<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic i did a capture for the drop in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711709#M189414</link>
    <description>&lt;P&gt;i did a capture for the drop and for the interface, neither showed expected results. i then opened sdm and went to monitoring and put the nexus as source ip filter and sure enough it showed packets passed and dropped when ping was launched.&lt;/P&gt;&lt;P&gt;i can't traceroute from nexus perhaps because there is only a management vrf. even the management interface that i can ping can't be tracerouted.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jul 2015 13:37:57 GMT</pubDate>
    <dc:creator>Majed Zouhairy</dc:creator>
    <dc:date>2015-07-23T13:37:57Z</dc:date>
    <item>
      <title>can't ping inside interfaces on asa from switch</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711701#M189388</link>
      <description>&lt;P&gt;Peace,&lt;/P&gt;&lt;P&gt;I have asa 5520 with sub interfaces inside, i can ping hosts on the inside networks but i can't ping the inside interfaces themselves from an attached nexus switch. it would make troubleshooting a lot easier if i can ping the gateway. So is there a way to enable pings to the inside interfaces from different vlans?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:19:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711701#M189388</guid>
      <dc:creator>Majed Zouhairy</dc:creator>
      <dc:date>2019-03-12T06:19:16Z</dc:date>
    </item>
    <item>
      <title>Have a look at this:https:/</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711702#M189391</link>
      <description>&lt;P&gt;Have a look at this:&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/discussion/10347521/asa-5505-icmp-not-responding&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can only ping the ASA's ip address from a network that is behind that specific interface (meaning you can't ping the outside IP addres from an inside host for example); additionally you have to specify which sources you allow - the command is:&lt;/P&gt;&lt;P class="pB1_Body1"&gt;"To configure access rules for ICMP traffic that terminates at a adaptive security appliance interface, use the &lt;B class="cCN_CmdName"&gt;icmp&lt;/B&gt; command. To remove the configuration, use the &lt;B class="cCN_CmdName"&gt;no&lt;/B&gt; form of this command.&lt;/P&gt;&lt;P class="pCE_CmdEnv"&gt;&lt;B class="cCN_CmdName"&gt;icmp &lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt;{&lt;/SPAN&gt;&lt;B class="cCN_CmdName"&gt;permit&lt;/B&gt; &lt;SPAN class="cCp_CmdPlain" style="font-weight: normal"&gt;|&lt;/SPAN&gt;&lt;SPAN style="color: Black; font-style: normal; font-weight: normal"&gt; &lt;/SPAN&gt;&lt;B class="cCN_CmdName"&gt;deny&lt;/B&gt;&lt;SPAN class="cCp_CmdPlain"&gt;}&lt;/SPAN&gt; &lt;EM class="cCi_CmdItalic"&gt;ip_address net_mask&lt;/EM&gt; &lt;SPAN class="cCp_CmdPlain"&gt;[&lt;/SPAN&gt;&lt;EM class="cCi_CmdItalic"&gt;icmp_type&lt;/EM&gt;&lt;SPAN class="cCp_CmdPlain"&gt;]&lt;/SPAN&gt; &lt;EM class="cCi_CmdItalic"&gt;if_name "&lt;/EM&gt;&lt;/P&gt;&lt;P class="pCE_CmdEnv"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="pCE_CmdEnv"&gt;&lt;EM class="cCi_CmdItalic"&gt;Traian&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 08:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711702#M189391</guid>
      <dc:creator>Traian Bratescu</dc:creator>
      <dc:date>2015-07-23T08:14:41Z</dc:date>
    </item>
    <item>
      <title>i am not trying to ping an</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711703#M189395</link>
      <description>&lt;P&gt;i am not trying to ping an outside address. i noticed that from inside network i can ping the inside interface.&lt;/P&gt;&lt;P&gt;from the link you gave, it stated:&lt;/P&gt;&lt;P&gt;"Put more generally, you cannot ping the firewall's ip addresses, unless you are on the interface you are pinging."&lt;/P&gt;&lt;P&gt;from this i understand that pinging another inside subinterface is not possible from a different vlan. i guess i asked for too much.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 08:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711703#M189395</guid>
      <dc:creator>Majed Zouhairy</dc:creator>
