<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: remote LAN could not ping ASA inside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276051#M347137</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; Gah, seems you have 3DES in ISAKMP policy and DES in the transform-set. Though naturally you dont really use DES anymore and not that much 3DES even.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually the transform-set on the ASA it different from the router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no crypto map OUTSIDE-MAP 10 set transform-set MYSET&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no crypto ipsec transform-set MYSET esp-des esp-md5-hmac &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ipsec transform-set MYSET esp-3des esp-md5-hmac &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map OUTSIDE-MAP 10 set transform-set MYSET&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The difference was that router is using 3DES while the ASA has DES configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Jul 2013 11:51:41 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-07-03T11:51:41Z</dc:date>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276043#M347129</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Im doing a testing in my lab.&lt;/P&gt;&lt;P&gt;I have an ASA act as HQ ASA while a router act as a remote router. I have configured both device. below is the topology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remote LAN(10.2.2.x/24)-----&amp;gt;Router &amp;lt;----(192.168.1.x/30)----&amp;gt; ASA&amp;lt;---LAN(10.1.1.x/24)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the problem is from remote LAN i could not ping to ASA LAN while from ASA, i was able to ping remote LAN. &lt;/P&gt;&lt;P&gt;is there a problem with my configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;REMOTE#&lt;/P&gt;&lt;P&gt;REMOTE#ping 10.1.1.254 so fa0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 10.1.1.254, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;Packet sent with a source address of 10.2.2.254 &lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;REMOTE#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HQ-FW# &lt;/P&gt;&lt;P&gt;HQ-FW# ping 10.2.2.254 &lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 10.2.2.254, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;HQ-FW# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is the configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:06:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276043#M347129</guid>
      <dc:creator>Anuar Shahrin</dc:creator>
      <dc:date>2019-03-12T02:06:26Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276044#M347130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its not possible to ICMP or connect to an ASA interface IP address from behind another ASA interface. So this wont work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only situation where this will work is if you had a L2L&amp;nbsp; VPN between the devices. In that case the ASA would allow the connection coming through the VPN connection to reach the "inside" interface provided you had the below configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this clarifies things &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark the reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 07:20:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276044#M347130</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-03T07:20:09Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276045#M347131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Anuar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jouni is right ,Your config is wrong you have not confignured Site-2-site VPN. later on there are multiple things which you need to look after like NAT Exemptionm, ACLs etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Pankaj &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 07:53:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276045#M347131</guid>
      <dc:creator>pankaj29in</dc:creator>
      <dc:date>2013-07-03T07:53:00Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276046#M347132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Jouni and Pankaj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've configured the IPsec tunnel to the ASA,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below is the configuration of the router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;REMOTE(config)#do sh run &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;crypto isakmp key labtest address 192.168.1.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set MYSET esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;crypto map TUNNEL 1 ipsec-isakmp &lt;/P&gt;&lt;P&gt; description to HQ&lt;/P&gt;&lt;P&gt; set peer 192.168.1.2&lt;/P&gt;&lt;P&gt; set transform-set MYSET &lt;/P&gt;&lt;P&gt; match address 101&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; description P2P with FW&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.252&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; description connect to SW port 0/1&lt;/P&gt;&lt;P&gt; ip address 10.2.2.254 255.255.255.0&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto map TUNNEL&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.2&lt;/P&gt;&lt;P&gt;ip route 10.1.1.0 255.255.255.0 192.168.1.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.2.2.0 0.0.0.255 10.1.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;here is the ASA&lt;/P&gt;&lt;P&gt;REMOTE#ssh -l cisco 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Password: &lt;/P&gt;&lt;P&gt;Type help or '?' for a list of available commands.&lt;/P&gt;&lt;P&gt;HQ-FW&amp;gt; en&lt;/P&gt;&lt;P&gt;Password: *****&lt;/P&gt;&lt;P&gt;HQ-FW# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname HQ-FW&lt;/P&gt;&lt;P&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description P2P with router&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.1.2 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description Connect to SW-port 0/19&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.1.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list IN extended permit ip 10.2.2.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.1.1.0 255.255.255.0 10.2.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group IN in interface outside&lt;/P&gt;&lt;P&gt;access-group IN out interface outside&lt;/P&gt;&lt;P&gt;access-group IN in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set MYSET esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map MYMAP 1 set transform-set MYSET&lt;/P&gt;&lt;P&gt;crypto dynamic-map MYMAP 1 set reverse-route&lt;/P&gt;&lt;P&gt;crypto map dyn-map 10 ipsec-isakmp dynamic MYMAP&lt;/P&gt;&lt;P&gt;crypto map dyn-map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=============================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;the problem here, when i ping to ASA Lan, i keep on seeing this message in the router.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;*Jul&amp;nbsp; 3 10:06:13.890: %CRYPTO-4-RECVD_PKT_NOT_IPSEC: Rec'd packet not an IPSEC packet. (ip) vrf/dest_addr= /10.2.2.254, src_addr= 10.1.1.1, prot= 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;when i do this, it did not show any tunnel established. any suggestion?