<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5520 ping interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130904#M892434</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lydia,&lt;/P&gt;&lt;P&gt;  You can not ping the interface IP 134.76.221.195 from any host within 134.76.221.0/25 network and vice-versa. This is the default an non-changeable behaviour of ASA. Yet, being able to ping or being able to "connect" other interface's IP  from a host connected to another interface is NOT! a necessity for any VPN operation. If you explain "We want to ping the IP of the interface 0/2.106 and from the Internet !because of VPN!" in details, then I will advise accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Dec 2008 13:31:40 GMT</pubDate>
    <dc:creator>Alan Huseyin Kayahan</dc:creator>
    <dc:date>2008-12-12T13:31:40Z</dc:date>
    <item>
      <title>ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130897#M892413</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what is necessary to ping an interface of the ASA? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is an interface (security-level 1) with a public ip address (a.b.c.d). We can't ping it from the internet and we also can't ping it from another inside network (other physical interface). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We tried "icmp permit host a.b.c.d interfacename". &lt;/P&gt;&lt;P&gt;We tried to create access rules for this interface: source and destination ANY, Servicee ICMP/ECHO/ECHO-REPLY. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have no idea what the problem is. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe someone can help us. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;greetings&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130897#M892413</guid>
      <dc:creator>lydia.walther</dc:creator>
      <dc:date>2019-03-11T14:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130898#M892415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;AN ACL should suffice, here is a copy of mine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any any source-quench &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you have this applied and you ping, what does the logs say?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Dec 2008 17:44:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130898#M892415</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2008-12-11T17:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130899#M892418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lydia,&lt;/P&gt;&lt;P&gt;   Best practise is adding inspection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;   class inspection_default&lt;/P&gt;&lt;P&gt;      inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Dec 2008 18:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130899#M892418</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-12-11T18:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130900#M892421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You cannot reach the remote interface if the traffic is sourced from a local segment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Dec 2008 18:17:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130900#M892421</guid>
      <dc:creator>vvarakan</dc:creator>
      <dc:date>2008-12-11T18:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130901#M892424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it is what we have: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map DEFAULT_POLICYMAP&lt;/P&gt;&lt;P&gt;	class DEFAULT_CLASSMAP&lt;/P&gt;&lt;P&gt;		â&amp;#128;¦&lt;/P&gt;&lt;P&gt;		â&amp;#128;¦&lt;/P&gt;&lt;P&gt;		Inspect icmp&lt;/P&gt;&lt;P&gt;		Inspect icmp error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, I configured: &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any any source-quench &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but the ping says â&amp;#128;&amp;#156;timeoutâ&amp;#128;&amp;#157;. In the logging of the ASA I can see: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;built inbound icmp connection; source my computer, destination the gateway of my computers subnet&lt;/P&gt;&lt;P&gt;then teardown icmp connection; source my computer, destination the gateway of my computers subnet&lt;/P&gt;&lt;P&gt;then teardown icmp connection; source my computer, destination the ip of the interface we want to ping&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But there is no deny. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not the outside interface we want to ping. It is another one we want to use for vpn. Outside-Interface, VPN-Interface and Inside-Interface are 3 physical interfaces. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;greetings Lydia&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2008 08:10:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130901#M892424</guid>
      <dc:creator>lydia.walther</dc:creator>
      <dc:date>2008-12-12T08:10:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130902#M892427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lydia,&lt;/P&gt;&lt;P&gt;   You can remove all access-lists, if you already have inspection in place. Make sure that this default_policymap is assigned global, not to an interface.