      <dc:date>2015-07-23T08:55:11Z</dc:date>
    </item>
    <item>
      <title>Hi Majed, To troubleshoot you</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711704#M189401</link>
      <description>&lt;P&gt;Hi Majed,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To troubleshoot you can check following:&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; ARP on the ASA for the host from where you are doing the ping test.&lt;/P&gt;&lt;P&gt;show arp&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Check if ASA is receiving traffic:&lt;/P&gt;&lt;P&gt;cap capi interface inside match icmp any any&lt;/P&gt;&lt;P&gt;show cap capi&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; In case the traffic is reaching asa and it is getting dropped there then:&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all&lt;/P&gt;&lt;P&gt;show cap asp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please attach above mentioned data and also attach the show run interface output.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 09:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711704#M189401</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-07-23T09:25:31Z</dc:date>
    </item>
    <item>
      <title>It was just an example...You</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711705#M189404</link>
      <description>&lt;P&gt;It was just an example...&lt;/P&gt;&lt;P&gt;You can ping an inside interface from a different vlan as long as the packet is not traversing the ASA.&lt;/P&gt;&lt;P&gt;something like&lt;/P&gt;&lt;P&gt;vlan1 \&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; \ --- &amp;nbsp; Router&amp;nbsp; --- ASA&lt;/P&gt;&lt;P&gt;Vlan2 /&lt;/P&gt;&lt;P&gt;You can enable icmp from either vlan 1 or vlan 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;icmp permit any inside&lt;/P&gt;&lt;P&gt;If you have a different scenario than the above plese let me know...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another usefull command "packet-tracer" - it will tell you wether the packet i allowed or not and the reason for that:&lt;/P&gt;&lt;P&gt;&amp;nbsp;packet-tracer input inside icmp "source_ip" 0 8 "destination_ip"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this clarifies,&lt;/P&gt;&lt;P&gt;Traian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 09:59:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711705#M189404</guid>
      <dc:creator>Traian Bratescu</dc:creator>
      <dc:date>2015-07-23T09:59:09Z</dc:date>
    </item>
    <item>
      <title>thanks for the arp tip,about</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711706#M189405</link>
      <description>&lt;P&gt;thanks for the arp tip,&lt;/P&gt;&lt;P&gt;about the&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;i have 9 inside subinterfaces on different vlans. i did icmp permit any (all inside interfaces)&lt;/P&gt;&lt;P&gt;but still from nexus i can only ping the management vlan in the vrf management because it's on the same vlan and subnet.&lt;/P&gt;&lt;P&gt;where is the mistake?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 10:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711706#M189405</guid>
      <dc:creator>Majed Zouhairy</dc:creator>
      <dc:date>2015-07-23T10:59:35Z</dc:date>
    </item>
    <item>
      <title>Hi Majed, From ASA's</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711707#M189411</link>
      <description>&lt;P&gt;Hi Majed,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From ASA's perspective, you have 9 different interfaces with different names(nameif).&lt;/P&gt;&lt;P&gt;So if you try to ping the IP address configured on one sub-interface from a device whose traffic hits the firewall on a different sub-interface, will be dropped by the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For better understanding of the issue please attach the output of show run interface , so that we can understand the configuration. Also let us know if you were able to capture traffic on the ASA (steps mentioned in my previous reply).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 11:27:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711707#M189411</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-07-23T11:27:08Z</dc:date>
    </item>
