03-05-2025 05:18 PM - edited 04-03-2025 06:54 PM
Hello,
I'm facing an issue with network connectivity between two firewalls. Here's the setup:
Has anyone encountered this kind of issue before? Any suggestions on things I might have missed or additional logs or captures I should review?
03-09-2025 06:48 AM - edited 03-09-2025 01:43 PM
After reviewing the configurations I didn't see anything ASA related that should prevent this ICMP ping flow.
I would next verify the route path between these two ASAs.
The BE-ASA routes traffic destined to 10.96.18.240 to 10.96.116.1. Since you are seeing the ICMP requests on the VPN-ASA I am fairly confident routes are right in that direction.
The VPN-ASA routes traffic destined to 10.96.16.245 to 10.96.18.254. Since you are not seeing any ICMP replies on the ASA-BE from the ASA-VPN, I would suspect those ICMP packets are being lost somewhere en route. The cause could be NAT/ACL/Routing, it just depends on the configurations set on networking devices on and between the 10.96.116.1 and 10.96.18.254 gateways (primarily in the ASA-VPN to ASA-BE direction).
Could you share the route tables for 10.96.116.1 and 10.96.18.254?
Also, I sent you a direct message - please take a look at that when you have a chance!
03-09-2025 12:20 PM
What is between the VPN ASA and BE ASA? Would it be possible to perform a capture or tcpdump on whatever is inbetween to verify further if the icmp packet is exiting the interface towards the BE ASA?
03-09-2025 05:32 PM
Can you mount the capture on the untrust_v116 interfaces of the ASA xtv-VF-ASA5555X-BEFW to see if the icmp replies are reaching the interfaces?
If you see the ICMP reply on the interfaces, check the ACLs untrust_v116_access_in regarding the ICMP response from the source 10.96.18.240 to the server.
If you do not see the response on the ASA interface, you must validate the intermediate devices and the routing at the ASA level.
xtv-vf-vpn-asa, the route that is applied to reach the destination in the configuration is the following:
route trust 10.96.16.0 255.255.255.0 10.96.18.254 1
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide