitEthernet0/2
 nameif dxc_mgmt
 security-level 80
 ip address 134.251.84.227 255.255.255.192 standby 134.251.84.228
!
interface GigabitEthernet0/3.2
 vlan 62
 nameif RC_eNavi
 security-level 32
 ip address 134.251.87.237 255.255.255.224 standby 134.251.87.238&lt;/PRE&gt;
&lt;P&gt;dxc_mgmt has security level 80 where as RC_eNavi has security level 32. there is no nat rule in place from/to dxc_mgmt to RC_eNavi or vice versa. instead of sending the icmp could you do a tcp. and past the results.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also could you&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 08:41:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610670#M1090097</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-05-16T08:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610773#M1090098</link>
      <description>&lt;P&gt;Hi Sheraz,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The rules are there:&lt;/P&gt;&lt;P&gt;TWTPCAFW17# sh run access-group&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dxc_mgmt_access_in in interface dxc_mgmt&lt;BR /&gt;access-group RC_SMS_access_in in interface RC_SMS&lt;BR /&gt;access-group RC_eNavi_access_in in interface RC_eNavi&lt;BR /&gt;access-group RC_eDM-AP_access_in in interface RC_eDM-AP&lt;BR /&gt;TWTPCAFW17# sh run access-list dxc_mgmt_access_in | i icmp&lt;BR /&gt;access-list dxc_mgmt_access_in extended permit icmp object-group grp_Mgmt_NMS object-group DM_INLINE_NETWORK_2 log default&lt;BR /&gt;access-list dxc_mgmt_access_in extended permit icmp object-group grp_Office_GNS01 object-group DM_INLINE_NETWORK_4&lt;BR /&gt;access-list dxc_mgmt_access_in extended permit icmp 134.251.80.0 255.255.248.0 object-group DM_INLINE_NETWORK_7&lt;BR /&gt;access-list dxc_mgmt_access_in extended permit icmp any any&lt;BR /&gt;TWTPCAFW17# sh run access-list RC_eNavi_access_in | i icmp&lt;BR /&gt;access-list RC_eNavi_access_in extended permit icmp any any&lt;BR /&gt;access-list RC_eNavi_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list RC_eNavi_access_in extended permit icmp 134.251.87.224 255.255.255.240 any&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 10:14:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610773#M1090098</guid>
      <dc:creator>matthewik.lee</dc:creator>
      <dc:date>2022-05-16T10:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610804#M1090100</link>
      <description>&lt;P&gt;in your first post you did a packet tracer 134.251.80.53 8 0 134.251.87.253&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA# packet-tracer input dxc_mgmt icmp 134.251.80.53 8 0 134.251.87.253$&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group dxc_mgmt_access_in in interface dxc_mgmt
access-list dxc_mgmt_access_in remark 20190612 ITO Network request Send ICMP to network devices #019313
access-list dxc_mgmt_access_in extended permit icmp object-group grp_Mgmt_NMS object-group DM_INLINE_NETWORK_2 log default
object-group network grp_Mgmt_NMS
network-object host 134.251.80.207
network-object host 134.251.80.52
network-object host 134.251.80.53
network-object host 134.251.80.54
network-object host 134.251.80.8
network-object host 134.251.80.6
network-object host 134.251.80.200
object-group network DM_INLINE_NETWORK_2
network-object 134.251.78.144 255.255.255.240
network-object 134.251.87.224 255.255.255.224
network-object 134.251.87.96 255.255.255.224
network-object 172.30.0.0 255.255.255.128
network-object 113.21.86.32 255.255.255.248
Additional Information:
Forward Flow based lookup yields rule:
in id=0x2aaac9c446e0, priority=13, domain=permit, deny=false
hits=838, user_data=0x2aaabdb3c540, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
&lt;STRONG&gt;src ip/id=134.251.80.53, mask=255.255.255.255, icmp-type=0, tag=any
dst ip/id=134.251.87.224, mask=255.255.255.224, icmp-code=0, tag=any, dscp=0x0&lt;/STRONG&gt;
input_ifc=dxc_mgmt, output_ifc=any&lt;/PRE&gt;
&lt;P&gt;however you dst ip seem to be different it showing up as 134.251.87.224 not 134.251.87.253&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 11:14:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610804#M1090100</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-05-16T11:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610806#M1090101</link>
      <description>&lt;P&gt;in your first post you did a packet tracer 134.251.80.53 8 0 134.251.87.253&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA# packet-tracer input dxc_mgmt icmp 134.251.80.53 8 0 134.251.87.253$&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Phase: 4