    <item>
      <title>i would do what R.Seth</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711708#M189413</link>
      <description>&lt;P&gt;i would do what R.Seth suggested - a capture to see wether there are any icmp packets reaching the ASA; maybe a traceroute from Nexus... just to ignore any routing issue...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 11:32:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711708#M189413</guid>
      <dc:creator>Traian Bratescu</dc:creator>
      <dc:date>2015-07-23T11:32:29Z</dc:date>
    </item>
    <item>
      <title>i did a capture for the drop</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711709#M189414</link>
      <description>&lt;P&gt;i did a capture for the drop and for the interface, neither showed expected results. i then opened sdm and went to monitoring and put the nexus as source ip filter and sure enough it showed packets passed and dropped when ping was launched.&lt;/P&gt;&lt;P&gt;i can't traceroute from nexus perhaps because there is only a management vrf. even the management interface that i can ping can't be tracerouted.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 13:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711709#M189414</guid>
      <dc:creator>Majed Zouhairy</dc:creator>
      <dc:date>2015-07-23T13:37:57Z</dc:date>
    </item>
    <item>
      <title>Hi Majed, Now from your</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711710#M189416</link>
      <description>&lt;P&gt;Hi Majed,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now from your update I understand that you tried capturing traffic on ASA and you did not receive any packets. If this is the case then you should check if the routing is correct.&lt;/P&gt;&lt;P&gt;Also if possible share the interface config, packet tracer output and capture output.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 14:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711710#M189416</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-07-23T14:15:35Z</dc:date>
    </item>
    <item>
      <title>here is the config of the</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711711#M189418</link>
      <description>&lt;P&gt;here is the config of the interfaces in question:&lt;/P&gt;&lt;P&gt;the management interface:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.11&lt;BR /&gt;&amp;nbsp;vlan 11&lt;BR /&gt;&amp;nbsp;nameif Management_LAN&lt;BR /&gt;&amp;nbsp;security-level 99&lt;BR /&gt;&amp;nbsp;ip address 10.0.11.1 255.255.255.0&lt;/P&gt;&lt;P&gt;the new interface:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.17&lt;BR /&gt;&amp;nbsp;vlan 17&lt;BR /&gt;&amp;nbsp;nameif skko_test&lt;BR /&gt;&amp;nbsp;security-level 71&lt;BR /&gt;&amp;nbsp;ip address 10.0.180.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;from nexus i ping:&lt;/P&gt;&lt;P&gt;ping 10.0.181.1 vrf management&lt;BR /&gt;PING 10.0.181.1 (10.0.181.1): 56 data bytes&lt;BR /&gt;Request 0 timed out&lt;BR /&gt;Request 1 timed out&lt;BR /&gt;Request 2 timed out&lt;BR /&gt;Request 3 timed out&lt;BR /&gt;Request 4 timed out&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ping 10.0.11.1 vrf management&lt;BR /&gt;PING 10.0.11.1 (10.0.11.1): 56 data bytes&lt;BR /&gt;64 bytes from 10.0.11.1: icmp_seq=0 ttl=254 time=3.809 ms&lt;BR /&gt;64 bytes from 10.0.11.1: icmp_seq=1 ttl=254 time=1.305 ms&lt;BR /&gt;64 bytes from 10.0.11.1: icmp_seq=2 ttl=254 time=1.972 ms&lt;BR /&gt;64 bytes from 10.0.11.1: icmp_seq=3 ttl=254 time=1.92 ms&lt;BR /&gt;64 bytes from 10.0.11.1: icmp_seq=4 ttl=254 time=1.931 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on asa:&lt;/P&gt;&lt;P&gt;cap test interface skko_test match icmp any any&lt;/P&gt;&lt;P&gt;sh cap test&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;the nexus is connected to a switch and then to asa. i added the new vlan to the trunks in both switches.&lt;/P&gt;&lt;P&gt;i rechecked the cap test:&lt;/P&gt;&lt;P&gt;sh cap test&lt;/P&gt;&lt;P&gt;1 packet captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 08:55:53.186681 802.1Q vlan#17 P0 10.0.11.6 &amp;gt; 10.0.180.1: icmp: echo request&lt;BR /&gt;1 packet shown&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;put it's not the result of pings from the nexus as when i make new pings the packet capture does not increase although 10.0.11.6 is the nexus.&lt;/P&gt;&lt;P&gt;in packet tracer the packet is allowed.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2015 06:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711711#M189418</guid>
