<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic So Vlan1 is used for IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901672#M161671</link>
    <description>&lt;P&gt;So Vlan1 is used for IP-address on Eth0/1.&lt;/P&gt;
&lt;P&gt;Based on your configuration its like this:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface Vlan1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 192.168.245 255.255.255.128 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How are you able to ping the ASA on this subnet from a inside host without routing in-between? Is the switch a L3 device?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Jun 2016 09:33:43 GMT</pubDate>
    <dc:creator>Tim Schneider</dc:creator>
    <dc:date>2016-06-14T09:33:43Z</dc:date>
    <item>
      <title>Hosts can ping ASA interfaces but not each other</title>
      <link>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901666#M161664</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I'm facing a problem never faced before with our ASA5505. After putting it as a firewall everything worked pretty well. I have an Outside interface, an Inside one and a third which is a VoIP interface.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The only thing I stuck on is that my inside's hosts can't ping or see hosts that are on the VOIP interface and even hosts on the same interface. I checked NAT, ACLs and even when I do a Packet Trace with the ASA in ASDM there is no problem on ping, or protocols but in reality I can't ping any machine from Voip network to Inside and vice versa and machines on the same interface between them. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Here is a simplified schema&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;[[{"type":"media","fid":"1307231","view_mode":"default","link_text":null,"attributes":{"alt":"Network schema","title":"Network schema","height":"408","width":"856","class":"image-style-none media-element file-default"}}]]&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I'm joining my run-conf here, if it can help : &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;: Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;: Written by enable_company at 15:30:49.331 CEDT Thu Jun 2 2016&lt;BR /&gt;!&lt;BR /&gt;ASA Version 9.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname VEFW001-0&lt;BR /&gt;domain-name company.local&lt;BR /&gt;enable password Egk0d0h6qjOElLit encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool VPN-Admins 192.168.65-192.168.67 mask 255.255.255.240&lt;BR /&gt;ip local pool VPN-Users 192.168.68-192.168.70 mask 255.255.255.240&lt;BR /&gt;ip local pool VPN-Managers 192.168.71-192.168.78 mask 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; switchport access vlan 130&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 999&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.245 255.255.255.128 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 212.2xx.x.x 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan130&lt;BR /&gt; nameif voip&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.13.6 255.255.255.128 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan999&lt;BR /&gt; description LAN Failover Interface&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa924-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.252&lt;BR /&gt; domain-name company.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network VESR003&lt;BR /&gt; host 192.168.253&lt;BR /&gt;object service CTRL_995&lt;BR /&gt; service tcp source eq 995 destination eq 995 &lt;BR /&gt;object network VEVOIP001_HOTLINE&lt;BR /&gt; host 192.168.13.5&lt;BR /&gt;object service VPN_1194_UDP&lt;BR /&gt; service udp source eq 1194 destination eq 1194 &lt;BR /&gt;object network Video_ company&lt;BR /&gt; host 192.168.242&lt;BR /&gt;object service Video&lt;BR /&gt; service tcp destination eq 16847 &lt;BR /&gt;object network Brother_HL3040-CN&lt;BR /&gt; host 192.168.36&lt;BR /&gt;object service 9100_impression&lt;BR /&gt; service tcp source eq 9100 destination eq 9100 &lt;BR /&gt;object network VESR002&lt;BR /&gt; host 192.168.252&lt;BR /&gt;object network Poste_Ross_(VEPO004)&lt;BR /&gt; host 192.168.96&lt;BR /&gt;object service TSE&lt;BR /&gt; service tcp source eq 3389 destination eq 3389 &lt;BR /&gt;object service 444&lt;BR /&gt; service tcp source eq 444 destination eq https &lt;BR /&gt;object network VENAS001&lt;BR /&gt; host 192.168.248&lt;BR /&gt;object network VEVM001_VOODOO&lt;BR /&gt; host 192.168.210&lt;BR /&gt;object network VEVM002_FR&lt;BR /&gt; host 192.168.211&lt;BR /&gt;object network VEVM005_LACOSTE&lt;BR /&gt; host 192.168.212&lt;BR /&gt;object network VEVM004_Uniqlo&lt;BR /&gt; host 192.168.216&lt;BR /&gt;object network VEVM006_ZAPA&lt;BR /&gt; host 192.168.217&lt;BR /&gt;object network VEVM008_GANT&lt;BR /&gt; host 192.168.218&lt;BR /&gt;object network NETWORK_ADM_VPN&lt;BR /&gt; range 192.168.65 192.168.67&lt;BR /&gt; description VPN Admins IP Rang&lt;BR /&gt;object network