<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5515 - deny ICMP dst outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291234#M1078456</link>
    <description>&lt;P&gt;I think he use 8.8.8.8 as destination for IP SLA &amp;nbsp;imp echo&lt;/P&gt;</description>
    <pubDate>Sat, 13 Feb 2021 14:52:04 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2021-02-13T14:52:04Z</dc:date>
    <item>
      <title>ASA5515 - deny ICMP dst outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4290934#M1078442</link>
      <description>&lt;P&gt;&lt;FONT size="2"&gt;I get an error some in a while about Google DNS:&lt;/FONT&gt;&lt;/P&gt;&lt;PRE&gt;&lt;FONT size="2"&gt;%ASA-4-117145: 
Deny icmp src Z245:172.23.123.67 dst OUTSIDE:8.8.8.8 
(type 3, code 3) by access-group "Z245_access_in" &lt;/FONT&gt;&lt;/PRE&gt;&lt;P&gt;&lt;FONT size="2"&gt;I'm trying to understand it, but my mind is frozen.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;I have to permit icmp for Z245_access_in ? to get to Google DNS ?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;How the command should be ?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Thank you.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2021 18:16:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4290934#M1078442</guid>
      <dc:creator>NetAdmin2</dc:creator>
      <dc:date>2021-02-12T18:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5515 - deny ICMP dst outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4290986#M1078448</link>
      <description>&lt;P&gt;ICMP port unreachable this is the meaning for this code,&amp;nbsp;&lt;BR /&gt;can I see the NAT and ACL for this connection ?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2021 20:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4290986#M1078448</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-02-12T20:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5515 - deny ICMP dst outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291128#M1078453</link>
      <description>&lt;P&gt;The deny is for icmp (used by ping and traceroute) - not for DNS per se. Sometimes I have seen ACLs that allow DNS (or other things) explicitly and then the implicit deny will block icmp. To test DNS to 8.8.8.8 use nslookup and specify 8.8.8.8 as the server.&lt;/P&gt;
&lt;P&gt;If you want to allow the icmp then, yes, it would need to be added to the Z245_access_in ACL. The exact syntax depends on how the access-list is currently constructed.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2021 06:14:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291128#M1078453</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-02-13T06:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5515 - deny ICMP dst outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291231#M1078455</link>
      <description>&lt;P&gt;your command should be in this fashion. looking into your icmp code&lt;/P&gt;
&lt;P&gt;ICMP: Type = 3 (Destination unreachable)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list Z245_access_in line 1 extended permit icmp host 172.23.123.67 host 8.8.8.8 echo-reply&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2021 15:12:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291231#M1078455</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2021-02-13T15:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5515 - deny ICMP dst outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291234#M1078456</link>
      <description>&lt;P&gt;I think he use 8.8.8.8 as destination for IP SLA &amp;nbsp;imp echo&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2021 14:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291234#M1078456</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-02-13T14:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5515 - deny ICMP dst outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291235#M1078457</link>
      <description>&lt;P&gt;So If you use IP SLA then&amp;nbsp;&lt;BR /&gt;and you config the ACL then will permit only echo request&amp;nbsp;&lt;BR /&gt;but what about the port unreachable and other icmp message, it by default drop.&lt;BR /&gt;you need to permit it.&lt;BR /&gt;&lt;BR /&gt;NOTE:-&amp;nbsp;&lt;BR /&gt;if you generate the traffic from inside "which I sure" then you don't need any ACL in outside interface&amp;nbsp;&lt;BR /&gt;only need icmp inspection.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2021 15:13:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291235#M1078457</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-02-13T15:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5515 - deny ICMP dst outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291242#M1078458</link>
      <description>&lt;P&gt;if you use SLA on ASA the syslog message would be in this manner. i just test this on my ASA.&lt;BR /&gt;where my configuration are simple and default.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show sla monitor configuration 1&lt;BR /&gt;IP SLA Monitor, Infrastructure Engine-II.&lt;BR /&gt;Entry number: 1&lt;BR /&gt;Owner:&lt;BR /&gt;Tag:&lt;BR /&gt;Type of operation to perform: echo&lt;BR /&gt;Target address: 8.8.8.8&lt;BR /&gt;Interface: outside&lt;BR /&gt;Number of packets: 1&lt;BR /&gt;Request size (ARR data portion): 28&lt;BR /&gt;Operation timeout (milliseconds): 5000&lt;BR /&gt;Type Of Service parameters: 0x0&lt;BR /&gt;Verify data: No&lt;BR /&gt;Operation frequency (seconds): 60&lt;BR /&gt;Next Scheduled Start Time: Start Time already passed&lt;BR /&gt;Group Scheduled : FALSE&lt;BR /&gt;Life (seconds): Forever&lt;BR /&gt;Entry Ageout (seconds): never&lt;BR /&gt;Recurring (Starting Everyday): FALSE&lt;BR /&gt;Status of entry (SNMP RowStatus): Active&lt;BR /&gt;Enhanced History:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&amp;lt;166&amp;gt;:Feb 13 15:44:40 UTC: %ASA-session-6-302020: Built outbound ICMP connection for faddr 8.8.8.8/0 gaddr 192.168.8.108/42424 laddr 192.168.8.108/42424 type 8 code 0&lt;/PRE&gt;</description>
      <pubDate>Sat, 13 Feb 2021 15:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4291242#M1078458</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2021-02-13T15:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5515 - deny ICMP dst outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4292086#M1078490</link>
      <description>&lt;P&gt;&lt;FONT size="2"&gt;Hi MHM Cisco World,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;The network path: Router -&amp;gt; Switch -&amp;gt; Firewall ASA -&amp;gt; Switch -&amp;gt; F5 -&amp;gt; host container (NTCP-172.23.123.67/[68])&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="2"&gt;Router:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;The NAT is static, and is done on the router, using route-map + ACL&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;ip nat inside source static NTCP-172.23.123.67 134.23.123.67 route-map permit-134.23.123.67 extendable no-alias

