<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to ping inside address of ASAv from core switch in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815821#M1099551</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have setup a home lab and I am unable to ping the inside address of my ASAv from the connection core switch. I think it is being blocked by the implicit rule but my attempts to add the correct ACL is not working..&lt;/P&gt;&lt;P&gt;Switch#show ip int brief&lt;/P&gt;&lt;P&gt;Vlan500 10.1.1.3 YES NVRAM up up&lt;/P&gt;&lt;P&gt;interface Vlan500&lt;BR /&gt;ip address 10.1.1.3 255.255.255.0&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;description ACCESS &amp;gt; CORE&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;GigabitEthernet0/0 is up, line protocol is up (connected)&lt;BR /&gt;Hardware is iGbE, address is 0cba.ac0a.0000 (bia 0cba.ac0a.0000)&lt;BR /&gt;Description: ACCESS &amp;gt; CORE&lt;BR /&gt;MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec,&lt;BR /&gt;reliability 255/255, txload 1/255, rxload 1/255&lt;BR /&gt;Encapsulation ARPA, loopback not set&lt;BR /&gt;Keepalive set (10 sec)&lt;BR /&gt;Auto Duplex, Auto Speed, link type is auto, media type is unknown media type&lt;BR /&gt;output flow-control is unsupported, input flow-control is unsupported&lt;BR /&gt;Full-duplex, Auto-speed, link type is auto, media type is RJ45&lt;BR /&gt;input flow-control is off, output flow-control is unsupported&lt;BR /&gt;ARP type: ARPA, ARP Timeout 04:00:00&lt;BR /&gt;Last input 00:00:00, output 00:00:08, output hang never&lt;BR /&gt;Last clearing of "show interface" counters never&lt;BR /&gt;Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0&lt;BR /&gt;Queueing strategy: fifo&lt;BR /&gt;Output queue: 0/0 (size/max)&lt;BR /&gt;5 minute input rate 1000 bits/sec, 2 packets/sec&lt;BR /&gt;5 minute output rate 0 bits/sec, 0 packets/sec&lt;BR /&gt;23167 packets input, 1538396 bytes, 0 no buffer&lt;BR /&gt;Received 23157 broadcasts (23157 multicasts)&lt;BR /&gt;0 runts, 0 giants, 0 throttles&lt;BR /&gt;0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored&lt;BR /&gt;0 watchdog, 23157 multicast, 0 pause input&lt;BR /&gt;422 packets output, 69915 bytes, 0 underruns&lt;BR /&gt;0 output errors, 0 collisions, 2 interface resets&lt;BR /&gt;0 unknown protocol drops&lt;BR /&gt;0 babbles, 0 late collision, 0 deferred&lt;BR /&gt;0 lost carrier, 0 no carrier, 0 pause output&lt;BR /&gt;0 output buffer failures, 0 output buffers swapped out&lt;BR /&gt;Switch#&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ciscoasa# show ip&lt;/P&gt;&lt;P&gt;GigabitEthernet0/1 INSIDE 10.1.1.1 255.255.255.0 CONFIG&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input INSIDE icmp 10.1.1.1 1 8 10.1.1.2 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc20d4b4970, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=19, user_data=0x7fc20d4916c0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc20d5fe610, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=9, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 10.1.1.2 using egress ifc INSIDE&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc20d2b6190, priority=501, domain=permit, deny=true&lt;BR /&gt;hits=10, user_data=0x7, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.1, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000555c6a55cae6 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is recommended ACL to allow this traffic?&lt;/P&gt;</description>
    <pubDate>Mon, 17 Apr 2023 10:15:22 GMT</pubDate>
    <dc:creator>NetworkMonkey101</dc:creator>
    <dc:date>2023-04-17T10:15:22Z</dc:date>
    <item>
      <title>Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815821#M1099551</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have setup a home lab and I am unable to ping the inside address of my ASAv from the connection core switch. I think it is being blocked by the implicit rule but my attempts to add the correct ACL is not working..&lt;/P&gt;&lt;P&gt;Switch#show ip int brief&lt;/P&gt;&lt;P&gt;Vlan500 10.1.1.3 YES NVRAM up up&lt;/P&gt;&lt;P&gt;interface Vlan500&lt;BR /&gt;ip address 10.1.1.3 255.255.255.0&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;description ACCESS &amp;gt; CORE&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;GigabitEthernet0/0 is up, line protocol is up (connected)&lt;BR /&gt;Hardware is iGbE, address is 0cba.ac0a.0000 (bia 0cba.ac0a.0000)&lt;BR /&gt;Description: ACCESS &amp;gt; CORE&lt;BR /&gt;MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec,&lt;BR /&gt;reliability 255/255, txload 1/255, rxload 1/255&lt;BR /&gt;Encapsulation ARPA, loopback not set&lt;BR /&gt;Keepalive set (10 sec)&lt;BR /&gt;Auto Duplex, Auto Speed, link type is auto, media type is unknown media type&lt;BR /&gt;output flow-control is unsupported, input flow-control is unsupported&lt;BR /&gt;Full-duplex, Auto-speed, link type is auto, media type is RJ45&lt;BR /&gt;input flow-control is off, output flow-control is unsupported&lt;BR /&gt;ARP type: ARPA, ARP Timeout 04:00:00&lt;BR /&gt;Last input 00:00:00, output 00:00:08, output hang never&lt;BR /&gt;Last clearing of "show interface" counters never&lt;BR /&gt;Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0&lt;BR /&gt;Queueing strategy: fifo&lt;BR /&gt;Output queue: 0/0 (size/max)&lt;BR /&gt;5 minute input rate 1000 bits/sec, 2 packets/sec&lt;BR /&gt;5 minute output rate 0 bits/sec, 0 packets/sec&lt;BR /&gt;23167 packets input, 1538396 bytes, 0 no buffer&lt;BR /&gt;Received 23157 broadcasts (23157 multicasts)&lt;BR /&gt;0 runts, 0 giants, 0 throttles&lt;BR /&gt;0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored&lt;BR /&gt;0 watchdog, 23157 multicast, 0 pause input&lt;BR /&gt;422 packets output, 69915 bytes, 0 underruns&lt;BR /&gt;0 output errors, 0 collisions, 2 interface resets&lt;BR /&gt;0 unknown protocol drops&lt;BR /&gt;0 babbles, 0 late collision, 0 deferred&lt;BR /&gt;0 lost carrier, 0 no carrier, 0 pause output&lt;BR /&gt;0 output buffer failures, 0 output buffers swapped out&lt;BR /&gt;Switch#&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ciscoasa# show ip&lt;/P&gt;&lt;P&gt;GigabitEthernet0/1 INSIDE 10.1.1.1 255.255.255.0 CONFIG&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input INSIDE icmp 10.1.1.1 1 8 10.1.1.2 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc20d4b4970, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=19, user_data=0x7fc20d4916c0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc20d5fe610, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=9, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 10.1.1.2 using egress ifc INSIDE&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc20d2b6190, priority=501, domain=permit, deny=true&lt;BR /&gt;hits=10, user_data=0x7, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.1, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000555c6a55cae6 flow (NA)/NA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is recommended ACL to allow this traffic?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 10:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815821#M1099551</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2023-04-17T10:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815946#M1099552</link>
      <description>&lt;P&gt;First of all, packet-tracer is for use when simulating a packet passing through the ASA and not to the ASA itself.&amp;nbsp; So this will show as a drop no matter what.&lt;/P&gt;
&lt;P&gt;As for ping being unsuccessful, you have configured the switch port to be a trunk port while the ASA interace is a regular routed interface.&amp;nbsp; You need to do one of the following&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;configure the ASA interface as a sub-interface and specify the INSIDE interface to be in vlan 500&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Configure the switch port to be an access port and not a trunk port.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 17 Apr 2023 12:16:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815946#M1099552</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-04-17T12:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815958#M1099554</link>
      <description>&lt;P&gt;Thanks for the reply, I have amended the Core switch to ASA port as suggested but still no icmp reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;description CORE &amp;gt; ASAv&lt;BR /&gt;switchport mode access&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;Core1#ping 10.1.1.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:&lt;BR /&gt;.....&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;Core1#&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 12:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815958#M1099554</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2023-04-17T12:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815964#M1099555</link>
      <description>&lt;P&gt;this drop I think because you dont config icmp inspect under the policy global&amp;nbsp;&lt;BR /&gt;add inspect and check again&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 12:34:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815964#M1099555</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-17T12:34:58Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815983#M1099556</link>
      <description>&lt;P&gt;You have not assigned VLAN 500 to the access port so you are sending traffic in VLAN 1 right now. Add switchport access VLAN 500 to the port then test again&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 12:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815983#M1099556</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-04-17T12:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815984#M1099557</link>
      <description>&lt;P&gt;No ACL is necessary. ICMP inspect is also not necessary.&lt;/P&gt;
&lt;P&gt;You do need to fix the switchport vs. trunk port that &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt; mentioned&lt;/P&gt;
&lt;P&gt;Then, for icmp traffic TO the firewall, use the "icmp" command: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-cli-reference/I-R/asa-command-ref-I-R/ia-inr-commands.html#wp1366339900" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-cli-reference/I-R/asa-command-ref-I-R/ia-inr-commands.html#wp1366339900&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 12:53:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815984#M1099557</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-04-17T12:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815993#M1099558</link>
