<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA 5505 Cannot ping local traffic and local hosts cannot  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cannot-ping-local-traffic-and-local-hosts-cannot/m-p/1968736#M401638</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;If you were to chop your config, and paste them here, how are we to help you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, this is what you need to do. Let me know how it goes;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add this command&lt;/P&gt;&lt;P&gt;==============&lt;BR /&gt;global (Outside) 1 interface&lt;BR /&gt;nat (Inside) 1 10.51.253.210 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;// I hope you have something like these too;&lt;/P&gt;&lt;P&gt;access-list inside permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside permit ip any any&lt;/P&gt;&lt;P&gt;access-group inside in interface Inside&lt;/P&gt;&lt;P&gt;access-group outside in interface Outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Jul 2012 02:12:07 GMT</pubDate>
    <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
    <dc:date>2012-07-26T02:12:07Z</dc:date>
    <item>
      <title>Cisco ASA 5505 Cannot ping local traffic and local hosts cannot get out</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cannot-ping-local-traffic-and-local-hosts-cannot/m-p/1968735#M401637</link>
      <description>&lt;P&gt;I have, what I believe to be, a simple issue - I must be missing something.&lt;/P&gt;&lt;P&gt;Site to Site VPN with Cisco ASA's. VPN is up, and remote hosts can ping the inside int of ASA (10.51.253.209).&lt;/P&gt;&lt;P&gt;There is a PC (10.51.253.210) plugged into e0/1.&lt;/P&gt;&lt;P&gt;I know the PC is configured correctly with Windows firewall tuned off. &lt;/P&gt;&lt;P&gt;The PC cannot get to the ouside world, and the ASA cannot ping 10.51.253.210.&lt;/P&gt;&lt;P&gt;I have seen this before, and I deleted VLAN 1, recreated it, and I could ping the local host without issue.&lt;/P&gt;&lt;P&gt;Basically, the VPN is up and running but PC 10.51.253.210 cannot get out.&lt;/P&gt;&lt;P&gt;Any ideas? Sanitized Config is below. Thanks !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname *****&lt;/P&gt;&lt;P&gt;domain-name *****&lt;/P&gt;&lt;P&gt;enable password N7FecZuSHJlVZC2P encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif Inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.51.253.209 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif Outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address ***** 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name *****&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.51.253.208 255.255.255.248 10.1.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.51.253.208 255.255.255.248 host 10.1.10.250&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.51.253.208 255.255.255.248 host 10.1.3.200&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.51.253.208 255.255.255.248 host 10.1.3.9&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.51.253.208 255.255.255.248 host 10.10.10.14&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.51.253.208 255.255.255.248 host 10.10.10.15&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.51.253.208 255.255.255.248 host 10.10.10.16&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.51.253.208 255.255.255.248 10.1.9.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.51.253.208 255.255.255.248 10.10.9.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.51.253.208 255.255.255.248 ***** 255.255.255.240&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.51.253.208 255.255.255.248 10.1.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.51.253.208 255.255.255.248 host 10.1.10.250&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.51.253.208 255.255.255.248 host 10.1.3.200&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.51.253.208 255.255.255.248 host 10.1.3.9&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.51.253.208 255.255.255.248 host 10.10.10.14&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.51.253.208 255.255.255.248 host 10.10.10.15&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.51.253.208 255.255.255.248 host 10.10.10.16&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.51.253.208 255.255.255.248 10.1.9.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.51.253.208 255.255.255.248 10.10.9.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.51.253.208 255.255.255.248 ***** 255.255.255.240&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu Inside &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any Outside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (Outside) 1 interface&lt;BR /&gt;nat (Inside) 0 access-list No_NAT&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 ***** 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set DPS_Set esp-3des esp-md5-hmac&lt;BR /&gt;crypto map DPS_Map 10 match address Outside_VPN&lt;BR /&gt;crypto map DPS_Map 10 set peer *****&lt;BR /&gt;crypto map DPS_Map 10 set transform-set *****&lt;BR /&gt;crypto map DPS_Map interface Outside&lt;BR /&gt;crypto isakmp enable Outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash md5&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 28800&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 Outside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access Inside&lt;/P&gt;&lt;P&gt;username test password P4ttSyrm33SV8TYp encrypted&lt;BR /&gt;tunnel-group ***** type ipsec-l2l&lt;BR /&gt;tunnel-group ***** ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:8d0adca63eab6c6c738cc4ab432f609d&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;1500&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:34:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cannot-ping-local-traffic-and-local-hosts-cannot/m-p/1968735#M401637</guid>
      <dc:creator>CSCO11589626</dc:creator>
      <dc:date>2019-03-11T23:34:34Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Cannot ping local traffic and local hosts cannot</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cannot-ping-local-traffic-and-local-hosts-cannot/m-p/1968736#M401638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;If you were to chop your config, and paste them here, how are we to help you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, this is what you need to do. Let me know how it goes;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add this command&lt;/P&gt;&lt;P&gt;==============&lt;BR /&gt;global (Outside) 1 interface&lt;BR /&gt;nat (Inside) 1 10.51.253.210 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;// I hope you have something like these too;&lt;/P&gt;&lt;P&gt;access-list inside permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside permit ip any any&lt;/P&gt;&lt;P&gt;access-group inside in interface Inside&lt;/P&gt;&lt;P&gt;access-group outside in interface Outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 02:12:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cannot-ping-local-traffic-and-local-hosts-cannot/m-p/1968736#M401638</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-26T02:12:07Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Cannot ping local traffic and local hosts cannot</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-cannot-ping-local-traffic-and-local-hosts-cannot/m-p/1968737#M401639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which way you are trying. Sending traffic via site to site is not working or traffic which you generate to outside world is not working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But you say ASA connected interface to PC itself is not pinging that is strange. But try setting up the specific rules for the outgoing connection and check. Instead of not having any ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is outside world the you may need to check on the NAT rules which is not correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is site to site then you may need to check few other things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate for the helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 04:35:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-cannot-ping-local-traffic-and-local-hosts-cannot/m-p/1968737#M401639</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-26T04:35:27Z</dc:date>
    </item>
  </channel>
</rss>

