<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic not able to ping inside interface of ASA from my inside Network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581058#M204786</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;iam not able to ping inside interface of ASA from my internal network,not sure where exactly is the problem.&lt;/P&gt;&lt;P&gt;the internal network comprises of an L2 switch,L3 switch.a router and then the ASA,all configured on inter-vlan routing.&lt;/P&gt;&lt;P&gt;iam able to reach the interface of the router whose other end is connected to the inside of ASA.&lt;/P&gt;&lt;P&gt;Hope iam clear.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:59:58 GMT</pubDate>
    <dc:creator>mudasir05</dc:creator>
    <dc:date>2019-03-12T04:59:58Z</dc:date>
    <item>
      <title>not able to ping inside interface of ASA from my inside Network</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581058#M204786</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;iam not able to ping inside interface of ASA from my internal network,not sure where exactly is the problem.&lt;/P&gt;&lt;P&gt;the internal network comprises of an L2 switch,L3 switch.a router and then the ASA,all configured on inter-vlan routing.&lt;/P&gt;&lt;P&gt;iam able to reach the interface of the router whose other end is connected to the inside of ASA.&lt;/P&gt;&lt;P&gt;Hope iam clear.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:59:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581058#M204786</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2019-03-12T04:59:58Z</dc:date>
    </item>
    <item>
      <title>I would first look at the</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581059#M204787</link>
      <description>&lt;P&gt;I would first look at the following points:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Is the ASA blocking ICMP? Show the output of "sh run icmp". And can you reach the ASA with ASDM or SSH?&lt;/LI&gt;&lt;LI&gt;Does the ASA have a route back to the internal clients-network?&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 28 Oct 2014 14:17:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581059#M204787</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-10-28T14:17:25Z</dc:date>
    </item>
    <item>
      <title>Hi,ASA-FW# sh run icmpicmp</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581060#M204788</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;ASA-FW# sh run icmp&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any management&lt;/P&gt;&lt;P&gt;=========&lt;/P&gt;&lt;P&gt;yes iam bale to reach asdm through the management port.&lt;/P&gt;&lt;P&gt;===&lt;/P&gt;&lt;P&gt;yes the ASA has the route back to the asa firewall...&lt;/P&gt;&lt;P&gt;ASA-FW# sh run route&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 94.77.204.133 1&lt;BR /&gt;route inside 192.168.2.1 255.255.255.255 198.168.1.2 1&lt;BR /&gt;route inside 192.168.2.2 255.255.255.255 198.168.1.2 1&lt;BR /&gt;route inside 192.168.3.0 255.255.255.0 192.168.1.2 1&lt;BR /&gt;route inside 192.168.4.0 255.255.255.0 192.168.1.2 1&lt;BR /&gt;route inside 192.168.5.0 255.255.255.0 192.168.1.2 1&lt;BR /&gt;route inside 192.168.6.0 255.255.255.0 192.168.1.2 1&lt;/P&gt;&lt;P&gt;plz let me know what else u need&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 06:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581060#M204788</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-29T06:51:07Z</dc:date>
    </item>
    <item>
      <title>Also find the access-list and</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581061#M204789</link>
      <description>&lt;P&gt;Also find the access-list and access-group commands,&lt;/P&gt;&lt;P&gt;ASA-FW# sh run access-list&lt;BR /&gt;access-list IN_ACL extended permit ip any any&lt;BR /&gt;access-list OUT_ACL extended permit ip any object SW-MGMT-Public&lt;BR /&gt;access-list OUT_ACL extended permit ip any any&lt;BR /&gt;access-list MGMT_ACL extended permit ip any any&lt;BR /&gt;ASA-FW# sh run access-grou&lt;BR /&gt;ASA-FW# sh run access-group&lt;BR /&gt;access-group OUT_ACL in interface outside&lt;BR /&gt;access-group IN_ACL in interface inside&lt;/P&gt;&lt;P&gt;====&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 06:52:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581061#M204789</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-29T06:52:46Z</dc:date>
    </item>
    <item>
      <title>Hi,Are the pings working from</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581062#M204790</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Are the pings working from the Directly connected subnet devices as the ASA device ?&lt;/P&gt;&lt;P&gt;If yes ,&amp;nbsp; please apply debug icmp trace on the ASA device and give the outputs for the ping from the L3 connnected subnet behind the ASA Inside Subnet.&lt;/P&gt;&lt;P&gt;Also , remove these route statements:-&lt;/P&gt;&lt;P&gt;route inside 192.168.2.1 255.255.255.255 198.168.1.2 1&lt;BR /&gt;route inside 192.168.2.2 255.255.255.255 198.168.1.2 1&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 09:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581062#M204790</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-29T09:31:00Z</dc:date>
    </item>
    <item>
      <title>Hi Mudasir, If you are trying</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581063#M204791</link>
      <description>&lt;P&gt;Hi Mudasir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are trying to ping the ASA inside interface sourcing from a host different than 192.168.2.1 or 192.168.2.2 then that would be normal, because ASA has a route back only to those two ip addresses. I would remove those two routes and add this "route inside 192.168.2.0 255.255.255.0 192.168.1.2" then try again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Aref&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 09:53:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581063#M204791</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2014-10-29T09:53:03Z</dc:date>
    </item>
    <item>
      <title>Hi Aref,I was not able to</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581064#M204792</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;I was not able&amp;nbsp;to ping 192.168.2.1 and 192.168.2.2 ,&lt;/P&gt;&lt;P&gt;ASA-FW# ping 192.168.2.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.2.1, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;ASA-FW# ping 192.168.2.2&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.2.2, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;======&lt;/P&gt;&lt;P&gt;However after adding "&lt;SPAN style="font-size: 14px;"&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.2" command i was able to ping....&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA-FW# ping 192.168.2.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.2.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;ASA-FW# ping 192.168.2.2&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.2.2, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;thanks a ton for ur help...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 15:25:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581064#M204792</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-29T15:25:26Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhor,after removing</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581065#M204793</link>