      <dc:creator>Majed Zouhairy</dc:creator>
      <dc:date>2015-07-24T06:08:50Z</dc:date>
    </item>
    <item>
      <title>Who is doing the routing for</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711712#M189419</link>
      <description>&lt;P&gt;Who is doing the routing for Nexus (sh ip ro vrf management)? Can you also post a show route on ASA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what you posted, most likely the packets will first reach the Management_LAN and then traverse the ASA to the skko_test interface which would not be allowed - see previous posts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even if you would have a specific route for the Nexus to reach directly the skko_test interface route, most probably the return route would be through the Management_LAN which would break the URPf rule on ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2015 06:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711712#M189419</guid>
      <dc:creator>Traian Bratescu</dc:creator>
      <dc:date>2015-07-24T06:23:33Z</dc:date>
    </item>
    <item>
      <title>nexus# sh ip ro vrf</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711713#M189420</link>
      <description>&lt;P&gt;nexus#&lt;/P&gt;&lt;P&gt;&amp;nbsp;sh ip ro vrf management&lt;BR /&gt;IP Route Table for VRF "management"&lt;BR /&gt;'*' denotes best ucast next-hop&lt;BR /&gt;'**' denotes best mcast next-hop&lt;BR /&gt;'[x/y]' denotes [preference/metric]&lt;/P&gt;&lt;P&gt;0.0.0.0/0, ubest/mbest: 1/0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; *via 10.0.11.1, [1/0], 3w6d, static&lt;BR /&gt;10.0.11.0/24, ubest/mbest: 1/0, attached&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; *via 10.0.11.6, mgmt0, [0/0], 3w6d, direct&lt;BR /&gt;10.0.11.6/32, ubest/mbest: 1/0, attached&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; *via 10.0.11.6, mgmt0, [0/0], 3w6d, local&lt;/P&gt;&lt;P&gt;on asa:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;D EX 172.17.32.0 255.255.224.0 [170/3072] via 172.16.1.1, 602:28:50, outside&lt;BR /&gt;D EX 172.17.0.0 255.255.224.0 [170/3072] via 172.16.1.1, 602:28:50, outside&lt;BR /&gt;D EX 172.16.0.0 255.255.255.0 [170/3072] via 172.16.1.1, 602:28:50, outside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.1.0 255.255.255.240 is directly connected, outside&lt;BR /&gt;D EX 172.18.2.192 255.255.255.192&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [170/3328] via 172.16.1.1, 602:28:50, outside&lt;BR /&gt;D EX 172.18.2.0 255.255.255.0 [170/3072] via 172.16.1.1, 602:28:50, outside&lt;BR /&gt;D EX 172.18.3.0 255.255.255.0 [170/3328] via 172.16.1.1, 602:28:50, outside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.201.0 255.255.255.0 is directly connected, IP-Telefon&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.10.0 255.255.255.0 is directly connected, Admin&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.11.0 255.255.255.0 is directly connected, Management_LAN&lt;BR /&gt;D EX 10.0.12.0 255.255.255.0 [170/3072] via 172.16.1.1, 602:28:50, outside&lt;BR /&gt;D EX 10.96.99.0 255.255.255.0 [170/3072] via 172.16.1.1, 602:28:50, outside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.0 255.255.255.0 is directly connected, FW-Servers&lt;BR /&gt;&lt;BR /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.32.32 255.255.255.240 [90/3328] via 172.16.1.3, 602:28:53, outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [90/3328] via 172.16.1.1, 602:28:53, outside&lt;BR /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.32.48 255.255.255.240 [90/3072] via 172.16.1.3, 602:28:53, outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [90/3072] via 172.16.1.1, 602:28:53, outside&lt;BR /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.32.3 255.255.255.255 [90/130816] via 172.16.1.3, 602:28:53, outside&lt;BR /&gt;&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.126.0 255.255.255.0 is directly connected, FW-KMC&lt;BR /&gt;D EX 10.16.99.0 