<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CISCO ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5133851#M1113654</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1556185"&gt;@fmugambi&lt;/a&gt; you can enable ICMP inspection to allow ping responses, use the CLI command &lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This will amend the class map as below&lt;/P&gt;
&lt;PRE&gt;class inspection_default&lt;BR /&gt;&lt;STRONG&gt; inspect icmp&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jun 2024 06:26:40 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-06-20T06:26:40Z</dc:date>
    <item>
      <title>CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5133849#M1113653</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;I have a cisco asa firewall connected to ISP. I have allowed internet access of downstream devices on the asa.&lt;/P&gt;&lt;P&gt;I have a case where, servers downstream are able to browse internet, but not able to ping for example 8.8.8.8.&lt;/P&gt;&lt;P&gt;is there an acl restriction anywhere? is there an extra command i need for ping replies to be successful. this is useful for troubleshooting.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 06:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5133849#M1113653</guid>
      <dc:creator>fmugambi</dc:creator>
      <dc:date>2024-06-20T06:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5133851#M1113654</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1556185"&gt;@fmugambi&lt;/a&gt; you can enable ICMP inspection to allow ping responses, use the CLI command &lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This will amend the class map as below&lt;/P&gt;
&lt;PRE&gt;class inspection_default&lt;BR /&gt;&lt;STRONG&gt; inspect icmp&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 06:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5133851#M1113654</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-20T06:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5133868#M1113655</link>
      <description>&lt;P&gt;&lt;SPAN&gt;My always first step&amp;nbsp; command&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;config t&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;fixup protocol icmp&lt;/P&gt;
&lt;P&gt;end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 07:03:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5133868#M1113655</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-06-20T07:03:38Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5133998#M1113660</link>
      <description>&lt;P&gt;on that note, is there a specific cli command to just check acls with hit counts only?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 11:21:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5133998#M1113660</guid>
      <dc:creator>fmugambi</dc:creator>
      <dc:date>2024-06-20T11:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5134021#M1113661</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1556185"&gt;@fmugambi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA# &lt;STRONG&gt;show access-list | exclude hitcnt=0&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 11:35:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5134021#M1113661</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-20T11:35:43Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5134027#M1113662</link>
      <description>&lt;P&gt;if i have multiple, say dm_access_in, outside_access_in, inside_access_out, how do i filter to specifics?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 11:50:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5134027#M1113662</guid>
      <dc:creator>fmugambi</dc:creator>
      <dc:date>2024-06-20T11:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5134033#M1113663</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1556185"&gt;@fmugambi&lt;/a&gt; you just add the name of the ACL, i.e.,&lt;/P&gt;
&lt;P&gt;show access-list &lt;STRONG&gt;dm_access_in&lt;/STRONG&gt; | exclude hitcnt=0&lt;BR /&gt;show access-list &lt;STRONG&gt;outside_access_in&lt;/STRONG&gt; | exclude hitcnt=0&lt;BR /&gt;show access-list &lt;STRONG&gt;inside_access_out&lt;/STRONG&gt; | exclude hitcnt=0&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 12:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5134033#M1113663</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-06-20T12:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5134041#M1113664</link>
      <description>&lt;P&gt;thanks, helpful.&lt;/P&gt;&lt;P&gt;what if say in dm_inside_access_out, i have multiple vlans, 172.16.10.0/24,.20/24,.30.24.&lt;/P&gt;&lt;P&gt;is it possible to drill to specific vlan and get hitcount per vlan based?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 12:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5134041#M1113664</guid>
      <dc:creator>fmugambi</dc:creator>
      <dc:date>2024-06-20T12:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5134096#M1113668</link>
      <description>&lt;P&gt;the ASA ACL is apply to L3 interface which have nameif and VLAN,&amp;nbsp;&lt;BR /&gt;show run | in &amp;lt;nameif&amp;gt;&lt;BR /&gt;then you will see&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-group with nameif&amp;nbsp;&lt;BR /&gt;last&amp;nbsp;&lt;BR /&gt;do&lt;BR /&gt;show access-list &amp;lt;name of access-group appear&amp;gt; | include hitcnt&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;this way you can see access list hitcnt for each vlan&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 14:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/5134096#M1113668</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-20T14:03:00Z</dc:date>
    </item>
  </channel>
</rss>

