I am creating a VPN with Cisco 5525-X to a Palo Alto. I am not able to ping or connect to anything on their side but they are able to ping and connect to my side. I have the VPN configured like other VPNs and recently created one the same was with no problems. I ran the previous commands and looks like everything is good from what I see. Is this problem on my side or theirs?
object-group network Servers_18 description: | 10.18.31.30 - 33 Servers | network-object host 10.18.31.30 network-object host 10.18.31.31 network-object host 10.18.31.32 network-object host 10.18.31.33
object-group network 5024_LAN description: | LAN to VEN 2018-01-18 | group-object Servers_18
object-group network 5024_VEN_LAN description: | To VEN LAN 5024 2018-01-18 | network-object host 8.X.X.X
packet-tracer input INSIDE icmp 10.18.31.32 0 8 8.X.X.X
Phase: 1 Type: CAPTURE Subtype: Result: ALLOW Config: Additional Information: MAC Access list
Phase: 2 Type: ACCESS-LIST Subtype: Result: ALLOW Config: Implicit Rule Additional Information: MAC Access list
Phase: 3 Type: UN-NAT Subtype: static Result: ALLOW Config: nat (INSIDE,OUTSIDE) source static 5024_LAN 5024_LAN destination static 5024_VEN_LAN 5024_VEN_LAN description 5024 Additional Information: NAT divert to egress interface OUTSIDE Untranslate 8.X.X.X/0 to 8.X.X.X/0
Phase: 4 Type: CONN-SETTINGS Subtype: Result: ALLOW Config: class-map class-default match any policy-map global_policy class class-default set connection decrement-ttl service-policy global_policy global Additional Information:
Phase: 5 Type: NAT Subtype: Result: ALLOW Config: nat (INSIDE,OUTSIDE) source static 5024_LAN 5024_LAN destination static 5024_VEN_LAN 5024_VEN_LAN description 5024 Additional Information: Static translate 10.18.31.32/0 to 10.18.31.32/0
Phase: 6 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information:
Phase: 7 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information:
Phase: 8 Type: INSPECT Subtype: np-inspect Result: ALLOW Config: class-map inspection_default match default-inspection-traffic policy-map global_policy class inspection_default inspect icmp service-policy global_policy global Additional Information:
Phase: 9 Type: INSPECT Subtype: np-inspect Result: ALLOW Config: Additional Information:
Phase: 10 Type: FLOW-EXPORT Subtype: Result: ALLOW Config: Additional Information:
Phase: 11 Type: DEBUG-ICMP Subtype: Result: ALLOW Config: Additional Information:
Phase: 12 Type: VPN Subtype: encrypt Result: ALLOW Config: Additional Information:
Phase: 13 Type: NAT Subtype: rpf-check Result: ALLOW Config: nat (INSIDE,OUTSIDE) source static 5024_LAN 5024_LAN destination static 5024_VEN_LAN 5024_VEN_LAN description 5024 Additional Information:
Phase: 14 Type: USER-STATISTICS Subtype: user-statistics Result: ALLOW Config: Additional Information:
Phase: 15 Type: FLOW-CREATION Subtype: Result: ALLOW Config: Additional Information: New flow created with id 545584830, packet dispatched to next module
Result: input-interface: INSIDE input-status: up input-line-status: up output-interface: OUTSIDE output-status: up output-line-status: up Action: allow
packet-tracer input INSIDE icmp 10.18.31.32 0 8 8.X.X.X DEtailed
Phase: 1 Type: CAPTURE Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2aaac69786c0, priority=13, domain=capture, deny=false hits=11297500105, user_data=0x2aaac6324470, cs_id=0x0, l3_type=0x0 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0000.0000.0000 input_ifc=INSIDE, output_ifc=any
Phase: 2 Type: ACCESS-LIST Subtype: Result: ALLOW Config: Implicit Rule Additional Information: Forward Flow based lookup yields rule: in id=0x2aaac5756460, priority=1, domain=permit, deny=false hits=5645177141, user_data=0x0, cs_id=0x0, l3_type=0x8 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0100.0000.0000 input_ifc=INSIDE, output_ifc=any
Phase: 3 Type: UN-NAT Subtype: static Result: ALLOW Config: nat (INSIDE,OUTSIDE) source static 5024_LAN 5024_LAN destination static 5024_VEN_LAN 5024_VEN_LAN description 5024 Additional Information: NAT divert to egress interface OUTSIDE Untranslate 8.X.X.X/0 to 8.X.X.X/0
Phase: 4 Type: CONN-SETTINGS Subtype: Result: ALLOW Config: class-map class-default match any policy-map global_policy class class-default set connection decrement-ttl service-policy global_policy global Additional Information: Forward Flow based lookup yields rule: in id=0x2aaad8c91540, priority=7, domain=conn-set, deny=false hits=1590620, user_data=0x2aaad8c18610, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=INSIDE, output_ifc=any
