<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deny inbound icmp src inside:IP dst interface:IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4573486#M1088430</link>
    <description>&lt;UL&gt;&lt;LI&gt;packet-tracer input inside icmp IP-CoreSwitch 8 0 IP-hostM detailed&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop IP-hostM using egress ifc M&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip object obj-inside object obj-M&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd24a7b2d40, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=8, user_data=0x7fd23dee09c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=network-inside, mask=255.255.255.224, port=0, tag=any&lt;BR /&gt;dst ip/id=network-hostM, mask=255.255.255.192, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd2473df2a0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=12619505, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd24808ace0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=4763603, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd24a23f4a0, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;hits=261411, user_data=0x7fd24a23dd40, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd24a250ed0, priority=70, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=261411, user_data=0x7fd24a24f770, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd2473df2a0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=12619507, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd2482180f0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=1203810, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=M, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 13796669, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop IP-hostS using egress ifc M&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 00a0.a426.2284 hits 0 reference 8&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-interface: inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-interface: M&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Action: allow&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;packet-tracer input inside icmp IP-CoreSwitch 8 0 hostS detailed&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop hostS using egress ifc S&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd2485ea6c0, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=4077610, user_data=0x7fd23dee5d00, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd2473df2a0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=12620098, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd24808ace0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=4764989, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd24a23f4a0, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;hits=261430, user_data=0x7fd24a23dd40, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd24a250ed0, priority=70, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=261430, user_data=0x7fd24a24f770, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd2473df2a0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=12620100, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fd24814f400, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=1807908, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=S, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 13798335, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop IP-hostS using egress ifc S&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 0050.5691.4269 hits 12447 reference 10&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-interface: inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-interface: S&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Action: allow&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Mar 2022 10:21:21 GMT</pubDate>
    <dc:creator>Orcun Colakoglu</dc:creator>
    <dc:date>2022-03-18T10:21:21Z</dc:date>
    <item>
      <title>Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571505#M1088327</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I am having an issue with ASA5505 firewall setup. We have plenty of interfaces which works fine (likely same configurations, likely same ACL's as letting interface hosts reach required points)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am able to ping 3 different devices from ASA with their interfaces but I am able only able to ping 2 of them from Core switch. Core switch has the route for ASA inside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The log says "Deny inbound icmp src inside:core-switch dst interfaceM:IP-hostM(type 8, code 0)"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas as I am lost where this specific interfaceM doesn't work but others works as normal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 23:42:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571505#M1088327</guid>
      <dc:creator>Orcun Colakoglu</dc:creator>
