<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ICMP TRU ASAv in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591103#M1089166</link>
    <description>&lt;P&gt;&lt;EM&gt;Thank you for your response I think it was my asa that was not working well. I deleted it and recreated it with new setup and everything started working.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Apr 2022 17:37:33 GMT</pubDate>
    <dc:creator>stephn.zii</dc:creator>
    <dc:date>2022-04-12T17:37:33Z</dc:date>
    <item>
      <title>ICMP TRU ASAv</title>
      <link>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4589679#M1089072</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;I configured my ASAv to allow icmp through but for some reason traffic is not going through, below are configs on device:&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;R2#&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;interface Ethernet0/0&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;description OUTSIDE&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;ip address 192.1.20.2 255.255.255.0&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;ciscoasa# &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;interface GigabitEthernet0/0&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nameif Outside&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;security-level 0&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;ip address 192.1.20.10 255.255.255.0 &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;interface GigabitEthernet0/1&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nameif Inside&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;security-level 100&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;ip address 10.11.11.10 255.255.255.0 &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;inspect icmp &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;access-list OUTSIDE line 1 extended permit icmp any4 any4 echo-reply (hitcnt=0) 0x1a292449 &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list OUTSIDE line 2 extended permit icmp any4 any4 time-exceeded (hitcnt=0) 0xd763b729 &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list OUTSIDE line 3 extended permit icmp any4 any4 timestamp-reply (hitcnt=0) 0x9fbe9b61 &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list OUTSIDE line 4 extended permit icmp any4 any4 unreachable (hitcnt=0) 0xed842821 &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;R1#&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;interface Ethernet0/0&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;description INSIDE&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;ip address 10.11.11.1 255.255.255.0&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;Any help will be appreciated.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2022 11:54:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4589679#M1089072</guid>
      <dc:creator>stephn.zii</dc:creator>
      <dc:date>2022-04-10T11:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP TRU ASAv</title>
      <link>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4589680#M1089073</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1340026"&gt;@stephn.zii&lt;/a&gt; by enabling ICMP inspection should allow traffic from inside to outside to work....if you have routing and potentially nat configured correctly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you testing from inside (R1) to outside?&lt;/P&gt;
&lt;P&gt;Is routing configured on the ASA and both routers?&lt;/P&gt;
&lt;P&gt;If you are pinging from outside to inside you would need to create another ACE entry permitting "echo" on the ACL and also create an access-group (if it isn't already) and specifiy the direction and the interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list OUTSIDE extended permit icmp any4 any4 echo&lt;BR /&gt;access-group OUTSIDE in interface outside&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;If that doesn't work run packet-tracer from the CLI and provide the output for review.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2022 14:27:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4589680#M1089073</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-04-10T14:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP TRU ASAv</title>
      <link>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4589685#M1089074</link>
      <description>&lt;P&gt;what is the source and destination? what do you see in the log s?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;any4 any4&lt;/PRE&gt;
&lt;P&gt;not sure - this should be any any right?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;&lt;EM&gt;access-group &lt;STRONG&gt;OUTSIDE &lt;/STRONG&gt;in interface Outside&lt;/EM&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Apr 2022 12:12:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4589685#M1089074</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-04-10T12:12:03Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP TRU ASAv</title>
      <link>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591037#M1089162</link>
      <description>&lt;P&gt;Hello Ingram,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Yes I am testing from R1 to R2 and I have attach my topology to this reply. Yes routing is configured on the ASA, I am running BGP with R2 and OSPF with R1 and redistributed BGP into OSPF but have a default route on the ASA going to R2.&amp;nbsp; I recreated the access list, see below:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;access-list TRU-TRAFIK permit tcp host 192.1.20.2 10.11.11.0 255.255.255.0 eq 23&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;access-list TRU-TRAFIK permit tcp host 192.1.20.2 10.11.11.0 255.255.255.0 eq 22&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;access-list TRU-TRAFIK permit icmp host 192.1.20.2 10.11.11.0 255.255.255.0 eq echo&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;access-group TRU-TRAFIK in interface Outside&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;but I also found something weird, the ospf neighbors are not forming and I cannot ping to the ASA interface ip from either routers so I think there is an issue with my ASA image. I will check that and let you know the outcome.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 15:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591037#M1089162</guid>
      <dc:creator>stephn.zii</dc:creator>
      <dc:date>2022-04-12T15:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP TRU ASAv</title>
      <link>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591038#M1089163</link>
      <description>&lt;P&gt;Hello Bandi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;I think my ASA image has an issue so I am working on it and when am done I will let you know the outcome.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 15:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591038#M1089163</guid>
      <dc:creator>stephn.zii</dc:creator>
      <dc:date>2022-04-12T15:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP TRU ASAv</title>
      <link>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591103#M1089166</link>
      <description>&lt;P&gt;&lt;EM&gt;Thank you for your response I think it was my asa that was not working well. I deleted it and recreated it with new setup and everything started working.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 17:37:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591103#M1089166</guid>
      <dc:creator>stephn.zii</dc:creator>
      <dc:date>2022-04-12T17:37:33Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP TRU ASAv</title>
      <link>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591104#M1089167</link>
      <description>&lt;P&gt;Thank you for your response I think it was my asa that was not working well. I deleted it and recreated it with new setup and everything started working.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 17:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591104#M1089167</guid>
      <dc:creator>stephn.zii</dc:creator>
      <dc:date>2022-04-12T17:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP TRU ASAv</title>
      <link>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591242#M1089175</link>
      <description>&lt;P&gt;Glad to know it was resolved and appreciated your feedback, it is very useful for the community member, who have the same issue and can resolve it quickly with the solution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 21:09:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-tru-asav/m-p/4591242#M1089175</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-04-12T21:09:56Z</dc:date>
    </item>
  </channel>
</rss>

