<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: pix 6.3.5 ping interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787382#M1021189</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would open PING (ICMP) follow the process:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.5 10.1.1.5 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- and either&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conduit permit icmp 192.168.1.5 255.255.255.255 0.0.0.0 0.0.0.0 echo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.5 echo&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PING from Outbound:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.5 10.1.1.5 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- and either&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conduit permit icmp 192.168.1.5 255.255.255.255 0.0.0.0 0.0.0.0 echo-reply&lt;/P&gt;&lt;P&gt;conduit permit icmp 192.168.1.5 255.255.255.255 0.0.0.0 0.0.0.0 source-quench&lt;/P&gt;&lt;P&gt;conduit permit icmp 192.168.1.5 255.255.255.255 0.0.0.0 0.0.0.0 unreachable&lt;/P&gt;&lt;P&gt;conduit permit icmp 192.168.1.5 255.255.255.255 0.0.0.0 0.0.0.0 time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.5 echo-reply&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.5 source-quench&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.5 unreachable&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.5 time-exceeded&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More troubleshoting steps you can find from URL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dharmesh Purohit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 31 Jul 2007 19:31:34 GMT</pubDate>
    <dc:creator>purohit_810</dc:creator>
    <dc:date>2007-07-31T19:31:34Z</dc:date>
    <item>
      <title>pix 6.3.5 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787380#M1021179</link>
      <description>&lt;P&gt;I cannot ping external interface of pix from inside. Access list permits this traffic. I cannot find anything in logs. What is missing?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:51:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787380#M1021179</guid>
      <dc:creator>dragec</dc:creator>
      <dc:date>2019-03-11T10:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: pix 6.3.5 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787381#M1021185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are not missing anything. The pix will not allow you to ping a "remote" interface ie. you can ping the inside interface from the inside, you can ping the outside interface from the outside. But you can't ping the inside interface from outside and the outside from inside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note with pix v7.x you can allow this by using the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;managment-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2007 06:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787381#M1021185</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-07-31T06:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: pix 6.3.5 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787382#M1021189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would open PING (ICMP) follow the process:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.5 10.1.1.5 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- and either&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conduit permit icmp 192.168.1.5 255.255.255.255 0.0.0.0 0.0.0.0 echo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.5 echo&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PING from Outbound:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.5 10.1.1.5 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- and either&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conduit permit icmp 192.168.1.5 255.255.255.255 0.0.0.0 0.0.0.0 echo-reply&lt;/P&gt;&lt;P&gt;conduit permit icmp 192.168.1.5 255.255.255.255 0.0.0.0 0.0.0.0 source-quench&lt;/P&gt;&lt;P&gt;conduit permit icmp 192.168.1.5 255.255.255.255 0.0.0.0 0.0.0.0 unreachable&lt;/P&gt;&lt;P&gt;conduit permit icmp 192.168.1.5 255.255.255.255 0.0.0.0 0.0.0.0 time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!--- or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.5 echo-reply&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.5 source-quench&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.5 unreachable&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 192.168.1.5 time-exceeded&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More troubleshoting steps you can find from URL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dharmesh Purohit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2007 19:31:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787382#M1021189</guid>
      <dc:creator>purohit_810</dc:creator>
      <dc:date>2007-07-31T19:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: pix 6.3.5 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787383#M1021191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not have problem with pinging hosts. I have problem with pinging fw interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2007 03:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787383#M1021191</guid>
      <dc:creator>dragec</dc:creator>
      <dc:date>2007-08-01T03:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: pix 6.3.5 ping interface</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787384#M1021194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you were in the inside segment you can't ping the pix outside interface or DMZ. That's a pix thing. You can however, ping the interfaces (inside, outside, dmz, etc..) from the respective segment. For example, machines on the outside should be able to ping the PIX outside interface but will not be able to ping the PIX inside interface (assuming you have not blocked icmp on the pix interface). Machines in the inside can't ping pix outside interface but can ping inside interface. Think of it as you only can ping adjacent PIX interface only and not other ping interfaces. But you should be able to ping all other hosts in different zones assuming the proper security policy is applied.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2007 20:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-5-ping-interface/m-p/787384#M1021194</guid>
      <dc:creator>aalmuhajab</dc:creator>
      <dc:date>2007-08-02T20:32:39Z</dc:date>
    </item>
  </channel>
</rss>