      <dc:date>2022-03-17T23:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571509#M1088328</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1327768"&gt;@Orcun Colakoglu&lt;/a&gt; do you mean you are connected to the core switch and you are pinging the individual ASA interfaces? That won't work, by design, you can only ping the ASA's interface you (the core switch) is directly behind. You cannot ping through the ASA to one of the ASA's far interfaces.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 11:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571509#M1088328</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-16T11:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571520#M1088329</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; , thanks for the reply.&lt;/P&gt;&lt;P&gt;Yes, I can't ping 3 ASA interfaces which my hosts are inside from Core-Switch which is normal as you mention.&lt;/P&gt;&lt;P&gt;Inside ASA, we have multiple interfaces and when I try to ping hosts which are under same interfaces, I can ping them.&lt;/P&gt;&lt;P&gt;Inside Core-Switch, we have same vlans, only vlan looking to ASA inside interface has IP address for management and ip routing is enabled. When I try to ping same 3 hosts with source as core switch management vlan ip;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;2 of them responds normally&lt;/LI&gt;&lt;LI&gt;1 of them doesnt responds and drops and I see below log on ASA when I filter with source IP address of the host pinged;&lt;UL&gt;&lt;LI&gt;"Deny inbound icmp src inside:core-switch dst interfaceM:xx.xxx.xxx.xx(type 8, code 0)"&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 11:26:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571520#M1088329</guid>
      <dc:creator>Orcun Colakoglu</dc:creator>
      <dc:date>2022-03-16T11:26:58Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571524#M1088330</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1327768"&gt;@Orcun Colakoglu&lt;/a&gt; note sure what you are saying, are you connected on the inside of one ASA interface and pinging another ASA interface? If yes, that won't work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If no, provide configs of switch and ASA and information on what you are pinging and from where.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 11:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571524#M1088330</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-16T11:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571532#M1088332</link>
      <description>&lt;P&gt;-- wrong --&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 23:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571532#M1088332</guid>
      <dc:creator>Orcun Colakoglu</dc:creator>
      <dc:date>2022-03-17T23:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571560#M1088334</link>
      <description>&lt;P&gt;check the Native VLAN, are the source of ping is Native VLAN ?&lt;BR /&gt;try not use native VLAN with ASA, the ASA do not support in some case the untag frame.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 12:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571560#M1088334</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-16T12:01:39Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571738#M1088344</link>
      <description>&lt;P&gt;This doesn't reflect any solution nor about the issue I am having.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 15:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571738#M1088344</guid>
      <dc:creator>Orcun Colakoglu</dc:creator>
      <dc:date>2022-03-16T15:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571751#M1088345</link>
      <description>&lt;P&gt;you mention that you use trunk with ASA, are you use native VLAN of this trunk as sub interface in ASA?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 15:15:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571751#M1088345</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-16T15:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571808#M1088348</link>
      <description>&lt;P&gt;After making some ACL changes, I am now gettin below error;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6 Mar 16 2022 07:45:27 302021 core-switch 0 IP-hostM 0 Teardown ICMP connection for faddr core-switch/0 gaddr IP-hostM/0 laddr IP-hostM/0 type 8 code 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I don't have access to hostM device, I believe hostM device has configuration which prevents other networks traffic by firewall or software. Could it be?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 23:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571808#M1088348</guid>
      <dc:creator>Orcun Colakoglu</dc:creator>
      <dc:date>2022-03-17T23:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571821#M1088349</link>
      <description>&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0000914" target="_blank"&gt;https://www.petenetlive.com/KB/Article/0000914&lt;/A&gt;&lt;/P&gt;&lt;P&gt;ICMP inspect default must enable.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 16:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571821#M1088349</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-16T16:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571830#M1088351</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;it is enabled.&lt;/P&gt;&lt;P&gt;I believe you missed the part that I can ping other hosts hostP, hostS and hostM normally inside from ASA and can't ping hostM from CoreSwitch but can ping hostP and hostS. Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 16:28:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571830#M1088351</guid>
      <dc:creator>Orcun Colakoglu</dc:creator>
      <dc:date>2022-03-16T16:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571843#M1088352</link>
      <description>&lt;P&gt;Ping from ASA inside interface to all host is ok&lt;/P&gt;&lt;P&gt;Ping from core to any host is drop?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 16:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571843#M1088352</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-16T16:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571849#M1088353</link>
      <description>&lt;P&gt;From ASA, I can ping hostS, hostP, hostM.&lt;/P&gt;&lt;P&gt;From CoreSwitch, I can ping hostS and hostP but can't ping hostM.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 16:54:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571849#M1088353</guid>
      <dc:creator>Orcun Colakoglu</dc:creator>
