<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic As the outside IP address of in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921143#M167858</link>
    <description>&lt;P&gt;As the outside IP address of the ASA is not in the encryption domain you wont be able to do this. &amp;nbsp;You'll need to test this with a machine behind the ASA.&lt;/P&gt;</description>
    <pubDate>Sun, 28 Feb 2016 21:10:02 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2016-02-28T21:10:02Z</dc:date>
    <item>
      <title>Unable to ping the Remote IP across IPSEC</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921142#M167857</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi Everyone,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;IPSEC tunnel is established between Cisco and Palo Alto.&lt;/P&gt;
&lt;P&gt;From Palo Alto i can ping the Remote IP of the Cisco ASA but from Cisco ASA i can not ping Remote IP of Palo Alto&lt;/P&gt;
&lt;P&gt;Logs from ASA&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Feb 28 2016 13:40:22: %ASA-6-302020: Built outbound ICMP connection for faddr 172.16.0.2/0 gaddr 10.0.0.11/1 laddr 10.0.0.11/1&lt;BR /&gt;Feb 28 2016 13:40:24: %ASA-6-302021: Teardown ICMP connection for faddr 172.16.0.2/0 gaddr 10.0.0.11/1 laddr 10.0.0.11/1&lt;BR /&gt;Feb 28 2016 13:40:27: %ASA-6-302020: Built outbound ICMP connection for faddr 172.16.0.2/0 gaddr 10.0.0.11/1 laddr 10.0.0.11/1&lt;BR /&gt;Feb 28 2016 13:40:29: %ASA-6-302021: Teardown ICMP connection for faddr 172.16.0.2/0 gaddr 10.0.0.11/1 laddr 10.0.0.11/1&lt;BR /&gt;Feb 28 2016 13:40:32: %ASA-6-302020: Built outbound ICMP connection for faddr 172.16.0.2/0 gaddr 10.0.0.11/1 laddr 10.0.0.11/1&lt;BR /&gt;Feb 28 2016 13:40:34: %ASA-6-302021: Teardown ICMP connection for faddr 172.16.0.2/0 gaddr 10.0.0.11/1 laddr 10.0.0.11/1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;pri/act/ASA1# show crypto ipsec sa&lt;BR /&gt;interface: outside&lt;BR /&gt; Crypto map tag: CRYPTO-MAP, seq num: 1, local addr: 68.145.154.173&lt;/P&gt;
&lt;P&gt;access-list VPN-INTERESTING-TRAFFIC extended permit ip 10.0.0.0 255.255.255.0 172.16.0.0 255.255.255.0 log&lt;BR /&gt; local ident (addr/mask/prot/port): (10.0.0.0/255.255.255.0/0/0)&lt;BR /&gt; remote ident (addr/mask/prot/port): (172.16.0.0/255.255.255.0/0/0)&lt;BR /&gt; current_peer: 184.71.241.62&lt;/P&gt;
&lt;P&gt;#pkts encaps: 144, #pkts encrypt: 144, #pkts digest: 144&lt;BR /&gt; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt; #pkts not compressed: 144, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt; #TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt; #Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt; #send errors: 0, #recv errors: 0&lt;/P&gt;
&lt;P&gt;local crypto endpt.: 68.145.154.173/0, remote crypto endpt.: 184.71.241.62/0&lt;BR /&gt; path mtu 1500, ipsec overhead 74(44), media mtu 1500&lt;BR /&gt; PMTU time remaining (sec): 0, DF policy: copy-df&lt;BR /&gt; ICMP error validation: disabled, TFC packets: disabled&lt;BR /&gt; current outbound spi: A92FD619&lt;BR /&gt; current inbound spi : F5573103&lt;/P&gt;
&lt;P&gt;inbound esp sas:&lt;BR /&gt; spi: 0xF5573103 (4116132099)&lt;BR /&gt; transform: esp-aes-256 esp-md5-hmac no compression&lt;BR /&gt; in use settings ={L2L, Tunnel, PFS Group 5, IKEv1, }&lt;BR /&gt; slot: 0, conn_id: 1323008, crypto-map: CRYPTO-MAP&lt;BR /&gt; sa timing: remaining key lifetime (kB/sec): (3915000/85660)&lt;BR /&gt; IV size: 16 bytes&lt;BR /&gt; replay detection support: Y&lt;BR /&gt; Anti replay bitmap:&lt;BR /&gt; 0x00000000 0x00000001&lt;BR /&gt; outbound esp sas:&lt;BR /&gt; spi: 0xA92FD619 (2838484505)&lt;BR /&gt; transform: esp-aes-256 esp-md5-hmac no compression&lt;BR /&gt; in use settings ={L2L, Tunnel, PFS Group 5, IKEv1, }&lt;BR /&gt; slot: 0, conn_id: 1323008, crypto-map: CRYPTO-MAP&lt;BR /&gt; sa timing: remaining key lifetime (kB/sec): (3914991/85660)&lt;BR /&gt; IV size: 16 bytes&lt;BR /&gt; replay detection support: Y&lt;BR /&gt; Anti replay bitmap:&lt;BR /&gt; 0x00000000 0x00000001&lt;/P&gt;
&lt;P&gt;Logs From Palo Alto where ping is working to the Remote Cisco IP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;64 bytes from 10.0.0.4: icmp_seq=131 ttl=255 time=21.7 ms&lt;BR /&gt;64 bytes from 10.0.0.4: icmp_seq=132 ttl=255 time=18.7 ms&lt;BR /&gt;64 bytes from 10.0.0.4: icmp_seq=133 ttl=255 time=17.9 ms&lt;BR /&gt;64 bytes from 10.0.0.4: icmp_seq=134 ttl=255 time=21.0 ms&lt;BR /&gt;^C&lt;BR /&gt;--- 10.0.0.4 ping statistics ---&lt;BR /&gt;134 packets transmitted, 134 received, 0% packet loss, time 134401ms&lt;BR /&gt;rtt min/avg/max/mdev = 17.354/20.349/33.935/2.623 ms&lt;BR /&gt;admin@Palo_alto_test&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:24:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921142#M167857</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T07:24:59Z</dc:date>
    </item>
    <item>
      <title>As the outside IP address of</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921143#M167858</link>
