<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675562#M14047</link>
    <description>&lt;P&gt;Can someone please help me figure out why I can't ping from my Azure VM to any on-premises devices? I've added exclusions for ICMP in Windows Firewalls on both sides and can successfully ping from on-prem (i.e. 192.168.1.90) to an Azure VM (i.e. 10.0.0.1), but not the other way around. I've also added exclusions in Azure NSGs. All other traffic flows successfully. We are currently utilizing a Cisco ASA 5506-X with Firepower. We could ping in both directions when we were using the older ASA 5505, however the config for the two are a bit different (no VLANs on the 5506, using BVI).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is my config (anything marked [removed] I deemed sensitive):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;Result of the command: "show run"&lt;/DIV&gt;
&lt;DIV&gt;: Saved&lt;/DIV&gt;
&lt;DIV&gt;:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;: Serial Number:&amp;nbsp;[removed]&lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(2)&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name [removed]&lt;BR /&gt;enable password [removed]&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;names&lt;/DIV&gt;
&lt;DIV&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;description Comcast&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address [removed] 255.255.255.248&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_2&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_3&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_4&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_5&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_6&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_7&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;description [Removed] Network&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa982-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 75.75.75.75&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;name-server 8.8.4.4&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;domain-name [removed]&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside-network&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network azure&lt;BR /&gt;&amp;nbsp;subnet 10.0.0.0 255.255.0.0&lt;BR /&gt;object network DHCP_server&lt;BR /&gt;&amp;nbsp;host 192.168.1.10&lt;BR /&gt;object service tcp44434&lt;BR /&gt;&amp;nbsp;service tcp destination eq 44434&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;description RDP&lt;BR /&gt;object network OutsideInterface&lt;BR /&gt;&amp;nbsp;host [removed]&lt;BR /&gt;object service RDP-Service&lt;BR /&gt;&amp;nbsp;service tcp source eq&amp;nbsp;[removed]&lt;BR /&gt;object network AzureDC1&lt;BR /&gt;&amp;nbsp;host 10.0.0.4&lt;BR /&gt;object service ICMPv4&lt;BR /&gt;&amp;nbsp;service icmp echo 0&lt;BR /&gt;object-group network azure-networks&lt;BR /&gt;&amp;nbsp;network-object object azure&lt;BR /&gt;object-group network onprem-networks&lt;BR /&gt;&amp;nbsp;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt;&amp;nbsp;port-object eq&amp;nbsp;[removed]&lt;BR /&gt;access-list outside_access_in extended permit icmp any any&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list outside_access_in extended permit ip host [removed] host [removed]&lt;BR /&gt;access-list outside_access_in remark Ping&lt;BR /&gt;access-list outside_cryptomap extended permit ip object-group onprem-networks object-group azure-networks&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list outside_nat extended permit tcp any host [removed] eq [removed]&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 object azure&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list OUTSIDE extended permit icmp any any&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list inside_6_access_in extended permit ip any any&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list inside_6_access_in extended permit icmp any any&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 1000000&lt;BR /&gt;logging buffered informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_1 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside_2&lt;BR /&gt;icmp permit any inside_5&lt;BR /&gt;icmp permit any inside_6&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-782-151.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (inside_1,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_2,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_3,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_4,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_5,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_6,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_7,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_6_access_in in interface inside_6&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 [removed] 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;user-identity ad-agent active-user-database on-demand&lt;BR /&gt;aaa authentication http console LOCAL&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt connection tcpmss 1318&lt;BR /&gt;sysopt connection preserve-vpn-flows&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256Azure&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption 3des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-192&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association lifetime seconds 3600&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 102400000&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map outside_map1 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map1 1 set pfs group24&lt;BR /&gt;crypto map outside_map1 1 set peer [removed]&lt;BR /&gt;crypto map outside_map1 1 set ikev2 ipsec-proposal AES256Azure&lt;BR /&gt;crypto map outside_map1 1 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map outside_map1 1 set security-association lifetime kilobytes 102400000&lt;BR /&gt;crypto map outside_map1 interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;no validation-usage&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca&amp;nbsp;[removed]&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 24&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 28800&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev2 enable inside_1&lt;BR /&gt;crypto ikev2 enable inside_2&lt;BR /&gt;crypto ikev2 enable inside_3&lt;BR /&gt;crypto ikev2 enable inside_4&lt;BR /&gt;crypto ikev2 enable inside_5&lt;BR /&gt;crypto ikev2 enable inside_6&lt;BR /&gt;crypto ikev2 enable inside_7&lt;BR /&gt;crypto ikev2 enable inside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 enable inside_1&lt;BR /&gt;crypto ikev1 enable inside_2&lt;BR /&gt;crypto ikev1 enable inside_3&lt;BR /&gt;crypto ikev1 enable inside_4&lt;BR /&gt;crypto ikev1 enable inside_5&lt;BR /&gt;crypto ikev1 enable inside_6&lt;BR /&gt;crypto ikev1 enable inside_7&lt;BR /&gt;crypto ikev1 enable inside&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_2&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_3&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_4&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_6&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_7&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/DIV&gt;
&lt;DIV&gt;dhcpd dns 75.75.75.75 75.75.76.76&lt;BR /&gt;dhcpd domain [removed]&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev2&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username [removed]&lt;BR /&gt;username [removed]&lt;BR /&gt;tunnel-group [removed] type ipsec-l2l&lt;BR /&gt;tunnel-group [removed] general-attributes&lt;BR /&gt;&amp;nbsp;default-group-policy GroupPolicy1&lt;BR /&gt;tunnel-group [removed] ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev2 remote-authentication pre-shared-key&amp;nbsp;[removed]&lt;BR /&gt;&amp;nbsp;ikev2 local-authentication pre-shared-key&amp;nbsp;[removed]&lt;BR /&gt;no tunnel-group-map enable ou&lt;BR /&gt;!&lt;BR /&gt;class-map class-default-settings&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map global-class&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;&amp;nbsp; no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class class-default-settings&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;policy-map class-default&lt;BR /&gt;&amp;nbsp;class global-class&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;service call-home&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;contact-email-addr&amp;nbsp;[removed]&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; destination address http&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="nofollow noopener noreferrer"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:426c1042e5da8735c3d46dba6a161aec&lt;BR /&gt;: end&lt;/DIV&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:01:26 GMT</pubDate>
    <dc:creator>mark.bell</dc:creator>
    <dc:date>2020-02-21T16:01:26Z</dc:date>
    <item>
      <title>Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675562#M14047</link>
      <description>&lt;P&gt;Can someone please help me figure out why I can't ping from my Azure VM to any on-premises devices? I've added exclusions for ICMP in Windows Firewalls on both sides and can successfully ping from on-prem (i.e. 192.168.1.90) to an Azure VM (i.e. 10.0.0.1), but not the other way around. I've also added exclusions in Azure NSGs. All other traffic flows successfully. We are currently utilizing a Cisco ASA 5506-X with Firepower. We could ping in both directions when we were using the older ASA 5505, however the config for the two are a bit different (no VLANs on the 5506, using BVI).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is my config (anything marked [removed] I deemed sensitive):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;Result of the command: "show run"&lt;/DIV&gt;
&lt;DIV&gt;: Saved&lt;/DIV&gt;
&lt;DIV&gt;:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;: Serial Number:&amp;nbsp;[removed]&lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(2)&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name [removed]&lt;BR /&gt;enable password [removed]&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;names&lt;/DIV&gt;
&lt;DIV&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;description Comcast&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address [removed] 255.255.255.248&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_2&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_3&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_4&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_5&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_6&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_7&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;description [Removed] Network&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa982-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 75.75.75.75&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;name-server 8.8.4.4&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;domain-name [removed]&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside-network&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network azure&lt;BR /&gt;&amp;nbsp;subnet 10.0.0.0 255.255.0.0&lt;BR /&gt;object network DHCP_server&lt;BR /&gt;&amp;nbsp;host 192.168.1.10&lt;BR /&gt;object service tcp44434&lt;BR /&gt;&amp;nbsp;service tcp destination eq 44434&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;description RDP&lt;BR /&gt;object network OutsideInterface&lt;BR /&gt;&amp;nbsp;host [removed]&lt;BR /&gt;object service RDP-Service&lt;BR /&gt;&amp;nbsp;service tcp source eq&amp;nbsp;[removed]&lt;BR /&gt;object network AzureDC1&lt;BR /&gt;&amp;nbsp;host 10.0.0.4&lt;BR /&gt;object service ICMPv4&lt;BR /&gt;&amp;nbsp;service icmp echo 0&lt;BR /&gt;object-group network azure-networks&lt;BR /&gt;&amp;nbsp;network-object object azure&lt;BR /&gt;object-group network onprem-networks&lt;BR /&gt;&amp;nbsp;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt;&amp;nbsp;port-object eq&amp;nbsp;[removed]&lt;BR /&gt;access-list outside_access_in extended permit icmp any any&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list outside_access_in extended permit ip host [removed] host [removed]&lt;BR /&gt;access-list outside_access_in remark Ping&lt;BR /&gt;access-list outside_cryptomap extended permit ip object-group onprem-networks object-group azure-networks&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list outside_nat extended permit tcp any host [removed] eq [removed]&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 object azure&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list OUTSIDE extended permit icmp any any&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list inside_6_access_in extended permit ip any any&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;access-list inside_6_access_in extended permit icmp any any&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 1000000&lt;BR /&gt;logging buffered informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_1 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside_2&lt;BR /&gt;icmp permit any inside_5&lt;BR /&gt;icmp permit any inside_6&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-782-151.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (inside_1,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_2,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_3,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_4,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_5,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_6,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;nat (inside_7,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_6_access_in in interface inside_6&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 [removed] 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;user-identity ad-agent active-user-database on-demand&lt;BR /&gt;aaa authentication http console LOCAL&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt connection tcpmss 1318&lt;BR /&gt;sysopt connection preserve-vpn-flows&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256Azure&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption 3des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-192&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association lifetime seconds 3600&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 102400000&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map outside_map1 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map1 1 set pfs group24&lt;BR /&gt;crypto map outside_map1 1 set peer [removed]&lt;BR /&gt;crypto map outside_map1 1 set ikev2 ipsec-proposal AES256Azure&lt;BR /&gt;crypto map outside_map1 1 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map outside_map1 1 set security-association lifetime kilobytes 102400000&lt;BR /&gt;crypto map outside_map1 interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;no validation-usage&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca&amp;nbsp;[removed]&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 24&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 28800&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev2 enable inside_1&lt;BR /&gt;crypto ikev2 enable inside_2&lt;BR /&gt;crypto ikev2 enable inside_3&lt;BR /&gt;crypto ikev2 enable inside_4&lt;BR /&gt;crypto ikev2 enable inside_5&lt;BR /&gt;crypto ikev2 enable inside_6&lt;BR /&gt;crypto ikev2 enable inside_7&lt;BR /&gt;crypto ikev2 enable inside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 enable inside_1&lt;BR /&gt;crypto ikev1 enable inside_2&lt;BR /&gt;crypto ikev1 enable inside_3&lt;BR /&gt;crypto ikev1 enable inside_4&lt;BR /&gt;crypto ikev1 enable inside_5&lt;BR /&gt;crypto ikev1 enable inside_6&lt;BR /&gt;crypto ikev1 enable inside_7&lt;BR /&gt;crypto ikev1 enable inside&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_2&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_3&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_4&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_6&lt;BR /&gt;ssh 192.168.1.0 255.255.255.255 inside_7&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/DIV&gt;
&lt;DIV&gt;dhcpd dns 75.75.75.75 75.75.76.76&lt;BR /&gt;dhcpd domain [removed]&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev2&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username [removed]&lt;BR /&gt;username [removed]&lt;BR /&gt;tunnel-group [removed] type ipsec-l2l&lt;BR /&gt;tunnel-group [removed] general-attributes&lt;BR /&gt;&amp;nbsp;default-group-policy GroupPolicy1&lt;BR /&gt;tunnel-group [removed] ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev2 remote-authentication pre-shared-key&amp;nbsp;[removed]&lt;BR /&gt;&amp;nbsp;ikev2 local-authentication pre-shared-key&amp;nbsp;[removed]&lt;BR /&gt;no tunnel-group-map enable ou&lt;BR /&gt;!&lt;BR /&gt;class-map class-default-settings&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map global-class&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;&amp;nbsp; no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class class-default-settings&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;policy-map class-default&lt;BR /&gt;&amp;nbsp;class global-class&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;service call-home&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;contact-email-addr&amp;nbsp;[removed]&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; destination address http&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="nofollow noopener noreferrer"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:426c1042e5da8735c3d46dba6a161aec&lt;BR /&gt;: end&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:01:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675562#M14047</guid>
