<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to Ping ASA Subinterface Across VPN Tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259311#M350234</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you change the any keyword on the nat statements to be as specific as possible.&lt;/P&gt;&lt;P&gt;Instead of "any" using the right output interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know when you do the changes&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 May 2013 16:45:42 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-05-09T16:45:42Z</dc:date>
    <item>
      <title>Unable to Ping ASA Subinterface Across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259308#M350227</link>
      <description>&lt;P&gt;Hello - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a remote ASA with four subinterfaces configured. All four subnets participate in a site-to-site VPN tunnel back to corporate. Currently I'm unable to ping the MGMT subinterface, although I have configured ICMP inspection as well as management-access. Running a debug on ICMP trace shows that, while I am trying to ping 10.33.2.1, the request comes across the debug as 10.33.0.1 (Data_VLAN subinterface). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas where I'm going wrong??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.3(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname VA-4500-ASA-LAN-5505-1&lt;/P&gt;&lt;P&gt;domain-name xxxxxxxx.com&lt;/P&gt;&lt;P&gt;enable password &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;passwd &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;no names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif Data_VLAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.33.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan6&lt;/P&gt;&lt;P&gt; nameif Voice_VLAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.33.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; nameif MGMT_VLAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.33.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan56&lt;/P&gt;&lt;P&gt; nameif Video_VLAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ip address 10.33.3.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan99&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xxxxxxxx 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Connected to Internet Router&lt;/P&gt;&lt;P&gt; switchport access vlan 99&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description Connected to 2960 Switch&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 2,6,10,56&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 10&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time DST recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup MGMT_VLAN&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; retries 3&lt;/P&gt;&lt;P&gt; timeout 5&lt;/P&gt;&lt;P&gt; name-server 10.0.204.10&lt;/P&gt;&lt;P&gt; name-server 10.100.204.10&lt;/P&gt;&lt;P&gt; domain-name xxxxxxxx.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network Data_VLAN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; subnet 10.33.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Voice_VLAN &lt;/P&gt;&lt;P&gt; subnet 10.33.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network MGMT_VLAN &lt;/P&gt;&lt;P&gt; subnet 10.33.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Video_VLAN &lt;/P&gt;&lt;P&gt; subnet 10.33.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list netflow-export extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list Outside_Cryptomap_1 extended permit ip 10.33.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list Outside_Cryptomap_1 extended permit ip 10.33.1.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list Outside_Cryptomap_1 extended permit ip 10.33.2.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list Outside_Cryptomap_1 extended permit ip 10.33.3.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffer-size 512000&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap notifications&lt;/P&gt;&lt;P&gt;logging asdm notifications&lt;/P&gt;&lt;P&gt;logging host MGMT_VLAN 10.0.8.11&lt;/P&gt;&lt;P&gt;no logging message 106015&lt;/P&gt;&lt;P&gt;no logging message 313001&lt;/P&gt;&lt;P&gt;no logging message 313008&lt;/P&gt;&lt;P&gt;no logging message 106023&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no logging message 710003&lt;/P&gt;&lt;P&gt;no logging message 106100&lt;/P&gt;&lt;P&gt;no logging message 302015&lt;/P&gt;&lt;P&gt;no logging message 302014&lt;/P&gt;&lt;P&gt;no logging message 302013&lt;/P&gt;&lt;P&gt;no logging message 302018&lt;/P&gt;&lt;P&gt;no logging message 302017&lt;/P&gt;&lt;P&gt;no logging message 302016&lt;/P&gt;&lt;P&gt;no logging message 302021&lt;/P&gt;&lt;P&gt;no logging message 302020&lt;/P&gt;&lt;P&gt;flow-export template timeout-rate 1&lt;/P&gt;&lt;P&gt;flow-export delay flow-create 60&lt;/P&gt;&lt;P&gt;mtu Data_VLAN 1500&lt;/P&gt;&lt;P&gt;mtu Voice_VLAN 1500&lt;/P&gt;&lt;P&gt;mtu MGMT_VLAN 1500&lt;/P&gt;&lt;P&gt;mtu Video_VLAN 1500&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (Data_VLAN,any) source static Data_VLAN Data_VLAN&lt;/P&gt;&lt;P&gt;nat (Voice_VLAN,any) source static Voice_VLAN Voice_VLAN&lt;/P&gt;&lt;P&gt;nat (Video_VLAN,any) source static Video_VLAN Video_VLAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (MGMT_VLAN,any) source static MGMT_VLAN MGMT_VLAN&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 50.199.31.202 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server ACS protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server ACS (MGMT_VLAN) host 10.0.8.250&lt;/P&gt;&lt;P&gt; timeout 5&lt;/P&gt;&lt;P&gt; key xxxxxxxx&lt;/P&gt;&lt;P&gt;aaa-server ACS (MGMT_VLAN) host 10.39.157.165&lt;/P&gt;&lt;P&gt; timeout 5&lt;/P&gt;&lt;P&gt; key xxxxxxxx&lt;/P&gt;&lt;P&gt;aaa authentication enable console ACS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console ACS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console ACS LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console ACS LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http xxxxxxxx 255.255.255.0 Outside&lt;/P&gt;&lt;P&gt;http xxxxxxxx 255.255.255.0 Outside&lt;/P&gt;&lt;P&gt;http xxxxxxxx 255.255.255.192 Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.0.0.0 