      <description>&lt;P&gt;As the outside IP address of the ASA is not in the encryption domain you wont be able to do this. &amp;nbsp;You'll need to test this with a machine behind the ASA.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 21:10:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921143#M167858</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-28T21:10:02Z</dc:date>
    </item>
    <item>
      <title>Actually now i am testing on</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921144#M167859</link>
      <description>&lt;P&gt;&amp;nbsp;i am testing on machine behind the ASA.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 21:13:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921144#M167859</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T21:13:40Z</dc:date>
    </item>
    <item>
      <title>These are your stats:</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921145#M167860</link>
      <description>&lt;P&gt;These are your stats:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;#pkts encaps: 144, #pkts encrypt: 144, #pkts digest: 144&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;It says you are sending and encrypting packets, but not&amp;nbsp;receiving&amp;nbsp;anything back.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 21:19:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921145#M167860</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-28T21:19:23Z</dc:date>
    </item>
    <item>
      <title>I am checking the other side</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921146#M167861</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am checking the other side now.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 21:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921146#M167861</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T21:31:41Z</dc:date>
    </item>
    <item>
      <title>Hi Phil,</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921147#M167862</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi Phil,&lt;/P&gt;
&lt;P&gt;Do i need to specfic on ASA the static route for remote subnet across the tunnel?&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Mon, 29 Feb 2016 00:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921147#M167862</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-29T00:17:31Z</dc:date>
    </item>
    <item>
      <title>No.  You just need an</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921148#M167863</link>
      <description>&lt;P&gt;No. &amp;nbsp;You just need an existing route (such as the default route) pointing to the outside interface.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Feb 2016 00:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921148#M167863</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-29T00:20:11Z</dc:date>
    </item>
    <item>
      <title>i have that default route.</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921149#M167864</link>
      <description>&lt;P&gt;i have that default route.&lt;/P&gt;
&lt;P&gt;Seems traffic is coming to Palo Alto but not going back to ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Mon, 29 Feb 2016 00:37:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921149#M167864</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-29T00:37:53Z</dc:date>
    </item>
    <item>
      <title>As I mentioned in your other</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921150#M167865</link>
      <description>&lt;P&gt;As I mentioned in your other question, the issue is on the Palo Alto side as the configuration on the ASA looks fine.&amp;nbsp; Have you checked the routes on the Palo Alto?&amp;nbsp; I think the VPN is terminating on on of the Palo Alto interfaces while traffic to the 10.0.0.0/24 is being sent out a different interface and therefore not being encrypted.&lt;/P&gt;
&lt;P&gt;Have a look at the following article and check against your configuration&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/twzvq79624/attachments/twzvq79624/ConfigurationArticles/319/1/IPSec-Interoperability-CiscoASA.pdf"&gt;https://live.paloaltonetworks.com/twzvq79624/attachments/twzvq79624/ConfigurationArticles/319/1/IPSec-Interoperability-CiscoASA.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 29 Feb 2016 06:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921150#M167865</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-29T06:13:32Z</dc:date>
    </item>
    <item>
      <title>Issue was Palo alto Did not</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921151#M167866</link>
      <description>&lt;P&gt;Issue was Palo alto Did not have rule to allow vpn traffic to the inside zone.&lt;/P&gt;
&lt;P&gt;All is good now&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2016 01:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-the-remote-ip-across-ipsec/m-p/2921151#M167866</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-03-02T01:55:30Z</dc:date>
    </item>
  </channel>
</rss>