      <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;after removing these statements i was able to ping my inside network vice versa.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 15:30:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581065#M204793</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-29T15:30:10Z</dc:date>
    </item>
    <item>
      <title>Glad we could fix it up. Btw,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581066#M204794</link>
      <description>&lt;P&gt;Glad we could fix it up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Btw, the host route "route inside 192.168.2.1 255.255.255.255 198.168.1.2" and "route inside 192.168.2.2 255.255.255.255 198.168.1.2" should have been valid to route packets from ASA towards &lt;STRONG&gt;those two hosts only &lt;/STRONG&gt;(192.168.2.1 and 192.168.2.2), so ASA should have been able to ping them and vice-versa, but if there was another host let's say with 192.168.2.3 ip address, then that would not have been possible because there was no route on ASA towards that third host or other hosts on network 192.168.2.0/24. By applying the network route "route inside 192.168.2.0 255.255.255.0 192.168.1.2" we told ASA to route every things destined towards that network &lt;STRONG&gt;to all hosts&lt;/STRONG&gt; in that network via 192.168.1.2. That issue would have been dependent on some restrictions down the path, anyway, again glad we could fix it up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Aref&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 16:01:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581066#M204794</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2014-10-29T16:01:16Z</dc:date>
    </item>
    <item>
      <title>Hi,But with those two</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581067#M204795</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;But with those two commands,the ASA was still not able to ping 192.168.2.1 and 192.168.2.2,thats where iam confused....however when removed and added&amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;&amp;nbsp;"route inside 192.168.2.0 255.255.255.0 192.168.1.2" it worked....though it should have pinged 192.168.2.1 before...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2014 07:02:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581067#M204795</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2014-10-30T07:02:38Z</dc:date>
    </item>
    <item>
      <title>That would depend if there</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581068#M204796</link>
      <description>&lt;P&gt;Yes that would be a strange behavior. If you want to troubleshoot it again, please remove the last route you added, put back those two host routes and try again, if it does not work please post the output of "sh route".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Aref&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2014 14:43:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/2581068#M204796</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2014-10-30T14:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Hi Aref,I was not able to</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/3680301#M204797</link>
      <description>&lt;P&gt;I saw the next hop address in the route commands are different which could be the reason why it did not work in the host route:&lt;/P&gt;
&lt;P&gt;For the host route you have the next hop ip is&amp;nbsp;&lt;SPAN&gt;192.168.2.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route inside 192.168.2.1 255.255.255.255 192.168.2.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route inside 192.168.2.2 255.255.255.255 192.168.2.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;For the network route you have&amp;nbsp;&lt;SPAN&gt;the next hop ip is&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;192.168.1.2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.2&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 18:18:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/3680301#M204797</guid>
      <dc:creator>CiscoSkills</dc:creator>
      <dc:date>2018-08-02T18:18:23Z</dc:date>
    </item>
    <item>
      <title>How to get your Inside network to ping your outside or Google</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/4063471#M1069075</link>
      <description>This will fix two issues the failed Xlate issue when trying to test your packets to the outside I have learned you need some type of ICMP to be able to leave your inside network. This will help clear up your xlate failed NAT you can coup and past this as this is the default statements for any any so this will work on almost any ASA that is running over 8.4 ! access-list inside_access_in extended permit icmp any any access-list inside_access_in extended permit ip any any access-list outside_access_in extended permit icmp any any ! !now your NAT again default nat (inside,outside) source dynamic any interface ! !YOUR outside needs to allow ICMP back into your network so you will ensure your ICMP is before your deny statement access-group outside_access_in in interface outside access-group inside_access_in in interface inside Look at the ASDM for help on ensuring your statements are in the right locations. I used the ASDM to configure the firewall then check the CLI to ensure I understood how to write it via CLI. Review the Image attached.</description>
      <pubDate>Fri, 10 Apr 2020 14:41:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/4063471#M1069075</guid>
      <dc:creator>HusainBasir82646</dc:creator>
      <dc:date>2020-04-10T14:41:07Z</dc:date>
    </item>
    <item>
      <title>Re: not able to ping inside interface of ASA from my inside Network</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/4316464#M1079795</link>
      <description>&lt;P&gt;Running into a very similar issue without any luck, have a few vlans and inter-vlan routing is working with no problem, i can ping all the devices on other subnet, i can't ping the sub-interfaces on the ASA tho and i understand that this is the default behavior but i would like to know if it is possible at all with the help of an ACL or something else. Config is attached for reference.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you all in advance..&lt;/P&gt;</description>
      <pubDate>Tue, 30 Mar 2021 23:30:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-ping-inside-interface-of-asa-from-my-inside-network/m-p/4316464#M1079795</guid>
      <dc:creator>gillirfan</dc:creator>
      <dc:date>2021-03-30T23:30:17Z</dc:date>
    </item>
  </channel>
</rss>