MGMT_VLAN&lt;/P&gt;&lt;P&gt;http redirect MGMT_VLAN 80&lt;/P&gt;&lt;P&gt;http redirect Outside 80&lt;/P&gt;&lt;P&gt;snmp-server host MGMT_VLAN 10.0.8.11 community ***** version 2c&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec start stop&lt;/P&gt;&lt;P&gt;snmp-server enable traps entity config-change fru-insert fru-remove&lt;/P&gt;&lt;P&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map Outside_Map 1 match address Outside_Cryptomap_1&lt;/P&gt;&lt;P&gt;crypto map Outside_Map 1 set peer 192.64.157.61 &lt;/P&gt;&lt;P&gt;crypto map Outside_Map 1 set transform-set ESP-AES-128-SHA&lt;/P&gt;&lt;P&gt;crypto map Outside_Map interface Outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable Outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh scopy enable&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 Data_VLAN&lt;/P&gt;&lt;P&gt;ssh 10.0.0.0 255.0.0.0 MGMT_VLAN&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 MGMT_VLAN&lt;/P&gt;&lt;P&gt;ssh xxxxxxxx 255.255.255.0 Outside&lt;/P&gt;&lt;P&gt;ssh xxxxxxxx 255.255.255.0 Outside&lt;/P&gt;&lt;P&gt;ssh xxxxxxxx 255.255.255.192 Outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access MGMT_VLAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 10.0.4.21 prefer&lt;/P&gt;&lt;P&gt;tftp-server MGMT_VLAN 10.0.81.160 VA-4500-ASA-LAN-5505-1_Config&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username cisco password &amp;lt;removed&amp;gt; privilege 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group xxxxxxxx type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group xxxxxxxx ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map netflow-export-class&lt;/P&gt;&lt;P&gt; match access-list netflow-export&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map netflow-policy&lt;/P&gt;&lt;P&gt; class netflow-export-class&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:4fef1b392d267ef2da40dca56aad1687&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259308#M350227</guid>
      <dc:creator>Darren Roback</dc:creator>
      <dc:date>2019-03-12T01:40:46Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping ASA Subinterface Across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259309#M350230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;while I am trying to ping 10.33.2.1, the request comes across the debug as 10.33.0.1 (Data_VLAN subinterface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean that you see the destination being 10.33.0.1 or the source of the ICMP packet being 10.33.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 18:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259309#M350230</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-08T18:51:01Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping ASA Subinterface Across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259310#M350233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've performed a debug on ICMP traffic, and here's what I'm seeing from two different stations trying to ping 10.33.2.1. It's interesting as it lists the destination as the Data_VLAN subinterface (10.33.0.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo request from 10.0.8.11 to 10.33.0.1 ID=288 seq=3947 len=23&lt;/P&gt;&lt;P&gt;ICMP echo request from 10.0.81.160 to 10.33.0.1 ID=1 seq=14 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request from 10.0.8.11 to 10.33.0.1 ID=288 seq=3959 len=23&lt;/P&gt;&lt;P&gt;ICMP echo request from 10.0.81.160 to 10.33.0.1 ID=1 seq=15 len=32&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Definitely a weird one!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 16:14:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259310#M350233</guid>
      <dc:creator>Darren Roback</dc:creator>
      <dc:date>2013-05-09T16:14:00Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping ASA Subinterface Across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259311#M350234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you change the any keyword on the nat statements to be as specific as possible.&lt;/P&gt;&lt;P&gt;Instead of "any" using the right output interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know when you do the changes&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 16:45:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259311#M350234</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-09T16:45:42Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping ASA Subinterface Across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259312#M350237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've updated the NAT translations to the following, with the same result... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (MGMT_VLAN,Outside) source static MGMT_VLAN MGMT_VLAN&lt;/P&gt;&lt;P&gt;nat (Data_VLAN,Outside) source static Data_VLAN Data_VLAN&lt;/P&gt;&lt;P&gt;nat (Voice_VLAN,Outside) source static Voice_VLAN Voice_VLAN&lt;/P&gt;&lt;P&gt;nat (Video_VLAN,Outside) source static Video_VLAN Video_VLAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;Darren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 17:58:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259312#M350237</guid>
      <dc:creator>Darren Roback</dc:creator>
      <dc:date>2013-05-09T17:58:02Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping ASA Subinterface Across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259313#M350239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;What happens if you do &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ping MGMT_VLAN 10.0.8.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also can you get as many logs as possible from the ICMP session??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you clear the xlate table after the changes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 19:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259313#M350239</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-09T19:22:03Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping ASA Subinterface Across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259314#M350240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interestingly enough, if you source the ping from the MGMT_VLAN subinterface, it will work properly. I have cleared the XLATE and CONN table after making the NAT changes to no avail. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the output from an ICMP debug. Note that I am trying to ping 10.33.2.1 from 10.0.8.11 and 10.0.81.160.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo request from 10.0.8.11 to 10.33.0.1 ID=288 seq=3947 len=23&lt;/P&gt;&lt;P&gt;ICMP echo request from 10.0.81.160 to 10.33.0.1 ID=1 seq=14 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request from 10.0.8.11 to 10.33.0.1 ID=288 seq=3959 len=23&lt;/P&gt;&lt;P&gt;ICMP echo request from 10.0.81.160 to 10.33.0.1 ID=1 seq=15 len=32&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 19:41:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259314#M350240</guid>