VEVM_MOA&lt;BR /&gt; host 192.168.125&lt;BR /&gt;object network VM_GHOST&lt;BR /&gt; host 192.168.250&lt;BR /&gt;object network NETWORK_COLL_VPN&lt;BR /&gt; range 192.168.68 192.168.70&lt;BR /&gt;object network NETWORK_MNG_VPN&lt;BR /&gt; range 192.168.71 192.168.78&lt;BR /&gt;object network VEVM007&lt;BR /&gt; host 192.168.251&lt;BR /&gt;object network VENAS002&lt;BR /&gt; host 192.168.249&lt;BR /&gt;object network Internet&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object service SIP&lt;BR /&gt; service udp destination eq sip &lt;BR /&gt;object network VESR003NAT&lt;BR /&gt; subnet 212.234.15.0 255.255.255.240&lt;BR /&gt;object network Outside&lt;BR /&gt; host 212.234.15.1&lt;BR /&gt;object network NETWORK_OBJ_192.168.68_30&lt;BR /&gt; subnet 192.168.68 255.255.255.252&lt;BR /&gt;object-group network DM_INLINE_NETWORK_63&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt; service-object udp destination eq ntp &lt;BR /&gt; service-object udp destination eq www &lt;BR /&gt; service-object tcp destination eq 31615 &lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt; service-object udp destination eq 5004 &lt;BR /&gt; service-object tcp-udp destination eq sip &lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object object Poste_Ross_(VEPO004)&lt;BR /&gt; network-object object VEVOIP001_HOTLINE&lt;BR /&gt; network-object object VESR003&lt;BR /&gt; network-object object VESR002&lt;BR /&gt; network-object object Video_ company&lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp destination eq 3389 &lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_5&lt;BR /&gt; service-object tcp destination eq sip &lt;BR /&gt; service-object udp destination eq 3478 &lt;BR /&gt; service-object udp destination eq 3479 &lt;BR /&gt; service-object udp destination eq 5004 &lt;BR /&gt; service-object udp destination eq sip &lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp destination eq 9001 &lt;BR /&gt; service-object tcp destination eq www &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt; service-object udp destination range 10000 20000 &lt;BR /&gt; service-object udp destination eq 6970 &lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object object VESR002&lt;BR /&gt; network-object object VEVM001_VOODOO&lt;BR /&gt; network-object object VEVM002_FR&lt;BR /&gt; network-object object VEVM004_Uniqlo&lt;BR /&gt; network-object object VEVM005_LACOSTE&lt;BR /&gt; network-object object VEVM006_ZAPA&lt;BR /&gt; network-object object VEVM008_GANT&lt;BR /&gt; network-object object VEVM_MOA&lt;BR /&gt; network-object object VM_GHOST&lt;BR /&gt;object-group service DM_INLINE_SERVICE_7&lt;BR /&gt; service-object tcp destination eq sip &lt;BR /&gt; service-object udp destination eq sip &lt;BR /&gt;object-group network DM_INLINE_NETWORK_10&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt; network-object object VESR002&lt;BR /&gt; network-object object VEVM001_VOODOO&lt;BR /&gt; network-object object VEVM002_FR&lt;BR /&gt; network-object object VEVM004_Uniqlo&lt;BR /&gt; network-object object VEVM005_LACOSTE&lt;BR /&gt; network-object object VEVM006_ZAPA&lt;BR /&gt; network-object object VEVM008_GANT&lt;BR /&gt; network-object object VEVM_MOA&lt;BR /&gt; network-object object VM_GHOST&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq 444&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_25&lt;BR /&gt; network-object object Brother_HL3040-CN&lt;BR /&gt; network-object object Poste_Ross_(VEPO004)&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group service DM_INLINE_SERVICE_8&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp destination eq 9001 &lt;BR /&gt; service-object tcp destination eq www &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt; service-object tcp destination eq sip &lt;BR /&gt; service-object udp destination range 10000 20000 &lt;BR /&gt; service-object udp destination eq 3478 &lt;BR /&gt; service-object udp destination eq 3479 &lt;BR /&gt; service-object udp destination eq 5004 &lt;BR /&gt; service-object udp destination eq 6970 &lt;BR /&gt; service-object udp destination eq sip &lt;BR /&gt;object-group service DM_INLINE_SERVICE_11&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp destination eq 3389 &lt;BR /&gt;object-group network DM_INLINE_NETWORK_7&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_8&lt;BR /&gt; network-object object VENAS001&lt;BR /&gt; network-object object VENAS002&lt;BR /&gt;object-group service DM_INLINE_SERVICE_10&lt;BR /&gt; service-object tcp destination eq 445 &lt;BR /&gt; service-object udp destination range netbios-ns 139 &lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp destination eq netbios-ssn &lt;BR /&gt; service-object tcp destination eq www &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt; service-object tcp destination eq 5000 &lt;BR /&gt; service-object tcp destination eq 5001 &lt;BR /&gt; service-object tcp-udp destination eq domain &lt;BR /&gt;object-group network DM_INLINE_NETWORK_9&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object