<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cannot Ping Without Source in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453872#M733551</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Joseph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is not the ASA.&lt;/P&gt;&lt;P&gt;The ASA is routing to the deafult gateway to get to both remote networks.&lt;/P&gt;&lt;P&gt;If you specify the source on the router, then it gets routed correctly on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 May 2010 15:21:54 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-05-25T15:21:54Z</dc:date>
    <item>
      <title>Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453862#M733459</link>
      <description>&lt;P&gt;I have a router behind a Cisco ASA 5520. The router has interfaces which are carried on 2 seperate Crypto maps going to the same peer. I can ping across one of the interfaces but when I try to ping across the other it appears to be using the other Cryptomap so it doesnt find its way. If I ping and specify the source it uses the correct crypto map and works fine. i have a static route built telling it which interface to use but still with no luck. How can i force it to use the correct cryptomap ?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:50:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453862#M733459</guid>
      <dc:creator>jtmullis82</dc:creator>
      <dc:date>2019-03-11T17:50:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453863#M733463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Im sorry, It is the same cryptomap but with 2 different access-lists for the seperate subnets.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 May 2010 22:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453863#M733463</guid>
      <dc:creator>jtmullis82</dc:creator>
      <dc:date>2010-05-24T22:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453864#M733466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Joseph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have one crypto map on the ASA and connecting to two interfaces on the router?&lt;/P&gt;&lt;P&gt;What's exactly the problem that you're having? Could you elaborate a bit?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 May 2010 22:19:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453864#M733466</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-24T22:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453865#M733473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Below are the two access-lists i have built going over cryptomap 2. i have a router that has a IP of 10.1.25.251 and i can successfully ping the router on the other end which is 10.1.26.1. on the same router that has the 10.1.25.251 address i have a IP of 10.10.10.5 and when i try to ping the other end which is 10.10.30.6 it doesnt work. i ran a icmp trace on the ASA it sources from the inside 10.1.25.251. but when i do ping 10.10.30.6 source 10.10.10.5 the icmp trace shows the source as inside 10.10.10.5 and it works. not sure how to correct this. i have a static route telling anything 10.10.30.0/24 to route to 10.10.10.1 but still need to use source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!! ACCESS - LISTS !!&lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 10.10.10.0 255.255.255.0 10.10.30.0 255.255.255.0&lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 10.1.25.0 255.255.255.0 10.1.26.0 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 May 2010 22:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453865#M733473</guid>
      <dc:creator>jtmullis82</dc:creator>
      <dc:date>2010-05-24T22:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453866#M733482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Joseph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please correct me if i'm wrong....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The networks on the router behind the ASA are:&lt;/P&gt;&lt;P&gt;10.1.25.x&lt;/P&gt;&lt;P&gt;10.10.10.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's a VPN tunnel where you can PING from 10.1.25.251 to 10.1.26.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is:&lt;/P&gt;&lt;P&gt;When you attempt to PING to 10.10.30.6 from 10.10.10.5... is this a different VPN tunnel? I mean a tunnel to a different location?&lt;/P&gt;&lt;P&gt;I see that you have a route to 10.10.30.x pointing to 10.10.10.1&lt;/P&gt;&lt;P&gt;This means that is indeed another tunnel, so you should have both statements in a different ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this two examples go to different VPN tunnels, both lines of the ACL should belong to a separate ACL because they belong to a different peer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want, you can post the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 May 2010 22:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453866#M733482</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-24T22:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453867#M733492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;they are going to the same location on the same peer. the router on the other side ( which is behind a ASA5510 ) has the 10.1.26.1 address and also the 10.10.30.6. so i have one cryptomap going to one peer but 2 ACL's on it. i cannot get the prints for the other end until tomorrow but here are some prints from my local end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!! ASA SHOW RUN !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;YPG-ASA5520-1# show run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname YPG-ASA5520-1&lt;BR /&gt;enable password xeWGH4eCU0N7TfVY encrypted&lt;BR /&gt;passwd xeWGH4eCU0N7TfVY encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.1.25.18 test&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 6.7.0.13 255.255.254.