<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to ping via S2S VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3959363#M30404</link>
    <description>&lt;P&gt;Thanks every one, issue resolved, issue wasn't with the vpn, the issue was with the internal network.&lt;/P&gt;</description>
    <pubDate>Fri, 15 Nov 2019 15:22:34 GMT</pubDate>
    <dc:creator>kamrannaseem1</dc:creator>
    <dc:date>2019-11-15T15:22:34Z</dc:date>
    <item>
      <title>Unable to ping via S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3954985#M30313</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have a site to site VPN configured on cisco asa 5505, VPN is up and we can see TX and RX but we are unable to get any ping replies. We also tried RDP and other access to the remote end but no luck.&lt;/P&gt;&lt;P&gt;The strange thing is TX and RX are going up on the VPN but we cant get any ping etc replies from the remote end.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find attached asa config and wireshark traces.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any help will be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 17:47:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3954985#M30313</guid>
      <dc:creator>kamrannaseem1</dc:creator>
      <dc:date>2019-11-07T17:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping via S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3954999#M30337</link>
      <description>&lt;P&gt;you have to change your nat.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CHANGE THIS &lt;/STRONG&gt;&lt;BR /&gt;nat (inside,outside) source dynamic LocalVPNClients LocalVPN-NAT destination static RemoteVPNClients RemoteVPNClients&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;TO THIS&lt;/STRONG&gt;&lt;BR /&gt;nat (inside,outside) source static LocalVPNClients LocalVPN-NAT destination static RemoteVPNClients RemoteVPNClients no-proxy-arp route-lookup&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;for PING&lt;/STRONG&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;/P&gt;&lt;P&gt;inspect icmp-error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;check this reference guide too.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/119141-configure-asa-00.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/119141-configure-asa-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also noticed you have overlap of ip address in your network and remote network&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network ClientSubnet&lt;BR /&gt;subnet 192.168.0.0 255.255.248.0&lt;BR /&gt;!&lt;BR /&gt;object-group network LocalVPNClients&lt;BR /&gt;network-object object ClientSubnet&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;object-group network LocalVPN-NAT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;network-object object 192.168.6.3&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;object-group network RemoteVPNClients&lt;BR /&gt;network-object object RemoteVPNClient1&lt;BR /&gt;network-object object RemoteVPNClient2&lt;BR /&gt;network-object object RemoteVPNClient3&lt;BR /&gt;network-object object RemoteVPNClient4&lt;BR /&gt;!&lt;BR /&gt;object network RemoteVPNClient1&lt;BR /&gt;host 129.1.3.12&lt;BR /&gt;object network RemoteVPNClient2&lt;BR /&gt;host 129.1.33.65&lt;BR /&gt;object network RemoteVPNClient3&lt;BR /&gt;host 129.1.155.61&lt;BR /&gt;&lt;STRONG&gt;object network 192.168.6.3&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;host 192.168.6.3&lt;/STRONG&gt;&lt;BR /&gt;object network RemoteVPNClient4&lt;BR /&gt;host 129.1.3.11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;could you also run this command and past the results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show crypto ipsec sa peer 185.170.172.10&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 18:12:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3954999#M30337</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-11-07T18:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping via S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3955037#M30348</link>
      <description>&lt;P&gt;Thanks sheraz for the quick response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Problem is that we have to use many to one NAT. Basically the requirement is to NAT the subnet to single IP so shouldn't we use dynamic for that ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have changes the below but no luck. I haven't yet changed the NAT.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inspect icmp-error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BAirASA# &lt;STRONG&gt;show crypto ipsec sa peer 185.170.172.10&lt;/STRONG&gt;&lt;BR /&gt;peer address: 185.170.172.10&lt;BR /&gt;Crypto map tag: outside_map0, seq num: 1, local addr: 64.66.10.70&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_1 extended permit ip host 192.168.6.3 host 1 29.1.3.12&lt;BR /&gt;local ident (addr/mask/prot/port): (192.168.6.3/255.255.255.255/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (129.1.3.12/255.255.255.255/0/0)&lt;BR /&gt;current_peer: 185.170.172.10&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;#pkts encaps: 4479, #pkts encrypt: 4479, #pkts digest: 4479&lt;BR /&gt;#pkts decaps: 4466, #pkts decrypt: 4466, #pkts verify: 4466&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 