<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SLA failure because certain IP addresses cannot be reached by ping in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166657#M1115421</link>
    <description>&lt;P&gt;ok based on the suggestion with ping -i etc will help you and traceroutes.. but the problem seems elsewhere..&lt;/P&gt;
&lt;P&gt;I think we have given enough ways to troubleshoot this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;**Please rate as helpful if this was useful **&lt;/P&gt;</description>
    <pubDate>Tue, 27 Aug 2024 17:01:45 GMT</pubDate>
    <dc:creator>ccieexpert</dc:creator>
    <dc:date>2024-08-27T17:01:45Z</dc:date>
    <item>
      <title>SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165242#M1115313</link>
      <description>&lt;P&gt;We have a FTD managed by FMC.&lt;/P&gt;
&lt;P&gt;For some reason it's nos possible to ping the address 8.8.8.8 and 1.1.1.1 for example. But if we ping the address 8.8.4.4, it responds to the ping.&lt;/P&gt;
&lt;P&gt;We have a default static route to the internet provider, but when entering the command 'show route&amp;nbsp; 8.8.8.8' or 'show route 1.1.1.1'&amp;nbsp; or 'show route 8.8.4.4', always get the answer '% Network not in table'.&lt;/P&gt;
&lt;P&gt;However for internal networks the 'show route' command display the correct gateways.&lt;/P&gt;
&lt;P&gt;Any ideas.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 19:44:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165242#M1115313</guid>
      <dc:creator>LuigiDiFronzo9542</dc:creator>
      <dc:date>2024-08-23T19:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165245#M1115314</link>
      <description>&lt;P&gt;Can I see show route&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 19:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165245#M1115314</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-23T19:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165253#M1115315</link>
      <description>&lt;P&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area &lt;BR /&gt;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN&lt;BR /&gt;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;o - ODR, P - periodic downloaded static route, + - replicated route&lt;BR /&gt;SI - Static InterVRF, BI - BGP InterVRF&lt;BR /&gt;Gateway of last resort is 10.232.255.11 to network 0.0.0.0&lt;/P&gt;
&lt;P&gt;S* 0.0.0.0 0.0.0.0 [1/0] via 10.232.255.11, outside&lt;BR /&gt;S 10.63.0.0 255.255.0.0 [1/0] via 10.232.60.2, DMZ60&lt;BR /&gt;S 10.64.0.0 255.255.0.0 [1/0] via 10.232.60.2, DMZ60&lt;BR /&gt;S 10.170.2.0 255.255.255.128 [1/0] via 10.232.255.11, outside&lt;BR /&gt;S 10.232.0.0 255.255.0.0 [1/0] via 10.232.240.1, inside&lt;BR /&gt;S 10.232.0.20 255.255.255.252 [1/0] via 10.232.60.2, DMZ60&lt;BR /&gt;S 10.232.0.24 255.255.255.252 [1/0] via 10.232.60.2, DMZ60&lt;BR /&gt;D 10.232.14.0 255.255.255.0 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.15.0 255.255.255.0 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.20.0 255.255.255.0 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;C 10.232.22.0 255.255.255.252 is directly connected, Failover_Link&lt;BR /&gt;L 10.232.22.1 255.255.255.255 is directly connected, Failover_Link&lt;BR /&gt;C 10.232.22.4 255.255.255.252 is directly connected, State_Link&lt;BR /&gt;L 10.232.22.5 255.255.255.255 is directly connected, State_Link&lt;BR /&gt;D 10.232.30.0 255.255.255.192 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.40.0 255.255.255.0 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;S 10.232.40.8 255.255.255.255 [1/0] via 10.232.60.2, DMZ60&lt;BR /&gt;D 10.232.41.33 255.255.255.255 &lt;BR /&gt;[90/195072] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;C 10.232.50.0 255.255.255.192 is directly connected, DMZ50&lt;BR /&gt;L 10.232.50.1 255.255.255.255 is directly connected, DMZ50&lt;BR /&gt;C 10.232.60.0 255.255.255.240 is directly connected, DMZ60&lt;BR /&gt;L 10.232.60.1 255.255.255.255 is directly connected, DMZ60&lt;BR /&gt;D 10.232.90.0 255.255.255.192 &lt;BR /&gt;[90/25600512] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.114.0 255.255.255.0 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.115.0 255.255.255.0 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.200.0 255.255.255.240 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.210.0 255.255.255.240 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.220.0 255.255.255.240 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.221.0 255.255.255.240 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.240.0 255.255.255.252 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.245.0 255.255.255.240 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.247.0 255.255.255.192 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;V 10.232.249.22 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.232.249.175 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.232.249.176 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.232.249.177 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.232.249.178 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.232.249.179 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 10.232.249.180 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;D 10.232.251.0 255.255.255.0 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.252.0 255.255.255.0 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.253.0 255.255.255.0 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 10.232.254.0 255.255.255.240 [90/3072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;C 10.232.255.0 255.255.255.248 is directly connected, inside&lt;BR /&gt;L 10.232.255.6 255.255.255.255 is directly connected, inside&lt;BR /&gt;C 10.232.255.8 255.255.255.248 is directly connected, outside&lt;BR /&gt;L 10.232.255.9 255.255.255.255 is directly connected, outside&lt;BR /&gt;D 10.234.0.28 255.255.255.252 &lt;BR /&gt;[90/284672] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.234.81.