<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with icmp-reply through ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/5171630#M1115600</link>
    <description>&lt;P&gt;This is very strange but it works. Do we have to do this again and again even in the new image versions?&lt;/P&gt;</description>
    <pubDate>Thu, 05 Sep 2024 11:47:09 GMT</pubDate>
    <dc:creator>JaySL</dc:creator>
    <dc:date>2024-09-05T11:47:09Z</dc:date>
    <item>
      <title>Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725559#M1095207</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm having trouble getting ICMP replies from outside hosts to my inside hosts.&amp;nbsp; I've spent a few hours looking at other posts with the same issue.&amp;nbsp; Most posts suggest policy map inspection over ACL exceptions.&amp;nbsp; I've tried two methods of policy map inspection without success.&amp;nbsp; I can't figure out what I'm missing.&amp;nbsp; Here's what I've been working on:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ACL Method&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list icmp-allow extended permit icmp any any&lt;/P&gt;&lt;P&gt;class-map icmp-class-map&lt;BR /&gt;match access-list icmp-allow&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map icmp-policy-map&lt;BR /&gt;class icmp-class-map&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy icmp-policy-map interface inside&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Inspection Method&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Debug&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;With either of these applied, I see the following:&lt;/P&gt;&lt;P&gt;firewall# debug icmp trace&lt;BR /&gt;debug icmp trace enabled at level 1&lt;BR /&gt;firewall# ping googl.com&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 142.251.215.228, timeout is 2 seconds:&lt;BR /&gt;ICMP echo request from 65.129.24.126 to 142.251.215.228 ID=48558 seq=4567 len=72&lt;BR /&gt;ICMP echo reply from 142.251.215.228 to 65.129.24.126 ID=48558 seq=4567 len=68&lt;BR /&gt;Denied ICMP type = 0, code = 0 from 142.251.215.228on interface 2&lt;BR /&gt;?ICMP echo request from 65.129.24.126 to 142.251.215.228 ID=48559 seq=4567 len=72&lt;BR /&gt;ICMP echo reply from 142.251.215.228 to 65.129.24.126 ID=48559 seq=4567 len=68&lt;BR /&gt;Denied ICMP type = 0, code = 0 from 142.251.215.228on interface 2&lt;BR /&gt;?ICMP echo request from 65.129.24.126 to 142.251.215.228 ID=48560 seq=4567 len=72&lt;BR /&gt;ICMP echo reply from 142.251.215.228 to 65.129.24.126 ID=48560 seq=4567 len=68&lt;BR /&gt;Denied ICMP type = 0, code = 0 from 142.251.215.228on interface 2&lt;BR /&gt;?ICMP echo request from 65.129.24.126 to 142.251.215.228 ID=48561 seq=4567 len=72&lt;BR /&gt;ICMP echo reply from 142.251.215.228 to 65.129.24.126 ID=48561 seq=4567 len=68&lt;BR /&gt;Denied ICMP type = 0, code = 0 from 142.251.215.228on interface 2&lt;BR /&gt;?ICMP echo request from 65.129.24.126 to 142.251.215.228 ID=48562 seq=4567 len=72&lt;BR /&gt;ICMP echo reply from 142.251.215.228 to 65.129.24.126 ID=48562 seq=4567 len=68&lt;BR /&gt;Denied ICMP type = 0, code = 0 from 142.251.215.228on interface 2&lt;/P&gt;&lt;P&gt;I can see that my inside host is being properly translated to my outside interface's IP (PAT).&amp;nbsp; It seems like the firewall isn't tracking my ICMP request...&lt;/P&gt;&lt;P&gt;My Inside hosts can access the Internet without issue, I'm just having trouble getting ICMP back through the ASA.&amp;nbsp; I'm using a 5506 running 9.16(4) code.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 04:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725559#M1095207</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2022-11-22T04:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725628#M1095208</link>
      <description>&lt;P&gt;Do you by chance have any ICMP access rules?&amp;nbsp; try issuing the command "show run icmp" and/or "show run | in icmp" and see if anything shows up&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 07:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725628#M1095208</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-11-22T07:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725653#M1095211</link>
      <description>&lt;P&gt;after config the inspection do you check show running ?&lt;BR /&gt;&lt;BR /&gt;Note:-if you use PKT then you need to delete global_policy and add again with ICMP inspection.&amp;nbsp;&lt;BR /&gt;this limitation in PKT&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 10:00:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725653#M1095211</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-22T10:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725930#M1095228</link>
      <description>&lt;P&gt;Hello Marius,&lt;/P&gt;&lt;P&gt;Here's the info you asked for:&lt;/P&gt;&lt;P&gt;firewall# show run icmp&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp deny any outside&lt;BR /&gt;icmp permit any DMZ&lt;BR /&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;From what I've read, the icmp deny and permit statements above are for whether the ASA will respond to ICMP on its interfaces, not whether it'll pass &amp;amp; track ICMP.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 14:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725930#M1095228</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2022-11-22T14:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725932#M1095229</link>