object Internet&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt; service-object tcp-udp destination eq domain &lt;BR /&gt; service-object tcp destination eq www &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt; service-object icmp &lt;BR /&gt;object-group network DM_INLINE_NETWORK_11&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_13&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_53&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group service DM_INLINE_SERVICE_12&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp-udp destination eq domain &lt;BR /&gt; service-object tcp destination eq www &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt;object-group service DM_INLINE_SERVICE_13&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp-udp destination eq domain &lt;BR /&gt; service-object tcp destination eq 445 &lt;BR /&gt; service-object tcp destination eq www &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt;object-group network DM_INLINE_NETWORK_12&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_21&lt;BR /&gt; network-object object Brother_HL3040-CN&lt;BR /&gt; network-object object Poste_Ross_(VEPO004)&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_14&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group service DM_INLINE_SERVICE_14&lt;BR /&gt; service-object tcp destination eq 5900 &lt;BR /&gt; service-object tcp destination eq ftp &lt;BR /&gt; service-object udp destination eq 5800 &lt;BR /&gt;object-group service DM_INLINE_UDP_1 udp&lt;BR /&gt; port-object eq 1194&lt;BR /&gt; port-object eq 1701&lt;BR /&gt; port-object eq 4500&lt;BR /&gt; port-object eq isakmp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_16&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object object Internet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_17&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object object Internet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_18&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object object Internet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_19&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object object Internet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_20&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object object Internet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_22&lt;BR /&gt; network-object object Brother_HL3040-CN&lt;BR /&gt; network-object object Poste_Ross_(VEPO004)&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_23&lt;BR /&gt; network-object object Brother_HL3040-CN&lt;BR /&gt; network-object object Poste_Ross_(VEPO004)&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_24&lt;BR /&gt; network-object object Brother_HL3040-CN&lt;BR /&gt; network-object object Poste_Ross_(VEPO004)&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_26&lt;BR /&gt; network-object object Brother_HL3040-CN&lt;BR /&gt; network-object object Poste_Ross_(VEPO004)&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_27&lt;BR /&gt; network-object object Brother_HL3040-CN&lt;BR /&gt; network-object object Poste_Ross_(VEPO004)&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group service DM_INLINE_SERVICE_16&lt;BR /&gt; service-object tcp destination eq pcanywhere-data &lt;BR /&gt; service-object udp destination eq pcanywhere-status &lt;BR /&gt;object-group service DM_INLINE_SERVICE_17&lt;BR /&gt; service-object object TSE &lt;BR /&gt; service-object tcp destination eq 9100 &lt;BR /&gt; service-object tcp destination eq ssh &lt;BR /&gt; service-object tcp destination eq telnet &lt;BR /&gt;object-group network DM_INLINE_NETWORK_29&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_31&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object object Internet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_47&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_48&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_55&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_56&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_57&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object object Internet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_58&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object object Internet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_59&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object object Internet&lt;BR /&gt;object-group service DM_INLINE_SERVICE_6&lt;BR /&gt; service-object tcp destination eq sip &lt;BR /&gt; service-object udp destination eq sip &lt;BR /&gt; service-object icmp &lt;BR /&gt;object-group service DM_INLINE_SERVICE_9&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp destination eq ssh &lt;BR /&gt;object-group network DM_INLINE_NETWORK_38&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object 0.0.0.0 0.0.0.0&lt;BR /&gt; network-object 192.168.