<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-To_Site_DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287464#M345266</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean a &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; fails on some ASA or a Traceroute? Traceroute to what?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you mean &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; then can you share the output from the CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Aug 2013 15:43:26 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-08-02T15:43:26Z</dc:date>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287461#M345263</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I worked with you a few days back on a site-to-site using to 5505 ASA's in a lab before deploying, with your help that is working.&lt;/P&gt;&lt;P&gt;We are moving to deploy into production with some different settings, as the customers site remains the same but we will move from using the local interface nameif inside to our DMZ - first thing is will this work through site-to-site?&lt;/P&gt;&lt;P&gt;We have the ASA on our end configured to use site-to-site through our DMZ interface, we created the ACL, then the NAT, we can't ping anything on their local subnet or they ping our local subnet.&lt;/P&gt;&lt;P&gt;I really need you help to show what I missed or failed to implement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:20:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287461#M345263</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2019-03-12T02:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287462#M345264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I assume that on the ASA &lt;STRONG&gt;PCS-EW-VPN&lt;/STRONG&gt; you want to use the &lt;STRONG&gt;"EWVPN"&lt;/STRONG&gt; interface instead of &lt;STRONG&gt;"inside"&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that you have to modify the NAT rule there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (inside,outside) source static net-local net-local destination static net-remote net-remote&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (EWVPN,outside) source static net-local net-local destination static net-remote net-remote&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is because it still has the old source interface. The current rule only applies between &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. Since you want to change the local interface for the VPN you will also have to change the local interface for the NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I would suggest changing this NAT configuration also to avoid future problems&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (EWVPN,outside) source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (EWVPN,outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration I suggest removing is at so high priority that you might have problems in the future if you try to configure some additional NAT rules for interface "EWVPN". So a bit pre-emptive change to the configuration. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 15:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287462#M345264</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-02T15:19:41Z</dc:date>
    </item>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287463#M345265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni, I'm very sorry to bother you with this again my friend, really nice to have your expertise...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I made the changes as shown for both NAT's, we still can't ping local network.&lt;/P&gt;&lt;P&gt;I'm running packet tracer on both with ASA -PCS-lab-EW-VPN completes with all green check marks, the ASA-PCS-EW-VPN fails to complete the trace route at VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 15:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287463#M345265</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2013-08-02T15:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287464#M345266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean a &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; fails on some ASA or a Traceroute? Traceroute to what?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you mean &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; then can you share the output from the CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 15:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287464#M345266</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-02T15:43:26Z</dc:date>
    </item>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287465#M345268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; My Bad, should read Packet-tracer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 15:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287465#M345268</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2013-08-02T15:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287466#M345270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In addition to what Jouni has said, you might also need to clear the xlate table to get this working right away instead of having to wait for it to timeout.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 15:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287466#M345270</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-02T15:47:03Z</dc:date>
    </item>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287467#M345272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I figured out how to run the Packet-tracer from the command-line as shown below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (EWVPN,outside) source static net-local net-local destination static net-remote net-remote&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside&lt;BR /&gt;Untranslate 10.10.10.10/21 to 10.10.10.10/21&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-ftp&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (EWVPN,outside) source static net-local net-local destination static net-remote net-remote&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.5.2/21 to 172.16.5.2/21&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: EWVPN&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 15:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287467#M345272</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2013-08-02T15:52:42Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287468#M345273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will need to run the packet tracer twice.&amp;nbsp; The first time it will show as drop because the VPN tunnel is most likely not up. The first trace will bring the tunnel up, and the second trace should give you the real result of the trace.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 15:57:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287468#M345273</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-02T15:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287469#M345274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you issue the command twice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually when we have a L2L VPN connection and we use the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; to simulate a packet going to the L2L VPN the first &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; will always produce a drop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So can you issue the command again. Also mention the command used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though then again if you have issued a corresponding &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command on the other side and it goes through it doesnt make sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case you could perhaps try issue this command on both ASAs and then issue the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; commands again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;clear crypto ikev1 sa&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 15:58:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287469#M345274</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-02T15:58:54Z</dc:date>