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.234.181.0 255.255.255.128 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.234.210.0 255.255.255.128 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;S 10.240.0.0 255.255.0.0 [1/0] via 10.232.240.1, inside&lt;BR /&gt;D 10.240.0.0 255.255.255.252 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.1.0 255.255.255.128 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.1.128 255.255.255.128 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.2.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.3.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.5.0 255.255.255.192 &lt;BR /&gt;[90/67328] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.20.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.40.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.41.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.42.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.43.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.44.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.45.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.46.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.47.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.48.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.50.0 255.255.254.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.60.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.61.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.66.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.67.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.72.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.73.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.78.0 255.255.255.128 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.78.128 255.255.255.128 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.80.0 255.255.255.240 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.80.16 255.255.255.240 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.81.16 255.255.255.240 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.82.0 255.255.255.240 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.82.16 255.255.255.240 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.83.0 255.255.255.224 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.83.32 255.255.255.240 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.84.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 10.240.247.0 255.255.255.0 &lt;BR /&gt;[90/67584] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;V 10.250.0.0 255.255.0.0 connected by VPN (advertised), PRUEBA_ROUTER&lt;BR /&gt;S 10.250.20.0 255.255.255.0 [1/0] via 190.216.233.1, PRUEBA_ROUTER&lt;BR /&gt;S 97.65.232.134 255.255.255.255 [1/0] via 190.216.233.1, PRUEBA_ROUTER&lt;BR /&gt;S 104.106.235.41 255.255.255.255 [1/0] via 190.216.233.1, PRUEBA_ROUTER&lt;BR /&gt;S 172.18.86.0 255.255.255.0 [1/0] via 10.232.60.2, DMZ60&lt;BR /&gt;S 184.31.70.16 255.255.255.255 [1/0] via 190.216.233.1, PRUEBA_ROUTER&lt;BR /&gt;S 184.31.176.180 255.255.255.255 [1/0] via 190.216.233.1, PRUEBA_ROUTER&lt;BR /&gt;C 186.167.7.176 255.255.255.248 is directly connected, digitel&lt;BR /&gt;L 186.167.7.179 255.255.255.255 is directly connected, digitel&lt;BR /&gt;C 190.216.233.0 255.255.255.224 is directly connected, PRUEBA_ROUTER&lt;BR /&gt;L 190.216.233.17 255.255.255.255 is directly connected, PRUEBA_ROUTER&lt;BR /&gt;D 192.168.2.0 255.255.255.252 [90/67072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 192.168.3.1 255.255.255.255 &lt;BR /&gt;[90/131072] via 10.232.255.5, 7w0d, inside&lt;BR /&gt;D 192.168.3.2 255.255.255.255 &lt;BR /&gt;[90/195072] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 192.168.18.0 255.255.255.0 &lt;BR /&gt;[90/67840] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;D 192.168.60.0 255.255.255.0 &lt;BR /&gt;[90/67840] via 10.232.255.5, 12:12:17, inside&lt;BR /&gt;S 194.247.235.241 255.255.255.255 &lt;BR /&gt;[1/0] via 190.216.233.1, PRUEBA_ROUTER&lt;BR /&gt;S 207.218.87.194 255.255.255.255 [1/0] via 190.216.233.1, PRUEBA_ROUTER&lt;BR /&gt;S 209.130.193.34 255.255.255.255 [1/0] via 190.216.233.1, PRUEBA_ROUTER&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 20:14:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165253#M1115315</guid>
      <dc:creator>LuigiDiFronzo9542</dc:creator>
      <dc:date>2024-08-23T20:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165255#M1115316</link>
      <description>&lt;P&gt;can you run packet tracer with "trace detail" option and show the output for that&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 20:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165255#M1115316</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-23T20:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165273#M1115317</link>
      <description>&lt;P&gt;there is 0.0.0.0&amp;nbsp;&lt;BR /&gt;so it seem show route 8.8.8.8 not work as we want in FTD like it work in other IOS device&lt;/P&gt;
&lt;P&gt;why ping to 8.8.8.8 failed and ping to 8.8.4.4 success ?&lt;/P&gt;
&lt;P&gt;check in fmc platform setting check in icmp if you allow ANY or 8.8.4.4&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 22:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165273#M1115317</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-23T22:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165275#M1115318</link>
      <description>&lt;P&gt;Thanks MHM,&lt;/P&gt;
&lt;P&gt;Yes, the ping is permitted to Any, in fact we had a SLA monitor doing ping to 1.1.1.1 address but failed this morning because the unsucesfull ping.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 23:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165275#M1115318</guid>
