<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 9.1(2) - Allowing ping,telnet or access to inside hosts from outside hosts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625245#M195712</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Hi All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;I have a problem with allowing outside hosts ping, telnet or access on port '80' to inside hosts.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;In the current configuration none of the outside hosts can ping, telnet or access inside host with the ip&amp;nbsp;192.168.64.176, static mapping is configured as well as acls&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Configuration below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 88.151.aaa.aaa&amp;nbsp;255.255.255.240&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;interface GigabitEthernet0/1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.64.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;object network Test-DNS&lt;BR /&gt;&amp;nbsp;host 192.168.64.176&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;access-list acl_out extended permit icmp any any unreachable&lt;BR /&gt;access-list acl_out extended permit icmp any any echo-reply&lt;BR /&gt;access-list acl_out extended permit icmp any any time-exceeded&lt;BR /&gt;access-list acl_out extended permit icmp any host 88.151.aaa.bbb&amp;nbsp;echo&lt;BR /&gt;access-list acl_out extended permit icmp any host 88.151.aaa.bbb&amp;nbsp;echo-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;access-list acl_out extended permit tcp any object Test-DNS eq www&lt;BR /&gt;access-list acl_out extended permit tcp any object Test-DNS eq telnet&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;object network Test-DNS&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 88.151.aaa.bbb&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;access-group acl_out in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Kind Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;S&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 13 Mar 2019 01:08:09 GMT</pubDate>
    <dc:creator>szczyrk80</dc:creator>
    <dc:date>2019-03-13T01:08:09Z</dc:date>
    <item>
      <title>ASA 9.1(2) - Allowing ping,telnet or access to inside hosts from outside hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625245#M195712</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Hi All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;I have a problem with allowing outside hosts ping, telnet or access on port '80' to inside hosts.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;In the current configuration none of the outside hosts can ping, telnet or access inside host with the ip&amp;nbsp;192.168.64.176, static mapping is configured as well as acls&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Configuration below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 88.151.aaa.aaa&amp;nbsp;255.255.255.240&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;interface GigabitEthernet0/1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.64.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;object network Test-DNS&lt;BR /&gt;&amp;nbsp;host 192.168.64.176&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;access-list acl_out extended permit icmp any any unreachable&lt;BR /&gt;access-list acl_out extended permit icmp any any echo-reply&lt;BR /&gt;access-list acl_out extended permit icmp any any time-exceeded&lt;BR /&gt;access-list acl_out extended permit icmp any host 88.151.aaa.bbb&amp;nbsp;echo&lt;BR /&gt;access-list acl_out extended permit icmp any host 88.151.aaa.bbb&amp;nbsp;echo-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;access-list acl_out extended permit tcp any object Test-DNS eq www&lt;BR /&gt;access-list acl_out extended permit tcp any object Test-DNS eq telnet&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;object network Test-DNS&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 88.151.aaa.bbb&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;access-group acl_out in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Kind Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;S&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 01:08:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625245#M195712</guid>
      <dc:creator>szczyrk80</dc:creator>
      <dc:date>2019-03-13T01:08:09Z</dc:date>
    </item>
    <item>
      <title>These two lines are not</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625246#M195713</link>
      <description>&lt;P&gt;These two lines are not needed as the ACL needs the real-IP, not the translated:&lt;/P&gt;

&lt;PRE style="font-size: 14px;"&gt;
access-list acl_out extended permit icmp any host 88.151.aaa.bbb echo
access-list acl_out extended permit icmp any host 88.151.aaa.bbb echo-reply&lt;/PRE&gt;

&lt;P&gt;Is the address&amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;88.151.aaa.bbb in the ip subnet of&amp;nbsp;88.151.aaa.aaa&amp;nbsp;255.255.255.240? If not, it's very likely that you need the command&lt;/SPAN&gt;&lt;/P&gt;

&lt;PRE&gt;
arp permit-nonconnected&lt;/PRE&gt;

&lt;P&gt;This ACL-Line is also not needed:&lt;/P&gt;

&lt;PRE&gt;
&lt;SPAN style="font-size: 14px;"&gt;access-list acl_out extended permit icmp any any echo-reply&lt;/SPAN&gt;
&lt;/PRE&gt;

&lt;P&gt;returning echo-replys should be allowed by making ICMP stateful:&lt;/P&gt;

