<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to ping management IP on core switch inside the ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525644#M602756</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the packet-trace result:&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6fb43078, priority=12, domain=capture, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=636533, user_data=0x6f2e4548, cs_id=0x0, l3_type=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6f202788, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=55028024, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;10192.168.1.1&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; 255.255.255.240 management [&lt;STRONG&gt;&lt;EM&gt;The inside int ip is 192.168.1.2 not 192.168.1.1]&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acsnet_ACCESS_IN in interface acsnet&lt;BR /&gt;access-list acsnet_ACCESS_IN extended permit icmp any any&lt;BR /&gt;access-list acsnet_ACCESS_IN remark ***Developer access&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6f2922b8, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=302, user_data=0x6f125910, cs_id=0x0, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt; match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; set connection decrement-ttl&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6f3484b8, priority=7, domain=conn-set, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=156948, user_data=0x6ece3600, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6f204a48, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=744719, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6f203ee0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=57183, user_data=0x6f203e10, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6fb3f5b8, priority=12, domain=capture, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1163, user_data=0x6f2e4548, cs_id=0x6f1ba980, reverse, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=192.168.1.3, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0x6f2189a0, priority=12, domain=capture, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=941, user_data=0x6f2a25d8, cs_id=0x6fbf7a40, reverse, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 840571, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: output and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.1.3 using egress ifc management&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 5475.d0ef.d37f hits 13506&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: acsnet&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: management&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Sep 2010 03:28:06 GMT</pubDate>
    <dc:creator>mutabaruka1</dc:creator>
    <dc:date>2010-09-24T03:28:06Z</dc:date>
    <item>
      <title>Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525639#M602751</link>
      <description>&lt;P&gt;I have a site with a pair of ASA, a core switch (&lt;/P&gt;&lt;P&gt;4510) and 6 layer switches attached to the core. From outside&lt;/P&gt;&lt;P&gt;, I can ping all devices except the core management IP. I can&lt;/P&gt;&lt;P&gt;get to the core from the firewall or the access switches. icmp any any and replies is permitted on the outside int on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea why I can't ping the core switch from outside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525639#M602751</guid>
      <dc:creator>mutabaruka1</dc:creator>
      <dc:date>2019-03-11T18:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525640#M602752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paul,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; What kind of syslogs do you see when you try to ping from outside the network. Please enable debug level syslogs on the ASA and tell us what syslogs you see. The ASA is very verbose when it comes to telling you why it is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Magnus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 01:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525640#M602752</guid>
      <dc:creator>Magnus Mortensen</dc:creator>
      <dc:date>2010-09-24T01:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525641#M602753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Magnus:&lt;/P&gt;&lt;P&gt;I did a capture and I am only getting:&lt;/P&gt;&lt;P&gt;icmp: echo request.&lt;/P&gt;&lt;P&gt;No reply coming back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 02:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525641#M602753</guid>
      <dc:creator>mutabaruka1</dc:creator>
      <dc:date>2010-09-24T02:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525642#M602754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am assuming that you have taken capture on the internal interface that faces the core switch?&lt;/P&gt;&lt;P&gt;If you could run the packet-tracer command as follows, we would be able to roughly determine as to why the packet response is not coming back. Please follow this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input &lt;OUTSIDE-INTERFACE&gt; icmp &lt;OUTSIDE-HOST-IP&gt; 8 0 &lt;CORE-SWITCH-MANAGEMENT-IP&gt; detailed&lt;/CORE-SWITCH-MANAGEMENT-IP&gt;&lt;/OUTSIDE-HOST-IP&gt;&lt;/OUTSIDE-INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Narayanan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 02:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525642#M602754</guid>