&lt;/P&gt;&lt;P&gt;   Second, as previously mentioned, pinging an interface from a subnet bound to another interface is not possible. The only excpetion to this is IPSec VPN Tunnels that remote end terminated at the outside interface can ping the inside interface IP IF! this interface is assigned Management interface role with the command "management-access inside"&lt;/P&gt;&lt;P&gt;   Please describe us from which subnet connected to which interface you are trying to ping which interface. Posting the sanitized config would help, it may be a routing issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2008 11:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130902#M892427</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-12-12T11:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130903#M892431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.76.221.249 255.255.255.248 standby 10.76.221.250 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.101 (--&amp;gt;it is Gateway)&lt;/P&gt;&lt;P&gt; vlan 101&lt;/P&gt;&lt;P&gt; nameif service&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 134.76.221.126 255.255.255.128 standby 134.76.221.125 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2.106 (--&amp;gt; no Gateway, only one IP of the subnet)&lt;/P&gt;&lt;P&gt; vlan 106&lt;/P&gt;&lt;P&gt; nameif vpn&lt;/P&gt;&lt;P&gt; security-level 1&lt;/P&gt;&lt;P&gt; ip address 134.76.221.195 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router ospf 1&lt;/P&gt;&lt;P&gt; router-id 12.12.12.12&lt;/P&gt;&lt;P&gt; network 10.76.221.248 255.255.255.248 area 10.76.216.0&lt;/P&gt;&lt;P&gt; network 134.76.221.0 255.255.255.128 area 10.76.216.0&lt;/P&gt;&lt;P&gt; area 10.76.216.0&lt;/P&gt;&lt;P&gt; log-adj-changes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map DEFAULT_CLASSMAP&lt;/P&gt;&lt;P&gt; description classmap fuer alles&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map DEFAULT_POLICYMAP&lt;/P&gt;&lt;P&gt; class DEFAULT_CLASSMAP&lt;/P&gt;&lt;P&gt;  inspect dns &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect http &lt;/P&gt;&lt;P&gt;  inspect icmp &lt;/P&gt;&lt;P&gt;  inspect icmp error &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect snmp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;policy-map default_policymap&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy DEFAULT_POLICYMAP global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The private IP of our outside interface is an IP of a routing network. There is another router before our ASA making the connection to the internet. This router is also having the Gateway of the IP on interface 0/2.106. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My computer is in the subnet of interface 0/1.101. We want to ping the IP of the interface 0/2.106 and from the Internet because of VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2008 12:49:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130903#M892431</guid>
      <dc:creator>lydia.walther</dc:creator>
      <dc:date>2008-12-12T12:49:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130904#M892434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lydia,&lt;/P&gt;&lt;P&gt;  You can not ping the interface IP 134.76.221.195 from any host within 134.76.221.0/25 network and vice-versa. This is the default an non-changeable behaviour of ASA. Yet, being able to ping or being able to "connect" other interface's IP  from a host connected to another interface is NOT! a necessity for any VPN operation. If you explain "We want to ping the IP of the interface 0/2.106 and from the Internet !because of VPN!" in details, then I will advise accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2008 13:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130904#M892434</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-12-12T13:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130905#M892436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I know that it is not neccessary. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We wanted to test if the vpn-interface is reachable from the internet etc. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To test VPN we configured it for the outside interface. It worked! But like you see, it's a private IP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we configured another interface for VPN with 134.76.221.195. &lt;/P&gt;&lt;P&gt;And VPN is not working. The Cisco VPN Client says "it's not responding". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In both cases we tested the vpn connection from another network part (not saved via our ASA). &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2008 13:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130905#M892436</guid>
      <dc:creator>lydia.walther</dc:creator>
      <dc:date>2008-12-12T13:52:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130906#M892439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now its much more clear, thanks for explaination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When ASA is involved, this design is not applicable when ASA has to terminate the VPN itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Applicable design would be creating a sub-interface in next-hop router for ASA, (that is the router facing ASA g0/0 in 10.76.221.248/29), assign that sub-interface an IP in 134.76.221.0/128 (or it can be the physical interface itself facing ASA), and assign ASA's g0/0 another IP in that same subnet, then configure OSPF accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2008 14:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130906#M892439</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-12-12T14:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130907#M892441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you a lot for your time and your answers!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well I think it is not the right solution for us. Our network is a little bit complicated &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think we have to read first some manuals again and think about it. &lt;/P&gt;&lt;P&gt;We have a new idea at the moment and I think we will test it next week. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe we will write again here next week &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; then with a picture of the network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lydia&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2008 14:52:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-ping-interface/m-p/1130907#M892441</guid>
      <dc:creator>lydia.walther</dc:creator>
      <dc:date>2008-12-12T14:52:29Z</dc:date>
    </item>
  </channel>
</rss>