&lt;PRE&gt;
policy-map global_policy
 class inspection_default
  inspect icmp&lt;/PRE&gt;

&lt;P&gt;The rest looks ok, what is the output of the following command:&lt;/P&gt;

&lt;PRE&gt;
packet-tracer input outside tcp 1.2.3.4 1234 88.151.aaa.bbb 80&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2015 12:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625246#M195713</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-03-23T12:05:59Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten,Thank you for your</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625247#M195714</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Hi Karsten,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Thank you for your response&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;88.151.aaa.bbb is in the subnet of Public IPs,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;The output of packet-tracer is below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;ASA# packet-tracer input outside tcp 1.2.3.4 1234 88.151.aaa.bbb&amp;nbsp;80&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Test-DNS&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 88.151.aaa.bbb&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 88.151.aaa.bbb/80 to 192.168.64.176/80&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acl_out in interface outside&lt;BR /&gt;access-list acl_out extended permit tcp any object Test-DNS eq www&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source dynamic OBJ_GENERIC_ALL interface&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 2902909, packet dispatched to next module&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;The problem is out 3rd party needs to monitor the server on tcp port 80 and they can not get any response, trying telnet on 80 as well as ping, however from the output above it looks like all is fine?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;I haven't applied this yet:&lt;/SPAN&gt;&lt;/P&gt;

&lt;PRE&gt;
policy-map global_policy
 class inspection_default
  inspect icmp&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2015 12:32:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625247#M195714</guid>
      <dc:creator>szczyrk80</dc:creator>
      <dc:date>2015-03-23T12:32:17Z</dc:date>
    </item>
    <item>
      <title>looks fine. Also troubleshoot</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625248#M195715</link>
      <description>&lt;P&gt;looks fine. Also troubleshoot if you 3rd party can send any traffic in your direction.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2015 12:35:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625248#M195715</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-03-23T12:35:38Z</dc:date>
    </item>
    <item>
      <title>Great, thank you,</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625249#M195716</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Great, thank you,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;So far I can see they tried:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;access-list acl_out line 21 extended permit tcp any object Test-DNS eq www (hitcnt=286) 0x552a4a47&lt;BR /&gt;&amp;nbsp; access-list acl_out line 21 extended permit tcp any host 192.168.64.176 eq www (hitcnt=286) 0x552a4a47&lt;BR /&gt;access-list acl_out line 22 extended permit tcp any object Test-DNS eq telnet (hitcnt=2377) 0xb2e2cdba&lt;BR /&gt;&amp;nbsp; access-list acl_out line 22 extended permit tcp any host 192.168.64.176 eq telnet (hitcnt=2377) 0xb2e2cdba&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;However no response is received at the other end,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Should I try to implement te below:&lt;/SPAN&gt;&lt;/P&gt;

&lt;PRE&gt;
policy-map global_policy
 class inspection_default
  inspect icmp&lt;/PRE&gt;

&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;The question I have got is, if I want to use port e.g. 80 or 1720 for tcp monitoring, icmp has to be enabled?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2015 12:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625249#M195716</guid>
      <dc:creator>szczyrk80</dc:creator>
      <dc:date>2015-03-23T12:45:57Z</dc:date>
    </item>
    <item>
      <title>The config in the policy-map</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625250#M195717</link>
      <description>&lt;P&gt;The config in the policy-map is only for pinging through the ASA. It's not needed for other traffic like HTTP.&lt;/P&gt;&lt;P&gt;Other things to test:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Does the server work from the inside?&lt;/LI&gt;&lt;LI&gt;try the commad: ping tcp 192.168.64.176 80&lt;/LI&gt;&lt;LI&gt;correct default-gateway/subnet-mask on the Server?&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Mon, 23 Mar 2015 13:02:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625250#M195717</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-03-23T13:02:44Z</dc:date>
    </item>
    <item>
      <title>Thank you,All working fine</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625251#M195718</link>
      <description>&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;All working fine now&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;S&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2015 15:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-2-allowing-ping-telnet-or-access-to-inside-hosts-from/m-p/2625251#M195718</guid>
      <dc:creator>szczyrk80</dc:creator>
      <dc:date>2015-03-25T15:07:42Z</dc:date>
    </item>
  </channel>
</rss>

