<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with ASA5525 allowing ping through in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3911136#M24818</link>
    <description>&lt;P&gt;Actually, they are public and routable and not within the following private address ranges,&lt;/P&gt;
&lt;UL class="i8Z77e"&gt;
&lt;LI class="TrT0Xe"&gt;10.0.0.0 to 10.255.255.255&lt;/LI&gt;
&lt;LI class="TrT0Xe"&gt;172.16.0.0 to 172.31.255.255&lt;/LI&gt;
&lt;LI class="TrT0Xe"&gt;192.168.0.0 to 192.168.255.255&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;with one being a /30 used to connect from a lab network ASA through to another network and the other /27 used for device addresses to communicate through the ASA into that another network with just the .97 address leading to that another network needing to be pingable from the switch through the ASA.&lt;/P&gt;
&lt;P&gt;Without adding NAT yet having not seen your post yet, I did change my switch route to ip route 0.0.0.0 0.0.0.0 x.x.251.1 when it was incorrect and changed "access-group acl-in-out in interface outside" to "access-group acl-in-out in interface inside" on the ASA and receiving "Allow" for all phases of a "packet-tracer input inside icmp x.x.251.2 8 0 x.x.249.97 detailed" command, from the switch .2 ip to the next hop .97 ip on the other side of the ASA, on the ASA afterward but still not getting a successful ping to .97 from the switch.&lt;/P&gt;
&lt;P&gt;Latest packet-tracer output attached.&lt;/P&gt;</description>
    <pubDate>Tue, 20 Aug 2019 22:26:11 GMT</pubDate>
    <dc:creator>adbland</dc:creator>
    <dc:date>2019-08-20T22:26:11Z</dc:date>
    <item>
      <title>Issue with ASA5525 allowing ping through</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3911107#M24816</link>
      <description>&lt;P&gt;After reading though and implementing many of other configuration suggestions from community page posts related to the same issue as well as from config guides and other related pages, I am still having an issue with pinging from my Catalyst 9200 switch through a ASA5525 to next hop IP address when I am able to ping it from the ASA it is directly connected to and can ping from from both directions of the connection between the switch and ASA but just cannot from the switch through ASA to the next hop IP nor from the switch to the ASA outbound interface connected to that next hop IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following ASA output is from the switch ip, of one subnet, connected to the ASA inbound interface checking the path to the .97 next hop IP, of another subnet, which lists it to be due to an implicit deny rule,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;ASA# packet-tracer input inside icmp x.x.251.1 8 0 x.x.249.97 detailed&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;Phase: 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Type: ROUTE-LOOKUP&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Subtype: Resolve Egress Interface&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Result: ALLOW&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Additional Information:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;found next-hop x.x.249.97 using egress ifc outside&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;Phase: 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Type: ACCESS-LIST&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Subtype:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Result: DROP&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Implicit Rule&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Additional Information:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Forward Flow based lookup yields rule:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;in id=0x2aaac7b08bb0, priority=501, domain=permit, deny=true&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;hits=5, user_data=0x7, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;src ip/id=64.102.251.1, mask=255.255.255.255, port=0, tag=any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input_ifc=inside, output_ifc=any&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;Result:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input-interface: inside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input-line-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;output-interface: outside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;output-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;output-line-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Action: drop&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;ASA#&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;with the following ASA config edited down to what was believed to be the appropriate ASA configs to allow ICMP through,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;: Hardware: ASA5525, 8192 MB RAM, CPU Lynnfield 2394 MHz, 1 CPU (4 cores)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;ASA Version 9.8(2)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;!&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;...&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;!&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;interface GigabitEthernet0/0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;description to WAN&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;nameif outside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;security-level 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;ip address x.x.249.98 255.255.255.252&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;!&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;interface GigabitEthernet0/1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;description to LAN&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;nameif inside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;security-level 100&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;ip address x.x.251.1 255.255.255.224&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;!&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;...&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;!&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;ftp mode passive&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;dns server-group DefaultDNS&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;domain-name cisco.com&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;object-group icmp-type ping&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;description Ping Group&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;icmp-object echo&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;icmp-object echo-reply&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-list acl-in-out extended permit icmp any any echo&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-list acl-in-out extended permit icmp any any time-exceeded&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-list OUT-IN extended permit icmp any any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;...&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;icmp permit any unreachable outside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;icmp permit any time-exceeded outside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;icmp permit any echo-reply outside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;no asdm history enable&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;arp timeout 14400&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;no arp permit-nonconnected&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;arp rate-limit 16384&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-group acl-in-out in interface outside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;route outside 0.0.0.0 0.0.0.0 x.x.249.97 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;...&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;!&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;policy-map type inspect dns preset_dns_map&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;...