<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enabling ICMP through ASA Firewalls in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/enabling-icmp-through-asa-firewalls/m-p/4686725#M1093356</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1404070"&gt;@Drader&lt;/a&gt; #1 and #3 turn on ICMP stateful inspection globally. The command "fixup protocol icmp" (#3) is just a shortcut to enable icmp inspection under the global policy (#1) - both achieve the same thing.&lt;/P&gt;
&lt;P&gt;#2 explictly permits the return ICMP traffic on the ACL, usually this is inbound on the outside interface. You would use the ACL if you didn't want to inspect ICMP. The ACL can of course be configured granularly, so explictly permitting ICMP traffic for certain hosts/subnets, and denying for the rest.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Sep 2022 07:06:00 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-09-14T07:06:00Z</dc:date>
    <item>
      <title>Enabling ICMP through ASA Firewalls</title>
      <link>https://community.cisco.com/t5/network-security/enabling-icmp-through-asa-firewalls/m-p/4685770#M1093354</link>
      <description>&lt;P&gt;Hello, I am new to networking and was wondering if anyone can tell me what is the difference (like in what situation will I need to use them) amongst the following commands for cisco ASA:&lt;/P&gt;&lt;P&gt;1. inspect icmp - for policy-map global_policy&lt;/P&gt;&lt;P&gt;2. access-list icmp extended permit icmp any any (and using access group after)&lt;/P&gt;&lt;P&gt;3. fixup protocol icmp&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2022 06:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enabling-icmp-through-asa-firewalls/m-p/4685770#M1093354</guid>
      <dc:creator>Drader</dc:creator>
      <dc:date>2022-09-14T06:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling ICMP through ASA Firewalls</title>
      <link>https://community.cisco.com/t5/network-security/enabling-icmp-through-asa-firewalls/m-p/4686721#M1093355</link>
      <description>&lt;P&gt;1st and 3rd commands using to inform firewall to treat ICMP traffic as a statefull way. 2nd command is allowing ICMP traffic using ACL applied to respect direction and interface.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2022 06:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enabling-icmp-through-asa-firewalls/m-p/4686721#M1093355</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2022-09-14T06:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling ICMP through ASA Firewalls</title>
      <link>https://community.cisco.com/t5/network-security/enabling-icmp-through-asa-firewalls/m-p/4686725#M1093356</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1404070"&gt;@Drader&lt;/a&gt; #1 and #3 turn on ICMP stateful inspection globally. The command "fixup protocol icmp" (#3) is just a shortcut to enable icmp inspection under the global policy (#1) - both achieve the same thing.&lt;/P&gt;
&lt;P&gt;#2 explictly permits the return ICMP traffic on the ACL, usually this is inbound on the outside interface. You would use the ACL if you didn't want to inspect ICMP. The ACL can of course be configured granularly, so explictly permitting ICMP traffic for certain hosts/subnets, and denying for the rest.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2022 07:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enabling-icmp-through-asa-firewalls/m-p/4686725#M1093356</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-09-14T07:06:00Z</dc:date>
    </item>
  </channel>
</rss>

