<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I've been away for a little in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923016#M155257</link>
    <description>&lt;P&gt;I've been away for a little bit. &amp;nbsp;Are you still needing this resolved? &amp;nbsp;If so, can you attach a copy of your current config so I can see the state of the NAT at the moment.&lt;/P&gt;</description>
    <pubDate>Sun, 03 Apr 2016 20:27:12 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2016-04-03T20:27:12Z</dc:date>
    <item>
      <title>new ASA setup - cannot ping subinterface from VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923009#M155250</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am setting up a ASA in a new environment - well actually building out a new Datacenter for us to store our servers and equipment in.&lt;/P&gt;
&lt;P&gt;So far I have been running into issues and have been able to resolve (like setting up a NAT for internet traffic) for the most part..&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Wanted redundant connections to our HP 3800s which are connected to the Data Centers HSRP core, so setup Redundant Outside and Inside Interfaces on the ASA utilizing 2 ports for Outside, and 2 ports for Inside (connected to separate HP 3800 switches) (VLAN'd the Outside and WAN connection to 1000).. Setup Site to Site VPN and verified Ping and connectivity is fine. I can ping from our 192.168.4.x network to the Datacenter network of 10.100.1.x. I can access the ASDM from our office, telnet into the ASDM, telnet into the switches.. This all works great... Tested the Redundant function and it worked as expected when I unplugged either port.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now the issue I have and did some extensive reading on but cant figure it out is I have created a subinterface with a VLAN ID of 80 on the Inside interface, This will be intended to be used for phone server, so I wanted to VLAN and place it in a different subnet so there is no crossover however I still want to be able to route between the networks since I will have phones in other sites and will need connectivity to the 10.80 at the datacenter for the phone system.. I have enabled the two ticks "Enable Traffic between two or more interfaces w/ same security levels and the enable traffic between two or more hosts connected to same interface.. Both inside and "voice" interface are security level 100.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I cannot ping 10.80.1.1 (IP of the Subint), and I cannot ping 10.80.1.2 or 10.80.1.3 (IP's of the HP 3800's on that VLAN) from my office.&lt;/P&gt;
&lt;P&gt;Onsite, I have a laptop that I remote into for testing, I also cant ping 10.80.1.1,1.2, or 1.3, it has a 10.100.1.x address.&lt;/P&gt;
&lt;P&gt;However when I am in that VLAN, I can ping between all the devices fine, but cant ping out to the internet or 10.100.1.x network. (I assume I need a NAT for internet bound traffic for that subint).. I also read about setting up a static NAT for each interface to each other to create a basic router on a stick setup but couldn't get that to work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:33:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923009#M155250</guid>
      <dc:creator>Kylejb007</dc:creator>
      <dc:date>2019-03-12T07:33:14Z</dc:date>
    </item>
    <item>
      <title>Could you show us your</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923010#M155251</link>
      <description>&lt;P&gt;Could you show us your redundant interface configuration, physical interface configuration, NAT configuration, and related access-lists, plus the VPN configuration - might be easier to just show us your whole configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2016 18:56:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923010#M155251</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-03-29T18:56:12Z</dc:date>
    </item>
    <item>
      <title>I modified external addresses</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923011#M155252</link>