      <dc:creator>nseshan</dc:creator>
      <dc:date>2010-09-24T02:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525643#M602755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok. Thanks. I will run the packet-tracer shortly. In meantim&lt;/P&gt;&lt;P&gt;e, here is the capture from the inside int:&lt;/P&gt;&lt;P&gt;31: 19:45:00.575943 802.1Q vlan#201 P0 192.168.1.1.137 &amp;gt; 192.168.1.2.137:&amp;nbsp; udp 50&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 32: 19:45:03.864258 192.168.1.3&amp;gt; 192.168.1.1: icmp: time exceeded in-transit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.1 is my pc&lt;/P&gt;&lt;P&gt;192.168.1.2 is the core switch&lt;/P&gt;&lt;P&gt;192.168.1.3 is the inside int of the firewall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 03:09:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525643#M602755</guid>
      <dc:creator>mutabaruka1</dc:creator>
      <dc:date>2010-09-24T03:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525644#M602756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the packet-trace result:&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6fb43078, priority=12, domain=capture, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=636533, user_data=0x6f2e4548, cs_id=0x0, l3_type=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6f202788, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=55028024, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;10192.168.1.1&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; 255.255.255.240 management [&lt;STRONG&gt;&lt;EM&gt;The inside int ip is 192.168.1.2 not 192.168.1.1]&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acsnet_ACCESS_IN in interface acsnet&lt;BR /&gt;access-list acsnet_ACCESS_IN extended permit icmp any any&lt;BR /&gt;access-list acsnet_ACCESS_IN remark ***Developer access&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6f2922b8, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=302, user_data=0x6f125910, cs_id=0x0, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt; match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; set connection decrement-ttl&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6f3484b8, priority=7, domain=conn-set, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=156948, user_data=0x6ece3600, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6f204a48, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=744719, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6f203ee0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=57183, user_data=0x6f203e10, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x6fb3f5b8, priority=12, domain=capture, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1163, user_data=0x6f2e4548, cs_id=0x6f1ba980, reverse, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=192.168.1.3, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0x6f2189a0, priority=12, domain=capture, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=941, user_data=0x6f2a25d8, cs_id=0x6fbf7a40, reverse, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 840571, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: output and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.1.3 using egress ifc management&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 5475.d0ef.d37f hits 13506&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: acsnet&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: management&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 03:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525644#M602756</guid>
      <dc:creator>mutabaruka1</dc:creator>
      <dc:date>2010-09-24T03:28:06Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525645#M602757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you attach a topology diagram or draw out the topology for clarity purposes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Narayanan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 03:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525645#M602757</guid>
      <dc:creator>nseshan</dc:creator>
      <dc:date>2010-09-24T03:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525646#M602758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The captures seems to show that the ASA is sending out "time exceeded in-transit" implying there is somekind of a &lt;STRONG&gt;routing loop&lt;/STRONG&gt; in your network. As suggested, please send a line topology with details of from where you are trying to ping to where.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, in addition, please attach the sanitized output of "show route" from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 03:49:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525646#M602758</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-24T03:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525647#M602759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I attached the diagram.&lt;/P&gt;&lt;P&gt;Here the scenario:&lt;/P&gt;&lt;P&gt;From my desk:&lt;/P&gt;&lt;P&gt;- I can ping the firewall fine&lt;/P&gt;&lt;P&gt;-I can ping all layer_2 switches&lt;/P&gt;&lt;P&gt;but I cannot ping the core switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the layer 2 switches:&lt;/P&gt;&lt;P&gt;I can ping the core&lt;/P&gt;&lt;P&gt;I can ping my pc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the core switch:&lt;/P&gt;&lt;P&gt;I can ping the firewall&lt;/P&gt;&lt;P&gt;I can ping all layer 2 switches&lt;/P&gt;&lt;P&gt;But I can not ping outside the firewall (my pc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks alot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 03:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525647#M602759</guid>
