<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to Ping VPN ASA Firewall from Backend Server, SNMP Walk Works in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-vpn-asa-firewall-from-backend-server-snmp-walk/m-p/5268036#M1119902</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm facing an issue with network connectivity between two firewalls. Here's the setup:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Backend Server IP:&lt;/STRONG&gt; 10.96.16.245&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Backend Firewall (Cisco ASA):&lt;/STRONG&gt; The default gateway for 10.96.16.1&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;VPN Firewall (Trust IP):&lt;/STRONG&gt; 10.96.18.240&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Problem:&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;From the &lt;STRONG&gt;Backend Server (10.96.16.245)&lt;/STRONG&gt;, I am unable to &lt;STRONG&gt;ping&lt;/STRONG&gt; the &lt;STRONG&gt;VPN Firewall (10.96.18.240)&lt;/STRONG&gt;, though &lt;STRONG&gt;SNMP walk&lt;/STRONG&gt; commands successfully reach the firewall.&lt;/LI&gt;&lt;LI&gt;When capturing packets on the &lt;STRONG&gt;VPN Firewall&lt;/STRONG&gt;, I can see both &lt;STRONG&gt;ICMP Echo Request&lt;/STRONG&gt; and &lt;STRONG&gt;ICMP Echo Reply&lt;/STRONG&gt; packets being exchanged.&lt;/LI&gt;&lt;LI&gt;However, when I perform a capture on the &lt;STRONG&gt;Backend Firewall (Cisco ASA)&lt;/STRONG&gt;, only the &lt;STRONG&gt;ICMP Echo Request&lt;/STRONG&gt; is visible, and the &lt;STRONG&gt;ICMP Echo Reply&lt;/STRONG&gt; does not appear.&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Troubleshooting Steps Taken:&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;SNMP Walk:&lt;/STRONG&gt; Works fine between the server and VPN firewall, indicating basic connectivity is not the issue.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;ICMP Capture on VPN Firewall:&lt;/STRONG&gt; Shows both ICMP request and reply, suggesting the VPN firewall is responding properly.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;ICMP Capture on Backend Firewall (Cisco ASA):&lt;/STRONG&gt; Shows only the request packets, no reply packets, suggesting the reply may be blocked or not being routed properly by the backend firewall.&lt;/LI&gt;&lt;/OL&gt;&lt;H3&gt;Things I’ve Considered:&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;ACLs / Firewall Rules:&lt;/STRONG&gt; There might be specific rules blocking ICMP replies. I’ve verified that no such rules are configured, but I will revisit them to confirm.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Routing:&lt;/STRONG&gt; The routing on both firewalls should be configured correctly, but I’m considering possible misconfigurations or asymmetric routing.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;NAT / Inspection Issues:&lt;/STRONG&gt; There could be a NAT or stateful inspection issue preventing the return ICMP packets from being properly routed or allowed by the backend firewall.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Has anyone encountered this kind of issue before? Any suggestions on things I might have missed or additional logs or captures I should review?&lt;/P&gt;</description>
    <pubDate>Fri, 04 Apr 2025 01:54:07 GMT</pubDate>
    <dc:creator>ghufran.siddiqui11</dc:creator>
    <dc:date>2025-04-04T01:54:07Z</dc:date>
    <item>
      <title>Unable to Ping VPN ASA Firewall from Backend Server, SNMP Walk Works</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-vpn-asa-firewall-from-backend-server-snmp-walk/m-p/5268036#M1119902</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm facing an issue with network connectivity between two firewalls. Here's the setup:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Backend Server IP:&lt;/STRONG&gt; 10.96.16.245&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Backend Firewall (Cisco ASA):&lt;/STRONG&gt; The default gateway for 10.96.16.1&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;VPN Firewall (Trust IP):&lt;/STRONG&gt; 10.96.18.240&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Problem:&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;From the &lt;STRONG&gt;Backend Server (10.96.16.245)&lt;/STRONG&gt;, I am unable to &lt;STRONG&gt;ping&lt;/STRONG&gt; the &lt;STRONG&gt;VPN Firewall (10.96.18.240)&lt;/STRONG&gt;, though &lt;STRONG&gt;SNMP walk&lt;/STRONG&gt; commands successfully reach the firewall.&lt;/LI&gt;&lt;LI&gt;When capturing packets on the &lt;STRONG&gt;VPN Firewall&lt;/STRONG&gt;, I can see both &lt;STRONG&gt;ICMP Echo Request&lt;/STRONG&gt; and &lt;STRONG&gt;ICMP Echo Reply&lt;/STRONG&gt; packets being exchanged.&lt;/LI&gt;&lt;LI&gt;However, when I perform a capture on the &lt;STRONG&gt;Backend Firewall (Cisco ASA)&lt;/STRONG&gt;, only the &lt;STRONG&gt;ICMP Echo Request&lt;/STRONG&gt; is visible, and the &lt;STRONG&gt;ICMP Echo Reply&lt;/STRONG&gt; does not appear.&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Troubleshooting Steps Taken:&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;SNMP Walk:&lt;/STRONG&gt; Works fine between the server and VPN firewall, indicating basic connectivity is not the issue.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;ICMP Capture on VPN Firewall:&lt;/STRONG&gt; Shows both ICMP request and reply, suggesting the VPN firewall is responding properly.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;ICMP Capture on Backend Firewall (Cisco ASA):&lt;/STRONG&gt; Shows only the request packets, no reply packets, suggesting the reply may be blocked or not being routed properly by the backend firewall.&lt;/LI&gt;&lt;/OL&gt;&lt;H3&gt;Things I’ve Considered:&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;ACLs / Firewall Rules:&lt;/STRONG&gt; There might be specific rules blocking ICMP replies. I’ve verified that no such rules are configured, but I will revisit them to confirm.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Routing:&lt;/STRONG&gt; The routing on both firewalls should be configured correctly, but I’m considering possible misconfigurations or asymmetric routing.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;NAT / Inspection Issues:&lt;/STRONG&gt; There could be a NAT or stateful inspection issue preventing the return ICMP packets from being properly routed or allowed by the backend firewall.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Has anyone encountered this kind of issue before? Any suggestions on things I might have missed or additional logs or captures I should review?&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2025 01:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-vpn-asa-firewall-from-backend-server-snmp-walk/m-p/5268036#M1119902</guid>
      <dc:creator>ghufran.siddiqui11</dc:creator>
      <dc:date>2025-04-04T01:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Ping VPN ASA Firewall from Backend Server, SNMP Walk Wor</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-vpn-asa-firewall-from-backend-server-snmp-walk/m-p/5269129#M1119950</link>
      <description>&lt;P&gt;After reviewing the configurations I didn't see anything ASA related that should prevent this ICMP ping flow.&lt;/P&gt;
&lt;P&gt;I would next verify the route path between these two ASAs.&lt;/P&gt;
&lt;P&gt;The BE-ASA routes traffic destined to 10.96.18.240 to 10.96.116.1.&amp;nbsp; Since you are seeing the ICMP requests on the VPN-ASA I am fairly confident routes are right in that direction.&lt;/P&gt;
&lt;P&gt;The VPN-ASA routes traffic destined to 10.96.16.245 to 10.96.18.254.&amp;nbsp; Since you are not seeing any ICMP replies on the ASA-BE from the ASA-VPN, I would suspect those ICMP packets are being lost somewhere en route.&amp;nbsp; The cause could be NAT/ACL/Routing, it just depends on the configurations set on networking devices on and between the 10.96.116.1 and 10.96.18.254 gateways (primarily in the ASA-VPN to ASA-BE direction).&lt;BR /&gt;&lt;BR /&gt;Could you share the route tables for 10.96.116.1 and 10.96.18.254?&lt;BR /&gt;&lt;BR /&gt;Also, I sent you a direct message - please take a look at that when you have a chance!&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 20:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-vpn-asa-firewall-from-backend-server-snmp-walk/m-p/5269129#M1119950</guid>
      <dc:creator>Mark Ftc</dc:creator>
      <dc:date>2025-03-09T20:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Ping VPN ASA Firewall from Backend Server, SNMP Walk Wor</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-vpn-asa-firewall-from-backend-server-snmp-walk/m-p/5269248#M1119956</link>
      <description>&lt;P&gt;What is between the VPN ASA and BE ASA?&amp;nbsp; Would it be possible to perform a capture or tcpdump on whatever is inbetween to verify further if the icmp packet is exiting the interface towards the BE ASA?&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 19:20:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-vpn-asa-firewall-from-backend-server-snmp-walk/m-p/5269248#M1119956</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2025-03-09T19:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Ping VPN ASA Firewall from Backend Server, SNMP Walk Wor</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-vpn-asa-firewall-from-backend-server-snmp-walk/m-p/5269290#M1119959</link>
      <description>&lt;P&gt;Can you mount the capture on the untrust_v116 interfaces of the ASA xtv-VF-ASA5555X-BEFW to see if the icmp replies are reaching the interfaces?&lt;/P&gt;
&lt;P&gt;If you see the ICMP reply on the interfaces, check the ACLs&amp;nbsp;untrust_v116_access_in regarding the ICMP response from the source 10.96.18.240 to the server.&lt;/P&gt;
&lt;P&gt;If you do not see the response on the ASA interface, you must validate the intermediate devices and the routing at the ASA level.&lt;BR /&gt;xtv-vf-vpn-asa, the route that is applied to reach the destination in the configuration is the following:&lt;/P&gt;
&lt;P&gt;route trust 10.96.16.0 255.255.255.0 10.96.18.254 1&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 00:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-vpn-asa-firewall-from-backend-server-snmp-walk/m-p/5269290#M1119959</guid>
      <dc:creator>krmp010608</dc:creator>
      <dc:date>2025-03-10T00:32:16Z</dc:date>
    </item>
  </channel>
</rss>