      <description>&lt;P&gt;I modified external addresses and removed some of the fluff VPN info such as tunnel-group ipsec attributes and vpn crypto polices. Does this have enough info?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA Version 9.2(2)4&lt;BR /&gt;!&lt;BR /&gt;hostname Cisco5512&lt;BR /&gt;domain-name lst1.local&lt;BR /&gt;enable password cs7ZVZ21yUzYAPGe encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Redundant1&lt;BR /&gt; member-interface GigabitEthernet0/0&lt;BR /&gt; member-interface GigabitEthernet0/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 136.179.XX.XX 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Redundant2&lt;BR /&gt; member-interface GigabitEthernet0/2&lt;BR /&gt; member-interface GigabitEthernet0/3&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.100.1.1 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface Redundant2.80&lt;BR /&gt; vlan 80&lt;BR /&gt; nameif Voice&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.80.1.1 255.255.0.0&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name lst1.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside-subnet&lt;BR /&gt; subnet 10.100.0.0 255.255.0.0&lt;BR /&gt;object network LV-192.168.4.x&lt;BR /&gt; subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network RNV-192.168.1.x&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network SNA-192.168.2.x&lt;BR /&gt; subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network LV-10.170.1.x&lt;BR /&gt; subnet 10.170.1.0 255.255.255.0&lt;BR /&gt;object network RNV-10.172.1.x&lt;BR /&gt; subnet 10.172.1.0 255.255.255.0&lt;BR /&gt;object network SNA-10.171.1.x&lt;BR /&gt; subnet 10.171.1.0 255.255.255.0&lt;BR /&gt;object network LOA-10.173.1.0&lt;BR /&gt; subnet 10.173.1.0 255.255.255.0&lt;BR /&gt;object network LOA-192.168.0.x&lt;BR /&gt; subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;object network SAC-10.175.1.x&lt;BR /&gt; subnet 10.175.1.0 255.255.255.0&lt;BR /&gt;object network SAC-192.168.7.x&lt;BR /&gt; subnet 192.168.7.0 255.255.255.0&lt;BR /&gt;object network SD-10.176.1.x&lt;BR /&gt; subnet 10.176.1.0 255.255.255.0&lt;BR /&gt;object network SD-192.168.8.x&lt;BR /&gt; subnet 192.168.8.0 255.255.255.0&lt;BR /&gt;object network SLC-10.179.1.x&lt;BR /&gt; subnet 10.179.1.0 255.255.255.0&lt;BR /&gt;object network SLC-192.168.11.x&lt;BR /&gt; subnet 192.168.11.0 255.255.255.0&lt;BR /&gt;object network zspam_69.94.157.114&lt;BR /&gt; host 69.94.157.114&lt;BR /&gt;object network Las-ITKB-01M&lt;BR /&gt; host 10.100.1.5&lt;BR /&gt;object network Voice&lt;BR /&gt; subnet 10.80.0.0 255.255.0.0&lt;BR /&gt;object network voice-network&lt;BR /&gt; subnet 10.80.0.0 255.255.0.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object object LV-192.168.4.x&lt;BR /&gt; network-object object LV-10.170.1.x&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object 10.100.0.0 255.255.0.0&lt;BR /&gt; network-object object voice-network&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt; network-object 10.100.0.0 255.255.0.0&lt;BR /&gt; network-object object voice-network&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt; network-object 10.100.0.0 255.255.0.0&lt;BR /&gt; network-object object voice-network&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt; network-object object RNV-10.172.1.x&lt;BR /&gt; network-object object RNV-192.168.1.x&lt;BR /&gt;object-group network DM_INLINE_NETWORK_7&lt;BR /&gt; network-object object SNA-10.171.1.x&lt;BR /&gt; network-object object SNA-192.168.2.x&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt; network-object 10.100.0.0 255.255.0.0&lt;BR /&gt; network-object object voice-network&lt;BR /&gt;object-group network DM_INLINE_NETWORK_8&lt;BR /&gt; network-object object SLC-10.179.1.x&lt;BR /&gt; network-object object SLC-192.168.11.x&lt;BR /&gt;object-group network DM_INLINE_NETWORK_10&lt;BR /&gt; network-object object SD-10.176.1.x&lt;BR /&gt; network-object object SD-192.168.8.x&lt;BR /&gt;object-group network DM_INLINE_NETWORK_9&lt;BR /&gt; network-object 10.100.0.0 255.255.0.0&lt;BR /&gt; network-object object voice-network&lt;BR /&gt;object-group network DM_INLINE_NETWORK_11&lt;BR /&gt; network-object 10.100.0.0 255.255.0.0&lt;BR /&gt; network-object object voice-network&lt;BR /&gt;object-group network DM_INLINE_NETWORK_12&lt;BR /&gt; network-object object SAC-10.175.1.x&lt;BR /&gt; network-object object SAC-192.168.7.x&lt;BR /&gt;object-group network DM_INLINE_NETWORK_13&lt;BR /&gt; network-object 10.100.0.0 255.255.0.0&lt;BR /&gt; network-object object voice-network&lt;BR /&gt;object-group network DM_INLINE_NETWORK_14&lt;BR /&gt; network-object object LOA-10.173.1.0&lt;BR /&gt; network-object object LOA-192.168.0.x&lt;/P&gt;
