Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

Trouble passing traffic between sites using an ASA VPN solution

I am currently experiencing trouble with VPN traffic between two sites which has me at a loss. I'm sure it is something simple but I can not pinpoint it.

I have an ASA 5510 (running 9.0.3) that I am connecting to from an 819 router using NEM. The tunnel establishes and from anywhere on the inside networks I can access all of the remote site networks, however from the remote networks I can only access as far as the inside interface of the ASA, not even another device on the same subnet as the inside interface. I have checked the traffic for the SA and when pinging from the remote site I can see traffic from the remote network coming into the ASA, but no response. When pinging from behind the ASA I can see bi-directional traffic. I can not see anything in the logs to indicate that the traffic is being dropped, the routing looks good and the crypto maps should work, so I'm at a bit of a loss...

On my older ASA (running 8.2.1) that has a similar config I have numerous remote sites connected via the same methodology. When the 819 I'm using to test the new ASA is pointed to the old ASA it all works fine.

Any assistance would be greatly appreciated.


Hi Brown, Please check the

Hi Brown,


Please check the following things in your ASA configs.

1) Routing to the internal networks

2) Inspect icmp is enabled in your ASA service policy

3) Your NAT statements / Access-list / VPN configuration has changes in 8.3 or latest versions of software.




Cisco Employee

Hi ,Method to check packet

Hi ,

Method to check packet drops on ASA

You can initiate traffic from remote side and apply "cap asp type asp-drop all" captures.
Just check if you see the packets getting dropped on ASA using "show cap asp | in <ip_address>"
This will show you if the packets are getting dropped on the ASA.

Secondly , you can run "show asp drop" after each second (while running continuous traffic from remote side ) to check which section is showing increase in count (e.g flow denied by any rule or tcp packets not in order) and then proceed accordingly.

Dinesh Moudgil

P.S. Please rate helpful posts.

New Member

Thanks for the replies,Using

Thanks for the replies,

Using the "show asp drop" command on the ASA I can see that "NAT failed" is incrementing when I ping across. I've had a look, but it looks ok to me. This is my first attempt on a post 8.3 version though, so I'm obviously doing it wrong.

The relevant lines from the config are:

object network HEGT_CSN_LAN

object network CSN_LAN

nat (Inside,Outside) source static CSN_LAN CSN_LAN destination static HEGT_CSN_LAN HEGT_CSN_LAN

I am unable to ping from (819 internal Ethernet port) to (device on internal network behind the ASA), due to the NAT failure, however I can ping in reverse.

New Member

It looks like I might have it

It looks like I might have it resolved. I had the VPN NAT exemption statement after the dynamic web one in the config, therefore the return traffic was not being exempt. I have changed the order and it all looks like it's working.

Thanks for your assistance and pointing me in the right direction.

Cisco Employee

We are glad its resolved

We are glad its resolved.

Dinesh Moudgil

P.S. Please rate helpful posts.

CreatePlease login to create content