      <description>&lt;P&gt;Hello MHM,&lt;/P&gt;&lt;P&gt;I don't understand "use PKT".&amp;nbsp; I have removed and recreated the global_polcy policy-map a few times while switching back and forth between inspection methods.&amp;nbsp; Pulling out the policy-map code and re-applying it during trouble-shooting should have effectively done what you've suggested.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 14:16:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725932#M1095229</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2022-11-22T14:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725935#M1095230</link>
      <description>&lt;P&gt;PKT packet-tracer.&lt;BR /&gt;if you do all above you mention, can you share&amp;nbsp;&lt;BR /&gt;show access-list&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 14:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4725935#M1095230</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-22T14:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726013#M1095240</link>
      <description>&lt;P&gt;I thought I'd add a network diagram too to help visualized the environment.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="network.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/168774iBF2DD2ADD87EA4EA/image-size/large?v=v2&amp;amp;px=999" role="button" title="network.png" alt="network.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 16:39:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726013#M1095240</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2022-11-22T16:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726028#M1095242</link>
      <description>&lt;P&gt;Hello MHM,&lt;/P&gt;&lt;P&gt;I've tried maybe six times to post my config in my reply but the forum site keeps dropping my post.&amp;nbsp; I've attached my running config.&amp;nbsp; Note that I've removed all the policy-map icmp inspect code.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 16:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726028#M1095242</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2022-11-22T16:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726086#M1095245</link>
      <description>&lt;P&gt;I'm adding ASDM screenshots of my interfaces, firewall rules, and nat configuration.&amp;nbsp; Sometimes it's easier to see the data in the GUI vs CLI.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 18:09:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726086#M1095245</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2022-11-22T18:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726090#M1095246</link>
      <description>&lt;P&gt;I will run lab now and update you.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 18:32:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726090#M1095246</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-22T18:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726185#M1095253</link>
      <description>&lt;P&gt;thanks for sharing. I apply same config&amp;nbsp;&lt;BR /&gt;BVI and inspect ICMP and all fine except&lt;BR /&gt;are you using inside interface as source of ping ??&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 23:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726185#M1095253</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-22T23:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726186#M1095254</link>
      <description>&lt;P&gt;Hello MHM,&lt;/P&gt;&lt;P&gt;I just got home and tried implementing the policy-map using ASDM.&amp;nbsp; It worked.&amp;nbsp; The code I created by hand via CLI is EXACTLY the same as the code created by ASDM.&amp;nbsp; I don't have a good reason why the new code is working but it is.&amp;nbsp; Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASDM created code&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;class-map global-class&lt;BR /&gt;description Permit ICMP return traffic&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;description Permit ICMP return traffic&lt;BR /&gt;class global-class&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CLI created code&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;class-map inspection_default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;match default-inspection-traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;policy-map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;class inspection_default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;inspect icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 23:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726186#M1095254</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2022-11-22T23:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726189#M1095255</link>
      <description>&lt;P&gt;Yes I do lab and also success to ping from host inside to host outside using same policy you share.&lt;/P&gt;&lt;P&gt;Anyway&amp;nbsp;&lt;/P&gt;&lt;P&gt;I So glad your issue solved.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 23:44:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726189#M1095255</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-22T23:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726193#M1095256</link>