      <dc:date>2022-03-16T16:54:29Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571869#M1088354</link>
      <description>&lt;P&gt;before I want to make you note that ASA have two ICMP check mode&amp;nbsp;&lt;BR /&gt;the ICMP PASS THROUGH ASA different than ICMP FROM ASA.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;there are two policy drop the traffic,&lt;BR /&gt;the security level which is default behavior for ASA&lt;BR /&gt;if the traffic go from High to low security level here the ICMP inspect work and traffic allow&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;what if we apply ACL in interface &amp;lt;-&lt;STRONG&gt;the interface that drop ICMP echo reply&lt;/STRONG&gt; &amp;nbsp;&lt;BR /&gt;the default behavior of ASA is change and now depend on ACL apply to interface.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;so what should we do you must allow return Echo reply from interface to Core.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;check if you have any ACL apply to this interface, then config it to allow echo reply.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 17:27:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571869#M1088354</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-16T17:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571876#M1088355</link>
      <description>&lt;P&gt;My inside interface has security-level 80 and CoreSwitch also belongs to this network.&lt;/P&gt;&lt;P&gt;Other interfaces InterfaceS, InterfaceP and InterfacesM has security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below configurations are also in place;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;same-security-traffic permit inter-interface&lt;/LI&gt;&lt;LI&gt;same-security-traffic permit intra-interface&lt;/LI&gt;&lt;LI&gt;policy-map global_policy&lt;UL&gt;&lt;LI&gt;class inspection_default&lt;UL&gt;&lt;LI&gt;inspect icmp&lt;/LI&gt;&lt;LI&gt;inspect icmp error&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For these 3 interfaces I don't have any echo-return ACL;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;interfaceS and interfaceP responds to CoreSwitch ping requests&lt;/LI&gt;&lt;LI&gt;interfaceM doesn't responds to CoreSwitch ping requests&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Wed, 16 Mar 2022 17:44:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571876#M1088355</guid>
      <dc:creator>Orcun Colakoglu</dc:creator>
      <dc:date>2022-03-16T17:44:50Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571890#M1088356</link>
      <description>&lt;P&gt;Core Interface have lower security level 80 than the other port,&amp;nbsp;&lt;BR /&gt;so there must ACL allow the ICMP from Core interface to other Interface &amp;lt;high Security 100&amp;gt;.&lt;BR /&gt;check this ACL if it allow Core-&amp;gt;Host ICMP.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 17:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571890#M1088356</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-16T17:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571978#M1088362</link>
      <description>&lt;P&gt;&lt;U&gt;packet-tracer input &amp;lt;Core&amp;gt;&amp;nbsp;icmp&amp;nbsp;&amp;lt;IP of Core&amp;gt;&amp;nbsp;&lt;STRONG&gt;8&lt;/STRONG&gt;&lt;/U&gt;&lt;SPAN&gt;&lt;U&gt;&lt;STRONG&gt; 0&lt;/STRONG&gt; &amp;lt;IP of Host&amp;gt; detailed&lt;/U&gt;&lt;BR /&gt;please do this packet-tracer&amp;nbsp;and share output here, this give us hint&amp;nbsp;were the packet is drop.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 20:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4571978#M1088362</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-16T20:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4572107#M1088363</link>
      <description>&lt;P&gt;Here you go;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;packet-tracer input inside icmp &lt;STRONG&gt;CoreSwitch&lt;/STRONG&gt; 8 0 &lt;STRONG&gt;hostM&lt;/STRONG&gt; detailed&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Result:&lt;BR /&gt;&lt;STRONG&gt;input-interface: inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-interface: M&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Action: allow&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I don't have access to remote host, I believe something else is blocking it. May be a firewall, rule or software on the &lt;STRONG&gt;hostM.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 23:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4572107#M1088363</guid>
      <dc:creator>Orcun Colakoglu</dc:creator>
      <dc:date>2022-03-17T23:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4572464#M1088377</link>
      <description>&lt;P&gt;Hi friend&amp;nbsp;&lt;BR /&gt;do same packet-tracer and check other interface that work,&amp;nbsp;&lt;BR /&gt;under the NAT rule there is &lt;STRONG&gt;deny=true&lt;/STRONG&gt;&amp;nbsp;&amp;lt;- this may be issue&lt;BR /&gt;under the IP Option there is &lt;STRONG&gt;deny=true&lt;/STRONG&gt; &amp;lt;-this may be issue&amp;nbsp;&lt;BR /&gt;so we need to make check with other work interface.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 09:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4572464#M1088377</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-17T09:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inbound icmp src inside:IP dst interface:IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4572488#M1088378</link>
      <description>&lt;P&gt;-- wrong --&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 23:37:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inbound-icmp-src-inside-ip-dst-interface-ip/m-p/4572488#M1088378</guid>
      <dc:creator>Orcun Colakoglu</dc:creator>
      <dc:date>2022-03-17T23:37:56Z</dc:date>
    </item>
  </channel>
</rss>

