<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA: Strange behaviour of ICMP echo replies through a S2S tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4497725#M1084819</link>
    <description>&lt;P&gt;Compairing SSH to ICMP is like compairing apples and oranges.&amp;nbsp; They are not the same.&amp;nbsp; SSH is connection oriented while ICMP is connectionless.&amp;nbsp; This is why we need the inspect icmp to allow ICMP replies between interfaces on the firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That being said, the inspect icmp needs to see the echo request on one interface, and then monitors for the echo reply on another interface (or the same interface in the case of hairpinning).&amp;nbsp; The problem with VPN is that the traffic is encrypted on the ingress interface, so the ASA does not see the initial ICMP request and is not able to check for the reply.&amp;nbsp; This is the reason you would need to allow the ICMP reply when coming through the VPN and not being able to disable&amp;nbsp;&lt;STRONG&gt;sysopt connection permit-vpn&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Nov 2021 09:33:13 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2021-11-04T09:33:13Z</dc:date>
    <item>
      <title>ASA: Strange behaviour of ICMP echo replies through a S2S tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4488595#M1084461</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;today I have an issue regarding VPN filters for site-to-site VPNs&lt;BR /&gt;at a ASA5525 running OS rel. 9.12(4)26.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The customer has several site-to-site VPN tunnels and the issue occur&lt;BR /&gt;with each of them so I assume the reason is located in the general&lt;BR /&gt;configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the VPN filter ACL IPSEC-MediaCologne is currently allowing the&lt;BR /&gt;remote users to ping and RDP local hosts (see attached small screen dump).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now when he ping from a local host to a remote host he gets only ICMP&lt;BR /&gt;replies when he allows the remote users to ping local users by the&lt;BR /&gt;first VPN filter entry!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought that when:&lt;/P&gt;&lt;PRE&gt;...
policy-map global_policy
class inspection_default
...
inspect icmp
...&lt;/PRE&gt;&lt;P&gt;is in the configuration ICMP will be treated similar as a stateful protocol&lt;BR /&gt;so I don't need think about the return traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know why we need a VPN filter entry for allowing the remote users&lt;BR /&gt;to ping us to make the ASA able to let pass ICMP replies for our pings to&lt;BR /&gt;the remote hosts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I attach the 'sh run all' output and perhaps someone has an explanation&lt;BR /&gt;for this behaviour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bye&lt;/P&gt;&lt;P&gt;R.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 14:52:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4488595#M1084461</guid>
      <dc:creator>swscco001</dc:creator>
      <dc:date>2021-10-19T14:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA: Strange behaviour of ICMP echo replies through a S2S tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4488825#M1084479</link>
      <description>&lt;P&gt;I do not see any reason why that should be allowed.&amp;nbsp; The only reason I can think of is if dynamic IPs were used at the remote office to send periodic ping to keep the tunnel up.&amp;nbsp; But that is not the case in your setup.&amp;nbsp; Is there perhaps any equipment at the remote site that needs to ping over the VPN, perhaps to check if something is reachable?&lt;/P&gt;
&lt;P&gt;You could remove it and see who starts screaming &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 22:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4488825#M1084479</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-10-19T22:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA: Strange behaviour of ICMP echo replies through a S2S tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4488937#M1084490</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for your reply!&lt;BR /&gt;&lt;BR /&gt;The customer want to be able to ping remote hosts to check their availablility and&lt;/P&gt;&lt;P&gt;not to bring up the tunnel. The remote users are usually not use ping.&lt;BR /&gt;&lt;BR /&gt;The local customer starts a permanent ping to a remote host and when he deactivate&lt;/P&gt;&lt;P&gt;the first VPN-Filter entry for ICMP he gets no reply anymore.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;In a L2L VPN Filter ACLs you ALWAYS define the source address as the "remote network".&lt;BR /&gt;&lt;BR /&gt;So it looks like he needs to allow ICMP echo replies by an ACL entry even if&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;inspect icmp&lt;/PRE&gt;&lt;P&gt;is enabled.&lt;BR /&gt;&lt;BR /&gt;This is not logical and would not be expected from a stateful firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps someone can explain this to me and the customer.&lt;BR /&gt;&lt;BR /&gt;Thanks a lot!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Bye&lt;/P&gt;&lt;P&gt;R.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 06:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4488937#M1084490</guid>