      <dc:creator>mutabaruka1</dc:creator>
      <dc:date>2010-09-24T03:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525648#M602760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so if i understand you right when you ping your PC from the layer 3 switch behind the core you can ping the PC, but when you try to ping the PC from the core itself it does not work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i understand you right please check the ip default gateway on your swicth and see if it point to the right device or ip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 04:12:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525648#M602760</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-09-24T04:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525649#M602761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The default gateway is setup fine. the core switch i&lt;/P&gt;&lt;P&gt;s set as the default gateway for the layer 2 switches and they are able&lt;/P&gt;&lt;P&gt; to get outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 04:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525649#M602761</guid>
      <dc:creator>mutabaruka1</dc:creator>
      <dc:date>2010-09-24T04:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525650#M602762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you span the switch port connected to asa and confirm if the packets are actually sent out by core, bcoz from the earlier discussion it looks like when we collect captures on the asa interfac we do not see anything,&lt;/P&gt;&lt;P&gt;can you also post the access-list for captures and the sh run int for the interface connected to core&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 04:26:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525650#M602762</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-09-24T04:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525651#M602763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here are the config of the interfaces on the core:&lt;/P&gt;&lt;P&gt;Vlan201 is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is Ethernet SVI, address is 5475.d0ef.d37f (bia 5475.d0ef.d37f)&lt;BR /&gt;&amp;nbsp; Description: management ip&lt;BR /&gt;&amp;nbsp; Internet address is 192.168.1.3&lt;BR /&gt;&amp;nbsp; MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; reliability 255/255, txload 1/255, rxload 1/255&lt;BR /&gt;&amp;nbsp; Encapsulation ARPA, loopback not set&lt;BR /&gt;&amp;nbsp; Keepalive not supported&lt;BR /&gt;&amp;nbsp; ARP type: ARPA, ARP Timeout 04:00:00&lt;BR /&gt;&amp;nbsp; Last input 00:00:00, output never, output hang never&lt;BR /&gt;&amp;nbsp; Last clearing of "show interface" counters never&lt;BR /&gt;&amp;nbsp; Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0&lt;BR /&gt;&amp;nbsp; Queueing strategy: fifo&lt;BR /&gt;&amp;nbsp; Output queue: 0/40 (size/max)&lt;BR /&gt;&amp;nbsp; 5 minute input rate 0 bits/sec, 0 packets/sec&lt;BR /&gt;&amp;nbsp; 5 minute output rate 0 bits/sec, 0 packets/sec&lt;BR /&gt;&amp;nbsp; L3 in Switched: ucast: 35486 pkt, 1975044 bytes - mcast: 0 pkt, 0 bytes&lt;BR /&gt;&amp;nbsp; L3 out Switched: ucast: 0 pkt, 0 bytes - mcast: 0 pkt, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 35510 packets input, 1976754 bytes, 0 no buffer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 24 broadcasts (0 IP multicasts)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 runts, 0 giants, 0 throttles&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4280 packets output, 524513 bytes, 0 underruns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 interface resets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output buffer failures, 0 output buffers swapped out&lt;/P&gt;&lt;P&gt;GigabitEthernet1/1 is up, line protocol is up (connected)&lt;BR /&gt;&amp;nbsp; Hardware is Gigabit Ethernet Port, address is c84c.751d.48b0 (bia c84c.751d.48b0)&lt;BR /&gt;&amp;nbsp; Description: To Firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp; MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; reliability 255/255, txload 1/255, rxload 1/255&lt;BR /&gt;&amp;nbsp; Encapsulation ARPA, loopback not set&lt;BR /&gt;&amp;nbsp; Keepalive set (10 sec)&lt;BR /&gt;&amp;nbsp; Full-duplex, 1000Mb/s, link type is auto, media type is 10/100/1000-TX&lt;BR /&gt;&amp;nbsp; input flow-control is off, output flow-control is off&lt;BR /&gt;&amp;nbsp; ARP type: ARPA, ARP Timeout 04:00:00&lt;BR /&gt;&amp;nbsp; Last input never, output never, output hang never&lt;BR /&gt;&amp;nbsp; Last clearing of "show interface" counters never&lt;BR /&gt;&amp;nbsp; Input queue: 0/2000/0/0 (size/max/drops/flushes); Total output drops: 0&lt;BR /&gt;&amp;nbsp; Queueing strategy: fifo&lt;BR /&gt;&amp;nbsp; Output queue: 0/40 (size/max)&lt;BR /&gt;&amp;nbsp; 5 minute input rate 2027000 bits/sec, 320 packets/sec&lt;BR /&gt;&amp;nbsp; 5 minute output rate 297000 bits/sec, 293 packets/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 