      <dc:creator>LuigiDiFronzo9542</dc:creator>
      <dc:date>2024-08-23T23:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165318#M1115327</link>
      <description>&lt;P&gt;couple of things as i already suggested:&lt;/P&gt;
&lt;P&gt;1) is ping from the inside to outside for 8.8.8.8 working fine through the box ?&lt;/P&gt;
&lt;P&gt;2) do packet trace from the box packet-tracer input inside icmp &amp;lt;inside host&amp;gt; 0 0 8.8.8.8&lt;/P&gt;
&lt;P&gt;3) show asp table routing&lt;/P&gt;
&lt;P&gt;4) try to put host route /32 for the 8.8.8.8 to point to default gateway..&lt;/P&gt;
&lt;P&gt;BTW show route &amp;lt;network&amp;gt; doesnt work unless there is a exact match.&lt;/P&gt;
&lt;P&gt;try&lt;/P&gt;
&lt;P&gt;sh route 8.8.8.8 longer-prefixes&lt;/P&gt;
&lt;P&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN&lt;BR /&gt;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;o - ODR, P - periodic downloaded static route, + - replicated route&lt;BR /&gt;SI - Static InterVRF, BI - BGP InterVRF&lt;BR /&gt;Gateway of last resort is 192.168.254.254 to network 0.0.0.0&lt;/P&gt;
&lt;P&gt;hope this helps..&lt;/P&gt;</description>
      <pubDate>Sat, 24 Aug 2024 05:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165318#M1115327</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-24T05:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165407#M1115328</link>
      <description>&lt;P&gt;&lt;SPAN&gt;S* 0.0.0.0 0.0.0.0 [1/0] via 10.232.255.11, outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;C 10.232.255.8 255.255.255.248 is directly connected, outside&lt;BR /&gt;L 10.232.255.9 255.255.255.255 is directly connected, outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;FTD is connect to router and router connect to ISP? Check if somehow one engineer add ACL in router deny 8.8.8.8&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 24 Aug 2024 07:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165407#M1115328</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-24T07:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165875#M1115363</link>
      <description>&lt;P&gt;The output that the Network is not in the routing table is expected. this just means that the default route will be used.&lt;/P&gt;
&lt;P&gt;show route 8.8.8.8&lt;/P&gt;
&lt;P&gt;% Network not in table&lt;/P&gt;
&lt;P&gt;can you run a packet tracer for this traffic and post the output here.&amp;nbsp; This issue can be that there is an access list blocking the issue, security intelligence blocking the traffic for some reason, or that the ISP is dropping the traffic (though this is not very likely).&lt;/P&gt;
&lt;P&gt;in addition to packet tracer do a packet capture on the inside interface and then run a connection test and post the output here.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 11:07:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5165875#M1115363</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-08-26T11:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166140#M1115388</link>
      <description>&lt;P&gt;Executing a traceroute from the FTD on both IP address, you can see the diferent results.&lt;/P&gt;
&lt;P&gt;For the one working this is the trace:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LuigiDiFronzo9542_0-1724705274866.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227094iA93212412BB022B2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LuigiDiFronzo9542_0-1724705274866.png" alt="LuigiDiFronzo9542_0-1724705274866.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;For the IP address that doesn´t respond this is the trace:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LuigiDiFronzo9542_1-1724705329890.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227095i67BBEC96AB1FC716/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LuigiDiFronzo9542_1-1724705329890.png" alt="LuigiDiFronzo9542_1-1724705329890.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;It seems like an external block for that IP adddress.&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 20:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166140#M1115388</guid>
      <dc:creator>LuigiDiFronzo9542</dc:creator>
      <dc:date>2024-08-26T20:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166141#M1115389</link>
      <description>&lt;P&gt;Traceroute different than ping so you cant depend on it&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As I mentioned above ftd connect to edge router from this router try ping 8.8.8.8 and check ACL on it&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 21:01:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166141#M1115389</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-26T21:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166152#M1115391</link>
      <description>&lt;P&gt;Thank you for your response.&lt;/P&gt;
&lt;P&gt;The FTD has a switch above it that is then connected to a balancing device that connects with the ISPs. We don't have direct access to the switch but from the balancing device there is a ping response for both addresses. According your indication, the blocking could be due to an ACL on the switch?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 21:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166152#M1115391</guid>
      <dc:creator>LuigiDiFronzo9542</dc:creator>
      <dc:date>2024-08-26T21:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166156#M1115392</link>
      <description>&lt;P&gt;ACL or NAT with balance issue. Check this point&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 21:25:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166156#M1115392</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-26T21:25:26Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166267#M1115401</link>
