<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VLAN tagging to ISP through ASA to remote site in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069325#M396758</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for late reply. Yes the posts has been very helpful for troublshooting. Please show how to rate post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Hulio.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Joseph&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Nov 2012 04:54:40 GMT</pubDate>
    <dc:creator>jlesa2457</dc:creator>
    <dc:date>2012-11-01T04:54:40Z</dc:date>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069315#M396721</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have a base license ASA 5510, and been trying to get ICMP working to check that we're routing and not hitting any NAT translation. We have a VLAN280 setup to ISP for VPN link to remote site and another VLAN281 for internet access for internal users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users can browse internet from (name _inside interface e0/1 access port) which is fine. When I do a ping to remote office through the VPN I get a response pinging from VLAN280 name VPN_Link. When I do a ping from name inside interface I don't get a response both are security level 100 with &lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure I'm missing something here any expertise would be very grateful as been at this for a few days now!!! I have just included the config that probably needs to be looked at for NAT exempt and routing issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.280&lt;/P&gt;&lt;P&gt; vlan 280&lt;/P&gt;&lt;P&gt; nameif vpn_link&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.11.xx.xx 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.281&lt;/P&gt;&lt;P&gt; vlan 281&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 203.xx.xx.xx 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------extracted for brievity--------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit ip 192.168.10.0 255.255.255.0 Inside_Network 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside-in extended permit tcp any host 203.xx.xx.xx eq www &lt;/P&gt;&lt;P&gt;access-list outside-in extended permit tcp any host 203.xx.xx.xx eq https &lt;/P&gt;&lt;P&gt;access-list outside-in extended permit tcp any host 203.xx.xx.xx eq 3389 &lt;/P&gt;&lt;P&gt;access-list outside-in extended permit tcp any host 203.xx.xx.xx eq https&lt;/P&gt;&lt;P&gt;access-list Tunnel_Traffic standard permit 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split extended permit ip 192.168.0.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split remark Traffic to Remote site NAT exempt&lt;/P&gt;&lt;P&gt;access-list split extended permit ip 192.168.0.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vpn_link_access_in remark Test&lt;/P&gt;&lt;P&gt;access-list vpn_link_access_in extended permit ip 192.168.10.0 255.255.255.0 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list vpn_link_access_in remark test&lt;/P&gt;&lt;P&gt;access-list vpn_link_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark Allow access from remote office&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.10.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list split&lt;/P&gt;&lt;P&gt;nat (inside) 5 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group vpn_link_access_in in interface vpn_link&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside-in in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 203.xx.xx.xx 1&lt;/P&gt;&lt;P&gt;route vpn_link 192.168.10.0 255.255.255.0 10.11.xx.xx 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know other config u may want to see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;appreciate the assist.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:14:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069315#M396721</guid>
      <dc:creator>jlesa2457</dc:creator>
      <dc:date>2019-03-12T00:14:35Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069316#M396729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The remote office range is 192.168.10.xx/24 which is reachable via interface VPN_link as mentioned but not via inside interface 192.168.0.xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2012 14:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069316#M396729</guid>
      <dc:creator>jlesa2457</dc:creator>
      <dc:date>2012-10-26T14:32:54Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069317#M396735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joseph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list&amp;nbsp; inside_access_in&amp;nbsp; permit ip 192.168.0.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2012 18:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069317#M396735</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-26T18:18:18Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069318#M396740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;added:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.10.0 255.255.255.0 Inside_Network 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to the above config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;still no luck:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# ping inside 192.168.10.1&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but again with vpn_link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ALTUS-ASA# ping vpn_link 192.168.10.1&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any other thoughts. I know by default this behaviour is not allowed, however I would of thought applying an access-list should overide this. Only inside_interface is NAT for internal users to web browsing which is working for some reason yesterday it broke, I had to do a permit any any??? to make it work though!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Oct 2012 00:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069318#M396740</guid>
      <dc:creator>jlesa2457</dc:creator>
      <dc:date>2012-10-27T00:33:35Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069319#M396743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;did you mean to add to extended ACL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in&lt;STRONG&gt; extended&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Oct 2012 00:56:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069319#M396743</guid>
      <dc:creator>jlesa2457</dc:creator>