&lt;P&gt;access-list outside_cryptomap extended permit ip object-group DM_INLINE_NETWORK_2 object-group DM_INLINE_NETWORK_1&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_NETWORK_7&lt;BR /&gt;access-list outside_cryptomap_2 extended permit ip object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_NETWORK_6&lt;BR /&gt;access-list outside_cryptomap_3 extended permit ip object-group DM_INLINE_NETWORK_5 object-group DM_INLINE_NETWORK_8&lt;BR /&gt;access-list outside_cryptomap_4 extended permit ip object-group DM_INLINE_NETWORK_9 object-group DM_INLINE_NETWORK_10&lt;BR /&gt;access-list outside_cryptomap_5 extended permit ip object-group DM_INLINE_NETWORK_11 object-group DM_INLINE_NETWORK_12&lt;BR /&gt;access-list outside_cryptomap_6 extended permit ip object-group DM_INLINE_NETWORK_13 object-group DM_INLINE_NETWORK_14&lt;BR /&gt;access-list outside_access_in extended deny tcp object-group Known_Spam_Hosts any eq smtp&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any object-group http_servers eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group https_servers eq https&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group smtp_servers eq smtp&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group ssh_servers eq ssh&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group rdp_servers eq 3389&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any object LVQuagmire object-group RB_Java_Ports&lt;BR /&gt;access-list outside_access_in extended permit tcp any object LVBrian object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any object Las-Barracuda eq domain&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Lassftp object-group DM_INLINE_TCP_2&lt;BR /&gt;access-list outside_access_in extended permit tcp any object LVChris object-group DM_INLINE_TCP_3&lt;/P&gt;
&lt;P&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu Voice 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit 192.168.4.0 255.255.255.0 inside&lt;BR /&gt;icmp permit any Voice&lt;BR /&gt;icmp permit 192.168.4.0 255.255.255.0 Voice&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_2 DM_INLINE_NETWORK_2 destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_4 DM_INLINE_NETWORK_4 destination static DM_INLINE_NETWORK_6 DM_INLINE_NETWORK_6 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_3 destination static DM_INLINE_NETWORK_7 DM_INLINE_NETWORK_7 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_5 DM_INLINE_NETWORK_5 destination static DM_INLINE_NETWORK_8 DM_INLINE_NETWORK_8 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_9 DM_INLINE_NETWORK_9 destination static DM_INLINE_NETWORK_10 DM_INLINE_NETWORK_10 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_11 DM_INLINE_NETWORK_11 destination static DM_INLINE_NETWORK_12 DM_INLINE_NETWORK_12 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_13 DM_INLINE_NETWORK_13 destination static DM_INLINE_NETWORK_14 DM_INLINE_NETWORK_14 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network inside-subnet&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network Las-ITKB-01M&lt;BR /&gt; nat (any,any) static 136.179.XX.XX net-to-net&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 136.179.XX.XX 1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer 207.8.&lt;SPAN&gt;XX&lt;/SPAN&gt;.&lt;SPAN&gt;XX&lt;/SPAN&gt;&lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 2 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 2 set peer 66.155.&lt;SPAN&gt;XX&lt;/SPAN&gt;.&lt;SPAN&gt;XX&lt;/SPAN&gt;&lt;BR /&gt;crypto map outside_map 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 2 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map 3 match address outside_cryptomap_2&lt;BR /&gt;crypto map outside_map 3 set peer 40.132.&lt;SPAN&gt;XX&lt;/SPAN&gt;.&lt;SPAN&gt;XX&lt;/SPAN&gt;&lt;BR /&gt;crypto map outside_map 3 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 3 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map 4 match address outside_cryptomap_3&lt;BR /&gt;crypto map outside_map 4 set peer 63.253.&lt;SPAN&gt;XX&lt;/SPAN&gt;.&lt;SPAN&gt;XX&lt;/SPAN&gt;&lt;BR /&gt;crypto map outside_map 4 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 4 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map 5 match address outside_cryptomap_4&lt;BR /&gt;crypto map outside_map 5 set peer 63.139.