      <dc:creator>mark.bell</dc:creator>
      <dc:date>2020-02-21T16:01:26Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675738#M14048</link>
      <description>&lt;P&gt;Have you tried running a packet-tracer test for icmp traffic from both ingress and egress on the firewall?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the syntax:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer input&amp;nbsp;&lt;EM&gt;&amp;lt;inside-interface-name&amp;gt;&lt;/EM&gt;&amp;nbsp;icmp&amp;nbsp;&lt;EM&gt;&amp;lt;source-ip&amp;gt;&lt;/EM&gt; 0 0&amp;nbsp;&lt;EM&gt;&amp;lt;destination-ip&amp;gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It should give you a detailed explanation of what happens to the traffic entering and exiting the firewall. &amp;nbsp;If all phases pass then we know the firewall isn't to blame on this issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 19:45:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675738#M14048</guid>
      <dc:creator>Ben Walters</dc:creator>
      <dc:date>2018-07-26T19:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675757#M14049</link>
      <description>&lt;P&gt;Hi, I&amp;nbsp;see your traffic should go through a VPN tunnel towards the Azure VMs. A packet tracer will let you know if traffic is going encrypted through the tunnel on a phase, but may not let us know if it is dropped by a rule, or something similar.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would suggest to additionally take some asp captures (capture asp type asp-drop all match host &lt;EM&gt;[src-OnPrm-host]&lt;/EM&gt; host &lt;EM&gt;[dst-Azure-host]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;/U&gt;This will give us more information on the drop reason for that specific traffic.&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, have there been any other changes apart from the asa5505 to asa5506 that we should be aware of?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 20:03:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675757#M14049</guid>
      <dc:creator>Sergio Ceron Ramirez</dc:creator>
      <dc:date>2018-07-26T20:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675766#M14050</link>
      <description>&lt;P&gt;Result of the command: "packet-tracer input inside_6 icmp 10.0.0.4 0 0 192.168.1.90"&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.1.90 using egress ifc inside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_6_access_in in interface inside_6&lt;BR /&gt;access-list inside_6_access_in extended permit ip any any &lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp &lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 883583, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside_6&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 20:15:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675766#M14050</guid>
      <dc:creator>mark.bell</dc:creator>
      <dc:date>2018-07-26T20:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675767#M14051</link>
      <description>&lt;P&gt;No other major changes between the 5505 and 5506 that I'm aware of. It might be pertinent to know that this Site-to-Site VPN is using policy-based traffic selectors (it is route-based VPN but must utilize the policy-based traffic selectors to make it work).&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 20:16:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675767#M14051</guid>
      <dc:creator>mark.bell</dc:creator>
      <dc:date>2018-07-26T20:16:54Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675788#M14052</link>
      <description>&lt;P&gt;When you look at the results you can see the output interface is your inside BVI interface, when it should be the outside interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In phase 2 route lookup it is saying the next hop is your 192.168.1.90 address which resides on the inside interface. Your 0.0.0.0 route should use the gate way address that is on your outside Comcast interface for traffic to be routed to the outside of the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 20:32:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675788#M14052</guid>
      <dc:creator>Ben Walters</dc:creator>
      <dc:date>2018-07-26T20:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675789#M14053</link>
      <description>&lt;P&gt;This capture might be more pertinent since we're dealing with a VPN:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Result of the command: "packet-tracer input outside icmp 10.0.0.4 8 0 192.168.1.90"&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside_1,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside_1&lt;BR /&gt;Untranslate 192.168.1.90/0 to 192.168.1.90/0&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit icmp any4 any4 &lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside_1,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.0.0.4/0 to 10.0.0.4/0&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit icmp any4 any4 &lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside_1&lt;BR /&gt;output-status: down&lt;BR /&gt;output-line-status: down&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 20:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675789#M14053</guid>
      <dc:creator>mark.bell</dc:creator>
      <dc:date>2018-07-26T20:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675795#M14054</link>
      <description>&lt;P&gt;I just realized that your inside packet tracer had the IP addresses reversed.. so your source was 10.x and dest was 192.x which would be why the routing looked incorrect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 20:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675795#M14054</guid>
      <dc:creator>Ben Walters</dc:creator>
      <dc:date>2018-07-26T20:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675800#M14056</link>
