<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4679194#M1093088</link>
    <description>&lt;P&gt;Thanks, going to try setting up a new one from the working ASA (.190 subnet) to a test ASA on a test network in Dover, on that same circuit. I'll let you all know our result.&lt;/P&gt;</description>
    <pubDate>Wed, 31 Aug 2022 13:19:30 GMT</pubDate>
    <dc:creator>Jesserony</dc:creator>
    <dc:date>2022-08-31T13:19:30Z</dc:date>
    <item>
      <title>Two IPSEC tunnels up, but only can ping mgmt interfaces between one</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676237#M1092997</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have an ASA5516 that i want to temporarily run two IPSEC site to site tunnels so we can start setting up a new data center while waiting for our SDWAN equipment. One tunnel to our current data center (CoLo) subnet and DMZ (running an ASA5505), and one to our office in Dover (running an ASA5508X).&lt;/P&gt;&lt;P&gt;Both tunnels initialize and look normal when looking at them in ASDM.&lt;/P&gt;&lt;P&gt;We currently have no equipment behind the new ASA to do ping tests with, so i am using the inside interfaces of the ASAs to test.&lt;/P&gt;&lt;P&gt;For the data center tunnel, i can ping back and forth without issue, even to and from hosts behind the data center ASA.&lt;/P&gt;&lt;P&gt;For the Dover tunnel, when i ping from either ASA to the other, i get no ping response. On either end of the tunnel i see Byte Tx increment when i do the ping tests, but the other side Rx doesnt increment, and vise-versa.&lt;/P&gt;&lt;P&gt;Could someone please take a look at my configs and see if there are any glaring issues?&lt;/P&gt;&lt;P&gt;Thank you in advance for any suggestions!&lt;/P&gt;&lt;P&gt;Jesse&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Config for ASA5516 with tunnel to 192.168.170.0 working and 192.168.10.0 not working:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif Tierpoint&lt;BR /&gt;security-level 5&lt;BR /&gt;ip address !TierpointIP! 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.190.22 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network Internal_RFC1918-10&lt;BR /&gt;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network Internal_RFC1918-172.16&lt;BR /&gt;subnet 172.16.0.0 255.240.0.0&lt;BR /&gt;object network Internal_RFC1918-192.168&lt;BR /&gt;subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;object network New_CoLo-SW01&lt;BR /&gt;host 192.168.190.21&lt;BR /&gt;object network Office-CoLo&lt;BR /&gt;subnet 192.168.190.0 255.255.255.0&lt;BR /&gt;object network OldCoLo-DMZ&lt;BR /&gt;subnet 172.20.43.0 255.255.255.0&lt;BR /&gt;object network Office-OldCoLo&lt;BR /&gt;subnet 192.168.170.0 255.255.255.0&lt;BR /&gt;object network Office-dover&lt;BR /&gt;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network Dover_inside&lt;BR /&gt;subnet 192.168.254.56 255.255.255.248&lt;BR /&gt;object-group network Internal_RFC1918&lt;BR /&gt;network-object object Internal_RFC1918-10&lt;BR /&gt;network-object object Internal_RFC1918-192.168&lt;BR /&gt;network-object object Internal_RFC1918-172.16&lt;BR /&gt;object-group network local-network&lt;BR /&gt;network-object object Office-CoLo&lt;BR /&gt;object-group network remote-network&lt;BR /&gt;network-object object Office-OldCoLo&lt;BR /&gt;network-object object OldCoLo-DMZ&lt;BR /&gt;object-group network remote-dover&lt;BR /&gt;network-object object Office-dover&lt;BR /&gt;network-object object Dover_inside&lt;BR /&gt;access-list mpls_access_in extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list DMZ_access_in extended permit ip any any&lt;BR /&gt;access-list Tierpoint_cryptomap_1 extended permit ip object-group local-network object-group remote-network&lt;BR /&gt;access-list Tierpoint_access_in extended permit tcp any object New_CoLo-SW01 eq ssh&lt;BR /&gt;access-list Tierpoint_access_in extended permit ip any any&lt;BR /&gt;access-list outside_access_in extended permit tcp any object New_CoLo-SW01 eq ssh&lt;BR /&gt;access-list outside_access_in extended permit ip any any&lt;BR /&gt;access-list Tierpoint_cryptomap_4 extended permit ip object-group local-network object-group remote-dover&lt;/P&gt;&lt;P&gt;nat (any,any) source static Internal_RFC1918 Internal_RFC1918 destination static Internal_RFC1918 Internal_RFC1918 no-proxy-arp&lt;BR /&gt;nat (any,outside) source dynamic any interface inactive&lt;BR /&gt;nat (any,Tierpoint) source dynamic any interface&lt;BR /&gt;nat (inside,Tierpoint) source static local-network local-network destination static remote-dover remote-dover no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,Tierpoint) source static local-network local-network destination static remote-network remote-network no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network New_CoLo-SW01&lt;BR /&gt;nat (inside,Tierpoint) static interface service tcp ssh 6758&lt;/P&gt;&lt;P&gt;route Tierpoint 0.0.0.0 0.0.0.0 !TierpointGatewayIP! 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 !AnotherISPgateway! 2&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map Tierpoint_map1 1 match address Tierpoint_cryptomap_4&lt;BR /&gt;crypto map Tierpoint_map1 1 set peer !IP of non-working peer!&lt;BR /&gt;crypto map Tierpoint_map1 1 set ikev1 transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map Tierpoint_map1 2 match address Tierpoint_cryptomap_1&lt;BR /&gt;crypto map Tierpoint_map1 2 set peer !IP of working peer!&lt;BR /&gt;crypto map Tierpoint_map1 2 set ikev1 transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map Tierpoint_map1 interface Tierpoint&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash md5&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;tunnel-group !IP of working peer! type ipsec-l2l&lt;BR /&gt;tunnel-group !IP of working peer! ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group !IP of non-working peer!type ipsec-l2l&lt;BR /&gt;tunnel-group !IP of non-working peer!ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;------------------------------------------------------&lt;/P&gt;&lt;P&gt;Config of non-working Dover end of tunnel:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;description LINK SW01:G1/0/20&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.254.58 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;nameif Comcast_Test&lt;BR /&gt;security-level 2&lt;BR /&gt;ip address !ISP IP! 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;object network Internal_RFC1918-10&lt;BR /&gt;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network Internal_RFC1918-172.16&lt;BR /&gt;subnet 172.16.0.0 255.24.0.0&lt;BR /&gt;object network Internal_RFC1918-192.168&lt;BR /&gt;subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;object network Dover_Data_Subnet&lt;BR /&gt;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network New_CoLo_Subnet&lt;BR /&gt;subnet 192.168.190.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network remote-network&lt;BR /&gt;network-object object CGI-Network&lt;BR /&gt;network-object object CGI-DMZ&lt;BR /&gt;network-object object DCIS&lt;BR /&gt;object-group network Internal_RFC1918&lt;BR /&gt;network-object object Internal_RFC1918-10&lt;BR /&gt;network-object object Internal_RFC1918-172.16&lt;BR /&gt;network-object object Internal_RFC1918-192.168&lt;/P&gt;&lt;P&gt;object-group network VPN_Local&lt;BR /&gt;network-object object Dover_Data_Subnet&lt;BR /&gt;network-object 192.168.254.56 255.255.255.248&lt;BR /&gt;object-group network VPN_Remote&lt;BR /&gt;network-object object New_CoLo_Subnet&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list Comcast_Test_cryptomap extended permit ip object-group VPN_Local object-group VPN_Remote&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list Comcast_Test_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any mpls&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any Comcast_Test&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Server_RDGWA-Dov Server_RDGWA-Dov-Outside&lt;BR /&gt;nat (DMZ,any) source static CGI-Network CGI-Network destination static DMZ-Network DMZ-Network no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static CGI-Network CGI-Network destination static DMZ-Network DMZ-Network no-proxy-arp route-lookup&lt;BR /&gt;nat (DMZ,any) source static CGI-DMZ CGI-DMZ destination static DMZ-Network DMZ-Network no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static CGI-DMZ CGI-DMZ destination static DMZ-Network DMZ-Network no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,Comcast_Test) source static VPN_Local VPN_Local destination static VPN_Remote VPN_Remote no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;nat (any,any) after-auto source static Internal_RFC1918 Internal_RFC1918 destination static Internal_RFC1918 Internal_RFC1918 no-proxy-arp&lt;BR /&gt;nat (any,any) after-auto source static Internal_RFC1918 Internal_RFC1918 destination static DCIS-Hosts DCIS-Hosts no-proxy-arp&lt;BR /&gt;nat (any,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;route Comcast_Test 0.0.0.0 0.0.0.0 !ISP gateway IP! 2&lt;BR /&gt;route inside 192.168.8.0 255.255.252.0 192.168.254.57 1&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map Comcast_Test_map0 1 match address Comcast_Test_cryptomap&lt;BR /&gt;crypto map Comcast_Test_map0 1 set peer !Peer IP!&lt;BR /&gt;crypto map Comcast_Test_map0 1 set ikev1 transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map Comcast_Test_map0 1 set nat-t-disable&lt;BR /&gt;crypto map Comcast_Test_map0 1 set reverse-route&lt;BR /&gt;crypto map Comcast_Test_map0 interface Comcast_Test&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ikev1 enable Comcast_Test&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash md5&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;tunnel-group !Peer IP! type ipsec-l2l&lt;BR /&gt;tunnel-group !Peer IP! ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2022 13:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676237#M1092997</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-08-26T13:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676245#M1092998</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1104473"&gt;@Jesserony&lt;/a&gt; As you've configured "mangement-access inside" ping from a device (switch, router) behind the main site's firewall to the dover site ASA's inside interface, rather than from the main site's ASA. If you ping from the ASA the source would be the egress interface, which is not in the crypto ACL?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2022 13:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676245#M1092998</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-26T13:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676265#M1092999</link>
      <description>&lt;P&gt;&lt;SPAN&gt;object-group network VPN_Local&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;network-object object Dover_Data_Subnet &amp;lt;&amp;lt;&amp;lt;---subnet 192.168.10.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;network-object 192.168.254.56 255.255.255.248 &amp;lt;&amp;lt;&amp;lt;---&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object-group network VPN_Remote&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;network-object object New_CoLo_Subnet &amp;lt;&amp;lt;&amp;lt;---subnet 192.168.190.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;!&lt;BR /&gt;object-group network local-network&lt;BR /&gt;network-object object Office-CoLo &amp;lt;&amp;lt;&amp;lt;---subnet 192.168.190.0 255.255.255.0&lt;BR /&gt;object-group network remote-dover&lt;BR /&gt;network-object object Office-dover&amp;lt;&amp;lt;&amp;lt;-subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;network-object object Dover_inside&amp;lt;&amp;lt;&amp;lt;-subnet 192.168.254.56 255.255.255.248&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Your Proxy is OK&amp;nbsp;&lt;BR /&gt;but I prefer add multi ACE instead of using Object-group&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2022 14:28:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676265#M1092999</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-08-26T14:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676764#M1093004</link>
      <description>&lt;P&gt;Thanks Rob and MHM Cisco World - i simplified the config on both ends, not usign object groups this time, and just using 192.168.10.0/24 to 192.168.190.0/24.&lt;/P&gt;&lt;P&gt;Also, we now have a few actual hosts on the 190.0 subnet, 190.200 and 190.60, which i can ping across the working tunnel to the 192.168.170.0/24 subnet.&lt;/P&gt;&lt;P&gt;But i still cant ping them from Dover. I am not seeing anything in the logs where the pings are being denied. Im seeing on the .190 end (the one with the other working tunnel) that Bytes Tx is increasing as the host behind it gets pinged from Dover, but the bytes Tx stays at 0. While on the Dover end, both Tx and Rx are increasing.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jesserony_1-1661614250397.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/160973iCC455F24F69BE67A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Jesserony_1-1661614250397.png" alt="Jesserony_1-1661614250397.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other ideas? Here are the relevant config parts.&lt;/P&gt;&lt;P&gt;New data center, with 1 working tunnel:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list Tierpoint_cryptomap_1 extended permit ip object-group local-network object-group remote-network&lt;/P&gt;&lt;P&gt;access-list Tierpoint_cryptomap_4 extended permit ip object Office-CoLo object Office-dover&lt;/P&gt;&lt;P&gt;nat (any,any) source static Internal_RFC1918 Internal_RFC1918 destination static Internal_RFC1918 Internal_RFC1918 no-proxy-arp&lt;BR /&gt;nat (any,outside) source dynamic any interface inactive&lt;BR /&gt;nat (any,Tierpoint) source dynamic any interface&lt;BR /&gt;nat (inside,Tierpoint) source static Office-CoLo Office-CoLo destination static Office-dover Office-dover no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,Tierpoint) source static local-network local-network destination static remote-network remote-network no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network New_CoLo-SW01&lt;BR /&gt;nat (inside,Tierpoint) static interface service tcp ssh 6758&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map Tierpoint_map1 1 match address Tierpoint_cryptomap_4&lt;BR /&gt;crypto map Tierpoint_map1 1 