      <description>&lt;P&gt;Ciao friends&lt;/P&gt;
&lt;P&gt;I will give you my analysis based on the traceroute.&lt;/P&gt;
&lt;P&gt;First based on the traceroute nothing is blocked by upstream switch/router as the traceroute packet will have the same destination 8.8.8.8.. It is dropped by last hop 8.8.8.8 and the path seems to be the same..&lt;/P&gt;
&lt;P&gt;Most likely something is happening on the last hop-maybe a blacklist of your ip or a problem with load balancer.. It is very clear with traceroute the last hop is not responding...It is ofcourse possible that there is a inbound ACL block on the upstream router for anything sourced from 8.8.8.8 - that is a possibility.&lt;/P&gt;
&lt;P&gt;One way to for sure verify that the upstream first hop is not dropping is to do a ping with TTL of 6 hops from a inside windows or linux host where you can set the the TTL- If you get a TTL expired in transit on the the ping command, then that shows that it is not blocked by upstream device(first hope):&lt;/P&gt;
&lt;P&gt;C:\Users\thoma&amp;gt;ping -i 6 8.8.8.8&lt;/P&gt;
&lt;P&gt;Pinging 8.8.8.8 with 32 bytes of data:&lt;BR /&gt;Reply from 45.52.201.115: TTL expired in transit.&lt;BR /&gt;Reply from 45.52.201.115: TTL expired in transit.&lt;/P&gt;
&lt;P&gt;In this case the 45.52.201.115 is the 6th hop in traceroute also.. so just to confirm ...&lt;/P&gt;
&lt;P&gt;Hope that helps friends &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 05:56:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166267#M1115401</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-27T05:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166289#M1115402</link>
      <description>&lt;P&gt;Based on the traceroute you provided the issue is from 142.250.47.74, so either a routing issue on the device containing this subnet or a firewall at the next hop after this.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 07:04:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166289#M1115402</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-08-27T07:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166530#M1115413</link>
      <description>&lt;P&gt;Hello this is the test.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LuigiDiFronzo9542_0-1724765072953.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227121iCB7386347FE89D10/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LuigiDiFronzo9542_0-1724765072953.png" alt="LuigiDiFronzo9542_0-1724765072953.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LuigiDiFronzo9542_1-1724765205825.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227122i3B668DF76EDC1DFF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="LuigiDiFronzo9542_1-1724765205825.png" alt="LuigiDiFronzo9542_1-1724765205825.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So according your comments the blocking could be in this case at the last hop (142.250.47.74, according the trace a Google address). In this case what could be the reason for this behavior?&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 13:32:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166530#M1115413</guid>
      <dc:creator>LuigiDiFronzo9542</dc:creator>
      <dc:date>2024-08-27T13:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166607#M1115417</link>
      <description>&lt;P&gt;potential reason is they have blacklisted your ip or something else ...have you checked if your public ip is not blacklisted.... maybe contact google ??&amp;nbsp; do you have more than 1 public ip ? maybe try another public IP to see is the issues with blacklist.. did you by any chance send too much traffic (pings or other) to them ?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 15:44:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166607#M1115417</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-27T15:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166645#M1115419</link>
      <description>&lt;P&gt;Yes, we have two Public IP addresses and searching in Cisco Talos they don't look suspicious.&lt;/P&gt;
&lt;P&gt;Right now the ping 8.8.8.8 is working again but the 1.1.1.1 not yet.&lt;/P&gt;
&lt;P&gt;Thanks all for your suggestions.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 16:49:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166645#M1115419</guid>
      <dc:creator>LuigiDiFronzo9542</dc:creator>
      <dc:date>2024-08-27T16:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166657#M1115421</link>
      <description>&lt;P&gt;ok based on the suggestion with ping -i etc will help you and traceroutes.. but the problem seems elsewhere..&lt;/P&gt;
&lt;P&gt;I think we have given enough ways to troubleshoot this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;**Please rate as helpful if this was useful **&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 17:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166657#M1115421</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-27T17:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: SLA failure because certain IP addresses cannot be reached by ping</title>
      <link>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166677#M1115425</link>
      <description>&lt;P&gt;It will appear again&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the edge router connect to ftd have two ISP check NAT and ACL as I mention before.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 17:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sla-failure-because-certain-ip-addresses-cannot-be-reached-by/m-p/5166677#M1115425</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-27T17:16:39Z</dc:date>
    </item>
  </channel>
</rss>