      <description>&lt;P&gt;icmp inspection was not able and I have now added that, thank you. I have also changed the switch port to an access port but still unable to ping the inside address of the firewall from the core switch, please see attached both full configurations.&lt;/P&gt;&lt;P&gt;ASA&lt;/P&gt;&lt;P&gt;ciscoasa# show run&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: 9AMQNCL7QTL&lt;BR /&gt;: Hardware: ASAv, 2048 MB RAM, CPU Pentium II 3500 MHz, 1 CPU (2 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.16(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name TEST.local&lt;BR /&gt;enable password ***** pbkdf2&lt;BR /&gt;service-module 0 keepalive-timeout 4&lt;BR /&gt;service-module 0 keepalive-counter 6&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description OUTSIDE&lt;BR /&gt;shutdown&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.100.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;description DMZ&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 172.16.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;no management-only&lt;BR /&gt;nameif MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.255.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup OUTSIDE&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 8.8.4.4&lt;BR /&gt;domain-name TEST.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;pager lines 23&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 99999&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu MGMT 1500&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any OUTSIDE&lt;BR /&gt;icmp permit any INSIDE&lt;BR /&gt;icmp permit any DMZ&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 MGMT&lt;BR /&gt;http 0.0.0.0 0.0.0.0 INSIDE&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA2&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca 0a0142800000014523c844b500000002&lt;BR /&gt;30820560 30820348 a0030201 0202100a 01428000 00014523 c844b500 00000230&lt;BR /&gt;0d06092a 864886f7 0d01010b 0500304a 310b3009 06035504 06130255 53311230&lt;BR /&gt;10060355 040a1309 4964656e 54727573 74312730 25060355 0403131e 4964656e&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha256&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect snmp&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;profile License&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination transport-method http&lt;BR /&gt;Cryptochecksum:bff2ad5e30e164455c5fd6effaf8e9e3&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SWITCH&lt;/P&gt;&lt;P&gt;Core1#show run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 4488 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 13:00:15 UTC Mon Apr 17 2023&lt;BR /&gt;!&lt;BR /&gt;version 15.2&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;service compress-config&lt;BR /&gt;!&lt;BR /&gt;hostname Core1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vtp domain TEST&lt;BR /&gt;vtp mode off&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 10.10.10.1 10.10.10.10&lt;BR /&gt;ip dhcp excluded-address 10.20.10.1 10.20.10.10&lt;BR /&gt;ip dhcp excluded-address 10.30.10.1 10.30.10.10&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool CLIENTS&lt;BR /&gt;network 10.10.10.0 255.255.255.0&lt;BR /&gt;dns-server 8.8.8.8&lt;BR /&gt;default-router 10.10.10.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool WIFI&lt;BR /&gt;network 10.20.10.0 255.255.255.0&lt;BR /&gt;dns-server 8.8.8.8&lt;BR /&gt;default-router 10.20.10.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool DMZ&lt;BR /&gt;network 10.30.10.0 255.255.255.0&lt;BR /&gt;dns-server 8.8.8.8&lt;BR /&gt;default-router 10.30.10.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;vlan 10&lt;BR /&gt;name CLIENTS&lt;BR /&gt;!&lt;BR /&gt;vlan 20&lt;BR /&gt;name WIFI&lt;BR /&gt;!&lt;BR /&gt;vlan 30&lt;BR /&gt;name DMZ&lt;BR /&gt;!&lt;BR /&gt;vlan 500&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description CORE &amp;gt; ASA&lt;BR /&gt;switchport mode access&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description CORE &amp;gt; ACCESS&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2/0&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2/1&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2/2&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2/3&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/0&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/1&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/2&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/3&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;ip address 10.20.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan30&lt;BR /&gt;ip address 10.30.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan500&lt;BR /&gt;ip address 10.1.1.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;banner exec ^C&lt;BR /&gt;**************************************************************************&lt;BR /&gt;* IOSv is strictly limited to use for evaluation, demonstration and IOS *&lt;BR /&gt;* education. IOSv is provided as-is and is not supported by Cisco's *&lt;BR /&gt;* Technical Advisory Center. Any use or disclosure, in whole or in part, *&lt;BR /&gt;* of the IOSv Software or Documentation to any third party for any *&lt;BR /&gt;* purposes is expressly prohibited except as otherwise authorized by *&lt;BR /&gt;* Cisco in writing. *&lt;BR /&gt;**************************************************************************^C&lt;BR /&gt;banner incoming ^C&lt;BR /&gt;**************************************************************************&lt;BR /&gt;* IOSv is strictly limited to use for evaluation, demonstration and IOS *&lt;BR /&gt;* education. IOSv is provided as-is and is not supported by Cisco's *&lt;BR /&gt;* Technical Advisory Center. Any use or disclosure, in whole or in part, *&lt;BR /&gt;* of the IOSv Software or Documentation to any third party for any *&lt;BR /&gt;* purposes is expressly prohibited except as otherwise authorized by *&lt;BR /&gt;* Cisco in writing. *&lt;BR /&gt;**************************************************************************^C&lt;BR /&gt;banner login ^C&lt;BR /&gt;**************************************************************************&lt;BR /&gt;* IOSv is strictly limited to use for evaluation, demonstration and IOS *&lt;BR /&gt;* education. IOSv is provided as-is and is not supported by Cisco's *&lt;BR /&gt;* Technical Advisory Center. Any use or disclosure, in whole or in part, *&lt;BR /&gt;* of the IOSv Software or Documentation to any third party for any *&lt;BR /&gt;* purposes is expressly prohibited except as otherwise authorized by *&lt;BR /&gt;* Cisco in writing. *&lt;BR /&gt;**************************************************************************^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;login&lt;BR /&gt;line vty 1 4&lt;BR /&gt;login&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;Core1#&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:06:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4815993#M1099558</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2023-04-17T13:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816000#M1099560</link>
      <description>&lt;P&gt;share the packet tracer after you enable the icmp inspection&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816000#M1099560</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-17T13:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816002#M1099561</link>
      <description>&lt;P&gt;You are still missing VLAN configuration on the switch port connecting to the ASA&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816002#M1099561</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-04-17T13:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816006#M1099562</link>
      <description>&lt;P&gt;Core1#show run int gi0/0&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 147 bytes&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description CORE &amp;gt; ASA&lt;BR /&gt;switchport access vlan 500&lt;BR /&gt;switchport mode access&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;should it be this?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:15:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816006#M1099562</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2023-04-17T13:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816009#M1099563</link>
      <description>&lt;P&gt;ciscoasa# packet-tracer input INSIDE icmp 10.1.1.1 1 8 10.1.1.2 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fb005600760, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=0, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: No ECMP load balancing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Destination is locally connected. No ECMP load balancing.&lt;BR /&gt;Found next-hop 10.1.1.2 using egress ifc INSIDE&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fb0052b6500, priority=501, domain=permit, deny=true&lt;BR /&gt;hits=1, user_data=0x7, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.1, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;input_ifc=INSIDE, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000560af18feae6 flow (NA)/NA&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;Getting the same output&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:16:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816009#M1099563</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2023-04-17T13:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816018#M1099564</link>
      <description>&lt;P&gt;there are multi VLAN in L3SW and there is one (VLAN1) connect L3SW to ASA&amp;nbsp;&lt;BR /&gt;so I think run permit intra-interface connection&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816018#M1099564</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-17T13:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816019#M1099565</link>
      <description>&lt;P&gt;Yes that is correct, but again, packet-tracer is for simulating a packet through the ASA and not to it. So you packet-tracer you are posting will always fail.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:25:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816019#M1099565</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-04-17T13:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816020#M1099566</link>
      <description>&lt;P&gt;STOP using packet-tracer. It is not for traffic TO the firewall. Only for traffic THROUGH the firewall.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816020#M1099566</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-04-17T13:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping inside address of ASAv from core switch</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816026#M1099567</link>
      <description>&lt;P&gt;Thanks for your help it is now working&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-inside-address-of-asav-from-core-switch/m-p/4816026#M1099567</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2023-04-17T13:27:45Z</dc:date>
    </item>
  </channel>
</rss>

