cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
452
Views
0
Helpful
6
Replies

Pinging between two subnets connected to ASA5510

Oscar Martinez
Level 1
Level 1

Hello all, 

I'm having problems pinging from my data subnet (192.168.0.0/24) to my voice subnet (10.10.10.0/24). data subnet is connected to 0/1 and voice subnet to 0/2 on my ASA5510. I've tried adding static routes on each of the switches and enabled ip routing as well. Voice Switch has VLAN1 with ip 10.10.10.2 with 10.10.10.1 being the IP on 0/2 on ASA.  Likewise Data Switch has VLAN1 with ip 192.168.0.2 and interface 0/1 on ASA has 192.168.0.1.

Can someone please point me in the right direction?

Thank you! 

6 Replies 6

Dennis Mink
VIP Alumni
VIP Alumni

oscar,

can you ping the ASA IP address 192.168.0.1 from that data vlan and same from voice vlan.

can you ping the ASA's voice vlan IP address from the data vlan? can you ping the ASAs data vlan IP address from voice vlan?

narrow it down.

also, is there an ACL between data and voice if so, temporarily do a permit any any and test it again.

Please rate if helpful

Please remember to rate useful posts, by clicking on the stars below.

Hi Dennis good morning I just got into the office. 

I definitely should've included that information! 

Here are the results of the pinging tests: 

Data Switch (192.168.0.2) to it's default gateway (192.168.0.1)  OK!

Data Switch to 10.10.10.1 (Voice Subnet on Fa0/2 on ASA)  FAIL!

Voice Switch (10.10.10.2) to it's default gateway (10.10.10.1) OK!

Voice Switch to 192.168.0.1 (Data Subnet on Fa0/1  on ASA) FAIL!

Just to clarify, there are no VLANs configured in the switches other than the default VLAN 1. 

Let me know if you need any more information. 

Thank you!

how about an extended ping on your ASA from 192.168.0.1  to 10.10.10.2 does that ping?

and from  10.10.10.1 to 192.168.0.2?   are the fa0/1 and fa0/2 same security level interfaces?  ACLs?

Please rate if helpful

Please remember to rate useful posts, by clicking on the stars below.

Hi all, 

Thanks for your replies, been kinda busy lately but here is the current config of the ASA: 

ciscoasa# sh run
: Saved
:
: Serial Number: ********
: Hardware: ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1600 MHz
:
ASA Version 9.1(7)16
!
hostname ciscoasa
domain-name *********
enable password 8Ry2YjIyt7RRXU24 encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Ethernet0/0
description FIBER WAN LINK
speed 1000
duplex full
nameif outside
security-level 0
ip address ***.***.***.*** 255.255.255.0
!
interface Ethernet0/1
description DATA LAN
duplex full
nameif inside
security-level 100
ip address 192.168.0.1 255.255.255.0
!
interface Ethernet0/2
description VOICE LAN
nameif voice
security-level 100
ip address 10.10.10.1 255.255.255.0
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
management-only
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
!
boot system disk0:/asa917-16-k8.bin
ftp mode passive
clock timezone PST -8
clock summer-time PDT recurring 1 Sun Apr 2:00 last Sun Oct 2:00
dns domain-lookup inside
dns server-group DefaultDNS
name-server **********
name-server **********
domain-name **********
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network INSIDE_NAT
subnet 192.168.0.0 255.255.255.0
object network VOICE_NAT
subnet 10.10.10.0 255.255.255.0
description voice network
object network DIGIUM_PHONE
host 10.10.10.100
object service SIPPORT
service udp source eq sip
object-group protocol TCPUDP
protocol-object udp
protocol-object tcp
object-group service SIP_PORTS tcp-udp
port-object eq sip
access-list OUTSIDE_TO_INSIDE extended permit ip any any
access-list outside_access_in_1 extended permit object-group TCPUDP any object DIGIUM_PHONE object-group SIP_PORTS
access-list outside_access_in_1 extended permit icmp any 10.10.10.0 255.255.255.0
access-list outside_access_in_1 extended permit icmp any 192.168.0.0 255.255.255.0
pager lines 24
logging enable
logging timestamp
logging buffer-size 128000
logging console notifications
logging asdm notifications
mtu outside 1500
mtu inside 1500
mtu voice 1500
mtu management 1500
mtu voicegw 1500
ip verify reverse-path interface outside
ip verify reverse-path interface inside
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-771-150.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (voice,outside) source static DIGIUM_PHONE interface service any SIPPORT
!
object network INSIDE_NAT
nat (inside,outside) dynamic interface
object network VOICE_NAT
nat (voice,outside) dynamic interface
access-group outside_access_in_1 in interface outside
route outside 0.0.0.0 0.0.0.0 ***.***.***.*** 1
route inside 192.168.15.0 255.255.255.0 192.168.0.2 1
route inside 192.168.30.0 255.255.255.0 192.168.0.2 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 management
http 192.168.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck
ssh ***.***.***.*** 255.255.255.0 outside
ssh ***.***.***.*** 255.255.255.0 outside
ssh ***.***.***.*** 255.255.255.0 outside
ssh 0.0.0.0 0.0.0.0 outside
ssh ***.***.***.*** 255.255.255.255 outside
ssh 192.168.0.0 255.255.255.0 inside
ssh timeout 30
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0
dhcpd address 10.10.10.51-10.10.10.254 voice
dhcpd dns ***.***.***.*** ***.***.***.*** interface voice
dhcpd lease 14400 interface voice
dhcpd enable voice
!
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
!
threat-detection basic-threat
threat-detection statistics
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
ntp server 128.156.1.43 source outside prefer
ntp server 24.56.178.140 source outside
username omartinez password 9nZF1Yc8FKAsf4rB encrypted privilege 15
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
class class-default
user-statistics accounting
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:404f731b5bec0d4598e6be01b2c0888c
: end

Let me know if you need anything else. 

Thank you!

Have you added the command:

same-security traffic permit inter-interface

That's required to do what you're asking.

Hi Oscar,

Can you please provide the configuration of the ASA?

As you already told that you defined routes on switches and enabled routing.

This issue can be due to ACL on the interface of the ASA, NAT, etc.

Spooster IT Services Team
Review Cisco Networking for a $25 gift card