4479, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;#TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt;#send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;local crypto endpt.: 64.66.10.70/0, remote crypto endpt.: 185.170.172.10/0&lt;BR /&gt;path mtu 1500, ipsec overhead 58(36), media mtu 1500&lt;BR /&gt;PMTU time remaining (sec): 0, DF policy: copy-df&lt;BR /&gt;ICMP error validation: disabled, TFC packets: disabled&lt;BR /&gt;current outbound spi: D4B437E8&lt;BR /&gt;current inbound spi : 41568E7D&lt;/P&gt;&lt;P&gt;inbound esp sas:&lt;BR /&gt;spi: 0x41568E7D (1096191613)&lt;BR /&gt;transform: esp-3des esp-sha-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, PFS Group 2, IKEv1, }&lt;BR /&gt;slot: 0, conn_id: 282624, crypto-map: outside_map0&lt;BR /&gt;sa timing: remaining key lifetime (sec): 2634&lt;BR /&gt;IV size: 8 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0xFFFFFFFF 0xFFFFFFFF&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;spi: 0xD4B437E8 (3568580584)&lt;BR /&gt;transform: esp-3des esp-sha-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, PFS Group 2, IKEv1, }&lt;BR /&gt;slot: 0, conn_id: 282624, crypto-map: outside_map0&lt;BR /&gt;sa timing: remaining key lifetime (sec): 2634&lt;BR /&gt;IV size: 8 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 18:56:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3955037#M30348</guid>
      <dc:creator>kamrannaseem1</dc:creator>
      <dc:date>2019-11-07T18:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping via S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3955091#M30366</link>
      <description>&lt;P&gt;try this command&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic LocalVPNClients LocalVPN-NAT destination static RemoteVPNClients RemoteVPNClients no-proxy-arp route-lookup&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 20:16:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3955091#M30366</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-11-07T20:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping via S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3955195#M30372</link>
      <description>it doesn't take this command. Doesn't give me option for no-proxy-arp route-lookup.</description>
      <pubDate>Thu, 07 Nov 2019 23:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3955195#M30372</guid>
      <dc:creator>kamrannaseem1</dc:creator>
      <dc:date>2019-11-07T23:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping via S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3955225#M30388</link>
      <description>&lt;P&gt;I recommend trying the following things&lt;/P&gt;&lt;P&gt;1. run a packet tracer and see what step is failing&lt;/P&gt;&lt;P&gt;2. run debugs: debug cryp isa sa 127 and deb cryp ipsec sa 127 - while these are running, attempt ping across the tunnel and attach to output to this thread&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2019 00:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3955225#M30388</guid>
      <dc:creator>gerald.scott</dc:creator>
      <dc:date>2019-11-08T00:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping via S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3955394#M30396</link>
      <description>&lt;P&gt;I had a thought on this. you need to define a subnet for you real traffic to mapped into mapped network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you have single ip address in this object&amp;nbsp;&lt;SPAN&gt;LocalVPN-NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;create a subnet&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network &lt;STRONG&gt;LocalVPN-NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.10.x 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (inside,outside) source &lt;STRONG&gt;static&lt;/STRONG&gt; LocalVPNClients &lt;STRONG&gt;LocalVPN-NAT&lt;/STRONG&gt; destination static RemoteVPNClients RemoteVPNClients &lt;STRONG&gt;no-proxy-arp route-lookup&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you also need to let the remote network Firewall to change the network to LocalVPN-NAT subnet 192.168.10.x 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2019 09:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3955394#M30396</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-11-08T09:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping via S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3959363#M30404</link>
      <description>&lt;P&gt;Thanks every one, issue resolved, issue wasn't with the vpn, the issue was with the internal network.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 15:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3959363#M30404</guid>
      <dc:creator>kamrannaseem1</dc:creator>
      <dc:date>2019-11-15T15:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping via S2S VPN</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3959596#M30412</link>
      <description>&lt;P&gt;what was the issue? your site to site vpn working ?&lt;/P&gt;&lt;P&gt;could you please show your final working configuration&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 23:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-via-s2s-vpn/m-p/3959596#M30412</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-11-15T23:40:24Z</dc:date>
    </item>
  </channel>
</rss>