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;REMOTE#show crypto isakmp sa&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;IPv4 Crypto ISAKMP SA&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dst&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; state&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; conn-id slot status&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;IPv6 Crypto ISAKMP SA&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;REMOTE#show crypto ipsec sa&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface: FastEthernet0/1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: TUNNEL, local addr 10.2.2.254&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; protected vrf: (none)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; local&amp;nbsp; ident (addr/mask/prot/port): (10.2.2.0/255.255.255.0/0/0)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.1.1.0/255.255.255.0/0/0)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; current_peer 192.168.1.2 port 500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PERMIT, flags={origin_is_acl,}&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts compr. failed: 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not decompressed: 0, #pkts decompress failed: 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors 0, #recv errors 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 10.2.2.254, remote crypto endpt.: 192.168.1.2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 0x0(0)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound ah sas:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound pcp sas:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound ah sas:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound pcp sas:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;REMOTE#&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 10:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276046#M347132</guid>
      <dc:creator>Anuar Shahrin</dc:creator>
      <dc:date>2013-07-03T10:29:36Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276047#M347133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats great!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark the correct reply as answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Pankaj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 11:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276047#M347133</guid>
      <dc:creator>pankaj29in</dc:creator>
      <dc:date>2013-07-03T11:00:34Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276048#M347134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi pankaj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;im still seeing the ipsec is not established between asa and router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;the problem here, when i ping to ASA Lan, i keep on seeing this message in the router.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;*Jul&amp;nbsp;&amp;nbsp; 3 10:06:13.890: %CRYPTO-4-RECVD_PKT_NOT_IPSEC: Rec'd packet not an&amp;nbsp; IPSEC packet. (ip) vrf/dest_addr= /10.2.2.254, src_addr= 10.1.1.1, prot=&amp;nbsp; 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;when i do show crypto isakmp sa, it did not show any tunnel established. same goes to ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HQ-FW(config)# sh isakmp sa&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;There are no isakmp sas&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HQ-FW(config)# sh ipse&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HQ-FW(config)# sh ipsec sa&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;There are no ipsec sas&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any suggestion?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 11:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276048#M347134</guid>
      <dc:creator>Anuar Shahrin</dc:creator>
      <dc:date>2013-07-03T11:03:54Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276049#M347135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have incomplete L2L VPN configurations on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remove these&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no crypto map dyn-map interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no crypto dynamic-map MYMAP 1 set transform-set MYSET&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no crypto dynamic-map MYMAP 1 set reverse-route&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no crypto map dyn-map 10 ipsec-isakmp dynamic MYMAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then configure the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list L2LVPN extended permit ip 10.1.1.0 255.255.255.0 10.2.2.0 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map OUTSIDE-MAP 10 match address L2LVPN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map OUTSIDE-MAP 10 set peer 192.168.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map OUTSIDE-MAP 10 set transform-set MYSET&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map OUTSIDE-MAP interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto isakmp enable outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group 192.168.1.1 type ipsec-l2l&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group 192.168.1.1 ipsec-attributes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; pre-shared-key &lt;/STRONG&gt;&lt;PRE shared="" key=""&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then try again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 11:11:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276049#M347135</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-03T11:11:07Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276050#M347136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni Sir has answered it &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; , please do the changes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 11:28:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276050#M347136</guid>
      <dc:creator>pankaj29in</dc:creator>
      <dc:date>2013-07-03T11:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276051#M347137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; Gah, seems you have 3DES in ISAKMP policy and DES in the transform-set. Though naturally you dont really use DES anymore and not that much 3DES even.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually the transform-set on the ASA it different from the router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no crypto map OUTSIDE-MAP 10 set transform-set MYSET&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no crypto ipsec transform-set MYSET esp-des esp-md5-hmac &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ipsec transform-set MYSET esp-3des esp-md5-hmac &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map OUTSIDE-MAP 10 set transform-set MYSET&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The difference was that router is using 3DES while the ASA has DES configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 11:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276051#M347137</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-03T11:51:41Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276052#M347138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did the changes in the ASA as per your configuration and the Router to match the both policy 1. I can see both sites are now matching each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the curreny config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set MYSET esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map OUTSIDE-MAP 10 match address L2LVPN&lt;/P&gt;&lt;P&gt;crypto map OUTSIDE-MAP 10 set peer 192.168.1.1 &lt;/P&gt;&lt;P&gt;crypto map OUTSIDE-MAP 10 set transform-set MYSET&lt;/P&gt;&lt;P&gt;crypto map OUTSIDE-MAP interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto isakmp policy 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; authentication pre-share&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; encryption 3des&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; hash md5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; group 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; lifetime 86400&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 192.168.1.1 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 192.168.1.1 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; encr 3des&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; hash md5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; authentication pre-share&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; group 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp key labtest address 192.168.1.