<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can't ping the internal network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905966#M955378</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the config? What is the client pool?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Feb 2008 16:29:10 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2008-02-07T16:29:10Z</dc:date>
    <item>
      <title>Can't ping the internal network</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905960#M955372</link>
      <description>&lt;P&gt;I'm trying to ping and connect to my internal network thru a VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN connection is being made and got an IP adres on the client computer.&lt;/P&gt;&lt;P&gt;When I try to ping something in the internal network it does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This are my ACL rules:&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 10.0.0.0 255.0.0.0 128.2.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 192.168.10.0 255.255.255.0 128.2.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.0.0.0 255.0.0.0 128.2.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.0.0.0 255.0.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 128.2.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 10.1.1.2 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 [external IP] 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone tell me why it isnt working properly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:00:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905960#M955372</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2019-03-11T12:00:21Z</dc:date>
    </item>
    <item>
      <title>Re: Can't ping the internal network</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905961#M955373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Post a config or check config for "isakmp nat-traversal" or "crypto iskamp nat-traversal".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2008 15:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905961#M955373</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-02-07T15:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: Can't ping the internal network</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905962#M955374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Checklist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. sysopt connection permit-vpn&lt;/P&gt;&lt;P&gt;2. nat 0 for the inside hosts against the vpn-pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stefan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2008 15:34:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905962#M955374</guid>
      <dc:creator>s-andersson</dc:creator>
      <dc:date>2008-02-07T15:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: Can't ping the internal network</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905963#M955375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've got the lines sysopt connection permit-vpn and isakmp nat-traversal in my config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what do you mean by:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. nat 0 for the inside hosts against the vpn-pool ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2008 16:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905963#M955375</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2008-02-07T16:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: Can't ping the internal network</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905964#M955376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;He means this and it looks like you've already got it...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.0.0.0 255.0.0.0 128.2.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.0.0.0 255.0.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2008 16:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905964#M955376</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-02-07T16:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: Can't ping the internal network</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905965#M955377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;also got this lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2008 16:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905965#M955377</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2008-02-07T16:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: Can't ping the internal network</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905966#M955378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the config? What is the client pool?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2008 16:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905966#M955378</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-02-07T16:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: Can't ping the internal network</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905967#M955379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password * encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address [External IP] &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.1.1.7 255.255.0.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 10.0.0.0 255.0.0.0 128.2.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 192.168.10.0 255.255.255.0 128.2.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.0.0.0 255.0.0.0 128.2.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.0.0.0 255.0.0.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 128.2.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 192.168.10.1-192.168.10.254&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;monitor-interface inside&lt;/P&gt;&lt;P&gt;monitor-interface outside&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 10.1.1.2 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 [EXTERNAL IP] 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS host 10.1.8.40&lt;/P&gt;&lt;P&gt; key [RADIUS KEY]&lt;/P&gt;&lt;P&gt; radius-common-pw [RADIUS KEY]&lt;/P&gt;&lt;P&gt;aaa-server myradius protocol radius&lt;/P&gt;&lt;P&gt;aaa-server myradius host 10.1.8.40&lt;/P&gt;&lt;P&gt; timeout 5&lt;/P&gt;&lt;P&gt; key [RADIUS KEY]&lt;/P&gt;&lt;P&gt;group-policy clientgroup internal&lt;/P&gt;&lt;P&gt;group-policy clientgroup attributes&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 20&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value splittunnel&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http *.*.*.* 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;http *.*.*.* 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map argenta 20 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map mymap 10 match address 100&lt;/P&gt;&lt;P&gt;crypto map mymap 10 set peer [Client VPN IP] &lt;/P&gt;&lt;P&gt;crypto map mymap 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map mymap 20 ipsec-isakmp dynamic [Client Name]&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal  20&lt;/P&gt;&lt;P&gt;tunnel-group [Client VPN IP] type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group [Client VPN IP] ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group dailin type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group dailin general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpnpool&lt;/P&gt;&lt;P&gt; authentication-server-group RADIUS&lt;/P&gt;&lt;P&gt; default-group-policy clientgroup&lt;/P&gt;&lt;P&gt;tunnel-group dailin ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;telnet *.*.*.* 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet *.*.*.* 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 240&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;no dhcpd address 10.1.1.8-10.1.2.7 inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;[LIST TRUNCATED]&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Feb 2008 08:58:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905967#M955379</guid>
      <dc:creator>tbrinkma</dc:creator>
      <dc:date>2008-02-08T08:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: Can't ping the internal network</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905968#M955380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tristan&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;First of all, you should correct your split tunnel ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list splittunnel standard permit 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;no access-list splittunnel standard permit 128.2.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 10.0.0.0 255.0.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 128.2.0.0 255.255.0.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where is the 128.2.0.0 located? There is no route to that network that you can never reach this subnet&lt;/P&gt;&lt;P&gt; Make sure the following route exists in router with IP 10.1.1.2&lt;/P&gt;&lt;P&gt;ip route 192.168.10.0 255.255.255.0 10.1.1.7&lt;/P&gt;&lt;P&gt; For testing conenctivity, use telnet with desired port instead ping. You should allow icmp for getting ping to work and issue some commands like following &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;  management-access inside&lt;/P&gt;&lt;P&gt;  policy-map global_policy &lt;/P&gt;&lt;P&gt;  class inspection_default &lt;/P&gt;&lt;P&gt;  inspect icmp &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Feb 2008 15:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-the-internal-network/m-p/905968#M955380</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-02-09T15:39:00Z</dc:date>
    </item>
  </channel>
</rss>