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_43&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group network DM_INLINE_NETWORK_61&lt;BR /&gt; network-object 212.234.15.0 255.255.255.240&lt;BR /&gt; network-object object Internet&lt;BR /&gt; network-object 192.168.13.0 255.255.255.128&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt;object-group service DM_INLINE_SERVICE_15&lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp destination eq netbios-ssn &lt;BR /&gt;object-group network DM_INLINE_NETWORK_30&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_62&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_64&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_65&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_66&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_67&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_68&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_69&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_70&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_71&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_72&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_36&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_60&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_73&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_74&lt;BR /&gt; network-object object NETWORK_ADM_VPN&lt;BR /&gt; network-object object NETWORK_COLL_VPN&lt;BR /&gt; network-object object NETWORK_MNG_VPN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_75&lt;BR /&gt; network-object 192.168.128 255.255.255.128&lt;BR /&gt; network-object object Internet&lt;BR /&gt;access-list company_192.168.0_IN extended permit ip object VESR003 192.168.13.0 255.255.255.128 &lt;BR /&gt;access-list company_192.168.0_IN extended permit object-group DM_INLINE_SERVICE_2 192.168.128 255.255.255.128 object Internet &lt;BR /&gt;access-list company_192.168.0_IN extended permit tcp object VESR003 object Internet eq 587 &lt;BR /&gt;access-list company_192.168.0_IN extended permit udp 192.168.128 255.255.255.128 object Internet object-group DM_INLINE_UDP_1 &lt;BR /&gt;access-list company_192.168.0_IN extended permit object-group DM_INLINE_SERVICE_16 192.168.128 255.255.255.128 object Internet &lt;BR /&gt;access-list company_192.168.0_IN extended permit object-group DM_INLINE_SERVICE_17 192.168.128 255.255.255.128 object Internet &lt;BR /&gt;access-list company_192.168.0_IN extended permit object-group DM_INLINE_SERVICE_14 192.168.128 255.255.255.128 object Internet &lt;BR /&gt;access-list company_192.168.0_IN extended permit ip 192.168.128 255.255.255.128 192.168.13.0 255.255.255.128 &lt;BR /&gt;access-list company_192.168.0_IN extended permit ip 192.168.128 255.255.255.128 192.168.128 255.255.255.128 &lt;BR /&gt;access-list company_192.168.0_IN remark Monitoring ACL&lt;BR /&gt;access-list company_192.168.0_IN remark Monitoring ACL&lt;BR /&gt;access-list company_192.168.0_IN remark Monitoring ACL&lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_48 eq 1701 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_47 eq 123 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit icmp object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_10 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit object-group TCPUDP object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_53 eq domain &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit object-group DM_INLINE_SERVICE_3 object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_11 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_56 eq ssh &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_55 eq telnet &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_59 eq ftp &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_31 eq www &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_57 eq https &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit icmp object NETWORK_ADM_VPN object-group DM_INLINE_NETWORK_58 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 3389 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 445 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 444 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 500 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 587 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 5800 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 5001 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 5000 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 8080 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 5900 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq https &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq www &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq netbios-ssn &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq ftp &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit udp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 range 3478 3479 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit udp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 range netbios-ns 139 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit tcp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq pop3 &lt;BR /&gt;access-list VPN_ADMINS_RULES extended permit udp object NETWORK_ADM_VPN 192.168.128 255.255.255.128 eq 1194 &lt;BR /&gt;access-list voip_access_in extended permit ip 192.168.13.0 255.255.255.128 object Internet &lt;BR /&gt;access-list voip_access_in extended permit ip 192.168.13.0 255.255.255.128 192.168.13.0 255.255.255.128 &lt;BR /&gt;access-list voip_access_in extended permit ip 192.168.13.0 255.255.255.128 object VESR003 &lt;BR /&gt;access-list voip_access_in extended permit ip object VEVOIP001_HOTLINE object Internet &lt;BR /&gt;access-list VPN_COLLABORATORS_Rules extended permit object-group DM_INLINE_SERVICE_6 object NETWORK_COLL_VPN object VEVOIP001_HOTLINE &lt;BR /&gt;access-list VPN_COLLABORATORS_Rules extended permit object-group DM_INLINE_SERVICE_11 object NETWORK_COLL_VPN object-group DM_INLINE_NETWORK_4 &lt;BR /&gt;access-list VPN_COLLABORATORS_Rules extended permit object-group DM_INLINE_SERVICE_10 object NETWORK_COLL_VPN object-group DM_INLINE_NETWORK_8 &lt;BR /&gt;access-list VPN_COLLABORATORS_Rules extended permit object-group DM_INLINE_SERVICE_12 object NETWORK_COLL_VPN object Internet &lt;BR /&gt;access-list VPN_NOMATCH_RULE extended deny ip any any &lt;BR /&gt;access-list VPN_MANAGERS_Rules extended permit object-group DM_INLINE_SERVICE_15 object NETWORK_MNG_VPN object-group DM_INLINE_NETWORK_43 &lt;BR /&gt;access-list VPN_MANAGERS_Rules extended permit object-group DM_INLINE_SERVICE_7 object NETWORK_MNG_VPN object VEVOIP001_HOTLINE &lt;BR /&gt;access-list VPN_MANAGERS_Rules extended permit object-group DM_INLINE_SERVICE_4 object NETWORK_MNG_VPN object-group DM_INLINE_NETWORK_2 &lt;BR /&gt;access-list VPN_MANAGERS_Rules extended permit object-group DM_INLINE_SERVICE_9 object NETWORK_MNG_VPN object VEVM007 &lt;BR /&gt;access-list VPN_MANAGERS_Rules extended permit object-group DM_INLINE_SERVICE_13 object NETWORK_MNG_VPN object Internet &lt;BR /&gt;access-list VPN_MANAGERS_Rules extended permit tcp object NETWORK_COLL_VPN object VESR003 eq ssh &lt;BR /&gt;access-list ORANGE_212.234.15.0_IN extended permit tcp any object Video_ company eq 16847 &lt;BR /&gt;access-list ORANGE_212.234.15.0_IN extended permit tcp any object VESR003 object-group DM_INLINE_TCP_2 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging console notifications&lt;BR /&gt;logging monitor informational&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging history debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging facility 21&lt;BR /&gt;logging debug-trace&lt;BR /&gt;logging class webvpn trap informational &lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 111010&lt;BR /&gt;logging message 106101 level informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu voip 1500&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface failover Vlan999&lt;BR /&gt;failover key ve09je05$&lt;BR /&gt;failover mac address Vlan1 e25e.18e3.2912 e25e.18e3.2913&lt;BR /&gt;failover mac address Vlan130 803b.c02f.291e 803b.c02f.291f&lt;BR /&gt;failover interface ip failover 192.168.12.1 255.255.255.128 standby 192.168.12.2&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-752.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,voip) source static any any description NAT &amp;amp; Routing of traffic between VOIP &amp;lt;-&amp;gt; Inside&lt;BR /&gt;nat (outside,voip) source static any any destination static VEVOIP001_HOTLINE VEVOIP001_HOTLINE service VPN_1194_UDP VPN_1194_UDP unidirectional inactive description 1194 to 1194 UDP&lt;BR /&gt;nat (outside,inside) source static any any destination static Poste_Ross_(VEPO004) Poste_Ross_(VEPO004) service TSE TSE unidirectional inactive&lt;BR /&gt;nat (outside,inside) source static any any destination static VESR002 VESR002 service CTRL_995 CTRL_995 unidirectional inactive&lt;BR /&gt;nat (outside,voip) source static DM_INLINE_NETWORK_30 interface destination static VEVOIP001_HOTLINE VEVOIP001_HOTLINE service SIP SIP unidirectional description NAT VPN Traffic for Telephony&lt;BR /&gt;nat (outside,voip) source static DM_INLINE_NETWORK_73 interface unidirectional description Hairpin VPN Traffic for 192.168.13&lt;BR /&gt;nat (outside,inside) source static DM_INLINE_NETWORK_30 interface unidirectional description Hairpin VPN Traffic for 192.168.15&lt;BR /&gt;nat (outside,inside) source static DM_INLINE_NETWORK_60 DM_INLINE_NETWORK_60 unidirectional description Internet for VPN Traffic&lt;BR /&gt;nat (outside,inside) source static any any destination static interface VESR003 service 444 444 unidirectional&lt;BR /&gt;nat (outside,inside) source static any any destination static interface Video_ company service Video Video unidirectional&lt;BR /&gt;nat (any,outside) source dynamic any interface description Internet&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.68_30 NETWORK_OBJ_192.168.68_30 no-proxy-arp route-lookup&lt;BR /&gt;access-group company_192.168.0_IN in interface inside&lt;BR /&gt;access-group ORANGE_212.234.15.0_IN in interface outside&lt;BR /&gt;access-group voip_access_in in interface voip&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 212.234.15.14 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;ldap attribute-map CISCOMAP&lt;BR /&gt; map-name memberOf IETF-Radius-Class&lt;BR /&gt; map-value memberOf CN=VPN_ADMINS,CN=Users,DC= company,DC=local VPN_ADMINS&lt;BR /&gt; map-value memberOf CN=VPN_MANAGERS,CN=Users,DC=company,DC=local VPN_MANAGERS&lt;BR /&gt; map-value memberOf CN=VPN_USERS,CN=Users,DC= company,DC=local VPN_USERS&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt; description "No matching rules"&lt;BR /&gt; user-message "You don't match any company' security rules"&lt;BR /&gt; network-acl VPN_NOMATCH_RULE&lt;BR /&gt; action terminate&lt;BR /&gt; webvpn&lt;BR /&gt; url-list none&lt;BR /&gt;dynamic-access-policy-record VPN_COLLABORATORS_ANDROID&lt;BR /&gt; description "Dynamic Access Policy for Collaborators MOBILE"&lt;BR /&gt; user-message "**** WELCOME TO COLLABORATORS VPN NETWORK ****"&lt;BR /&gt; network-acl VPN_COLLABORATORS_Rules&lt;BR /&gt;dynamic-access-policy-record VPN_ADMINS_ANDROID&lt;BR /&gt; description "Dynamic Access Policy for Admins MOBILE"&lt;BR /&gt; user-message "**** WELCOME TO ADMINS VPN NETWORK ****"&lt;BR /&gt; network-acl VPN_ADMINS_RULES&lt;BR /&gt; priority 10&lt;BR /&gt;dynamic-access-policy-record VPN_MANAGERS_ANDROID&lt;BR /&gt; description "Dynamic Access Policy for Managers DESKTOP"&lt;BR /&gt; user-message "**** WELCOME TO MANAGERS VPN NETWORK ****"&lt;BR /&gt; network-acl VPN_MANAGERS_Rules&lt;BR /&gt; priority 10&lt;BR /&gt;dynamic-access-policy-record VPN_MANAGERS&lt;BR /&gt; description "Dynamic Access Policy for Managers MOBILE"&lt;BR /&gt; network-acl VPN_MANAGERS_Rules&lt;BR /&gt;dynamic-access-policy-record VPN_COLLABORATORS&lt;BR /&gt; description "Dynamic Access Policy for Collaborators DESKTOP"&lt;BR /&gt; user-message "**** WELCOME TO COLLABORATORS VPN NETWORK ****"&lt;BR /&gt; network-acl VPN_COLLABORATORS_Rules&lt;BR /&gt; priority 10&lt;BR /&gt;dynamic-access-policy-record VPN_ADMINS_IOS&lt;BR /&gt;dynamic-access-policy-record VPN_COLLABORATORS_IOS&lt;BR /&gt;dynamic-access-policy-record VPN_MANAGERS_IOS&lt;BR /&gt;dynamic-access-policy-record VPN_ADMINS_DESKTOP&lt;BR /&gt; description "Dynamic Access Policy for Admins DESKTOP"&lt;BR /&gt; user-message "**** WELCOME TO ADMINS VPN NETWORK ****"&lt;BR /&gt; network-acl VPN_ADMINS_RULES&lt;BR /&gt; priority 10&lt;BR /&gt; webvpn&lt;BR /&gt; url-list none&lt;BR /&gt; svc ask none default svc&lt;BR /&gt;aaa-server AD_LDAP protocol ldap&lt;BR /&gt;aaa-server AD_LDAP (inside) host 192.168.252&lt;BR /&gt; server-port 389&lt;BR /&gt; ldap-base-dn OU=Utilisateurs company,DC= company,DC=local&lt;BR /&gt; ldap-scope subtree&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password ve09je05$&lt;BR /&gt; ldap-login-dn CN=Cisco VPN/Firewall,OU=Utilisateurs company,DC= company,DC=local&lt;BR /&gt; server-type auto-detect&lt;BR /&gt; ldap-attribute-map CISCOMAP&lt;BR /&gt;aaa-server AD_RADIUS protocol radius&lt;BR /&gt;aaa-server AD_RADIUS (inside) host 192.168.252&lt;BR /&gt; key ve09je05$&lt;BR /&gt;no user-identity enable&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;user-identity ad-agent event-timestamp-check&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.128 255.255.255.128 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt; enrollment self&lt;BR /&gt; subject-name CN=VESR001&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt; enrollment self&lt;BR /&gt; subject-name CN=VEFW001-0&lt;BR /&gt; keypair ASDM_TrustPoint0&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2&lt;BR /&gt; enrollment terminal&lt;BR /&gt; subject-name CN=VEFW001-0,OU=IT,O= company,C=FR&lt;BR /&gt; keypair ASDM_TrustPoint0&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint3&lt;BR /&gt; enrollment self&lt;BR /&gt; subject-name CN=VEFW001-0,OU=IT,O= company,C=FR,L=TOULOUSE&lt;BR /&gt; serial-number&lt;BR /&gt; ip-address 192.168.254&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint1&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint3&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint3&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 192.168.128 255.255.255.128 inside&lt;BR /&gt;telnet timeout 60&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpn-addr-assign local reuse-delay 1&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside vpnclient-wins-override&lt;BR /&gt;!&lt;BR /&gt;dhcprelay server 192.168.252 inside&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 145.238.203.10 source outside prefer&lt;BR /&gt;ntp server 145.238.203.14 source outside prefer&lt;BR /&gt;ssl server-version tlsv1-only&lt;BR /&gt;ssl encryption dhe-aes256-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 voip vpnlb-ip&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 voip&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 inside&lt;BR /&gt;ssl trust-point ASDM_TrustPoint3 outside&lt;BR /&gt;webvpn&lt;BR /&gt; port 1563&lt;BR /&gt; enable inside&lt;BR /&gt; enable outside&lt;BR /&gt; dtls port 1563&lt;BR /&gt; no anyconnect-essentials&lt;BR /&gt; csd image disk0:/csd_3.6.4021-k9.pkg&lt;BR /&gt; csd enable&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-4.2.04018-k9.pkg 1&lt;BR /&gt; anyconnect enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt; keepout "Service not available."