&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;policy-map icmp_policy&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;class icmp-class&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect icmp&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;policy-map global_policy&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;class inspection_default&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect ftp&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect h323 h225&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect h323 ras&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect ip-options&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect netbios&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect rsh&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect rtsp&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect skinny&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect esmtp&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect sqlnet&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect sunrpc&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect tftp&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect sip&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect xdmcp&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect dns preset_dns_map&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect icmp&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;inspect icmp error&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;policy-map type inspect dns migrated_dns_map_2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;...&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;: end&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;ASA#&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;with the full ASA configuration attached along with an edited down version of my switch config if possibly needed for any reason.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: Hostname and IPs altered for this post to start with x.x to leave the ending subnet identifiers for each and interfaces summarized down with "..." dividers for each config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any feedback would be appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2019 20:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3911107#M24816</guid>
      <dc:creator>adbland</dc:creator>
      <dc:date>2019-08-20T20:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with ASA5525 allowing ping through</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3911111#M24817</link>
      <description>Hi,&lt;BR /&gt;You don't appear to have NAT configured on the ASA, I cannot determine from the masked IP addresses if they are public IP addresses and are routable - I assume not?&lt;BR /&gt;&lt;BR /&gt;You have "inspect icmp" so icmp replies should be permitted. &lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 20 Aug 2019 20:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3911111#M24817</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-08-20T20:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with ASA5525 allowing ping through</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3911136#M24818</link>
      <description>&lt;P&gt;Actually, they are public and routable and not within the following private address ranges,&lt;/P&gt;
&lt;UL class="i8Z77e"&gt;
&lt;LI class="TrT0Xe"&gt;10.0.0.0 to 10.255.255.255&lt;/LI&gt;
&lt;LI class="TrT0Xe"&gt;172.16.0.0 to 172.31.255.255&lt;/LI&gt;
&lt;LI class="TrT0Xe"&gt;192.168.0.0 to 192.168.255.255&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;with one being a /30 used to connect from a lab network ASA through to another network and the other /27 used for device addresses to communicate through the ASA into that another network with just the .97 address leading to that another network needing to be pingable from the switch through the ASA.&lt;/P&gt;
&lt;P&gt;Without adding NAT yet having not seen your post yet, I did change my switch route to ip route 0.0.0.0 0.0.0.0 x.x.251.1 when it was incorrect and changed "access-group acl-in-out in interface outside" to "access-group acl-in-out in interface inside" on the ASA and receiving "Allow" for all phases of a "packet-tracer input inside icmp x.x.251.2 8 0 x.x.249.97 detailed" command, from the switch .2 ip to the next hop .97 ip on the other side of the ASA, on the ASA afterward but still not getting a successful ping to .97 from the switch.&lt;/P&gt;
&lt;P&gt;Latest packet-tracer output attached.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2019 22:26:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3911136#M24818</guid>
      <dc:creator>adbland</dc:creator>
      <dc:date>2019-08-20T22:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with ASA5525 allowing ping through</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3911486#M24819</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/166081"&gt;@adbland&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What traffic are you trying to pass via ASA to the next hop ? have you check the logs on ASA ? the packet tracer shows you are been deny by implicit rule , which means there is a rule blocking the return packet from the other side back to the switch . There are two ICMP inspection on ASA , one that's&amp;nbsp;inspected via default inspection policy which is only for connectivity and the other explicitly define&amp;nbsp; Globally , which in your case is inspected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i suggest you check ASA logs ,&amp;nbsp;tcp dump&amp;nbsp;on the interested interface to know why this has been dropped, but all comes&amp;nbsp;down to you allowing this traffic via a rule .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In advance way you can modify&amp;nbsp;the ASA inspection engine with the&amp;nbsp;MQC syntax but you need to understand how this works before using&amp;nbsp;it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 19:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3911486#M24819</guid>
      <dc:creator>Afolarin Omole</dc:creator>
      <dc:date>2019-08-22T19:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with ASA5525 allowing ping through</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3919047#M24820</link>
      <description>&lt;P&gt;“ALLOW” results for each phase of a,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"packet-tracer input inside icmp &amp;lt;inside interface IP&amp;gt; 8 0 &amp;lt;next hop GW IP&amp;gt; detailed"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as well as show capture detail output from,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;capture capin interface inside match ip host &amp;lt;inside interface IP&amp;gt; host &amp;lt;next hop GW IP&amp;gt;&lt;/P&gt;
&lt;P&gt;capture capout interface outside match ip host &amp;lt;inside interface IP&amp;gt; host &amp;lt;next hop GW IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show that the ping was allowed out but no route on the other side to allow it back in for the ping to succeed on the next hop gateway IP DMZ network that others manage and have been informed to correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;all feedback for this post has been appreciated. Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2019 16:19:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3919047#M24820</guid>
      <dc:creator>adbland</dc:creator>
      <dc:date>2019-09-04T16:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with ASA5525 allowing ping through</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3919399#M24821</link>
      <description>&lt;P&gt;I would say that according to your latest Packet Tracer output, ASA is not blocking your ICMP packets. It is allowing the traffic to go by.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to keep in mind that You will never going to get response from ASA's Interface IP from a host on different Interface. For example, a host connected to INSIDE trying to ping the IP address configured on the ASA's OUTSIDE interface will never get response. Which is by design. As per my knowledge.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now to your query You have to look into two devices connected on the each interface of the ASA. Look at the routing table for both the devices you are trying to communicate and also check for the firewall/ACL on either device which might be blocking the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bhaggu&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2019 07:03:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-asa5525-allowing-ping-through/m-p/3919399#M24821</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-05T07:03:16Z</dc:date>
    </item>
  </channel>
</rss>