&lt;SPAN&gt;XX&lt;/SPAN&gt;.&lt;SPAN&gt;XX&lt;/SPAN&gt;&lt;BR /&gt;crypto map outside_map 5 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 5 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map 6 match address outside_cryptomap_5&lt;BR /&gt;crypto map outside_map 6 set peer 40.139.XX.XX&lt;BR /&gt;crypto map outside_map 6 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 6 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map 7 match address outside_cryptomap_6&lt;BR /&gt;crypto map outside_map 7 set peer 74.8.XX.XX&lt;BR /&gt;crypto map outside_map 7 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 7 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt; no validation-usage&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect dns&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect icmp error&lt;BR /&gt; class class-default&lt;BR /&gt; user-statistics accounting&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2016 19:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923011#M155252</guid>
      <dc:creator>Kylejb007</dc:creator>
      <dc:date>2016-03-29T19:37:02Z</dc:date>
    </item>
    <item>
      <title>Your redundant interface</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923012#M155253</link>
      <description>&lt;P&gt;Your redundant interface configuration is correct. &amp;nbsp;Have you configured the switch ports that Redundant2 plugs into as trunk ports, and to present VLAN80 as a tagged VLAN?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From the firewall, can you ping anything in the&amp;nbsp;&lt;SPAN&gt;10.80.x.x network?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It's quite hard reading your config as you have used so many inline objects with names that have no meaning, and include similar references to many things.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2016 19:47:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923012#M155253</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-03-29T19:47:41Z</dc:date>
    </item>
    <item>
      <title>I assume the DM_INLINE</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923013#M155254</link>
      <description>&lt;P&gt;I assume the DM_INLINE_NETWORK was created that way via the VPN Site-to-Site Wizard. I wouldn't have named them that but that must be the way the ASA decided to call them. If I go to the NAT Rules Screen, those are basically what those are but no place for a name.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The HP 3800s - Where the ASA plugs in on our "inside" interface, they are configured as Untagged 1 (default vlan) and tagged 80.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The ASA can ping from the "Voice" Interface (Vlan 80), can ping both Switches in VLAN 80.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2016 20:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923013#M155254</guid>
      <dc:creator>Kylejb007</dc:creator>
      <dc:date>2016-03-29T20:20:22Z</dc:date>
    </item>
    <item>
      <title>I made a little progress</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923014#M155255</link>
      <description>&lt;P&gt;I made a little progress based on reading something else -&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Essentially I created a Static nat for Voice to Inside - Original source, Original destination and it created the reverse nat for inside to voice - original source, original destination. This allows the traffic to passthru the inside int to the sub int.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;With this in place, my Computer located at the datacenter on the 10.100.1.x network can now successfully ping 10.80.1.2 and 10.80.1.3 (both of the Switches IP addresses on the voice vlan).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I still cant ping from my office located at 192.168.4.x to any 10.80 addresses, and the PC located at the Datacenter cannot ping the ASA's subint IP of 10.80.1.1. (policy rule?)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;edit:&lt;/P&gt;
&lt;P&gt;The ASA log shows this when I try to run a ping from my office to 10.80.1.2&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;4&lt;/TD&gt;
&lt;TD&gt;Mar 29 2016&lt;/TD&gt;
