<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Packet Inspection Blocking? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847816#M1101171</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Im using an ASA5585.&lt;/P&gt;&lt;P&gt;If I have a PC_B outside the asa and PC_A inside the asa, PC_A can ping PC_B. If I disconnect PC_B from its connection, PC_A will begin to have incomplete pings to PC_B. This is normal. However if I reconnect PC_B to the network the pings from PC_A will continue to fail. If I log into the ASA and use "clear conn address &amp;lt;PC_B ip&amp;gt;"&lt;FONT color="#000000"&gt; the pings become successful.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Some sort of statefull thing/inspection/timeout may be happening but i'm unsure how to figure out whats going on.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;I did increase the timeout of icmp to 1minute as a test but that didn't change anything.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Here is a chunk from my config if it helps.&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect esmtp _default_esmtp_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225 _default_h323_map&lt;BR /&gt;inspect h323 ras _default_h323_map&lt;BR /&gt;inspect ip-options _default_ip_options_map&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect icmp error&lt;BR /&gt;class class-default&lt;BR /&gt;set connection timeout idle 1:00:00 embryonic 0:00:30 half-closed 0:10:00&lt;BR /&gt;idle 1:00:00&lt;BR /&gt;DCD: disabled, retry-interval 0:00:15, max-retries 5&lt;BR /&gt;DCD: client-probe 0, server-probe 0, conn-expiration 0&lt;BR /&gt;set connection decrement-ttl&lt;BR /&gt;user-statistics accounting&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:01:00&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice is greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 02 Jun 2023 18:41:52 GMT</pubDate>
    <dc:creator>KGrev</dc:creator>
    <dc:date>2023-06-02T18:41:52Z</dc:date>
    <item>
      <title>Packet Inspection Blocking?</title>
      <link>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847816#M1101171</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Im using an ASA5585.&lt;/P&gt;&lt;P&gt;If I have a PC_B outside the asa and PC_A inside the asa, PC_A can ping PC_B. If I disconnect PC_B from its connection, PC_A will begin to have incomplete pings to PC_B. This is normal. However if I reconnect PC_B to the network the pings from PC_A will continue to fail. If I log into the ASA and use "clear conn address &amp;lt;PC_B ip&amp;gt;"&lt;FONT color="#000000"&gt; the pings become successful.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Some sort of statefull thing/inspection/timeout may be happening but i'm unsure how to figure out whats going on.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;I did increase the timeout of icmp to 1minute as a test but that didn't change anything.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Here is a chunk from my config if it helps.&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect esmtp _default_esmtp_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225 _default_h323_map&lt;BR /&gt;inspect h323 ras _default_h323_map&lt;BR /&gt;inspect ip-options _default_ip_options_map&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect icmp error&lt;BR /&gt;class class-default&lt;BR /&gt;set connection timeout idle 1:00:00 embryonic 0:00:30 half-closed 0:10:00&lt;BR /&gt;idle 1:00:00&lt;BR /&gt;DCD: disabled, retry-interval 0:00:15, max-retries 5&lt;BR /&gt;DCD: client-probe 0, server-probe 0, conn-expiration 0&lt;BR /&gt;set connection decrement-ttl&lt;BR /&gt;user-statistics accounting&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:01:00&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice is greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 18:41:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847816#M1101171</guid>
      <dc:creator>KGrev</dc:creator>
      <dc:date>2023-06-02T18:41:52Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Inspection Blocking?</title>
      <link>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847830#M1101172</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp; As a test purpose, can try to add a static NAT ?&lt;/P&gt;
&lt;P&gt;arp outside &amp;lt;IP PC B&amp;gt; &amp;lt;Mac address PC B&amp;gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 18:48:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847830#M1101172</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-02T18:48:44Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Inspection Blocking?</title>
      <link>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847870#M1101173</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/178747"&gt;@Flavio Miranda&lt;/a&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;I added the command but with the static nat entry to pings are still blocked after the disconnect period ends.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 19:01:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847870#M1101173</guid>
      <dc:creator>KGrev</dc:creator>
      <dc:date>2023-06-02T19:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Inspection Blocking?</title>
      <link>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847872#M1101174</link>
      <description>&lt;P&gt;&lt;SPAN&gt;set connection timeout idle 1:00:00&amp;lt;&amp;lt;- this not normal timeout' this and idle did you change the these defualt value?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 19:04:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847872#M1101174</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-02T19:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Inspection Blocking?</title>
      <link>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847873#M1101175</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;Thanks for your response. I don't believe I changed that. What is the default?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 19:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4847873#M1101175</guid>
      <dc:creator>KGrev</dc:creator>
      <dc:date>2023-06-02T19:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Inspection Blocking?</title>
      <link>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4848161#M1101182</link>
      <description>&lt;UL class="ul"&gt;
&lt;LI id="ID-2068-0000003c__li_D274D798896547308AB7AC260235BE4E" class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;timeout conn&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;VAR&gt;hh&lt;/VAR&gt;:&lt;VAR&gt;mm&lt;/VAR&gt;:&lt;VAR&gt;ss&lt;/VAR&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;—The idle time after which a connection closes, between 0:5:0 and 1193:0:0. The default is 1 hour (1:0:0).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="ID-2068-0000003c__li_75B763A4CE994E938D0FF90549D393A7" class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;timeout icmp&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;VAR&gt;hh&lt;/VAR&gt;:&lt;VAR&gt;mm&lt;/VAR&gt;:&lt;VAR&gt;ss&lt;/VAR&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;—The idle time for ICMP, between &lt;STRONG&gt;0:0:2&lt;/STRONG&gt; and 1193:0:0. The default is 2 seconds (0:0:2).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="ID-2068-0000003c__li_920F89A2D7174E45BD4637A5241E17A8" class="li"&gt;
&lt;P class="p"&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;timeout icmp-error&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;VAR&gt;hh&lt;/VAR&gt;:&lt;VAR&gt;mm&lt;/VAR&gt;:&lt;VAR&gt;ss&lt;/VAR&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;—The idle time before the ASA removes an ICMP connection after receiving an ICMP echo-reply packet, between 0:0:0 and 0:1:0 or the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;timeout icmp&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;value, whichever is lower. The default is 0 (disabled). When this timeout is disabled, and you enable ICMP inspection, then the ASA removes the ICMP connection as soon as an echo-reply is received; thus any ICMP errors that are generated for the (now closed) connection are dropped. This timeout delays the removal of ICMP connections so you can receive important ICMP errors.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp &lt;STRONG&gt;0:01:00&lt;BR /&gt;&lt;BR /&gt;this what I talking about keep it default if not solve your issue then&amp;nbsp;&lt;BR /&gt;share the NAT config&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jun 2023 08:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-inspection-blocking/m-p/4848161#M1101182</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-04T08:13:35Z</dc:date>
    </item>
  </channel>
</rss>

