<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to ping ASA interfaces (ASA intra-interface) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-interfaces-asa-intra-interface/m-p/1890225#M457064</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I required a desperate help on this.&lt;/P&gt;&lt;P&gt;Please help me some one&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 16 Apr 2012 12:53:58 GMT</pubDate>
    <dc:creator>awadheshkumar</dc:creator>
    <dc:date>2012-04-16T12:53:58Z</dc:date>
    <item>
      <title>Unable to ping ASA interfaces (ASA intra-interface)</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-interfaces-asa-intra-interface/m-p/1890224#M457063</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can not ping the DMZ hosts from my Inside or from other interface Network and vice-versa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mention below is my ASA Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname Test&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description + + + + Connection to Internet (Outside) + + + +&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 202.X.X.X 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description + + + + Connection to LAN (Inside) + + + +&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description VV&lt;/P&gt;&lt;P&gt; nameif VV&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa805-k8.bin&lt;/P&gt;&lt;P&gt;no ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone IST 5 30&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 203.122.X.X&lt;/P&gt;&lt;P&gt; name-server 203.122.X.X&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list 110 remark + + + +&amp;nbsp; OUTSIDE + + + +&lt;/P&gt;&lt;P&gt;access-list 110 extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 110 extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list 110 extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list 110 extended permit icmp any any source-quench &lt;/P&gt;&lt;P&gt;access-list 110 extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list 110 extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list 120 remark + + + + INSIDE + + + +&lt;/P&gt;&lt;P&gt;access-list 120 extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list PropRem_splitTunnelAcl remark VPN_Client_local_Lan_access&lt;/P&gt;&lt;P&gt;access-list PropRem_splitTunnelAcl standard permit host 0.0.0.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu VV 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool R_IP_vpn 192.168.0.240-192.168.0.250 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip local pool R_IP_VPN2 192.168.1.240-192.168.1.250 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any DMZ&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 2 202.63.X.X netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;global (outside) 3 202.63.X.X netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;global (outside) 4 202.63.X.X netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;global (outside) 5 202.63.X.X netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.18 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.X.X 192.168.1.11 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 202.63.X.X 192.168.0.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.X.X 192.168.1.20 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.X.X 192.168.1.19 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.12 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.6 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.13 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.7 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.14 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.201 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.202 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 202.63.x.x 192.168.1.9 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group 110 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 202.63.X.X 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto map DMZ_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map DMZ_map interface DMZ&lt;/P&gt;&lt;P&gt;crypto isakmp identity hostname &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable DMZ&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;group-policy PropRem internal&lt;/P&gt;&lt;P&gt;group-policy PropRem attributes&lt;/P&gt;&lt;P&gt; dns-server value 4.2.2.2 203.X.X.x&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value PropRem_splitTunnelAcl&lt;/P&gt;&lt;P&gt;tunnel-group PropRem type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group PropRem general-attributes&lt;/P&gt;&lt;P&gt; address-pool R_IP_VPN2&lt;/P&gt;&lt;P&gt; default-group-policy PropRem&lt;/P&gt;&lt;P&gt;tunnel-group PropRem ipsec-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-interfaces-asa-intra-interface/m-p/1890224#M457063</guid>
      <dc:creator>awadheshkumar</dc:creator>
      <dc:date>2019-03-11T22:53:37Z</dc:date>
    </item>
    <item>
      <title>Unable to ping ASA interfaces (ASA intra-interface)</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-interfaces-asa-intra-interface/m-p/1890225#M457064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I required a desperate help on this.&lt;/P&gt;&lt;P&gt;Please help me some one&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2012 12:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-interfaces-asa-intra-interface/m-p/1890225#M457064</guid>
      <dc:creator>awadheshkumar</dc:creator>
      <dc:date>2012-04-16T12:53:58Z</dc:date>
    </item>
    <item>
      <title>Unable to ping ASA interfaces (ASA intra-interface)</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-asa-interfaces-asa-intra-interface/m-p/1890226#M457065</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to bound an access-list with icmp echo-reply statement on your dmz interface. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2012 13:51:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-asa-interfaces-asa-intra-interface/m-p/1890226#M457065</guid>
      <dc:creator>maik.behley</dc:creator>
      <dc:date>2012-04-17T13:51:43Z</dc:date>
    </item>
  </channel>
</rss>