&lt;TD&gt;14:59:26&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;Denied ICMP type=0, from laddr 10.80.1.2 on interface inside to 192.168.4.145: no matching session&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Tue, 29 Mar 2016 22:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923014#M155255</guid>
      <dc:creator>Kylejb007</dc:creator>
      <dc:date>2016-03-29T22:00:50Z</dc:date>
    </item>
    <item>
      <title>Anyone else chime in?</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923015#M155256</link>
      <description>&lt;P&gt;Anyone else chime in?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;On the my office side of the&amp;nbsp;VPN (192.168.4.x), I cannot ping anything in the voice network (10.80.x).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However when I was onsite yesterday, from the 10.80.X network, I can ping to 192.168.4.x and get a reply.&lt;/P&gt;
&lt;P&gt;Second, Onsite from the 10.100.x network, I can ping the 10.80.X network, but I tried to telnet into the switch's 10.80.x IP and the connection failed.&lt;/P&gt;
&lt;P&gt;Third - How can I NAT my Voice Interface to use the same public IP as the ASA and Internal 10.100.x ??&lt;/P&gt;
&lt;P&gt;Thanks for any assistance.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 16:18:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923015#M155256</guid>
      <dc:creator>Kylejb007</dc:creator>
      <dc:date>2016-04-01T16:18:41Z</dc:date>
    </item>
    <item>
      <title>I've been away for a little</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923016#M155257</link>
      <description>&lt;P&gt;I've been away for a little bit. &amp;nbsp;Are you still needing this resolved? &amp;nbsp;If so, can you attach a copy of your current config so I can see the state of the NAT at the moment.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Apr 2016 20:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923016#M155257</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-04-03T20:27:12Z</dc:date>
    </item>
    <item>
      <title>I updated the ticket on</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923017#M155258</link>
      <description>&lt;P&gt;I updated the ticket on Friday with the latest news but here is the updated show nat:&lt;/P&gt;
&lt;P&gt;Keep in mind the DM_INLINE_NETWORK objects are the VPN site's&amp;nbsp;created thru the Wizard. Here is the notes from the latest issues:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1) On the my office side of the&amp;nbsp;VPN (192.168.4.x), I cannot ping anything in the voice network (10.80.x).&lt;/P&gt;
&lt;P&gt;However when I was onsite Thursday, from the 10.80.X network, I can ping to 192.168.4.x and get a reply.&lt;/P&gt;
&lt;P&gt;2)&amp;nbsp;Onsite from the 10.100.x network, I can ping the 10.80.X network, but I tried to telnet into the switch's 10.80.x IP and the connection failed.&lt;/P&gt;
&lt;P&gt;3)&amp;nbsp;How can I NAT my Voice Interface to use the same public IP as the ASA and Internal 10.100.x ?? or should I use a different public IP? (problem is from what I saw was the ASA couldnt use the same peer IP on the other side even though the source interfaces on this side were different).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (Voice) to (inside) source static Voice-network Voice-network destination st atic inside-subnet inside-subnet&lt;BR /&gt; translate_hits = 21, untranslate_hits = 71&lt;BR /&gt;2 (inside) to (outside) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static DM_INLINE_NETWORK_2 DM_INLINE_NETWORK_2 no-proxy-arp route-lo okup&lt;BR /&gt; translate_hits = 7067, untranslate_hits = 7135&lt;BR /&gt;3 (inside) to (outside) source static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_3 destination static DM_INLINE_NETWORK_4 DM_INLINE_NETWORK_4 no-proxy-arp route-lo okup&lt;BR /&gt; translate_hits = 859, untranslate_hits = 859&lt;BR /&gt;4 (inside) to (outside) source static DM_INLINE_NETWORK_5 DM_INLINE_NETWORK_5 destination static DM_INLINE_NETWORK_6 DM_INLINE_NETWORK_6 no-proxy-arp route-lo okup&lt;BR /&gt; translate_hits = 1127, untranslate_hits = 1128&lt;BR /&gt;5 (inside) to (outside) source static DM_INLINE_NETWORK_7 DM_INLINE_NETWORK_7 destination static DM_INLINE_NETWORK_8 DM_INLINE_NETWORK_8 no-proxy-arp route-lo okup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;6 (inside) to (outside) source static DM_INLINE_NETWORK_9 DM_INLINE_NETWORK_9 destination static DM_INLINE_NETWORK_10 DM_INLINE_NETWORK_10 no-proxy-arp route- lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;7 (inside) to (outside) source static DM_INLINE_NETWORK_11 DM_INLINE_NETWORK_11 destination static DM_INLINE_NETWORK_12 DM_INLINE_NETWORK_12 no-proxy-arp rout e-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;8 (inside) to (outside) source static DM_INLINE_NETWORK_13 DM_INLINE_NETWORK_13 destination static DM_INLINE_NETWORK_14 DM_INLINE_NETWORK_14 no-proxy-arp rout e-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (any) to (any) source static Las-ITKB-01M 136.179.XXX.XXX net-to-net&lt;BR /&gt; translate_hits = 3446, untranslate_hits = 5887&lt;BR /&gt;2 (inside) to (outside) source dynamic inside-subnet interface&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2016 17:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923017#M155258</guid>
      <dc:creator>Kylejb007</dc:creator>
      <dc:date>2016-04-04T17:47:24Z</dc:date>
    </item>
    <item>
      <title>I'm going to propose</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923018#M155259</link>
      <description>&lt;P&gt;I'm going to propose something radical. &amp;nbsp;Wipe your whole NAT configuration, because it is so hard to understand. &amp;nbsp;Also, lets change to using object NAT to make things easier to understand.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;First lets establish a PAT translation for internal networks going to the Internet.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network voice-network&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object network&amp;nbsp;inside-subnet&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;/PRE&gt;
&lt;P&gt;Note how these only apply for traffic going to the outside interface. &amp;nbsp;This means there will be no NAT between the internal networks automatically.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now we need a NAT exclusion for VPN traffic.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;nat (outside,any) source static voice-network voice-network&amp;nbsp;destination static obj-LV-192.168.4.x LV-192.168.4.x no-proxy-arp route-lookup&lt;BR /&gt;&lt;BR /&gt;nat (outside,any) source static inside-subnet inside-subnet&amp;nbsp;destination static obj-LV-192.168.4.x LV-192.168.4.x no-proxy-arp route-lookup&lt;/PRE&gt;
&lt;P&gt;Add more NAT exclusions for any extra VPNs you might have,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2016 19:09:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923018#M155259</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-04-04T19:09:11Z</dc:date>
    </item>
    <item>
      <title>I apologize for delay -</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923019#M155260</link>
      <description>&lt;P&gt;I apologize for delay - sometimes its a challenge to get away from the office to go onsite to test.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So I followed your instructions, removed all the NATs... I created a PAT for inside-subnet and Voice-network. I verified both subnets can ping to the internet now and ping each other.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I created individual NATs for Voice and Inside to each VPN site... I cant ping or connect to anything now from either Voice or Inside to the VPN site... I did find if I go to the Site to Site VPN and click NAT Exempt, I can connect&amp;nbsp;from 10.100 to 192.168.4.x, but when I connect from 10.80.x, I cant ping 192.168.4.x. I assume we dont want to do a NAT Exemption though?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Cisco5512(config)# show NAT&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (outside) to (any) source static inside-subnet inside-subnet destination static LV-192.168.4.x LV-192.168.4.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (outside) to (any) source static Voice-network Voice-network destination static LV-192.168.4.x LV-192.168.4.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;3 (outside) to (any) source static Voice-network Voice-network destination static LV-10.170.1.x LV-10.170.1.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;4 (outside) to (any) source static inside-subnet inside-subnet destination static LV-10.170.1.x LV-10.170.1.