    </item>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287470#M345275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; &lt;BR /&gt;Packet-trace 2 complete - looks good with green check marks - still not able to ping remote local network on either side&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PCS-EW-VPN(config)# packet-tracer input EWVPN tcp 172.16.5.2 21 10.10.10.10 21&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (EWVPN,outside) source static net-local net-local destination static net-remote net-remote&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside&lt;BR /&gt;Untranslate 10.10.10.10/21 to 10.10.10.10/21&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-ftp&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (EWVPN,outside) source static net-local net-local destination static net-remote net-remote&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.5.2/21 to 172.16.5.2/21&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (EWVPN,outside) source static net-local net-local destination static net-remote net-remote&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 2525, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: EWVPN&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287470#M345275</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2013-08-02T16:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287471#M345276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It doesnt seem to mention a VPN phase.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As if it was just sending the traffic to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But on the VPN configurations it seemed to me that the networks matched on each side so there should be some phase.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are making configurations through the ASDM I would double check that no essential configurations were removed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287471#M345276</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-02T16:11:32Z</dc:date>
    </item>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287472#M345277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What should I do - wipe both ASA's then start over?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287472#M345277</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2013-08-02T16:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287473#M345278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try to attach the current configurations to the post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if there is a chance that there is just some wierd problem with the ASAs you can save the configuration and reboot both devices since this is still a lab setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though looking through your current CLI format configuration should tell what the problem is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:22:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287473#M345278</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-02T16:22:27Z</dc:date>
    </item>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287474#M345279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this lab setup using GNS3,&amp;nbsp; If so, this can at time be a bit quirky and trashing the whole setup and rebuilding will resolve the problem most of the time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287474#M345279</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-02T16:25:08Z</dc:date>
    </item>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287475#M345280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nope , using two brand new ASA's 5505, will deploy them next week - with one at my current location and the other at customer site&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287475#M345280</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2013-08-02T16:30:52Z</dc:date>
    </item>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287476#M345281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure - both ASA rebooted, we still can't ping or use anything like RDP to local network, sending both configs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname PCS-lab-EW-VPN&lt;/P&gt;&lt;P&gt;domain-name sccul.org&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.10.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 209.177.212.103 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;nameif EWVPN&lt;/P&gt;&lt;P&gt;security-level 98&lt;/P&gt;&lt;P&gt;ip address 172.16.17.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa845-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;name-server 8.8.8.8&lt;/P&gt;&lt;P&gt;name-server 4.2.2.1&lt;/P&gt;&lt;P&gt;domain-name sccul.org&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;description PAT_inside_Outside_on_TW_Circuit&lt;/P&gt;&lt;P&gt;object network net-local&lt;/P&gt;&lt;P&gt;subnet 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network net-remote&lt;/P&gt;&lt;P&gt;subnet 172.16.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip object net-local object net-remote &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu EWVPN 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static net-local net-local destination static net-remote net-remote&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 209.177.212.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.10.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 172.16.1.0 255.255.255.0 EWVPN&lt;/P&gt;&lt;P&gt;http 70.61.194.0 255.255.255.240 outside&lt;/P&gt;&lt;P&gt;http 209.177.212.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map outside-map 1 match address outside_1_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set pfs group1&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer 70.61.194.178 &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set ikev1 transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 10.10.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 60&lt;/P&gt;&lt;P&gt;ssh 10.10.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 209.177.212.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh 172.16.1.0 255.255.255.0 EWVPN&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 208.87.104.40 source outside&lt;/P&gt;&lt;P&gt;ntp server 64.113.32.9 source outside&lt;/P&gt;&lt;P&gt;ntp server 50.22.155.163 source outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username ssisson password 1U3WSDowu/mxWWcx encrypted privilege 15&lt;/P&gt;&lt;P&gt;username admin1 password mNquohzwaXofLKzA encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group 70.61.194.178 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 70.61.194.178 ipsec-attributes&lt;/P&gt;&lt;P&gt;ikev1 pre-shared-key cisco123&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum client auto&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect ip-options &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt;profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;destination transport-method http&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:6865776390ce5bf69108b5f69386eb65&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt; &lt;/SPAN&gt;ASA2&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname PCS-EW-VPN&lt;/P&gt;&lt;P&gt;domain-name sccul.org&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.248 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 70.61.194.178 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;nameif EWVPN&lt;/P&gt;&lt;P&gt;security-level 98&lt;/P&gt;&lt;P&gt;ip address 172.16.