<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing Ping in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907960#M24890</link>
    <description>Yes.&lt;BR /&gt;&lt;BR /&gt;access-group OUTSIDE_IN in interface Outside</description>
    <pubDate>Wed, 14 Aug 2019 09:36:55 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2019-08-14T09:36:55Z</dc:date>
    <item>
      <title>Allowing Ping</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907907#M24880</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have a Cisco ASA Firewall 5516-x Firepower with ASA-Image 9-12-2.&lt;/P&gt;&lt;P&gt;The Device is complet new and i want to allowing ping from outside to Inside and from Inside to Outside.&lt;/P&gt;&lt;P&gt;can you help me?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 07:38:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907907#M24880</guid>
      <dc:creator>AliRezaMirzaei0031</dc:creator>
      <dc:date>2019-08-14T07:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Ping</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907910#M24884</link>
      <description>&lt;P&gt;You can have accessl-list like below in to out and out in for ICMP to allow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list acl-in-out extended permit icmp any any echo-reply&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list acl-in-out extended permit icmp any any time-exceeded&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 07:45:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907910#M24884</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-08-14T07:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Ping</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907911#M24885</link>
      <description>Hi,&lt;BR /&gt;Use the command "fixup protocol icmp" to enable inspection for icmp, this will allow icmp requests from inside to outside to be permitted. If you want to ping from the outside to inside, it depends, you would probably need to create a static NAT and then permit the traffic on the inbound ACL on the outside interface.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Wed, 14 Aug 2019 07:45:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907911#M24885</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-08-14T07:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Ping</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907928#M24886</link>
      <description>&lt;P&gt;perfect,&lt;/P&gt;&lt;P&gt;and can you write please the commands for NAT and ACL.&lt;/P&gt;&lt;P&gt;i want to all ip from outside can ping all ip to inside .&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 08:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907928#M24886</guid>
      <dc:creator>AliRezaMirzaei0031</dc:creator>
      <dc:date>2019-08-14T08:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Ping</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907943#M24887</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Here is an example of static NAT, you'll need 1 static NAT entry for each device if you want to ping inbound from the outside. You wouldn't normally do that, unless it was for DMZ hosted services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object network SWI-1&lt;BR /&gt; host 10.10.0.1&lt;BR /&gt; nat (INSIDE,OUTSIDE) static 1.1.1.111&lt;BR /&gt;&lt;BR /&gt;object network SWI-2&lt;BR /&gt; host 10.10.1.1&lt;BR /&gt; nat (INSIDE,OUTSIDE) static 1.1.1.112&lt;BR /&gt;&lt;BR /&gt;access-list OUTSIDE_IN extended permit icmp any object SWI-1 echo&lt;BR /&gt;access-list OUTSIDE_IN extended permit icmp any object SWI-2 echo&lt;/PRE&gt;
&lt;P&gt;If you were just pinging from in inside to outside you would only need 1 dynamic nat rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 08:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907943#M24887</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-08-14T08:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Ping</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907957#M24888</link>
      <description>do i Need Access-Group then?</description>
      <pubDate>Wed, 14 Aug 2019 09:34:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907957#M24888</guid>
      <dc:creator>AliRezaMirzaei0031</dc:creator>
      <dc:date>2019-08-14T09:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Ping</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907960#M24890</link>
      <description>Yes.&lt;BR /&gt;&lt;BR /&gt;access-group OUTSIDE_IN in interface Outside</description>
      <pubDate>Wed, 14 Aug 2019 09:36:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ping/m-p/3907960#M24890</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-08-14T09:36:55Z</dc:date>
    </item>
  </channel>
</rss>

