<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: default icmp behavior in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644362#M1036210</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allow only " echo-reply " in your outside interface , so only ur inside host can ping .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ref :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#topic0" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#topic0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;vanesh k&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 03 Dec 2006 17:49:18 GMT</pubDate>
    <dc:creator>network.king</dc:creator>
    <dc:date>2006-12-03T17:49:18Z</dc:date>
    <item>
      <title>default icmp behavior</title>
      <link>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644359#M1036206</link>
      <description>&lt;P&gt;What's the default icmp behavior on Pix?&lt;/P&gt;&lt;P&gt;I can't seem to ping from any inside hosts to any outside hosts...&lt;/P&gt;&lt;P&gt;What do I have to do to allow it, while blocking icmp initiated from outside?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644359#M1036206</guid>
      <dc:creator>huangedmc</dc:creator>
      <dc:date>2019-03-11T09:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: default icmp behavior</title>
      <link>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644360#M1036207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To be very sure, create/add ACL to allow ICMP from any inside host to ping external/internet host(s). Bind this ACL on the Inside interface, example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.1.10 --&amp;gt; Public IP&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.1.1.0 255.255.255.0 --&amp;gt; your internal segment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit icmp any any --&amp;gt; permit any icmp type from internal host to external&lt;/P&gt;&lt;P&gt;access-group in interface inside --&amp;gt; bind ACL to inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you already have existing ACL, just add it to the top, or before any deny statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allowing all ICMP type here is only for testing purposes only. Also, make sure on your Outside interface, do not block any ICMP (via any ACL).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Dec 2006 14:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644360#M1036207</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-03T14:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: default icmp behavior</title>
      <link>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644361#M1036208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the quick reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did exactly what you suggested, and it's still not going through.&lt;/P&gt;&lt;P&gt;I ping 63.240.76.72 from inside host, and get the following on Pix:&lt;/P&gt;&lt;P&gt;106014: Deny inbound icmp src outside:63.240.76.72 dst inside:192.168.1.10 (type 0, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show access-list:&lt;/P&gt;&lt;P&gt;access-list 101 line 1 permit icmp any any (hitcnt=2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like Pix is allowing icmp from inside out, but not from outside in.&lt;/P&gt;&lt;P&gt;So I created another ACL allowing inbound icmp, and applied it to outside interface, I can now ping from inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, how do I limit ping initiated from inside only?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Dec 2006 17:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644361#M1036208</guid>
      <dc:creator>huangedmc</dc:creator>
      <dc:date>2006-12-03T17:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: default icmp behavior</title>
      <link>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644362#M1036210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allow only " echo-reply " in your outside interface , so only ur inside host can ping .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ref :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#topic0" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#topic0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;vanesh k&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Dec 2006 17:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644362#M1036210</guid>
      <dc:creator>network.king</dc:creator>
      <dc:date>2006-12-03T17:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: default icmp behavior</title>
      <link>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644363#M1036212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks; this doc totally answered my question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Dec 2006 18:25:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-icmp-behavior/m-p/644363#M1036212</guid>
      <dc:creator>huangedmc</dc:creator>
      <dc:date>2006-12-03T18:25:57Z</dc:date>
    </item>
  </channel>
</rss>

