<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Allow ping to outside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702082#M534724</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Randy, &lt;/P&gt;&lt;P&gt;Can you please post out put of the following from this easy vpnclient asa ?&lt;/P&gt;&lt;P&gt;1&amp;gt; sh crypto isakmp sa &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2&amp;gt; sh crypto ipsec sa &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then issue 10-20 pings to the asa :- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3&amp;gt; sh crypto ipsec sa &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please when you are changing the ip's before posting , do like 1.1.1.1 = 1.x.x.1 , so that It's easier to understand the policies pushed by the headend to the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;Manish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Jul 2011 16:21:47 GMT</pubDate>
    <dc:creator>manish arora</dc:creator>
    <dc:date>2011-07-29T16:21:47Z</dc:date>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702063#M534673</link>
      <description>&lt;P&gt;How do I allow my outside interface to be pingable from the outside? I've tried configuring an access to allow icmp on the outside interface with no success. I'm still seeing the deny inbound icmp type 8 code 0 messages in the syslog.&amp;nbsp; Thanks. &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702063#M534673</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2019-03-11T21:05:27Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702064#M534674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please post the output of sh service-policy | in icmp , if nothing shows up then do :- &lt;/P&gt;&lt;P&gt;asa(config)# fixup protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if that doesn't help post the syslog + access-list and access-group for that access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 22:34:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702064#M534674</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-07-28T22:34:34Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702065#M534675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Inspect: icmp, packet 3745, drop 337, reset-drop 0.&amp;nbsp; Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 23:58:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702065#M534675</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-07-28T23:58:34Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702066#M534676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Randy, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please post the&amp;nbsp; "sh logging" output and also the access-list + access-group for the outside interface.&lt;/P&gt;&lt;P&gt;Also are you tring to ping the outside interface from inside the firewall or from outside nuetral location ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish ﻿&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 00:33:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702066#M534676</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-07-29T00:33:03Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702067#M534677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;lots of this....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-3-313001: Denied ICMP type=8, code=0 from x.x.x.x on interface outside&lt;/P&gt;&lt;P&gt;%ASA-3-313001: Denied ICMP type=8, code=0 from x.x.x.x on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;only thing in the access-list for the outside interface is &lt;/P&gt;&lt;P&gt;allow any any icmp then the implicit deny at the end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just want the outside interface pingable from an outside location for temporary testing.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 00:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702067#M534677</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-07-29T00:47:30Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702068#M534678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It might be foolish to ask but did you apply the access-list on the interface ?? &lt;/P&gt;&lt;P&gt;if yes then :- &lt;/P&gt;&lt;P&gt;1&amp;gt; Please provide the version running on the asa ? &lt;/P&gt;&lt;P&gt;2&amp;gt; paste output from&amp;nbsp; :- &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; asa# packet-tracer input outside icmp x.x.x.x ( remote ip add)&amp;nbsp; 8 0 X.X.X.X ( outside interface ip ) detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 01:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702068#M534678</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-07-29T01:09:12Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702069#M534679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes I created the access-rule in asdm&lt;/P&gt;&lt;P&gt;ver 8.2(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CP-PUNT&lt;/P&gt;&lt;P&gt;Subtype: l2-selective&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xcac596e0, priority=12, domain=punt, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=487, user_data=0xca8d9b20, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc9982370, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5439727, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc9983b90, priority=120, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=7629, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc9984aa8, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1348069, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xcaa2a028, priority=69, domain=ipsec-tunnel-flow, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=26, user_data=0xce47464, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc9984280, priority=66, domain=inspect-icmp, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=7662, user_data=0xc9984168, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc9984720, priority=66, domain=inspect-icmp-error, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1308719, user_data=0xc9984608, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: encrypt&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xca811740, priority=70, domain=encrypt, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=26, user_data=0xce2a3ec, cs_id=0xca5aa648, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=, mask=255.255.255.255, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (ipsec-spoof) IPSEC Spoof detected&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 01:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702069#M534679</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-07-29T01:23:22Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702070#M534680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have the source and destination ip address in any vpn interesting traffic acl ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Drop-reason: (ipsec-spoof) IPSEC Spoof detected :- &lt;/P&gt;&lt;P&gt;This counter will increment when the security appliance receives a&amp;nbsp; packet which should have been encrypted but was not. The packet matched&amp;nbsp; the inner header security policy check of a configured and established&amp;nbsp; IPSec connection on the security appliance but was received unencrypted.&amp;nbsp; This is a security issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 01:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702070#M534680</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-07-29T01:36:21Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702071#M534683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm using Easy VPN&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 01:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702071#M534683</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-07-29T01:56:41Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702072#M534685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should post your configuration ( remove passwords and change public ip's like 1.1.1.1 = 1.x.x.1 ) , I think there is some misconfiguration that is causing the firewall to see ICMP packets from your source as encrypted where as it should be encrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 02:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702072#M534685</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-07-29T02:19:49Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702073#M534689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check if ICMP Inspect is enabled in the global policy-map.