255.255.255.0 [170/3072] via 172.16.1.1, 602:28:53, outside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.130.0 255.255.255.0 is directly connected, FW-Appl&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.128.0 255.255.255.0 is directly connected, FW-Face&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.132.0 255.255.255.0 is directly connected, FW-DB&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.180.0 255.255.255.0 is directly connected, skko_test&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 172.16.1.1, outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i don't know what is urpf rule but sounds like it is broken?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2015 06:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711713#M189420</guid>
      <dc:creator>Majed Zouhairy</dc:creator>
      <dc:date>2015-07-24T06:59:14Z</dc:date>
    </item>
    <item>
      <title>Hi Majed, From the DATA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711714#M189421</link>
      <description>&lt;P&gt;Hi Majed,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the DATA provided i think this is your setup:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Nexus]------(Management_LAN)[ASA](skko_test)-----------------[10.0.181.1]&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;gt;&amp;gt; Now for this setup chcek the routing on ASA.&lt;BR /&gt;&amp;gt;&amp;gt; ACLs on ASA.&lt;BR /&gt;&amp;gt;&amp;gt; Output of command:&lt;BR /&gt;packet in Management_LAN icmp nexus_ip 8 0 10.0.181.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Share some details about how the traffic is going to flow from ASA and what is the route that you have on ASA for 10.0.181.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2015 07:07:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711714#M189421</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-07-24T07:07:22Z</dc:date>
    </item>
    <item>
      <title>there is no command that</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711715#M189422</link>
      <description>&lt;P&gt;there is no command that starts with packet there is packet-tracer..&lt;/P&gt;&lt;P&gt;the acl is permit ip any any&lt;/P&gt;&lt;P&gt;the setup is as follows: vsphere nexus (vrf management) the cisco switch the the asa.&lt;/P&gt;&lt;P&gt;the servers in the 10.0.180.0/24 subnet are supposed to reach the asa and from there either to the outside or to other vlans.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2015 07:34:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711715#M189422</guid>
      <dc:creator>Majed Zouhairy</dc:creator>
      <dc:date>2015-07-24T07:34:36Z</dc:date>
    </item>
    <item>
      <title>Sorry for my previous post...</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711716#M189423</link>
      <description>&lt;P&gt;Sorry for my previous post... I incorretly assumed that you were trying to ping the ASA's intrface Ip which doesn't seem to be the case...&lt;/P&gt;&lt;P&gt;uRPF is unicast reverse path forwarding which state that a packet is allowed only if there is a returning route (in ASA) through the interface that it came.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please confirm that the setup is the one described above by R.Seth.&lt;/P&gt;&lt;P&gt;Traian&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2015 07:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711716#M189423</guid>
      <dc:creator>Traian Bratescu</dc:creator>
      <dc:date>2015-07-24T07:34:43Z</dc:date>
    </item>
    <item>
      <title>Hi Majed, Please attach the</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711717#M189424</link>
      <description>&lt;P&gt;Hi Majed,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please attach the output of packet tracer output, use below mentioned command.&lt;/P&gt;&lt;P&gt;ASA will auto complete all the keywords.&lt;/P&gt;&lt;P&gt;packet in Management_LAN icmp nexus_ip 8 0 10.0.181.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2015 07:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-inside-interfaces-on-asa-from-switch/m-p/2711717#M189424</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-07-27T07:59:26Z</dc:date>
    </item>
  </channel>
</rss>