      <description>&lt;P&gt;Hello MCM,&lt;/P&gt;&lt;P&gt;I'm pinging out from a Windows 10 host within my inside network.&amp;nbsp; That's the way I've tested throughout my trouble-shooting.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 23:54:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726193#M1095256</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2022-11-22T23:54:29Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726198#M1095257</link>
      <description>&lt;P&gt;you test windows but the IP use for windows is it same as ASA inside interface?&lt;BR /&gt;why I ask you that, because when I run lab I run debug icmp and ping from inside interface and I get exactly same as your issue&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Denied ICMP type = 0, code = 0 from 142.251.215.228on interface 2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 00:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726198#M1095257</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-23T00:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726199#M1095258</link>
      <description>&lt;P&gt;Hell MHM,&lt;/P&gt;&lt;P&gt;I'm testing that now...&amp;nbsp; When I ping google.com from the ASA it fails, like before, but from an inside PC it works...&amp;nbsp; Looking at my original post, I tested by pinging from the ASA and it failed.&amp;nbsp; I want to believe I always tested using my PC but maybe not...&amp;nbsp; So,&amp;nbsp; different question then, why can't I get ICMP reply when pinging from the ASA?&amp;nbsp; Nice catch by the way!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;From ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;firewall# ping google.com&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 142.251.211.238, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;firewall#&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;From PC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;C:\Users\ramse&amp;gt;ping google.com&lt;/P&gt;&lt;P&gt;Pinging google.com [142.251.211.238] with 32 bytes of data:&lt;BR /&gt;Reply from 142.251.211.238: bytes=32 time=13ms TTL=118&lt;BR /&gt;Reply from 142.251.211.238: bytes=32 time=13ms TTL=118&lt;BR /&gt;Reply from 142.251.211.238: bytes=32 time=13ms TTL=118&lt;BR /&gt;Reply from 142.251.211.238: bytes=32 time=13ms TTL=118&lt;/P&gt;&lt;P&gt;Ping statistics for 142.251.211.238:&lt;BR /&gt;Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;BR /&gt;Approximate round trip times in milli-seconds:&lt;BR /&gt;Minimum = 13ms, Maximum = 13ms, Average = 13ms&lt;/P&gt;&lt;P&gt;C:\Users\ramse&amp;gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 00:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726199#M1095258</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2022-11-23T00:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726610#M1095281</link>
      <description>&lt;P&gt;ASA by default not accept the ping toward it interface.&amp;nbsp;&lt;BR /&gt;I make lab yesterday and I success make interface accept ping toward it BUT I dont recommend change the default behave of ASA.&amp;nbsp;&lt;BR /&gt;what I add is one command&amp;nbsp;&lt;BR /&gt;icmp permit host &amp;lt; &amp;gt; echo-reply &amp;lt;IN interface&amp;gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 13:48:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726610#M1095281</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-23T13:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726649#M1095286</link>
      <description>&lt;P&gt;Hello MHM,&lt;/P&gt;&lt;P&gt;I've been thinking about ICMP flow when initiated from the ASA.&amp;nbsp; Most Cisco devices, probably the ASA too, will use the nearest interface to the destination when originating traffic, including ICMP requests.&amp;nbsp; Therefor, the ASA is probably sourcing the ICMP request from the outside interface but it's not configured to track that interface's ICMP traffic.&amp;nbsp; Moreover, I have an explicit ICMP deny statement configured for the outside interface, which is the destination of the ICMP reply.&lt;/P&gt;&lt;P&gt;I think I just got confused when I switched from my host to the ASA when performing my ping tests.&amp;nbsp; It's been super educational and interesting but a journey started by an inconsistent test method.&lt;/P&gt;&lt;P&gt;Thanks for all your help.&amp;nbsp; You really have been an ambassador of good will throughout this process.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 14:46:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/4726649#M1095286</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2022-11-23T14:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with icmp-reply through ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/5171630#M1115600</link>
      <description>&lt;P&gt;This is very strange but it works. Do we have to do this again and again even in the new image versions?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 11:47:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-icmp-reply-through-asa/m-p/5171630#M1115600</guid>
      <dc:creator>JaySL</dc:creator>
      <dc:date>2024-09-05T11:47:09Z</dc:date>
    </item>
  </channel>
</rss>

