<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA &amp;quot;icmp&amp;quot; question. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089384#M1070384</link>
    <description>&lt;P&gt;&lt;I&gt;&amp;gt; I would expect the ASA to allow "echo" (not echo-reply). What was the source document?&lt;/I&gt;&lt;/P&gt;&lt;P&gt;I quoted example in ASA CLI Reference for command “icmp”.&lt;/P&gt;&lt;P&gt;&lt;I&gt;&amp;gt; Is the&amp;nbsp;&lt;FONT size="2"&gt;&lt;FONT face="courier new,courier"&gt;ASA-3-313001&lt;/FONT&gt;&lt;/FONT&gt; message showing any other information?&lt;/I&gt;&lt;/P&gt;&lt;P&gt;no - I copied content as stored on SYSLOG server, just with IP address obfuscated. ASA Log Reference explicitly states that &lt;I&gt;&lt;FONT size="2"&gt;&lt;FONT face="courier new,courier"&gt;313001&lt;/FONT&gt;&lt;/FONT&gt;&lt;/I&gt;&amp;nbsp;is associated with “icmp” command.&lt;/P&gt;</description>
    <pubDate>Wed, 20 May 2020 15:01:42 GMT</pubDate>
    <dc:creator>AlexFer</dc:creator>
    <dc:date>2020-05-20T15:01:42Z</dc:date>
    <item>
      <title>ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089094#M1070359</link>
      <description>&lt;P&gt;&lt;FONT size="2"&gt;Hi Experts,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;CLI Reference for "icmp" command states "&lt;EM&gt;The icmp command controls ICMP traffic that terminates on any ASA interface.&lt;/EM&gt;" As I read it, this is filtering on &lt;EM&gt;ingress&lt;/EM&gt; (ie. incoming ICMP message).&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;But this example in same document throws me off:&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2"&gt;&lt;EM&gt;The following example permits host 172.16.2.15 or hosts on subnet 172.22.1.0/16 to &lt;U&gt;ping&lt;/U&gt; the outside interface:&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;&lt;EM&gt;ciscoasa(config)# icmp permit host 172.16.2.15 &lt;FONT color="#FF0000"&gt;echo-reply&lt;/FONT&gt; outside&lt;BR /&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;FONT size="2" face="courier new,courier"&gt;&lt;EM&gt;ciscoasa(config)# icmp permit 172.22.1.0 255.255.0.0 &lt;FONT color="#FF0000"&gt;echo-reply&lt;/FONT&gt; outside&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;&lt;EM&gt;ciscoasa(config)# icmp permit any unreachable outside&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Surely, above "&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;&lt;FONT color="#FF0000"&gt;echo-reply&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;" should be "&lt;FONT face="courier new,courier"&gt;&lt;EM&gt;&lt;FONT color="#FF0000"&gt;echo&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;"?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;My reason for revisiting is that I'm receiving "&lt;FONT face="courier new,courier"&gt;%ASA-3-313001: Denied ICMP type=3, code=3 from {obfuscated} on interface external&lt;/FONT&gt;" which I don't expect, since "icmp" is provisioned thus:&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2" face="courier new,courier"&gt;5525# show running-config icmp&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any echo external&lt;BR /&gt;icmp permit any external&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" face="arial,helvetica,sans-serif"&gt;R's, Alex&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 06:57:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089094#M1070359</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2020-05-20T06:57:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089190#M1070366</link>
      <description>&lt;P&gt;Hi Alex,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could be due to your ICMP inspect configuration.&lt;/P&gt;&lt;P&gt;Please check the following articles regarding ICMP Inspection on ASA&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa94/config-guides/asdm74/firewall/asdm-74-firewall-config/inspect-basic.html#ID-2092-000007d4" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa94/config-guides/asdm74/firewall/asdm-74-firewall-config/inspect-basic.html#ID-2092-000007d4&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-blogs/cisco-asa-and-icmp-inspection/ba-p/3773485" target="_self"&gt;https://community.cisco.com/t5/security-blogs/cisco-asa-and-icmp-inspection/ba-p/3773485&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 09:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089190#M1070366</guid>
      <dc:creator>Panos Bouras</dc:creator>
      <dc:date>2020-05-20T09:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089338#M1070379</link>
      <description>&lt;P&gt;&lt;I&gt;&amp;gt; Could be due to your ICMP inspect &lt;/I&gt;&lt;/P&gt;&lt;P&gt;I can’t see how - ICMP Inspect is for through ASA traffic, not to/from ASA.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 14:06:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089338#M1070379</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2020-05-20T14:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089365#M1070381</link>
      <description>&lt;P&gt;I would expect the ASA to allow "echo" (not echo-reply). What was the source document?&lt;/P&gt;
&lt;P&gt;Is the&amp;nbsp;&lt;FONT size="2"&gt;&lt;FONT face="courier new,courier"&gt;ASA-3-313001&lt;/FONT&gt;&lt;/FONT&gt; message showing any other information? If not perhaps you could packet capture it - it could be a something other than an icmp echo coming into the ASA interface.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 14:39:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089365#M1070381</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-05-20T14:39:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089384#M1070384</link>
      <description>&lt;P&gt;&lt;I&gt;&amp;gt; I would expect the ASA to allow "echo" (not echo-reply). What was the source document?&lt;/I&gt;&lt;/P&gt;&lt;P&gt;I quoted example in ASA CLI Reference for command “icmp”.&lt;/P&gt;&lt;P&gt;&lt;I&gt;&amp;gt; Is the&amp;nbsp;&lt;FONT size="2"&gt;&lt;FONT face="courier new,courier"&gt;ASA-3-313001&lt;/FONT&gt;&lt;/FONT&gt; message showing any other information?&lt;/I&gt;&lt;/P&gt;&lt;P&gt;no - I copied content as stored on SYSLOG server, just with IP address obfuscated. ASA Log Reference explicitly states that &lt;I&gt;&lt;FONT size="2"&gt;&lt;FONT face="courier new,courier"&gt;313001&lt;/FONT&gt;&lt;/FONT&gt;&lt;/I&gt;&amp;nbsp;is associated with “icmp” command.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 15:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4089384#M1070384</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2020-05-20T15:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090629#M1070426</link>
      <description>&lt;P&gt;The log message indicates it is being generated due to a type 3 code 3 message. That indicates host unreachable / port unreachable. A basic ping (echo request) would be type 8.&lt;/P&gt;
