<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to ping outside interfaces (from outside) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746062#M8985</link>
    <description>&lt;P&gt;So both interfaces are unreachable by ping from outside.&lt;/P&gt;
&lt;P&gt;Do you have configured a default route on outside interface?&lt;/P&gt;</description>
    <pubDate>Tue, 13 Nov 2018 19:19:51 GMT</pubDate>
    <dc:creator>AndreaTornaghi</dc:creator>
    <dc:date>2018-11-13T19:19:51Z</dc:date>
    <item>
      <title>Unable to ping outside interfaces (from outside)</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746042#M8982</link>
      <description>&lt;P&gt;I'm in the process of setting up AnyConnect VPN to our ASA (5525) and in the process have realized that I'm unable to ping either of my outside interfaces from the internet.&amp;nbsp; A basic rundown of my setup:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Two outside interfaces -&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;outside&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;outside_centurylink&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(each routes to a separate internet circuit).&amp;nbsp;&amp;nbsp;I'm using policy based routing to utilize both internet circuits simultaneously.&amp;nbsp; This works without any issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have the following icmp settings configured:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;icmp permit any outside
icmp permit any unreachable outside
icmp permit any time-exceeded outside
icmp permit any echo-reply outside
icmp permit any outside_centurylink
icmp permit any unreachable outside_centurylink
icmp permit any time-exceeded outside_centurylink
icmp permit any echo-reply outside_centurylink&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Packet-tracer indicates that the icmp traffic should be allowed:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 68.xxx.xxx.xxx using egress ifc  identity

Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaaca0ba6b0, priority=121, domain=permit, deny=false
        hits=1019, user_data=0x0, cs_id=0x0, flags=0x0, protocol=1
        src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0
        input_ifc=outside_centurylink, output_ifc=identity

Phase: 3
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaac71cc1a0, priority=0, domain=nat-per-session, deny=true
        hits=11134872, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=any, output_ifc=any

Phase: 4
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaac7cbab50, priority=0, domain=inspect-ip-options, deny=true
        hits=1941717, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=outside_centurylink, output_ifc=any

Phase: 5
Type: CLUSTER-REDIRECT
Subtype: cluster-redirect
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaac7cb32d0, priority=208, domain=cluster-redirect, deny=false
        hits=3890, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=outside_centurylink, output_ifc=identity

Phase: 6
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaac7cb90e0, priority=66, domain=inspect-icmp, deny=false
        hits=3864, user_data=0x2aaac7cb8650, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
        src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0
        input_ifc=outside_centurylink, output_ifc=identity

Phase: 7
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaac7cba360, priority=66, domain=inspect-icmp-error, deny=false
        hits=3864, user_data=0x2aaac7cb98d0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
        src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0
        input_ifc=outside_centurylink, output_ifc=any

Phase: 8
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional Information:
 Forward Flow based lookup yields rule:
 in  id=0x2aaaca0c2f90, priority=13, domain=ipsec-tunnel-flow, deny=true
        hits=1079, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0
        src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
        dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
        input_ifc=outside_centurylink, output_ifc=any

Phase: 9
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 28363008, packet dispatched to next module
Module information for forward flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_inspect_icmp
snp_fp_adjacency
snp_fp_fragment
snp_ifc_stat

Module information for reverse flow ...

Result:
input-interface: outside_centurylink
input-status: up
input-line-status: up
output-interface: NP Identity Ifc
Action: allow&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only odd thing I can spot is from ASDM's packet tracer:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PacketTracer.png" style="width: 705px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/24046iD32045F5343BC43A/image-size/large?v=v2&amp;amp;px=999" role="button" title="PacketTracer.png" alt="PacketTracer.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone have any thoughts on this?&amp;nbsp; I'm pulling my hair out here and feel like there's got to be something obvious that I'm just overlooking.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746042#M8982</guid>
      <dc:creator>lucas.jereska</dc:creator>
      <dc:date>2020-02-21T16:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping outside interfaces (from outside)</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746053#M8983</link>
      <description>&lt;P&gt;For AnyConnect session are you using outside interface or&amp;nbsp;outside_centurylink interface?&lt;/P&gt;
&lt;P&gt;Did you&amp;nbsp;try to open a session on port 443 on both interface from internet?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you post your&amp;nbsp;config about AnyConnect?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 19:07:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746053#M8983</guid>
      <dc:creator>AndreaTornaghi</dc:creator>
      <dc:date>2018-11-13T19:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping outside interfaces (from outside)</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746057#M8984</link>
      <description>&lt;P&gt;My AnyConnect config is not yet completed - once I realized the interfaces were unreachable from outside I stopped to tackle that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;outside_centurylink is where AnyConnect will be enabled initially, which is why I was running the packet trace on that specific interface.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 19:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746057#M8984</guid>
      <dc:creator>lucas.jereska</dc:creator>
      <dc:date>2018-11-13T19:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping outside interfaces (from outside)</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746062#M8985</link>
      <description>&lt;P&gt;So both interfaces are unreachable by ping from outside.&lt;/P&gt;
&lt;P&gt;Do you have configured a default route on outside interface?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 19:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746062#M8985</guid>
      <dc:creator>AndreaTornaghi</dc:creator>
      <dc:date>2018-11-13T19:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping outside interfaces (from outside)</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746088#M8986</link>
      <description>&lt;P&gt;This prompted to go back and recheck the routing and I've learned a couple of things:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Ping to the outside interface is&amp;nbsp;&lt;EM&gt;working&lt;/EM&gt;.&amp;nbsp; It's only outside_centurylink that's not.&lt;/P&gt;
&lt;P&gt;2. The route that I set up for outside_centurylink is not in the routing table.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The gateway of last resort is the gateway for the outside interface - I'm guessing that traffic coming in from outside_centurylink is falling back to the gateway of last resort when trying to respond and failing since it's in a different subnet.&amp;nbsp; A cursory google search is pointing me to ECMP as a possible solution, so I may need to dig deeper there.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 19:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746088#M8986</guid>
      <dc:creator>lucas.jereska</dc:creator>
      <dc:date>2018-11-13T19:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to ping outside interfaces (from outside)</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746092#M8987</link>
      <description>&lt;P&gt;Ping is failing because ASA is answering with the wrong interface.&lt;/P&gt;
&lt;P&gt;You should track default route on outside and use the second outside interface as backup.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 19:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-outside-interfaces-from-outside/m-p/3746092#M8987</guid>
      <dc:creator>AndreaTornaghi</dc:creator>
      <dc:date>2018-11-13T19:57:23Z</dc:date>
    </item>
  </channel>
</rss>