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa845-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;name-server 8.8.8.8&lt;/P&gt;&lt;P&gt;name-server 4.2.2.1&lt;/P&gt;&lt;P&gt;domain-name sccul.org&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;description PAT_inside_Outside_on_TW_Circuit&lt;/P&gt;&lt;P&gt;object network net-local&lt;/P&gt;&lt;P&gt;subnet 172.16.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network net-remote&lt;/P&gt;&lt;P&gt;subnet 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list EWVPN_access-in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip object net-local object net-remote &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu EWVPN 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (EWVPN,outside) source static net-local net-local destination static net-remote net-remote&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (EWVPN,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 70.61.194.177 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 172.16.5.0 255.255.255.0 EWVPN&lt;/P&gt;&lt;P&gt;http 70.61.194.0 255.255.255.240 outside&lt;/P&gt;&lt;P&gt;http 209.177.212.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set pfs group1&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer 209.177.212.103 &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set ikev1 transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 65535&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 60&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 209.177.212.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh 172.16.5.0 255.255.255.0 EWVPN&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 208.87.104.40 source outside&lt;/P&gt;&lt;P&gt;ntp server 64.113.32.9 source outside&lt;/P&gt;&lt;P&gt;ntp server 50.22.155.163 source outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username ssisson password 1U3WSDowu/mxWWcx encrypted privilege 15&lt;/P&gt;&lt;P&gt;username admin1 password mNquohzwaXofLKzA encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group 209.177.212.103 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 209.177.212.103 ipsec-attributes&lt;/P&gt;&lt;P&gt;ikev1 pre-shared-key cisco123&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum client auto&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect ip-options &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt;profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;destination transport-method http&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:bccba008500a803d23f0933a87c0a791&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:32:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287476#M345281</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2013-08-02T16:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287477#M345282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PCS-EW-VPN ASA is missing a &lt;STRONG&gt;"crypto map"&lt;/STRONG&gt; related command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:37:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287477#M345282</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-02T16:37:19Z</dc:date>
    </item>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287478#M345283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If that doesn't solve it, please provide which license is installed on your ASAs&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:41:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287478#M345283</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-02T16:41:40Z</dc:date>
    </item>
    <item>
      <title>Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287479#M345284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Applied the &lt;STRONG&gt;crypto map outside_map 1 match address outside_1_cryptomap to PCS-EW_VPN ASA still not able to ping.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;License on both ASA's&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ Unrestricted&lt;BR /&gt;Dual ISPs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;VLAN Trunk Ports&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Active/Standby perpetual&lt;BR /&gt;VPN-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;VPN-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Premium Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Other VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Total VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Shared License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Advanced Endpoint Assessment&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;UC Phone Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Total UC Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Botnet Traffic Filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;BR /&gt;Intercompany Media Engine&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA 5505 Security Plus license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287479#M345284</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2013-08-02T16:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To_Site_DMZ</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287480#M345285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you issue the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command again on that same ASA unit (twice)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you also tell us between which devices are you attempting to ICMP? This cant be done from the ASA directly atleast so I assume that you are ICMP between hosts? Have you confirmed that those hosts are attached to the correct ports and have the correct IP addresses and gateways if you have change the &lt;STRONG&gt;INSIDE -&amp;gt; DMZ&lt;/STRONG&gt; for this setup on the other ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cant see no problem with the configurations at the moment. They should enable the L2L VPN negotiation to go through. But as you saw, you didnt have the configuration above on the other ASA that defines the local and remote networks on the L2L VPN connection so I think the ASDM might have removed that during some configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can naturally add the following commands on both ASAs for ICMP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those are old format commands but should convert to &lt;STRONG&gt;"inspect"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternatively you can add them in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can the ASAs ping eachothers WAN interfaces at the moment?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you issue the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command or have a continuous ICMP from some host behind the &lt;STRONG&gt;"EWVPN"&lt;/STRONG&gt; interface or &lt;STRONG&gt;"inside"&lt;/STRONG&gt; on the other ASA, what can you see with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show crypto ikev1 sa&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to issue it several times during testing to see what it shows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also use the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show crypto ipsec sa&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To view if the Phase2 has gone through and if packets have gone through the L2L VPN in either direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is always a chance that something else than the ASA is stopping the ICMP traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 16:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-dmz/m-p/2287480#M345285</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-02T16:54:22Z</dc:date>
    </item>
  </channel>
</rss>