&lt;P&gt;Replies to traceroute initiated from inside your network would include icmp unreachable messages. Those need to be explicitly permitted if you want to allow that function. It would require something like this:&lt;/P&gt;
&lt;PRE&gt;access-list outside_access_in extended permit icmp any any time-exceeded 
access-list outside_access_in extended permit icmp any any unreachable &lt;/PRE&gt;
&lt;P&gt;...along with the following in a class-map (that's referenced in your policy-map global_policy and applied via service-policy):&lt;/P&gt;
&lt;PRE&gt; class class-default
  set connection decrement-ttl
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 11:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090629#M1070426</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-05-22T11:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090677#M1070428</link>
      <description>&lt;P&gt;Surely, log messages &lt;SPAN&gt;313001 is not associated with deny by access-group? Cisco Log Reference specifically mentions “icmp” command.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 12:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090677#M1070428</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2020-05-22T12:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090686#M1070429</link>
      <description>&lt;P&gt;No, I'm not saying that message is due to any deny by access group.&lt;/P&gt;
&lt;P&gt;The message indicates the ASA received the ICMP message and is discarding it. The ASA will do that for ICMP messages other than the echo requests (type &lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt; if all you have configured is to allow the ASA to reply to ICMP on the external interface.&lt;/P&gt;
&lt;P&gt;I was going beyond the initial question and offering a theory as to why it is discarding ICMP type 3 (unreachable) messages.&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 13:00:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090686#M1070429</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-05-22T13:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090707#M1070431</link>
      <description>&lt;P&gt;Firstly, do you agree that trigger of&amp;nbsp;&lt;SPAN&gt;log messages &lt;/SPAN&gt;&lt;SPAN&gt;313001 is an ICMP message with destination IP address matching &amp;nbsp;“external” interface’s IP address?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Secondly, if above is true, then either ASA initiated the original request ICMP message that caused that response; or, it’s simply a drive-by ICMP message received (but not initiated) by ASA (perhaps, initiated by nmap)?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;I&gt;&amp;gt; if all you have configured is to allow the ASA to reply to ICMP on the external interface.&lt;/I&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Are you saying that because of&amp;nbsp;my second line: “icmp permit any external”, log message&amp;nbsp;&lt;SPAN&gt;313001 the result of ASA not knowing what to do with it and dropping it?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 13:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090707#M1070431</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2020-05-22T13:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090728#M1070434</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/262624"&gt;@AlexFer&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Firstly, do you agree that trigger of&amp;nbsp;&lt;SPAN&gt;log messages &lt;/SPAN&gt;&lt;SPAN&gt;313001 is an ICMP message with destination IP address matching &amp;nbsp;“external” interface’s IP address?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Yes I agree.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;&lt;SPAN&gt;Secondly, if above is true, then either ASA initiated the original request ICMP message that caused that response; or, it’s simply a drive-by ICMP message received (but not initiated) by ASA (perhaps, initiated by nmap)?&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;It could have been an external scan. More likely it is a response from some external host to an internally-generated traceroute. Either one could cause such input.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;I&gt;&amp;gt; if all you have configured is to allow the ASA to reply to ICMP on the external interface.&lt;/I&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Are you saying that because of&amp;nbsp;my second line: “icmp permit any external”, log message&amp;nbsp;&lt;SPAN&gt;313001 the result of ASA not knowing what to do with it and dropping it?&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Correct. The command "icmp permit any external" by itself only configures the ASA to send ICMP echo replies in response to ICMP echo requests (ICMP type &lt;span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:"&gt;😎&lt;/span&gt; from any external host. Any other type of incoming ICMP message will generate the 313001 message.&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 13:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090728#M1070434</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-05-22T13:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090764#M1070436</link>
      <description>&lt;P&gt;&lt;I&gt;&amp;gt;&amp;nbsp;More likely it is a response from some external host to an &lt;STRONG&gt;internally-generated &lt;/STRONG&gt;traceroute.&amp;nbsp;&lt;/I&gt;&lt;/P&gt;&lt;P&gt;this can’t be, because then destination IP address of this (response) ICMP message would that of that internal host that generated the request (as you say, using traceroute) and NOT of ASA’s external interface IP address. In which case, we’d be seeing the deny Log message, pertaining to access-group, and not&amp;nbsp;&lt;SPAN&gt;313001.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 14:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090764#M1070436</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2020-05-22T14:39:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090768#M1070437</link>
      <description>&lt;P&gt;It could be so if the ASA was configured to NAT internal hosts to the external interface address.&lt;/P&gt;
&lt;P&gt;You've only shared a small snippet of the running-config so I'm positing a common use case.&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 14:37:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090768#M1070437</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-05-22T14:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA "icmp" question.</title>
      <link>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090771#M1070438</link>
      <description>&lt;P&gt;Granted, but I can assure, no NAT on this ASA.&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 14:42:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-quot-icmp-quot-question/m-p/4090771#M1070438</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2020-05-22T14:42:16Z</dc:date>
    </item>
  </channel>
</rss>