56976467 packets input, 39831664720 bytes, 0 no buffer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 30027 broadcasts (0 multicasts)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 runts, 0 giants, 0 throttles&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input packets with dribble condition detected&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 61034896 packets output, 9453365738 bytes, 0 underruns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 babbles, 0 late collision, 0 deferred&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 lost carrier, 0 no carrier&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output buffer failures, 0 output buffers swapped out&lt;BR /&gt;GigabitEthernet2/1 is up, line protocol is up (connected)&lt;BR /&gt;&amp;nbsp; Hardware is Gigabit Ethernet Port, address is c84c.7549.7870 (bia c84c.7549.7870)&lt;BR /&gt;&amp;nbsp; Description: To firewall fo&lt;/P&gt;&lt;P&gt;&amp;nbsp; MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; reliability 255/255, txload 1/255, rxload 1/255&lt;BR /&gt;&amp;nbsp; Encapsulation ARPA, loopback not set&lt;BR /&gt;&amp;nbsp; Keepalive set (10 sec)&lt;BR /&gt;&amp;nbsp; Full-duplex, 1000Mb/s, link type is auto, media type is 10/100/1000-TX&lt;BR /&gt;&amp;nbsp; input flow-control is off, output flow-control is off&lt;BR /&gt;&amp;nbsp; ARP type: ARPA, ARP Timeout 04:00:00&lt;BR /&gt;&amp;nbsp; Last input never, output never, output hang never&lt;BR /&gt;&amp;nbsp; Last clearing of "show interface" counters never&lt;BR /&gt;&amp;nbsp; Input queue: 0/2000/0/0 (size/max/drops/flushes); Total output drops: 0&lt;BR /&gt;&amp;nbsp; Queueing strategy: fifo&lt;BR /&gt;&amp;nbsp; Output queue: 0/40 (size/max)&lt;BR /&gt;&amp;nbsp; 5 minute input rate 0 bits/sec, 0 packets/sec&lt;BR /&gt;&amp;nbsp; 5 minute output rate 2000 bits/sec, 4 packets/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10771 packets input, 735644 bytes, 0 no buffer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 7371 broadcasts (0 multicasts)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 runts, 0 giants, 0 throttles&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input packets with dribble condition detected&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4482092 packets output, 343325250 bytes, 0 underruns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 babbles, 0 late collision, 0 deferred&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 lost carrier, 0 no carrier&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output buffer failures, 0 output buffers swapped out&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 04:43:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525651#M602763</guid>
      <dc:creator>mutabaruka1</dc:creator>
      <dc:date>2010-09-24T04:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525652#M602764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on the attached topology, here is my understanding:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC(192.168.1.1)-----(NETWORK CLOUD)-----(acsnet)ASA(management)--------------(192.168.1.3)Core&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The captures you have attacehd is form the Management interface of the ASA. &lt;STRONG&gt;Please correct me if any of my above assumtions are wrong&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If my assumptions are right, I see tha the IP address of the PC is 192.168.1.1 which is the same as the Management interface network on the ASA and Core witch. The reason why we are seeing the TTL expired message could be due to this conflictng IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the ASA the 192.168.1.0 netowrk is on the management interface while the PC is coming in on the acsnet interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if what i have mentioned above is correct!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 04:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525652#M602764</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-24T04:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525653#M602765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i would like to know is, are you able to ping the firewall's next hop on the outside? Also, is there some kind of network running private IP's on the outside of the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly, is there a NAT rule or access-list statemtn permitting the pings to the core switch on the outside interface of the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Narayanan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 04:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525653#M602765</guid>
      <dc:creator>nseshan</dc:creator>
      <dc:date>2010-09-24T04:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping management IP on core switch inside the ASA</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525654#M602766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got it. THe ip route command were missing.&lt;/P&gt;&lt;P&gt;Thanks everybody.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2010 05:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-management-ip-on-core-switch-inside-the-asa/m-p/1525654#M602766</guid>
      <dc:creator>mutabaruka1</dc:creator>
      <dc:date>2010-09-24T05:34:00Z</dc:date>
    </item>
  </channel>
</rss>