Phase: 5 Type: NAT Subtype: Result: ALLOW Config: nat (INSIDE,OUTSIDE) source static 5024_LAN 5024_LAN destination static 5024_VEN_LAN 5024_VEN_LAN description 5024 Additional Information: Static translate 10.18.31.32/0 to 10.18.31.32/0 Forward Flow based lookup yields rule: in id=0x2aaad8736060, priority=6, domain=nat, deny=false hits=17244, user_data=0x2aaad02756a0, cs_id=0x0, flags=0x0, protocol=0 src ip/id=10.18.31.32, mask=255.255.255.255, port=0, tag=any dst ip/id=8.X.X.X, mask=255.255.255.255, port=0, tag=any, dscp=0x0 input_ifc=INSIDE, output_ifc=OUTSIDE
Phase: 6 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2aaac48cf110, priority=0, domain=nat-per-session, deny=true hits=381998060, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=any, output_ifc=any
Phase: 7 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2aaac58a53c0, priority=0, domain=inspect-ip-options, deny=true hits=354656113, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=INSIDE, output_ifc=any
Phase: 8 Type: INSPECT Subtype: np-inspect Result: ALLOW Config: class-map inspection_default match default-inspection-traffic policy-map global_policy class inspection_default inspect icmp service-policy global_policy global Additional Information: Forward Flow based lookup yields rule: in id=0x2aaac4fe3000, priority=70, domain=inspect-icmp, deny=false hits=12979109, user_data=0x2aaac65343c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1 src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0 input_ifc=INSIDE, output_ifc=any
Phase: 9 Type: INSPECT Subtype: np-inspect Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2aaac57eb850, priority=66, domain=inspect-icmp-error, deny=false hits=25243051, user_data=0x2aaac5419f50, cs_id=0x0, use_real_addr, flags=0x0, protocol=1 src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0 input_ifc=INSIDE, output_ifc=any
Phase: 10 Type: FLOW-EXPORT Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2aaace778a30, priority=18, domain=flow-export, deny=false hits=171412652, user_data=0x2aaacd3552b0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=INSIDE, output_ifc=any
Phase: 11 Type: DEBUG-ICMP Subtype: Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: in id=0x2aaad6bef870, priority=13, domain=debug-icmp-trace, deny=false hits=653621, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1 src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0 input_ifc=INSIDE, output_ifc=any
Phase: 12 Type: VPN Subtype: encrypt Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: out id=0x2aaad000bfe0, priority=70, domain=encrypt, deny=false hits=16, user_data=0x38282a3c, cs_id=0x2aaad8dd0c90, reverse, flags=0x0, protocol=0 src ip/id=10.18.31.32, mask=255.255.255.255, port=0, tag=any dst ip/id=8.X.X.X, mask=255.255.255.255, port=0, tag=any, dscp=0x0 input_ifc=any, output_ifc=OUTSIDE
Phase: 13 Type: NAT Subtype: rpf-check Result: ALLOW Config: nat (INSIDE,OUTSIDE) source static 5024_LAN 5024_LAN destination static 5024_VEN_LAN 5024_VEN_LAN description 5024 Additional Information: Forward Flow based lookup yields rule: out id=0x2aaacfede4c0, priority=6, domain=nat-reverse, deny=false hits=17241, user_data=0x2aaad8c9afb0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=10.18.31.32, mask=255.255.255.255, port=0, tag=any dst ip/id=8.X.X.X, mask=255.255.255.255, port=0, tag=any, dscp=0x0 input_ifc=INSIDE, output_ifc=OUTSIDE
Phase: 14 Type: USER-STATISTICS Subtype: user-statistics Result: ALLOW Config: Additional Information: Forward Flow based lookup yields rule: out id=0x2aaabd6e2a80, priority=0, domain=user-statistics, deny=false hits=410184676, user_data=0x2aaac6705cd0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0 input_ifc=any, output_ifc=OUTSIDE
Phase: 15 Type: FLOW-CREATION Subtype: Result: ALLOW Config: Additional Information: New flow created with id 545591009, packet dispatched to next module Module information for forward flow ... snp_fp_tracer_drop snp_fp_inspect_ip_options snp_fp_inspect_icmp snp_fp_translate snp_fp_dbg_icmp snp_fp_adjacency snp_fp_encrypt snp_fp_fragment snp_ifc_stat
Module information for reverse flow ...
Result: input-interface: INSIDE input-status: up input-line-status: up output-interface: OUTSIDE output-status: up output-line-status: up Action: allow
... View more