<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If you are actually just in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traceroute-is-not-working-in-next-generation-firewall/m-p/2482400#M267197</link>
    <description>&lt;P&gt;If you are actually just configuring ACL as a test then I would suggest to check logs to see what is built for any future troubleshooting so you can understand what is go through the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FYI: Inspection rule allows traceroute and you don't need ACLs from a higher security interface to a lower one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also check the next link:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2 class="title-page"&gt;ASA/PIX/FWSM: Handling ICMP Pings and Traceroute&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/15246-31.html&lt;/P&gt;</description>
    <pubDate>Wed, 30 Apr 2014 21:32:26 GMT</pubDate>
    <dc:creator>jumora</dc:creator>
    <dc:date>2014-04-30T21:32:26Z</dc:date>
    <item>
      <title>traceroute is not working in Next generation firewall.</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-is-not-working-in-next-generation-firewall/m-p/2482398#M267195</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have tried to allow traceroute for one PC for the testing purpose, but it is not working&lt;/P&gt;&lt;P&gt;Model : ASA 5515x Version : 9.12&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And also allowed below access list, but still user getting * * *&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list acl_out line 1 permit icmp any any echo-reply&lt;BR /&gt;access-list acl_out line 1 permit icmp any any time-exceeded&lt;BR /&gt;access-list acl_out line 1 permit icmp any any traceroute&lt;BR /&gt;access-list acl_out line 1 permit icmp any any time-exceeded&lt;BR /&gt;access-list acl_out line 1 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list acl_in line 1 permit icmp any any unreachable&lt;BR /&gt;access-list acl_in line 1 permit icmp any any time-exceeded&lt;BR /&gt;access-list acl_in line 1 permit icmp any any traceroute&lt;BR /&gt;access-list acl_in line 1 permit icmp any any echo-reply&lt;BR /&gt;access-list acl_in line 1 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-group acl_out in interface inside&lt;/P&gt;&lt;P&gt;access-group acl_in&amp;nbsp; in interface outside&lt;/P&gt;&lt;P&gt;Fixup protocol icmp&lt;BR /&gt;Fixup protocol icmp-error&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-is-not-working-in-next-generation-firewall/m-p/2482398#M267195</guid>
      <dc:creator>mphasis infosec</dc:creator>
      <dc:date>2019-03-12T04:08:13Z</dc:date>
    </item>
    <item>
      <title>Your acl_out isn't allowing</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-is-not-working-in-next-generation-firewall/m-p/2482399#M267196</link>
      <description>&lt;P&gt;Your acl_out isn't allowing the inside user's echo requests. That's the fundamental packet that they would be sending as the initiator of a ping.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;access-list acl_out line 1 permit icmp any any echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;It would be easier to just allow all icmp outbound:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;access-list acl_out line 1 permit icmp any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Of course, any access-list on the inside interface will then create an implicit deny for all other traffic. Without one, any inside-initiated to outside flows are allowed.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2014 00:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-is-not-working-in-next-generation-firewall/m-p/2482399#M267196</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-30T00:47:46Z</dc:date>
    </item>
    <item>
      <title>If you are actually just</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-is-not-working-in-next-generation-firewall/m-p/2482400#M267197</link>
      <description>&lt;P&gt;If you are actually just configuring ACL as a test then I would suggest to check logs to see what is built for any future troubleshooting so you can understand what is go through the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FYI: Inspection rule allows traceroute and you don't need ACLs from a higher security interface to a lower one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also check the next link:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2 class="title-page"&gt;ASA/PIX/FWSM: Handling ICMP Pings and Traceroute&lt;/H2&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/15246-31.html&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2014 21:32:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-is-not-working-in-next-generation-firewall/m-p/2482400#M267197</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2014-04-30T21:32:26Z</dc:date>
    </item>
    <item>
      <title>Hey could you please mark the</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-is-not-working-in-next-generation-firewall/m-p/2482401#M267198</link>
      <description>&lt;P&gt;Hey could you please mark the ticket as answered.&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2014 19:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-is-not-working-in-next-generation-firewall/m-p/2482401#M267198</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2014-05-19T19:11:36Z</dc:date>
    </item>
  </channel>
</rss>