      <description>&lt;P&gt;I'm definitely not an expert on this equipment. What change would you suggest I make and&amp;nbsp;could you help me out with the command?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 20:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675800#M14056</guid>
      <dc:creator>mark.bell</dc:creator>
      <dc:date>2018-07-26T20:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675802#M14057</link>
      <description>&lt;P&gt;I'm having trouble pinging 192.168.1.90 from 10.0.0.4. Not the other way around. I can ping 10.0.0.4 from 192.168.1.90 all day long. The 10.0.0.4 is an Azure VM. The 192.168.1.90 is my on-prem machine.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 20:49:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675802#M14057</guid>
      <dc:creator>mark.bell</dc:creator>
      <dc:date>2018-07-26T20:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675809#M14059</link>
      <description>&lt;P&gt;Result of the command: "packet-tracer input inside_6 icmp 192.168.1.90 0 0 10.0.0.4"&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside_6,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside&lt;BR /&gt;Untranslate 10.0.0.4/0 to 10.0.0.4/0&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_6_access_in in interface inside_6&lt;BR /&gt;access-list inside_6_access_in extended permit ip any any &lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside_6,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.1.90/0 to 192.168.1.90/0&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.1.90/0 to 192.168.1.90/0&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp &lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 13&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 14&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 15&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp &lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 16&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 17&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 18&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 19&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside_6,outside) source static onprem-networks onprem-networks destination static azure-networks azure-networks&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 20&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 911015, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside_6&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This shows the ping is working from 192.168.1.90 to 10.0.0.4, correct?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 20:54:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675809#M14059</guid>
      <dc:creator>mark.bell</dc:creator>
      <dc:date>2018-07-26T20:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675811#M14060</link>
      <description>&lt;P&gt;At the end of each NAT, please add the following keywords: &lt;STRONG&gt;no-proxy-arp route-lookup&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jul 2018 20:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675811#M14060</guid>
      <dc:creator>Sergio Ceron Ramirez</dc:creator>
      <dc:date>2018-07-26T20:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675813#M14064</link>
      <description>just the static ones towards Azure.</description>
      <pubDate>Thu, 26 Jul 2018 20:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675813#M14064</guid>
      <dc:creator>Sergio Ceron Ramirez</dc:creator>
      <dc:date>2018-07-26T20:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675831#M14068</link>
      <description>Thank you. Can you explain why it worked?</description>
      <pubDate>Thu, 26 Jul 2018 21:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675831#M14068</guid>
      <dc:creator>mark.bell</dc:creator>
      <dc:date>2018-07-26T21:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: Can't figure out why I can't ping from Azure VM to on-prem network (all other traffic flows and can ping from on-prem to VMs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675950#M14071</link>
      <description>In your scenario, I think that the no-proxy-arp command made the job, since your routing table is very simple, composed of a default route and directly connected networks. NAT commands override the routing table by default; and the use of 'route-lookup' will look directly into the routing table entries for the best match when using wide open ranges on the mapped objects. In this scenario, one way or the other the traffic will be routed through the proper 'outside' interface.&lt;BR /&gt;&lt;BR /&gt;Normally for identity NAT, proxy ARP is not required, and in some cases can cause connectivity issues. For example, if you configure a broad identity NAT rule for "any" IP address, then leaving proxy ARP enabled can cause problems for hosts on the network directly-connected to the mapped interface. In this case, when a host on the mapped network wants to communicate with another host on the same network, then the address in the ARP request matches the NAT rule (which matches "any" address). The ASA will then proxy ARP for the address, even though the packet is not actually destined for the ASA. (Note that this problem occurs even if you have a twice NAT rule; although the NAT rule must match both the source and destination addresses, the proxy ARP decision is made only on the "source" address). If the ASA ARP response is received before the actual host ARP response, then traffic will be mistakenly sent to the ASA.&lt;BR /&gt;&lt;BR /&gt;Let me know if this clarifies why it worked.</description>
      <pubDate>Fri, 27 Jul 2018 02:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-figure-out-why-i-can-t-ping-from-azure-vm-to-on-prem/m-p/3675950#M14071</guid>
      <dc:creator>Sergio Ceron Ramirez</dc:creator>
      <dc:date>2018-07-27T02:43:30Z</dc:date>
    </item>
  </channel>
</rss>