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set MYSET esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map TUNNEL 1 ipsec-isakmp &lt;/P&gt;&lt;P&gt; description to HQ&lt;/P&gt;&lt;P&gt; set peer 192.168.1.2&lt;/P&gt;&lt;P&gt; set transform-set MYSET &lt;/P&gt;&lt;P&gt; match address 101&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; description P2P with FW&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.252&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; crypto map TUNNEL&lt;/STRONG&gt; &amp;lt;----added this part as tunnel start point.&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from the show crypto ipsec sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;REMOTE#sh crypto ipsec sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface: FastEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: TUNNEL, local addr 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; protected vrf: (none)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; local&amp;nbsp; ident (addr/mask/prot/port): (10.2.2.0/255.255.255.0/0/0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.1.1.0/255.255.255.0/0/0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; current_peer 192.168.1.2 port 500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PERMIT, flags={origin_is_acl,}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts compr. failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not decompressed: 0, #pkts decompress failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors 0, #recv errors 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt; local crypto endpt.: 192.168.1.1, remote crypto endpt.: 192.168.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 0x0(0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound ah sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound pcp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound ah sas:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound pcp sas:&lt;/P&gt;&lt;P&gt;REMOTE#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HQ-FW# sh ipsec stats &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IPsec Global Statistics&lt;/P&gt;&lt;P&gt;-----------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Active tunnels: 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Previous tunnels: 0&lt;/P&gt;&lt;P&gt;Inbound&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Decompressed bytes: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dropped packets: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Replay failures: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentications: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentication failures: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Decryptions: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Decryption failures: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Decapsulated fragments needing reassembly: 0&lt;/P&gt;&lt;P&gt;Outbound&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Uncompressed bytes: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dropped packets: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentications: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentication failures: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encryptions: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encryption failures: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fragmentation successes: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Pre-fragmentation successses: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Post-fragmentation successes: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fragmentation failures: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Pre-fragmentation failures: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Post-fragmentation failures: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fragments created: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PMTUs sent: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PMTUs rcvd: 0&lt;/P&gt;&lt;P&gt;Protocol failures: 0&lt;/P&gt;&lt;P&gt;Missing SA failures: 0&lt;/P&gt;&lt;P&gt;System capacity failures: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HQ-FW# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 12:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276052#M347138</guid>
      <dc:creator>Anuar Shahrin</dc:creator>
      <dc:date>2013-07-03T12:18:50Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276053#M347139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the same &lt;STRONG&gt;"show crypto ipsec sa"&lt;/STRONG&gt; command on the ASA also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or &lt;STRONG&gt;"show vpn-sessiondb l2l"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that the L2L VPN is up but so far no traffic has come from the ASA or left for the ASA through the L2L VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue the following command TWICE on the ASA and share the second output with us&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 10.1.1.100 12345 10.2.2.200 12345&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is just meant to check what rules the traffic hits on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you could attach some host behind the router or ASA and generate traffic and see if the connections work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the router shouldnt require NAT0 configuration in a situation where there is no other NAT/PAT being done on the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 12:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276053#M347139</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-03T12:31:37Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276054#M347140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the output. Seems like drop by ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HQ-FW# packet-tracer input inside tcp 10.1.1.100 12345 10.2.2.200 12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: ACCESS-LIST&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype: &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Implicit Rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HQ-FW# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 12:41:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276054#M347140</guid>
      <dc:creator>Anuar Shahrin</dc:creator>
      <dc:date>2013-07-03T12:41:57Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276055#M347141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not even looking at the ACL again myself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems you have an incorrect ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should remove the current configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group IN out interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group IN in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list IN extended permit ip 10.2.2.0 255.255.255.0 any &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list IN permit ip 10.1.1.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group IN in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You essentially had an ACL that allowed traffic but the source network was defined as 10.2.2.0/24 which is the LAN of the router and not the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 12:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276055#M347141</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-03T12:46:37Z</dc:date>
    </item>
    <item>
      <title>remote LAN could not ping ASA inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276056#M347142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yea, i noticed that too. i already removed it. will try again. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks jouni,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 12:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-lan-could-not-ping-asa-inside-interface/m-p/2276056#M347142</guid>
      <dc:creator>Anuar Shahrin</dc:creator>
      <dc:date>2013-07-03T12:51:56Z</dc:date>
    </item>
  </channel>
</rss>