      <dc:date>2012-10-27T00:56:06Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069320#M396748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt; Do the following and share the output you get ( full output)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp 192.168.0.10 8 0 192,168.10.10 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Oct 2012 19:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069320#M396748</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-27T19:43:47Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069321#M396750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please see below, I've only edit the dynamic NAT ip 203.xx.xx.xx, I see allow but still can't ping from ASA cmd line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp 192.168.0.10 8 0 192.168.10.10packet-tracer input inside icmp 192.168.0.10 8 0 192.168.10.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; vpn_link&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark Allow access from Erina&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: DEBUG-ICMP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside Inside_Network 255.255.255.0 vpn_link 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 5, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 203.xx.xx.xx smtp 192.168.0.10 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 192.168.0.10 eq 25 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 203.149.75.177/25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1122, untranslate_hits = 3497&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 5 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any vpn_link any&lt;/P&gt;&lt;P&gt;&amp;nbsp; dynamic translation to pool 5 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: DEBUG-ICMP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 13&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 14&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 163663, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: vpn_link&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# ping inside 192.168.10.10&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.10.10, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# ping vpn_link 192.168.10.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.10.2, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2012 01:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069321#M396750</guid>
      <dc:creator>jlesa2457</dc:creator>
      <dc:date>2012-10-28T01:33:56Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069322#M396753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joseph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet tracer looks good...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That can't be done. Ping from the ASA itself to a host on vlan x sourced from vlan y... You need to do it from a real host... And that my fried based on the packet tracer should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; If you need any assitance on that just let me know &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2012 06:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069322#M396753</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-28T06:07:42Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069323#M396755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you are correct. I was mislead by my friends in systems &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; team. Who logged into the remote router and advised they could not ping the inside_network. I logged in via VPN (had to change the tunnel_traffic to allow me to reach all internal traffic)and was able to!!!! My guess is they didn't do a source ping from 192.168.10.xx. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it was always working and I've been sent on a wild goose chase!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the obvious question is why is it not possible to ping from ASA? how would you test this unless your on a real host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also sorry for the many questions is there a command I can use like above to test if web(http traffic) from remote end to 192.168.10.xx to internet is working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks! &lt;/P&gt;&lt;P&gt;this turned out to be a melodrama!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2012 10:07:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069323#M396755</guid>
      <dc:creator>jlesa2457</dc:creator>
      <dc:date>2012-10-28T10:07:44Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069324#M396757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joseph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For security reasons, the asa was created to provide as much security as possible, it is intended that will be used to restrict and monitor traffic not to test connectivity across different broadcast domains.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now how to test this stuff?&lt;/P&gt;&lt;P&gt;Simple, using packet-tracer. Please get used to that command, I ensure that will help you a LOT on future cases where you thing there is no where to go..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example: How to know if an inside user can go to the internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.0.10 1026 4.2.2.2 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Remember to rate all of the helpful posts, If you do not know how to rate a post, let me know. I will help you on that as well &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2012 17:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069324#M396757</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-28T17:21:54Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069325#M396758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for late reply. Yes the posts has been very helpful for troublshooting. Please show how to rate post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Hulio.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Joseph&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2012 04:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069325#M396758</guid>
      <dc:creator>jlesa2457</dc:creator>
      <dc:date>2012-11-01T04:54:40Z</dc:date>
    </item>
    <item>
      <title>VLAN tagging to ISP through ASA to remote site</title>
      <link>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069326#M396759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joseph.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do not worry &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; Glad that I could see that I helped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can go to every reply and on the bottom you can see 5 stars, you can click them ( 1 being a bad answer and 5 being a great answer)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have any other question..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you can mark the question as answered ( as you open the discussion you are the only allowed to mark it as answered)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great night!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2012 05:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-tagging-to-isp-through-asa-to-remote-site/m-p/2069326#M396759</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-01T05:13:49Z</dc:date>
    </item>
  </channel>
</rss>