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif internal&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.0.2.166 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;access-list 100 extended permit ip any any&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 10.10.10.0 255.255.255.0 10.10.20.0 255.255.255.0&lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 10.10.10.0 255.255.255.0 10.10.30.0 255.255.255.0&lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 10.1.25.0 255.255.255.0 10.1.26.0 255.255.255.0&lt;BR /&gt;access-list outside_3_cryptomap extended permit ip 10.10.10.0 255.255.255.0 10.10.40.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu internal 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;access-group 100 in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 6.7.0.1 1&lt;BR /&gt;route inside 10.1.25.0 255.255.255.0 10.10.10.5 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.0.2.0 255.255.255.0 inside&lt;BR /&gt;http 10.0.2.0 255.255.255.0 internal&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer 140.32.167.58&lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-DES-SHA&lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set peer 140.32.171.2&lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-DES-SHA&lt;BR /&gt;crypto map outside_map 3 match address outside_3_cryptomap&lt;BR /&gt;crypto map outside_map 3 set peer 131.120.38.2&lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-DES-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 5&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;tunnel-group 140.32.167.58 type ipsec-l2l&lt;BR /&gt;tunnel-group 140.32.167.58 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 140.32.171.2 type ipsec-l2l&lt;BR /&gt;tunnel-group 140.32.171.2 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 131.120.38.2 type ipsec-l2l&lt;BR /&gt;tunnel-group 131.120.38.2 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:69ef98a4d8ac38ebbdca0631b4932ba6&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!! ROUTER'S SHOW ROUTER INTERFACES !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;===============================================================================&lt;BR /&gt;Interface Table (Router: Base)&lt;BR /&gt;===============================================================================&lt;BR /&gt;Interface-Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Adm&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Opr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mode&amp;nbsp;&amp;nbsp;&amp;nbsp; Port/SapId&lt;BR /&gt;&amp;nbsp;&amp;nbsp; IP-Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PfxState&lt;BR /&gt;-------------------------------------------------------------------------------&lt;BR /&gt;system&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Network system&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10.1.25.251/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; n/a&lt;BR /&gt;to-5520&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Network 1/1/8&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10.10.10.5/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; n/a&lt;BR /&gt;to-7750A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Network 1/1/7&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10.1.32.74/30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; n/a&lt;BR /&gt;-------------------------------------------------------------------------------&lt;BR /&gt;Interfaces : 3&lt;BR /&gt;===============================================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!! ROUTER'S SHOW STATIC ROUTES !!&lt;/P&gt;&lt;P&gt;===============================================================================&lt;BR /&gt;Static Route Table (Router: Base)&amp;nbsp; Family: IPv4&lt;BR /&gt;===============================================================================&lt;BR /&gt;Prefix&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tag&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Met&amp;nbsp;&amp;nbsp;&amp;nbsp; Pref Type Act&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Next Hop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface&lt;BR /&gt;-------------------------------------------------------------------------------&lt;BR /&gt;10.1.25.251/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&amp;nbsp;&amp;nbsp;&amp;nbsp; NH&amp;nbsp;&amp;nbsp; Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10.10.10.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to-5520&lt;BR /&gt;10.1.25.252/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&amp;nbsp;&amp;nbsp;&amp;nbsp; NH&amp;nbsp;&amp;nbsp; Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10.1.32.73&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to-7750A&lt;BR /&gt;10.1.26.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&amp;nbsp;&amp;nbsp;&amp;nbsp; NH&amp;nbsp;&amp;nbsp; Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10.10.10.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to-5520&lt;BR /&gt;10.10.30.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&amp;nbsp;&amp;nbsp;&amp;nbsp; NH&amp;nbsp;&amp;nbsp; Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 10.10.10.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to-5520&lt;BR /&gt;-------------------------------------------------------------------------------&lt;BR /&gt;No. of Static Routes: 4&lt;BR /&gt;===============================================================================&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 May 2010 23:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453867#M733492</guid>
      <dc:creator>jtmullis82</dc:creator>
