<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix 506E Allowing ping (ICMP) replies in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722874#M1020970</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paul &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to be of help and many thanks for using the rating system. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Aug 2007 11:21:48 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2007-08-06T11:21:48Z</dc:date>
    <item>
      <title>Pix 506E Allowing ping (ICMP) replies</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722867#M1020957</link>
      <description>&lt;P&gt;Lo all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having trouble with a PIX 506E 6.3(5), I am trying to get ping and tracert working from clients within my network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have added the following lines to my pix config: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- Create an access list to allow pings out&lt;/P&gt;&lt;P&gt;access-list ping_acl permit icmp any host 217.34.xxx.xxx echo-reply  &lt;/P&gt;&lt;P&gt;access-list ping_acl permit icmp any host 217.34.xxx.xxx time-exceeded  &lt;/P&gt;&lt;P&gt;access-list ping_acl permit icmp any host 217.34.xxx.xxx unreachable  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ping_acl in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But still no joy, any ideas would be much appreciated&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722867#M1020957</guid>
      <dc:creator>paul.baird</dc:creator>
      <dc:date>2019-03-11T10:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E Allowing ping (ICMP) replies</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722868#M1020959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm a little unclear as to what you are trying to achieve. If you want to allow your clients to ping out why are you applying this access-list on the outside interface ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the source addresses of your clients and what are the destination addresses you want to ping ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2007 09:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722868#M1020959</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-06T09:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E Allowing ping (ICMP) replies</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722869#M1020960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to follow:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to allow all clients on the internal network to be able to ping / tracert any public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My clients are on a 10.1.2.x/8 range&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2007 09:55:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722869#M1020960</guid>
      <dc:creator>paul.baird</dc:creator>
      <dc:date>2007-08-06T09:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E Allowing ping (ICMP) replies</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722870#M1020962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay makes a bit more sense i think.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm assuing you are Natting all your inside hosts to 217.34.x.x ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have an access-list applied to your inside interface ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps you could send whole config of pix minus any sensitive information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2007 10:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722870#M1020962</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-06T10:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E Allowing ping (ICMP) replies</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722871#M1020964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very new to PIX's so this is my working config for the network that I have managed to piece together:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside 217.34.xxx.xxx  255.255.255.240&lt;/P&gt;&lt;P&gt;ip address inside 10.1.1.1 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 217.34.xxx.xxx 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 217.34.xxx.xxx ftp 10.1.2.150 ftp&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 217.34.xxx.xxx http 10.1.1.3 http&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 217.34.xxx.xxx https 10.1.1.3 https&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- Create an access list to allow pings out&lt;/P&gt;&lt;P&gt;access-list ping_acl permit icmp any host 217.34.xxx.xxx echo-reply  &lt;/P&gt;&lt;P&gt;access-list ping_acl permit icmp any host 217.34.xxx.xxx time-exceeded  &lt;/P&gt;&lt;P&gt;access-list ping_acl permit icmp any host 217.34.xxx.xxx unreachable  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 217.34.xxx.xxx eq ftp&lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 217.34.xxx.xxx eq http&lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 217.34.xxx.xxx eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ping_acl in interface outside &lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;no fixup protocol dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- Enable logging&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging trap 4&lt;/P&gt;&lt;P&gt;logging host 10.1.1.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.50.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.0.0.0 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- SSH for use with Putty&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- Firewall details and passwords&lt;/P&gt;&lt;P&gt;hostname FIREWALL&lt;/P&gt;&lt;P&gt;domain-name C2.local&lt;/P&gt;&lt;P&gt;en pass xxxxxxxxx&lt;/P&gt;&lt;P&gt;pass xxxxxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool VPN_Pool 192.168.50.1-192.168.50.254&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.0.0.0 255.0.0.0 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- For Cisco VPN Client&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPN_Trans esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map VPN_Dyn 10 set transform-set VPN_Trans&lt;/P&gt;&lt;P&gt;crypto map VPN_Crypto 10 ipsec-isakmp dynamic VPN_Dyn&lt;/P&gt;&lt;P&gt;crypto map VPN_Crypto interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption aes-256&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup C2_xxxxxxxx address-pool VPN_Pool&lt;/P&gt;&lt;P&gt;vpngroup C2_xxxxxxxx idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup C2_xxxxxxxx password xxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;vpngroup C2_xxxxxxxx wins-server 10.1.1.3&lt;/P&gt;&lt;P&gt;vpngroup C2_xxxxxxxx dns-server 10.1.1.3&lt;/P&gt;&lt;P&gt;vpngroup C2_xxxxxxxx default-domain c2.local&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2007 10:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722871#M1020964</guid>
      <dc:creator>paul.baird</dc:creator>
      <dc:date>2007-08-06T10:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E Allowing ping (ICMP) replies</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722872#M1020966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paul &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You cannot apply two access-lists to the same interface in the same direction ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ping_acl in interface outside &lt;/P&gt;&lt;P&gt;access-group inbound in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to combine your two access-lists ie. ping_acl and inbound into one access-list and apply this to the interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment the only access-list applied to your outside interface is the inbound access-list which has no entries for icmp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2007 11:10:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722872#M1020966</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-06T11:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E Allowing ping (ICMP) replies</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722873#M1020968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You learn something new every day:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for that Jon works a treat, thought I was being tidy keeping them apart.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2007 11:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722873#M1020968</guid>
      <dc:creator>paul.baird</dc:creator>
      <dc:date>2007-08-06T11:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 506E Allowing ping (ICMP) replies</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722874#M1020970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paul &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to be of help and many thanks for using the rating system. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2007 11:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-allowing-ping-icmp-replies/m-p/722874#M1020970</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-06T11:21:48Z</dc:date>
    </item>
  </channel>
</rss>