      <dc:creator>swscco001</dc:creator>
      <dc:date>2021-10-20T06:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA: Strange behaviour of ICMP echo replies through a S2S tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4491782#M1084592</link>
      <description>&lt;P&gt;It actually is logical.&amp;nbsp; the inspect icmp is for through the box traffic.&amp;nbsp; That is to say traffic that enters interface A and gets checked by the interface ACL, and this is where the inspect icmp is checked.&amp;nbsp; L2L VPN is to the box traffic.&amp;nbsp; By default, VPN traffic bypasses the interface ACL so the inspect icmp will never be used.&amp;nbsp; You would need to disable &lt;STRONG&gt;sysopt connection permit-vpn&lt;/STRONG&gt; function, this will tell the ASA to check all VPN traffic against the interface ACL and you should now see that inspect icmp works.&amp;nbsp; If you decide to change to this type of setup, remember to remove the VPN filter configuration.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Oct 2021 10:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4491782#M1084592</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-10-25T10:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA: Strange behaviour of ICMP echo replies through a S2S tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4493418#M1084651</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when I disable&amp;nbsp;&lt;STRONG&gt;sysopt connection permit-vpn&lt;/STRONG&gt;&amp;nbsp;a lot of trouble with other tunnels will be the consequence &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; . I know this from other cases.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The adminstrator wants just ping from a local protected host a host in the remote protected network though a present S2S-Tunnel and need to allow the reply traffic in the VPN filter ACL or disable&amp;nbsp;&lt;STRONG&gt;sysopt connection permit-vpn &lt;/STRONG&gt;therefore? This is hard to believe.&lt;BR /&gt;&lt;BR /&gt;I had a chat with the customer about this. Within a 2S2 tunnel when&amp;nbsp;&lt;STRONG&gt;sysopt connection permit-vpn &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;is anabled&amp;nbsp;reply traffic should be allowed without any entry in the VPN filter ACL and treated in a&lt;/P&gt;&lt;P&gt;stateful firewall style.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Would it be the same when he use SSH instead of ping, so it is an exception at ICMP in comparison&lt;/P&gt;&lt;P&gt;with TCP?&lt;BR /&gt;&lt;BR /&gt;The customer is asking: Should this be the behaviour of a stateful firewall?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your effort!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bye&lt;/P&gt;&lt;P&gt;R.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Oct 2021 12:00:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4493418#M1084651</guid>
      <dc:creator>swscco001</dc:creator>
      <dc:date>2021-10-27T12:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA: Strange behaviour of ICMP echo replies through a S2S tunnel</title>
      <link>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4497725#M1084819</link>
      <description>&lt;P&gt;Compairing SSH to ICMP is like compairing apples and oranges.&amp;nbsp; They are not the same.&amp;nbsp; SSH is connection oriented while ICMP is connectionless.&amp;nbsp; This is why we need the inspect icmp to allow ICMP replies between interfaces on the firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That being said, the inspect icmp needs to see the echo request on one interface, and then monitors for the echo reply on another interface (or the same interface in the case of hairpinning).&amp;nbsp; The problem with VPN is that the traffic is encrypted on the ingress interface, so the ASA does not see the initial ICMP request and is not able to check for the reply.&amp;nbsp; This is the reason you would need to allow the ICMP reply when coming through the VPN and not being able to disable&amp;nbsp;&lt;STRONG&gt;sysopt connection permit-vpn&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Nov 2021 09:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-strange-behaviour-of-icmp-echo-replies-through-a-s2s-tunnel/m-p/4497725#M1084819</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-11-04T09:33:13Z</dc:date>
    </item>
  </channel>
</rss>