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;5 (outside) to (any) source static Voice-network Voice-network destination static SNA-10.171.1.x SNA-10.171.1.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;6 (outside) to (any) source static inside-subnet inside-subnet destination static SNA-192.168.2.x SNA-192.168.2.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;7 (outside) to (any) source static Voice-network Voice-network destination static RNV-10.172.1.x RNV-10.172.1.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;8 (outside) to (any) source static inside-subnet inside-subnet destination static RNV-192.168.1.x RNV-192.168.1.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;9 (outside) to (any) source static Voice-network Voice-network destination static SLC-10.179.1.x SLC-10.179.1.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;10 (outside) to (any) source static inside-subnet inside-subnet destination static SLC-192.168.11.x SLC-192.168.11.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;11 (outside) to (any) source static Voice-network Voice-network destination static SD-10.176.1.x SD-10.176.1.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;12 (outside) to (any) source static inside-subnet inside-subnet destination static SD-192.168.8.x SD-192.168.8.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;13 (outside) to (any) source static Voice-network Voice-network destination static SAC-10.175.1.x SAC-10.175.1.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;14 (outside) to (any) source static inside-subnet inside-subnet destination static SAC-192.168.7.x SAC-192.168.7.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;15 (inside) to (outside) source static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_3 destination static DM_INLINE_NETWORK_4 DM_INLINE_NETWORK_4 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 21, untranslate_hits = 21&lt;BR /&gt;16 (inside) to (outside) source static DM_INLINE_NETWORK_5 DM_INLINE_NETWORK_5 destination static DM_INLINE_NETWORK_6 DM_INLINE_NETWORK_6 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 4, untranslate_hits = 4&lt;BR /&gt;17 (inside) to (outside) source static DM_INLINE_NETWORK_7 DM_INLINE_NETWORK_7 destination static DM_INLINE_NETWORK_8 DM_INLINE_NETWORK_8 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 11, untranslate_hits = 11&lt;BR /&gt;18 (inside) to (outside) source static DM_INLINE_NETWORK_9 DM_INLINE_NETWORK_9 destination static DM_INLINE_NETWORK_10 DM_INLINE_NETWORK_10 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 3, untranslate_hits = 3&lt;BR /&gt;19 (inside) to (outside) source static DM_INLINE_NETWORK_11 DM_INLINE_NETWORK_11 destination static DM_INLINE_NETWORK_12 DM_INLINE_NETWORK_12 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 4, untranslate_hits = 4&lt;BR /&gt;20 (inside) to (outside) source static DM_INLINE_NETWORK_13 DM_INLINE_NETWORK_13 destination static DM_INLINE_NETWORK_14 DM_INLINE_NETWORK_14 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 94, untranslate_hits = 94&lt;BR /&gt;21 (outside) to (any) source static Voice-network Voice-network destination static LOA-10.173.1.0 LOA-10.173.1.0 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;22 (outside) to (any) source static inside-subnet inside-subnet destination static LOA-192.168.0.x LOA-192.168.0.x no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;23 (inside) to (outside) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static DM_INLINE_NETWORK_2 DM_INLINE_NETWORK_2 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 16, untranslate_hits = 16&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (any) to (outside) source dynamic Voice-network interface&lt;BR /&gt; translate_hits = 427, untranslate_hits = 1&lt;BR /&gt;2 (any) to (outside) source dynamic inside-subnet interface&lt;BR /&gt; translate_hits = 585, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It looks like the DM_INLINE network appear when NAT Exempt is enabled in the Site to Site screen.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 03:38:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-setup-cannot-ping-subinterface-from-vpn-tunnel/m-p/2923019#M155260</guid>
      <dc:creator>Kylejb007</dc:creator>
      <dc:date>2016-04-12T03:38:16Z</dc:date>
    </item>
  </channel>
</rss>