      <dc:creator>Darren Roback</dc:creator>
      <dc:date>2013-05-09T19:41:08Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping ASA Subinterface Across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259315#M350241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay ,.. I would like to see the logs now, not the debugs,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will wait for them,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 19:49:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259315#M350241</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-09T19:49:51Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping ASA Subinterface Across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259316#M350242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Below are the logs - thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VA-4500-ASA-LAN-5505-1# sh log&lt;/P&gt;&lt;P&gt;Syslog logging: enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Facility: 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timestamp logging: enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Standby logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug-trace logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Console logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Monitor logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Buffer logging: level debugging, 285166 messages logged&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Trap logging: level notifications, facility 20, 1736 messages logged&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Logging to MGMT_VLAN 10.0.8.11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; History logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device ID: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mail logging: disabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASDM logging: level notifications, 2191 messages logged&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:05: %ASA-5-111008: User 'droback' executed the 'clear logging buffer' command.&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:05: %ASA-5-111010: User 'droback', running 'CLI' from IP 192.64.157.42, executed 'clear logging buffer'&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:07: %ASA-7-609002: Teardown local-host Outside:10.0.81.160 duration 0:00:02&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:07: %ASA-7-609002: Teardown local-host identity:10.33.0.1 duration 0:00:02&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:08: %ASA-7-609001: Built local-host Outside:192.175.48.42&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:10: %ASA-7-609001: Built local-host Outside:10.0.81.160&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:10: %ASA-7-609001: Built local-host identity:10.33.0.1&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:12: %ASA-7-609002: Teardown local-host Outside:10.0.81.160 duration 0:00:02&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:12: %ASA-7-609002: Teardown local-host identity:10.33.0.1 duration 0:00:02&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:14: %ASA-7-111009: User 'droback' executed cmd: show logging&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:15: %ASA-7-609001: Built local-host Outside:10.0.81.160&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:15: %ASA-7-609001: Built local-host identity:10.33.0.1&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:17: %ASA-7-609002: Teardown local-host Outside:10.0.81.160 duration 0:00:02&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:17: %ASA-7-609002: Teardown local-host identity:10.33.0.1 duration 0:00:02&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:20: %ASA-7-609001: Built local-host Outside:10.0.81.160&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:20: %ASA-7-609001: Built local-host identity:10.33.0.1&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:20: %ASA-7-609001: Built local-host Outside:192.175.48.6&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:22: %ASA-7-609002: Teardown local-host Outside:10.0.81.160 duration 0:00:02&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:22: %ASA-7-609002: Teardown local-host identity:10.33.0.1 duration 0:00:02&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:22: %ASA-7-609001: Built local-host identity:10.33.0.1&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:24: %ASA-7-609002: Teardown local-host identity:10.33.0.1 duration 0:00:02&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:24: %ASA-7-609001: Built local-host identity:10.33.0.1&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:24: %ASA-7-111009: User 'droback' executed cmd: show logging&lt;/P&gt;&lt;P&gt;May 09 2013 09:28:25: %ASA-7-609001: Built local-host Outside:10.0.81.160&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 20:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259316#M350242</guid>
      <dc:creator>Darren Roback</dc:creator>
      <dc:date>2013-05-09T20:15:17Z</dc:date>
    </item>
    <item>
      <title>Unable to Ping ASA Subinterface Across VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259317#M350243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check your inbox,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will analize the logs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 04:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-subinterface-across-vpn-tunnel/m-p/2259317#M350243</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-10T04:13:03Z</dc:date>
    </item>
  </channel>
</rss>