&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;group-policy VPN_ADMINS internal&lt;BR /&gt;group-policy VPN_ADMINS attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 192.168.252&lt;BR /&gt; vpn-tunnel-protocol ssl-client ssl-clientless&lt;BR /&gt; group-lock value VPN_ADMINS&lt;BR /&gt; default-domain value company.local&lt;BR /&gt; client-bypass-protocol disable&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect ssl dtls enable&lt;BR /&gt; anyconnect mtu 1406&lt;BR /&gt; anyconnect keep-installer installed&lt;BR /&gt; anyconnect ssl compression none&lt;BR /&gt; anyconnect dtls compression lzs&lt;BR /&gt; anyconnect ask none default anyconnect&lt;BR /&gt; anyconnect ssl df-bit-ignore disable&lt;BR /&gt;group-policy VPN_USERS internal&lt;BR /&gt;group-policy VPN_USERS attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 192.168.252&lt;BR /&gt; vpn-tunnel-protocol ssl-client ssl-clientless&lt;BR /&gt; password-storage disable&lt;BR /&gt; group-lock value VPN_USERS&lt;BR /&gt; default-domain value company.local&lt;BR /&gt; client-bypass-protocol disable&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect ssl dtls enable&lt;BR /&gt; anyconnect mtu 1406&lt;BR /&gt; anyconnect keep-installer installed&lt;BR /&gt; anyconnect ssl compression none&lt;BR /&gt; anyconnect dtls compression lzs&lt;BR /&gt; anyconnect ask none default anyconnect&lt;BR /&gt; anyconnect ssl df-bit-ignore disable&lt;BR /&gt;group-policy VPN_MANAGERS internal&lt;BR /&gt;group-policy VPN_MANAGERS attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 192.168.252&lt;BR /&gt; vpn-tunnel-protocol ssl-client ssl-clientless&lt;BR /&gt; default-domain value company.local&lt;BR /&gt;username enable password amY2xFi6mHQzuSvI encrypted privilege 15&lt;BR /&gt;tunnel-group VPN_ADMINS type remote-access&lt;BR /&gt;tunnel-group VPN_ADMINS general-attributes&lt;BR /&gt; address-pool VPN-Admins&lt;BR /&gt; authentication-server-group AD_RADIUS&lt;BR /&gt; authentication-server-group (inside) AD_LDAP&lt;BR /&gt; authorization-server-group AD_LDAP&lt;BR /&gt; authorization-server-group (inside) AD_LDAP&lt;BR /&gt; default-group-policy VPN_ADMINS&lt;BR /&gt;tunnel-group VPN_ADMINS webvpn-attributes&lt;BR /&gt; group-url &lt;A href="https://url_to_vpn/a05" target="_blank"&gt;https://url_to_vpn/a05&lt;/A&gt; enable&lt;BR /&gt; without-csd&lt;BR /&gt;tunnel-group VPN_USERS type remote-access&lt;BR /&gt;tunnel-group VPN_USERS general-attributes&lt;BR /&gt; address-pool VPN-Users&lt;BR /&gt; authentication-server-group AD_RADIUS&lt;BR /&gt; authentication-server-group (inside) AD_LDAP&lt;BR /&gt; authorization-server-group AD_LDAP&lt;BR /&gt; authorization-server-group (inside) AD_LDAP&lt;BR /&gt; default-group-policy VPN_USERS&lt;BR /&gt;tunnel-group VPN_USERS webvpn-attributes&lt;BR /&gt; group-url &lt;A href="https://url_to_vpn/EM0" target="_blank"&gt;https://url_to_vpn/EM0&lt;/A&gt; enable&lt;BR /&gt; without-csd&lt;BR /&gt;tunnel-group VPN_USERS ipsec-attributes&lt;BR /&gt; ikev1 trust-point VEFW001-0&lt;BR /&gt;tunnel-group VPN_USERS ppp-attributes&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;tunnel-group VPN_MANAGERS type remote-access&lt;BR /&gt;tunnel-group VPN_MANAGERS general-attributes&lt;BR /&gt; address-pool VPN-Managers&lt;BR /&gt; authentication-server-group AD_RADIUS&lt;BR /&gt; default-group-policy VPN_MANAGERS&lt;BR /&gt;tunnel-group VPN_MANAGERS webvpn-attributes&lt;BR /&gt; group-url &lt;A href="https://url_to_vpn/Am8" target="_blank"&gt;https://url_to_vpn/Am8&lt;/A&gt; enable&lt;BR /&gt; without-csd&lt;BR /&gt;tunnel-group-map default-group VPN_USERS&lt;BR /&gt;!&lt;BR /&gt;class-map type regex match-any DomainLogList&lt;BR /&gt; match regex matchall&lt;BR /&gt;class-map type inspect http match-all LogDomainsClass&lt;BR /&gt; match request header host regex class DomainLogList&lt;BR /&gt;class-map type inspect http match-all asdm_medium_security_methods&lt;BR /&gt; match not request method post&lt;BR /&gt; match not request method get&lt;BR /&gt; match not request method head&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map type inspect http match-all asdm_high_security_methods&lt;BR /&gt; match not request method get&lt;BR /&gt; match not request method head&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map type inspect http http_inspection_policy&lt;BR /&gt; parameters&lt;BR /&gt; protocol-violation action drop-connection&lt;BR /&gt; class LogDomainsClass&lt;BR /&gt; log&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp strict &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect http &lt;BR /&gt; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;hpm topN enable&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you very much&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:52:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901666#M161664</guid>