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 13:03:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702073#M534689</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2011-07-29T13:03:18Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702074#M534697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ICMP inspect is enabled.&amp;nbsp; Thanks Tim. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 13:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702074#M534697</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-07-29T13:12:40Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702075#M534705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The address on the outside interface that we are trying to ping is assigned via DHCP.. Below is the running config.&amp;nbsp; We are using Easy VPN to establish a VPN connection back to our office.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA5505&lt;/P&gt;&lt;P&gt;domain-name &lt;/P&gt;&lt;P&gt;enable password encrypted&lt;/P&gt;&lt;P&gt;passwd encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.11.49 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa822-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffer-size 16000&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-634-53.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.11.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community &lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.11.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 30&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd lease 86400&lt;/P&gt;&lt;P&gt;dhcpd domain us&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd option 150 ip 10.20.20.11 10.20.20.12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.11.50-192.168.11.62 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 10.20.16.4 10.20.16.3 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vpnclient server x.x.x.x&lt;/P&gt;&lt;P&gt;vpnclient mode network-extension-mode&lt;/P&gt;&lt;P&gt;vpnclient nem-st-autoconnect&lt;/P&gt;&lt;P&gt;vpnclient vpngroup Kiosk password &lt;/P&gt;&lt;P&gt;vpnclient username branch password &lt;/P&gt;&lt;P&gt;vpnclient enable&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 10.20.0.1 source inside prefer&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCESer"&gt;https://tools.cisco.com/its/service/oddce/services/DDCESer&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-634-53.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 13:18:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702075#M534705</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-07-29T13:18:56Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702076#M534710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another idea:&lt;/P&gt;&lt;P&gt;Have you enabled icmp permissions on the outside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# interf eth0/0&lt;/P&gt;&lt;P&gt;ASA(config-if)# i&lt;/P&gt;&lt;P&gt;ASA(config-if)# icmp ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Specify packets to reject&lt;/P&gt;&lt;P&gt;&amp;nbsp; permit&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Specify packets to forward&lt;/P&gt;&lt;P&gt;&amp;nbsp; unreachable&amp;nbsp; Configure unreachable behavior&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 13:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702076#M534710</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2011-07-29T13:24:31Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702077#M534712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried 'icmp permit any outside' on eth0/0 with no success.&amp;nbsp; It's really frustrating.. Thanks for the suggestions. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 13:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702077#M534712</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-07-29T13:31:04Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702078#M534715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm assuming you're trying to ping the outside interface over VPN?&lt;/P&gt;&lt;P&gt;Try deactivating Antispoofing - &lt;/P&gt;&lt;P&gt;no ip verify reverse-path interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 13:52:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702078#M534715</guid>
      <dc:creator>Tim Schneider</dc:creator>
      <dc:date>2011-07-29T13:52:58Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702079#M534716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just tried that still no luck.&amp;nbsp; I'm trying to ping the outside interface IP address, not over the VPN tunnel.&amp;nbsp; I can ping all the way to the last hop before my outside interface IP, and I see the ICMP drops in the syslog so I know that the firewall is dropping the ping.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 13:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702079#M534716</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-07-29T13:57:18Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702080#M534719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Randy, &lt;/P&gt;&lt;P&gt;Are you trying to ping the outside interface from the vpnclient server ( the headend device ) ?&amp;nbsp; As far as I can think , there isn't any issue with ICMP allowed or inspect but since you are using this 5505 as an easy&amp;nbsp; vpnclient it is assuming the traffic from the headend should be recieved with IPsec encryption and not unencrypted. &lt;/P&gt;&lt;P&gt;can you please check the settings on the Headend device if thats the case ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 15:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702080#M534719</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-07-29T15:57:28Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702081#M534722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, I'm trying to ping from a server out on the interwebs... well i've tried pinging it from many locations honestly. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 16:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702081#M534722</guid>
      <dc:creator>rmessina</dc:creator>
      <dc:date>2011-07-29T16:03:14Z</dc:date>
    </item>
    <item>
      <title>Allow ping to outside interface</title>
      <link>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702082#M534724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Randy, &lt;/P&gt;&lt;P&gt;Can you please post out put of the following from this easy vpnclient asa ?&lt;/P&gt;&lt;P&gt;1&amp;gt; sh crypto isakmp sa &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2&amp;gt; sh crypto ipsec sa &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then issue 10-20 pings to the asa :- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3&amp;gt; sh crypto ipsec sa &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please when you are changing the ip's before posting , do like 1.1.1.1 = 1.x.x.1 , so that It's easier to understand the policies pushed by the headend to the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;Manish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jul 2011 16:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-ping-to-outside-interface/m-p/1702082#M534724</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-07-29T16:21:47Z</dc:date>
    </item>
  </channel>
</rss>