set peer xxxx&lt;BR /&gt;crypto map Tierpoint_map1 1 set ikev1 transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map Tierpoint_map1 2 match address Tierpoint_cryptomap_1&lt;BR /&gt;crypto map Tierpoint_map1 2 set peer xxxx&lt;BR /&gt;crypto map Tierpoint_map1 2 set ikev1 transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map Tierpoint_map1 interface Tierpoint&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;/P&gt;&lt;P&gt;tunnel-group xxxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxxx ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group xxxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxxx ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------------------------------------------&lt;BR /&gt;Dover, tunnel not working at all&lt;/P&gt;&lt;P&gt;access-list Tierpoint_cryptomap_1 extended permit ip object-group local-network object-group remote-network&lt;/P&gt;&lt;P&gt;access-list Tierpoint_cryptomap_4 extended permit ip object Office-CoLo object Office-dover&lt;/P&gt;&lt;P&gt;nat (any,any) source static Internal_RFC1918 Internal_RFC1918 destination static Internal_RFC1918 Internal_RFC1918 no-proxy-arp&lt;BR /&gt;nat (any,outside) source dynamic any interface inactive&lt;BR /&gt;nat (any,Tierpoint) source dynamic any interface&lt;BR /&gt;nat (inside,Tierpoint) source static Office-CoLo Office-CoLo destination static Office-dover Office-dover no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,Tierpoint) source static local-network local-network destination static remote-network remote-network no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network New_CoLo-SW01&lt;BR /&gt;nat (inside,Tierpoint) static interface service tcp ssh 6758&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map Tierpoint_map1 1 match address Tierpoint_cryptomap_4&lt;BR /&gt;crypto map Tierpoint_map1 1 set peer xxxx&lt;BR /&gt;crypto map Tierpoint_map1 1 set ikev1 transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map Tierpoint_map1 2 match address Tierpoint_cryptomap_1&lt;BR /&gt;crypto map Tierpoint_map1 2 set peer xxxx&lt;BR /&gt;crypto map Tierpoint_map1 2 set ikev1 transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map Tierpoint_map1 interface Tierpoint&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;/P&gt;&lt;P&gt;tunnel-group xxxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxxx ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group xxxx type ipsec-l2l&lt;BR /&gt;tunnel-group xxxx ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Aug 2022 15:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676764#M1093004</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-08-27T15:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676769#M1093005</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1104473"&gt;@Jesserony&lt;/a&gt; NAT or routing problem.&lt;/P&gt;
&lt;P&gt;Please confirm what IP address/device are you pinging to and from what device are you generating this traffic? - for the non-working tunnel.&lt;/P&gt;
&lt;P&gt;Run packet-tracer from the CLI on the ASA from Dover to CoLo and on the ASA from CoLo to Dover to simulate the traffic flow, provide the outputs for review.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Aug 2022 15:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676769#M1093005</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-27T15:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676778#M1093006</link>
      <description>&lt;P&gt;there are two tunnel run between the Side,&amp;nbsp;&lt;BR /&gt;first try remove one Tunnel check tunnel status,&amp;nbsp;&lt;BR /&gt;if the tunnel is work and UP then you need&amp;nbsp;&lt;BR /&gt;isakmp profile to separate the tunnel.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Aug 2022 16:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676778#M1093006</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-08-27T16:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676780#M1093007</link>
      <description>&lt;P&gt;Thanks again Rob, trying to ping from 192.168.10.239 to 192.168.190.200. It is responding to the pings from the .170 subnets tunnel so i dont think it is something with that host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is from the Dover side:&lt;BR /&gt;packet-tracer input inside tcp 192.168.10.239 80 192.168.190.200 80&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.190.200 using egress ifc Comcast_Test&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,Comcast_Test) source static Dover_Data_Subnet Dover_Data_Subnet destination static New_CoLo_Subnet New_CoLo_Subnet no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Comcast_Test&lt;BR /&gt;Untranslate 192.168.190.200/80 to 192.168.190.200/80&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,Comcast_Test) source