      <dc:date>2010-05-24T23:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453868#M733507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the ASA's perspective, it will encrypt this traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 10.10.10.0 255.255.255.0 10.10.30.0 255.255.255.0&lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 10.1.25.0 255.255.255.0 10.1.26.0 255.255.255.0&lt;/P&gt;&lt;P&gt;You mentioned that traffic from 10.1.25.x flows fine to 10.1.26.x&lt;/P&gt;&lt;P&gt;The problem is with traffic from 10.10.10.x to 10.10.30.x correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA, do a ''sh cry ips sa'' and check if you have an SA for those two networks.&lt;/P&gt;&lt;P&gt;Since traffic is flowing fine through the first line, you should see packets encrypted/decrypted, what about the second line?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 May 2010 23:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453868#M733507</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-24T23:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453869#M733519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I ping from the router to 10.1.26.1 it works. It uses Cryptomap 2 and the ACL " access-list outside_2_cryptomap extended permit ip 10.1.25.0 255.255.255.0 10.1.26.0 255.255.255.0"&lt;/P&gt;&lt;P&gt;Here is the print from the ICMP TRACE on the ASA.&lt;/P&gt;&lt;P&gt;ICMP echo request from inside:10.1.25.251 to outside:10.1.26.1 ID=49375 seq=5 len=56&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now on the same router i try to ping 10.10.30.6 which uses ACL " access-list outside_2_cryptomap extended permit ip 10.10.10.0 255.255.255.0 10.10.30.0 255.255.255.0" which is on the same cryptomap as you can see and going to the same peer. but when I initiate the ping from the router it sources it with the 10.1.25.251 address when it should source it from the boxes 10.10.10.5. this making me have to use " ping 10.10.30.6 source 10.10.10.5" when i try to ping from the box. here are the ICMP TRACE prints for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what i get when i only use " ping 10.10.30.6 "&amp;nbsp; This doesnt work&lt;/P&gt;&lt;P&gt;ICMP echo request from inside:10.1.25.251 to outside:10.10.30.6 ID=49376 seq=5 len=56&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what i get when i use " ping 10.10.30.6 source 10.10.10.5" This works&lt;/P&gt;&lt;P&gt;ICMP echo request from inside:10.10.10.5 to outside:10.10.30.6 ID=49377 seq=5 len=56&lt;/P&gt;&lt;P&gt;sorry i cannot show the full ICMP trace but the remote end router is currently turned off so it wont show it as working. the router will be turned back on shortly.&amp;nbsp; so my question is how do i get it to use the correct ACL on the cryptomap without me having to use the SOURCE parameter on the print. i need to be able to just put the command " print 10.1.26.1" and " print 10.10.30.6" without source. as i stated before i have static routes telling this router to push 10.10.30.0/24 to 10.10.10.1 ( which is the inside interface of my ASA" But for some reason i still have to use source.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 May 2010 13:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453869#M733519</guid>
      <dc:creator>jtmullis82</dc:creator>
      <dc:date>2010-05-25T13:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453870#M733529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If sending a PING to 10.10.30.x from the router, the router chooses to source its PING from 10.1.25.251 is because the routing&lt;BR /&gt;table points out that to reach 10.10.30.x is should use the 10.1.25.x interface.&lt;/P&gt;&lt;P&gt;You say that there's a route for 10.10.30.x pointing out via 10.10.10.1, but it does not seem to be working then... &lt;BR /&gt;What kind of router is this? &lt;BR /&gt;I saw the static routes that you post, but can you check the routing table to make sure that the router knows that to reach &lt;BR /&gt;10.10.30.x it should get out 10.10.10.5 instead than 10.1.25.251?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 May 2010 13:45:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453870#M733529</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-25T13:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453871#M733539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the router is a Alcatel Lucent 7705 SAR. The route table shows that 10.10.30.0/24 goes to 10.10.10.1. I believe the issue is the ASA, I need to specify where to route the 10.10.30.0/24 traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 May 2010 15:16:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453871#M733539</guid>
      <dc:creator>jtmullis82</dc:creator>
      <dc:date>2010-05-25T15:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453872#M733551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Joseph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is not the ASA.&lt;/P&gt;&lt;P&gt;The ASA is routing to the deafult gateway to get to both remote networks.&lt;/P&gt;&lt;P&gt;If you specify the source on the router, then it gets routed correctly on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 May 2010 15:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453872#M733551</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-25T15:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453873#M733571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Joseph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you test initiating the traffic from the remote site?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 May 2010 15:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453873#M733571</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-25T15:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Ping Without Source</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453874#M733583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i added some more ACL's to allow 10.1.25.0/24 to 10.10.30.0 and the opposite on the remote end ASA and now the link works.&lt;/P&gt;&lt;P&gt;thank you for your help with this matter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 May 2010 16:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-without-source/m-p/1453874#M733583</guid>
      <dc:creator>jtmullis82</dc:creator>
      <dc:date>2010-05-25T16:17:19Z</dc:date>
    </item>
  </channel>
</rss>