      <dc:creator>abdou.bekk1</dc:creator>
      <dc:date>2019-03-12T07:52:10Z</dc:date>
    </item>
    <item>
      <title>If you can't see hosts that</title>
      <link>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901667#M161665</link>
      <description>&lt;P&gt;If you can't see hosts that are on the same interface then it is not likely to be anything to do with the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Double check the IP configuration being given to the hosts, in particular, the subnet mask.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2016 20:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901667#M161665</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-06-09T20:08:11Z</dc:date>
    </item>
    <item>
      <title>Hi Philip,</title>
      <link>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901668#M161666</link>
      <description>&lt;P&gt;Hi Philip,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your reply.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It was the first thing i checked, then I made IPs as static on hosts to be sure and it didn't work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2016 21:14:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901668#M161666</guid>
      <dc:creator>abdou.bekk1</dc:creator>
      <dc:date>2016-06-09T21:14:19Z</dc:date>
    </item>
    <item>
      <title>To confirm - you have two</title>
      <link>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901669#M161667</link>
      <description>&lt;P&gt;To confirm - you have two hosts in the same subnet that can not ping each other? &amp;nbsp;Any local firewalls on them?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2016 21:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901669#M161667</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-06-09T21:31:37Z</dc:date>
    </item>
    <item>
      <title>Yes hosts in the same subnet</title>
      <link>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901670#M161668</link>
      <description>&lt;P&gt;Yes hosts in the same subnet can't ping each other and far from that when they arent' in the same subnet they also can't ping each other.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is the default Windows firewall activated, and when I allowed all connections the &lt;STRONG&gt;ping was UP&lt;/STRONG&gt; but it's not a solution because before I deactivate Windows Firewall I was able to ping ASA's interface. I don't understand what's happening here.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2016 08:16:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901670#M161668</guid>
      <dc:creator>abdou.bekk1</dc:creator>
      <dc:date>2016-06-10T08:16:44Z</dc:date>
    </item>
    <item>
      <title>Are you using a Cisco switch?</title>
      <link>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901671#M161669</link>
      <description>&lt;P&gt;Are you using a Cisco switch? &amp;nbsp;If so, can you show the configuration of the ports that the two workstations are plugged into please.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2016 20:22:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901671#M161669</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-06-10T20:22:46Z</dc:date>
    </item>
    <item>
      <title>So Vlan1 is used for IP</title>
      <link>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901672#M161671</link>
      <description>&lt;P&gt;So Vlan1 is used for IP-address on Eth0/1.&lt;/P&gt;
&lt;P&gt;Based on your configuration its like this:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface Vlan1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 192.168.245 255.255.255.128 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How are you able to ping the ASA on this subnet from a inside host without routing in-between? Is the switch a L3 device?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2016 09:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901672#M161671</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2016-06-14T09:33:43Z</dc:date>
    </item>
    <item>
      <title>It was plugged on the wrong</title>
      <link>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901673#M161673</link>
      <description>&lt;P&gt;Hi Philip,&lt;/P&gt;
&lt;P&gt;It was plugged on the wrong switch port indeed. I trusted a manager on some port and their VLAN affectations but he was wrong so that was the problem.&lt;/P&gt;
&lt;P&gt;Thank you very much.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jun 2016 00:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosts-can-ping-asa-interfaces-but-not-each-other/m-p/2901673#M161673</guid>
      <dc:creator>abdou.bekk1</dc:creator>
      <dc:date>2016-06-19T00:39:10Z</dc:date>
    </item>
  </channel>
</rss>

