<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vpn clients on VPN tunnel ip_address range cannot ping each  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140019#M960676</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rick,&lt;/P&gt;&lt;P&gt;Done. after applying &lt;/P&gt;&lt;P&gt;"same-security-traffic permit intra-interface"&lt;/P&gt;&lt;P&gt;pings (icmp) are working between hosts on the VPN tunnel (172.16.8.0).&lt;/P&gt;&lt;P&gt;Could you please suggest, what is an "access list" command that would allow for example, any ip traffic between the hosts on the tunnel.&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;&lt;P&gt;BR, Melita   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Jan 2009 14:04:52 GMT</pubDate>
    <dc:creator>oanetadmin</dc:creator>
    <dc:date>2009-01-08T14:04:52Z</dc:date>
    <item>
      <title>Vpn clients on VPN tunnel ip_address range cannot ping each other</title>
      <link>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140015#M960672</link>
      <description>&lt;P&gt;Sylogs show that Cisco 5520 tears down all ICMP connections coming from one to another internal VPN tunnel host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN tunnel addresses are assigned through Address pool&lt;/P&gt;&lt;P&gt;172.16.8.0/24 &lt;/P&gt;&lt;P&gt;For example, once VPN connection established host 172.16.8.1 cannot ping any other host on 172.16.8.0 network &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Is this a misconfiguration issue? What kind of Security setting should be configured to allow this flow?&lt;/P&gt;&lt;P&gt;Please help. thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;important:&lt;/P&gt;&lt;P&gt;ASA is connected on public interface to Internet FW and on private interface to Intranet FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default routes on ASA are configured as follows:&lt;/P&gt;&lt;P&gt;"route private 0.0.0.0 0.0.0.0 172.16.7.65 tunneled&lt;/P&gt;&lt;P&gt;route public 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1"&lt;/P&gt;&lt;P&gt;This means that all tunneled traffic should  go through Intranet FW, which is true for all trafic from the VPN tunnel (172.16.8.x) to LAN but not for the traffic back to the tunnel (172.16.8.x). The latter will go out of the public interface and finish on the Internet FW, where the VPN tunnel address is spoofed. &lt;/P&gt;&lt;P&gt;Can someone explain why the tunnel address is going out through public interface? Thnx      &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140015#M960672</guid>
      <dc:creator>oanetadmin</dc:creator>
      <dc:date>2020-02-21T11:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: Vpn clients on VPN tunnel ip_address range cannot ping each</title>
      <link>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140016#M960673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perhaps it will clarify your confusion if you think from the perspective of the ASA: if it has a packet that it should send to the remote VPN peer, which interface should it use to send it? public or private?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most common reason why devices in the 172.16.8.0 subnet can not ping each other is a basic assumption in the ASA and PIX that by default it will not forward a packet out the same interface on which it was received. So if one remote client in 172.16.8.0 attempts to ping another remote client in that subnet, the request is received and the path to the destination is back out that interface. The way to get around this restriction is to configure:&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give this a try and let us know if it solves the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jan 2009 18:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140016#M960673</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2009-01-06T18:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: Vpn clients on VPN tunnel ip_address range cannot ping each</title>
      <link>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140017#M960674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rick, I appreciate your prompt reply.&lt;/P&gt;&lt;P&gt;If the security level of the private interface is at 100 and that of the public one at 0 by default, you mean that I should set the security level of the public one to 100 and enable the network traffic between the interfaces with the same security level, don't you?&lt;/P&gt;&lt;P&gt;I will give it a try. thanks again&lt;/P&gt;&lt;P&gt;Melita  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jan 2009 08:11:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140017#M960674</guid>
      <dc:creator>oanetadmin</dc:creator>
      <dc:date>2009-01-07T08:11:49Z</dc:date>
    </item>
    <item>
      <title>Re: Vpn clients on VPN tunnel ip_address range cannot ping each</title>
      <link>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140018#M960675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Melita&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NO I did not suggest that you change the security level of the public interface. Leave the security level of the public interface at 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to allow traffic between two interfaces with the same security level you would specify to allow inter interface traffic. What you need to do is to allow traffic to out the same interface that it entered on, which is intra interface traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jan 2009 18:30:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140018#M960675</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2009-01-07T18:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: Vpn clients on VPN tunnel ip_address range cannot ping each</title>
      <link>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140019#M960676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rick,&lt;/P&gt;&lt;P&gt;Done. after applying &lt;/P&gt;&lt;P&gt;"same-security-traffic permit intra-interface"&lt;/P&gt;&lt;P&gt;pings (icmp) are working between hosts on the VPN tunnel (172.16.8.0).&lt;/P&gt;&lt;P&gt;Could you please suggest, what is an "access list" command that would allow for example, any ip traffic between the hosts on the tunnel.&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;&lt;P&gt;BR, Melita   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jan 2009 14:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140019#M960676</guid>
      <dc:creator>oanetadmin</dc:creator>
      <dc:date>2009-01-08T14:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: Vpn clients on VPN tunnel ip_address range cannot ping each</title>
      <link>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140020#M960677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rick, &lt;/P&gt;&lt;P&gt;Done. after applying &lt;/P&gt;&lt;P&gt;"same-security-traffic permit intra-interface" &lt;/P&gt;&lt;P&gt;pings (icmp) are working between hosts on the VPN tunnel (172.16.8.0). &lt;/P&gt;&lt;P&gt;1. Somehow it works for icmp packet but not for the rest of the ip traffic. Could you please suggest, what is an "access list" command that would allow for example, any ip traffic between the hosts on the tunnel. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I also have a few static routes mapped to the management interface on ASA that point to several devices on the corporate LAN ; those devices cannot be reached by the hosts on the VPN tunnel, because ASA sends to them  packets incoming from the tunnel through the management interface instead of the private one (which is the default route for the tunneled traffic) and the packets are then spoofed on the external FW because expected from the ASA private interface. I hoped that the "..permit intra-interface" would have solve the issue but no...Is there a way to overcome this ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks in advance. &lt;/P&gt;&lt;P&gt;BR, Melita &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jan 2009 15:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140020#M960677</guid>
      <dc:creator>oanetadmin</dc:creator>
      <dc:date>2009-01-08T15:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: Vpn clients on VPN tunnel ip_address range cannot ping each</title>
      <link>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140021#M960678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Melita&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am glad that the intra-interface command fixed the initial problem. Without knowing a bit more about how the ASA is set up it is difficult to give really good advice about how to set up the access list, but it probably would be something like permit ip 172.16.8.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not clear why you have static routes for certain devices pointed through the management interface. But if you do I am not sure how you would route traffic from the VPN tunnels differently. If you need to keep the static routes pointed to the management interface then perhaps it might be possible to set up some address translation so that they look like they originate from the ASA when they get to the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jan 2009 18:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140021#M960678</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2009-01-08T18:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: Vpn clients on VPN tunnel ip_address range cannot ping each</title>
      <link>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140022#M960679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rick, I appreciate greatly all your help.&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Melita &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jan 2009 21:38:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-clients-on-vpn-tunnel-ip-address-range-cannot-ping-each/m-p/1140022#M960679</guid>
      <dc:creator>oanetadmin</dc:creator>
      <dc:date>2009-01-08T21:38:05Z</dc:date>
    </item>
  </channel>
</rss>