route-map permit-134.23.123.67 permit 10
match ip address LIST-permit-134.23.123.67
match interface FastEthernet0/1/0
!

ip access-list extended LIST-permit-134.23.123.67
permit ip host 172.23.123.67 host 8.8.8.8
permit ip host 172.23.123.68 host 8.8.4.4&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="2"&gt;ASA:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;the ACL for Z245_access_in:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;object-group service DM_INLINE_SERVICE_237
service-object object TCP-53
service-object object UDP-53

object-group network DM_INLINE_NETWORK_131
network-object object NTCP-172.23.123.67
network-object object NTCP-172.23.123.68

object-group network DM_INLINE_NETWORK_132
network-object object Google-DNS-8.8.4.4
network-object object Google-DNS-8.8.8.8

access-list Z245_access_in extended permit object-group DM_INLINE_SERVICE_237 object-group DM_INLINE_NETWORK_131 object-group DM_INLINE_NETWORK_132
access-list Z245_access_in extended deny tcp any any eq smtp log disable inactive
access-list Z245_access_in extended deny ip any any&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;the ACL for OUTSIDE_access_out:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;object-group service DM_INLINE_SERVICE_238
service-object object TCP-53
service-object object UDP-53

object-group network DM_INLINE_NETWORK_133
network-object object NTCP-172.23.123.67
network-object object NTCP-172.23.123.68

object-group network DM_INLINE_NETWORK_134
network-object object Google-DNS-8.8.4.4
network-object object Google-DNS-8.8.8.8

access-list OUTSIDE_access_out extended permit object-group DM_INLINE_SERVICE_238 object-group DM_INLINE_NETWORK_133 object-group DM_INLINE_NETWORK_134&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 01:01:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4292086#M1078490</guid>
      <dc:creator>NetAdmin2</dc:creator>
      <dc:date>2021-02-16T01:01:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5515 - deny ICMP dst outside</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4292096#M1078492</link>
      <description>&lt;P&gt;Where is ip sla config?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2021 01:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-deny-icmp-dst-outside/m-p/4292096#M1078492</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-02-16T01:40:36Z</dc:date>
    </item>
  </channel>
</rss>