static Dover_Data_Subnet Dover_Data_Subnet destination static New_CoLo_Subnet New_CoLo_Subnet no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.10.239/80 to 192.168.10.239/80&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map sfr&lt;BR /&gt;match access-list sfr_redirect&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class sfr&lt;BR /&gt;sfr fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,Comcast_Test) source static Dover_Data_Subnet Dover_Data_Subnet destination static New_CoLo_Subnet New_CoLo_Subnet no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 10707604, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Comcast_Test&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is from the new data center:&lt;BR /&gt;packet-tracer input inside tcp 192.168.190.200 80 192.168.10.239 80&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 63.254.156.9 using egress ifc Tierpoint&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,any) source static Internal_RFC1918 Internal_RFC1918 destination static Internal_RFC1918 Internal_RFC1918 no-proxy-arp&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Tierpoint&lt;BR /&gt;Untranslate 192.168.10.239/80 to 192.168.10.239/80&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,any) source static Internal_RFC1918 Internal_RFC1918 destination static Internal_RFC1918 Internal_RFC1918 no-proxy-arp&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.190.200/80 to 192.168.190.200/80&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,any) source static Internal_RFC1918 Internal_RFC1918 destination static Internal_RFC1918 Internal_RFC1918 no-proxy-arp&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 108471, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Tierpoint&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Aug 2022 16:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676780#M1093007</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-08-27T16:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676784#M1093008</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1104473"&gt;@Jesserony&lt;/a&gt; both packet-tracer output confirms this should work.&lt;/P&gt;
&lt;P&gt;So when you generate real traffic what are you generating traffic to/from? You previously said "We currently have no equipment behind the new ASA to do ping tests with, so i am using the inside interfaces of the ASAs to test." - and I said egress would come from the ASA's outside interface which would not be part of the encryption domain. When testing generate traffic "through" the ASA not "to" the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Aug 2022 16:38:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676784#M1093008</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-27T16:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676786#M1093009</link>
      <description>&lt;P&gt;Hi Rob, we now have some hosts behind the .190 subnet ASA, but we didnt in the original post.&lt;/P&gt;&lt;P&gt;192.168.10.239 is a windows PC and 192.168.190.200 is a Windows server.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other ideas on where the problem might lie?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Aug 2022 16:48:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676786#M1093009</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-08-27T16:48:42Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676789#M1093010</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1104473"&gt;@Jesserony&lt;/a&gt; well the packet-tracer output confirmed it should work, is windows firewall turned on these devices blocking communication?&lt;/P&gt;</description>
      <pubDate>Sat, 27 Aug 2022 16:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4676789#M1093010</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-27T16:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4677112#M1093020</link>
      <description>&lt;P&gt;Thanks Rob. Yes, Windows Firewall was on. I tried disabling it this morning but that didnt help. I ended up routing to the working tunnel and having it carry the Dover traffic. Not ideal but at least we have some access from Dover now, and it also shows that the PC in Dover was able to communicate, just not over THAT tunnel for some reason...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Aug 2022 15:48:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4677112#M1093020</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-08-28T15:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4677114#M1093021</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;try ping one more time and share the output of follwoing&amp;nbsp;&lt;BR /&gt;show crypto isakmp sa&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Aug 2022 15:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4677114#M1093021</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-08-28T15:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4679194#M1093088</link>