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group dxc_mgmt_access_in in interface dxc_mgmt
access-list dxc_mgmt_access_in remark 20190612 ITO Network request Send ICMP to network devices #019313
access-list dxc_mgmt_access_in extended permit icmp object-group grp_Mgmt_NMS object-group DM_INLINE_NETWORK_2 log default
object-group network grp_Mgmt_NMS
network-object host 134.251.80.207
network-object host 134.251.80.52
network-object host 134.251.80.53
network-object host 134.251.80.54
network-object host 134.251.80.8
network-object host 134.251.80.6
network-object host 134.251.80.200
object-group network DM_INLINE_NETWORK_2
network-object 134.251.78.144 255.255.255.240
network-object 134.251.87.224 255.255.255.224
network-object 134.251.87.96 255.255.255.224
network-object 172.30.0.0 255.255.255.128
network-object 113.21.86.32 255.255.255.248
Additional Information:
Forward Flow based lookup yields rule:
in id=0x2aaac9c446e0, priority=13, domain=permit, deny=false
hits=838, user_data=0x2aaabdb3c540, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
&lt;STRONG&gt;src ip/id=134.251.80.53, mask=255.255.255.255, icmp-type=0, tag=any
dst ip/id=134.251.87.224, mask=255.255.255.224, icmp-code=0, tag=any, dscp=0x0&lt;/STRONG&gt;
input_ifc=dxc_mgmt, output_ifc=any&lt;/PRE&gt;
&lt;P&gt;however you dst ip seem to be different it showing up as 134.251.87.224 not 134.251.87.253&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you do packe tracer on both ip addresses with detail at the end and show the output&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 11:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610806#M1090101</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-05-16T11:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610823#M1090104</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;clear conn &lt;FONT color="#FF0000"&gt;&amp;lt;Server IP&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&amp;amp;&lt;BR /&gt;timeout floating-conn 0:01:00&lt;BR /&gt;&lt;BR /&gt;solve your issue here.&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 13:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610823#M1090104</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-16T13:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610830#M1090106</link>
      <description>&lt;P&gt;using clear conn can cause a downtime in production network traffic I wont use this command as issuing this command can cause a blip in network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;instead the save command is clear conn x.x.x.x&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 12:14:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610830#M1090106</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-05-16T12:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610880#M1090110</link>
      <description>&lt;P&gt;could you&amp;nbsp; configure a packet capture on the RC_eNavi interface and then initiate traffic from a device that should have connectivity to the&amp;nbsp;&lt;SPAN&gt;134.251.87.254 server?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;capture cap-eNavi interface RC_eNavi match ip host &amp;lt; test PC IP &amp;gt; host&amp;nbsp;134.251.87.254 &lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;show cap cap-eNavi&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;if you see traffic exiting the interface then all is OK with the firewall, if you do not see return traffic then there is an issue between the firewall and the server or on the server itself.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 13:18:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610880#M1090110</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-05-16T13:18:37Z</dc:date>
    </item>
    <item>
      <title>Re: The output interface as "np identity ifc", and ping fail</title>
      <link>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610882#M1090111</link>
      <description>&lt;P&gt;I mention this point in my commend&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#00FF00"&gt;clear conn&lt;/FONT&gt; &lt;FONT color="#FF0000"&gt;&amp;lt;- use IP of server&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2022 13:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-output-interface-as-quot-np-identity-ifc-quot-and-ping/m-p/4610882#M1090111</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-16T13:23:40Z</dc:date>
    </item>
  </channel>
</rss>

