<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks for the relpyI have in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435589#M267400</link>
    <description>&lt;P&gt;Thanks for the relpy&lt;/P&gt;&lt;P&gt;I have added the ACL, I am able to ping the managment pc 192.168.100.10 from the 192.168.200.0 network but no the other way around. I have also added an ACL for that&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# sh access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;BR /&gt;access-list LAN-WAN-FTP; 1 elements; name hash: 0x91ef8aeb&lt;BR /&gt;access-list LAN-WAN-FTP line 1 extended permit tcp any any eq ftp (hitcnt=0) 0x194240d3&lt;BR /&gt;access-list management_access_in; 3 elements; name hash: 0x4814da18&lt;BR /&gt;access-list management_access_in line 1 extended permit tcp any 177.1.1.0 255.255.255.0 eq telnet (hitcnt=0) 0x22c167b0&lt;BR /&gt;access-list management_access_in line 2 extended permit tcp 192.168.200.0 255.255.255.0 192.168.100.0 255.255.255.0 eq echo (hitcnt=0) 0x9bdc8461&lt;BR /&gt;access-list management_access_in line 3 extended permit tcp 192.168.100.0 255.255.255.0 192.168.200.0 255.255.255.0 eq echo (hitcnt=0) 0x41a939ad&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even though I am able to ping that pc I dont see the number on the hit count changing&lt;/P&gt;</description>
    <pubDate>Wed, 23 Apr 2014 18:23:19 GMT</pubDate>
    <dc:creator>isdollsm1</dc:creator>
    <dc:date>2014-04-23T18:23:19Z</dc:date>
    <item>
      <title>ASA ping issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435586#M267394</link>
      <description>&lt;P&gt;&amp;nbsp;I am having trouble pinging from one zone to another&lt;/P&gt;&lt;P&gt;Zone - Management can not ping Zone-Inside and visa versa. At first I was able to ping the managment pc but couldnt ping the inside pc. I have played around with the service policy and ACL but no luck. Any help would be apprectiated&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;BR /&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.5 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;&amp;nbsp;nameif INSIDE&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt;&amp;nbsp;nameif OUTSIDE&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 177.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 172.20.20.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network Inside-Network&lt;BR /&gt;&amp;nbsp;host 192.168.200.0&lt;BR /&gt;object network test&lt;BR /&gt;&amp;nbsp;host 192.168.0.0&lt;BR /&gt;object network ASA-Gateway&lt;BR /&gt;&amp;nbsp;host 177.1.1.2&lt;BR /&gt;object network Management-Gateway&lt;BR /&gt;&amp;nbsp;host 177.1.1.1&lt;BR /&gt;object-group icmp-type SG-ICMP&lt;BR /&gt;&amp;nbsp;icmp-object echo&lt;BR /&gt;&amp;nbsp;icmp-object echo-reply&lt;BR /&gt;access-list LAN-WAN-FTP extended permit tcp any any eq ftp&lt;BR /&gt;access-list management_access_in extended permit tcp any 177.1.1.0 255.255.255.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; eq telnet&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-713.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;access-group management_access_in in interface management&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 177.1.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.100.10 255.255.255.255 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class global-class&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DD" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DD&lt;/A&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;CEService&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435586#M267394</guid>
      <dc:creator>isdollsm1</dc:creator>
      <dc:date>2019-03-12T04:06:06Z</dc:date>
    </item>
    <item>
      <title>You have applied the access</title>
      <link>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435587#M267396</link>
      <description>&lt;P&gt;You have applied the access-list:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;access-list management_access_in extended permit tcp any 177.1.1.0 255.255.255.0 eq telnet&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;...on your management interface. That will prohibit other traffic from being originated on hosts connected via that interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;You can check the flow through the ASA for a given protocol source destination address etc using packet-tracer cli utility. It will highlight what step is failing in establishing the flow. See &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/command-reference/cmdref/p1.html#pgfId-2129824"&gt;this link&lt;/A&gt; for reference.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Apr 2014 13:36:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435587#M267396</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-19T13:36:29Z</dc:date>
    </item>
    <item>
      <title>I agree with Marvin's</title>
      <link>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435588#M267398</link>
      <description>&lt;P&gt;I agree with Marvin's observation about your ACL. That's the most obvious thing to change because it affects the ASA's default behavior which is to allow traffic through the ASA if it's going out an interface with a lower security level, and let the stateful return traffic back in that interface. In fact, since your ACL is allowing Telnet through to go out the outside interface (which has the lowest security level), the default behavior (no ACL required) would already allow that, and the ACL you have in place is only necessary if your intent is to restrict Telnet to only the 177.1.1.0/24 subnet and no other addresses.&lt;/P&gt;&lt;P&gt;Regarding your change to the service policies, I would suggest that unless you have good reason to, removing the standard inspections is probably not a good idea. They are there by default for a reason. Adding ICMP to the list is fine, and something I've done frequently, but without good reason otherwise, I would add the other default protocols back in.&lt;/P&gt;&lt;P&gt;Hope you're well, Marvin!&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2014 17:24:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435588#M267398</guid>
      <dc:creator>jmeggers</dc:creator>
      <dc:date>2014-04-23T17:24:55Z</dc:date>
    </item>
    <item>
      <title>Thanks for the relpyI have</title>
      <link>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435589#M267400</link>
      <description>&lt;P&gt;Thanks for the relpy&lt;/P&gt;&lt;P&gt;I have added the ACL, I am able to ping the managment pc 192.168.100.10 from the 192.168.200.0 network but no the other way around. I have also added an ACL for that&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# sh access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;BR /&gt;access-list LAN-WAN-FTP; 1 elements; name hash: 0x91ef8aeb&lt;BR /&gt;access-list LAN-WAN-FTP line 1 extended permit tcp any any eq ftp (hitcnt=0) 0x194240d3&lt;BR /&gt;access-list management_access_in; 3 elements; name hash: 0x4814da18&lt;BR /&gt;access-list management_access_in line 1 extended permit tcp any 177.1.1.0 255.255.255.0 eq telnet (hitcnt=0) 0x22c167b0&lt;BR /&gt;access-list management_access_in line 2 extended permit tcp 192.168.200.0 255.255.255.0 192.168.100.0 255.255.255.0 eq echo (hitcnt=0) 0x9bdc8461&lt;BR /&gt;access-list management_access_in line 3 extended permit tcp 192.168.100.0 255.255.255.0 192.168.200.0 255.255.255.0 eq echo (hitcnt=0) 0x41a939ad&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even though I am able to ping that pc I dont see the number on the hit count changing&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2014 18:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435589#M267400</guid>
      <dc:creator>isdollsm1</dc:creator>
      <dc:date>2014-04-23T18:23:19Z</dc:date>
    </item>
    <item>
      <title>"ping" does not use tcp (or</title>
      <link>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435590#M267401</link>
      <description>&lt;P&gt;"ping" does not use tcp (or run over ip) - it uses icmp (a protocol "parallel" to ip) - so your access-list entries for tcp with the echo service are incorrect.&lt;/P&gt;&lt;P&gt;And hi to John - doing OK thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2014 18:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ping-issue/m-p/2435590#M267401</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-23T18:38:48Z</dc:date>
    </item>
  </channel>
</rss>