      <description>&lt;P&gt;Thanks, going to try setting up a new one from the working ASA (.190 subnet) to a test ASA on a test network in Dover, on that same circuit. I'll let you all know our result.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 13:19:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4679194#M1093088</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-08-31T13:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4679205#M1093089</link>
      <description>&lt;P&gt;Waiting your reply.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 13:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4679205#M1093089</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-08-31T13:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4687298#M1093371</link>
      <description>&lt;P&gt;Hi MHM, i was able to successfully establish and pass traffic through my test tunnel. While the original tunnel is still up.&lt;/P&gt;&lt;P&gt;So i re-created the production tunnel and am running into the same issue. I ping 192.168.190.200 from Dover and the tunnel establishes, i see bytes rx and tx on the Dover end of the tunnel, but on the other end just Tx but 0 Rx.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As previously requested, here are the results of show crypto isakmp sa:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dover End:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show crypto isakmp sa"&lt;/P&gt;&lt;P&gt;IKEv1 SAs:&lt;/P&gt;&lt;P&gt;Active SA: 1&lt;BR /&gt;Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 1&lt;/P&gt;&lt;P&gt;1 IKE Peer: xxxxxx&lt;BR /&gt;Type : L2L Role : responder&lt;BR /&gt;Rekey : no State : MM_ACTIVE&lt;/P&gt;&lt;P&gt;There are no IKEv2 SAs&lt;/P&gt;&lt;P&gt;New Data Center End:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "show crypto isakmp sa"&lt;/P&gt;&lt;P&gt;IKEv1 SAs:&lt;/P&gt;&lt;P&gt;Active SA: 2&lt;BR /&gt;Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 2&lt;/P&gt;&lt;P&gt;1 IKE Peer: xxxx&lt;BR /&gt;Type : L2L Role : initiator&lt;BR /&gt;Rekey : no State : MM_ACTIVE&lt;BR /&gt;2 IKE Peer: xxxx&lt;BR /&gt;Type : L2L Role : initiator&lt;BR /&gt;Rekey : no State : MM_ACTIVE&lt;/P&gt;&lt;P&gt;There are no IKEv2 SAs&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2022 18:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4687298#M1093371</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-09-14T18:15:29Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4687414#M1093375</link>
      <description>&lt;P&gt;Something else that might be meaningful - when i ping 192.168.190.200 from my Albany subnet, that has no tunnel to that subnet configured at all, it says&amp;nbsp;Reply from 192.168.190.200: Destination net unreachable.&lt;/P&gt;&lt;P&gt;Now if i do the same from a host in Dover, where the tunnel is up but not passing traffic back, it says&amp;nbsp;Reply from 70.43.126.128: Destination net unreachable.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2022 20:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4687414#M1093375</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-09-14T20:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: Two IPSEC tunnels up, but only can ping mgmt interfaces between on</title>
      <link>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4687933#M1093411</link>
      <description>&lt;P&gt;Did some more digging on that&amp;nbsp;&lt;SPAN&gt;70.43.126.128, it belongs to Windstream. We are utilizing Windstream SDWAN on the ASA in Dover, but for this VPN we have a separate&amp;nbsp;interface connected directly to a Comcast circuit, completely separate&amp;nbsp;from the SDWAN. On this ASA, the IP in question is being advertised by BGP from the Velos. Also it is advertising 192.168.0.0/16, so i can see why it would get routed this way. That is, unless a more specific route to 192.168.190.0/24 is in place... which should be by the tunnel... and where i can see the traffic bytes increasing on both ends of the tunnel... yet getting Destination net unreachable from&amp;nbsp;70.43.126.128... i am confused, please help!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;B 70.43.126.128 255.255.255.254 [20/0] via 192.168.252.13, 4w6d&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;B 192.168.0.0 255.255.0.0 [20/1] via 192.168.252.13, 4w6d&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 14:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-ipsec-tunnels-up-but-only-can-ping-mgmt-interfaces-between/m-p/4687933#M1093411</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-09-15T14:31:46Z</dc:date>
    </item>
  </channel>
</rss>

