<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is there by chance a firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487541#M267887</link>
    <description>&lt;P&gt;Is there by chance a firewall on your internal resources that are natted to the public IPs that would prevent ICMP?&lt;/P&gt;</description>
    <pubDate>Wed, 02 Apr 2014 18:14:02 GMT</pubDate>
    <dc:creator>jj27</dc:creator>
    <dc:date>2014-04-02T18:14:02Z</dc:date>
    <item>
      <title>Asa 5510 - additional outside /27 address block. No icmp into it.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487540#M267876</link>
      <description>&lt;P&gt;Hi all.... hoping an easy answer to this one.&amp;nbsp; I have seen a few views that don't help me.&amp;nbsp; I have just migrated a Watchguard X seres to an Asa 5510.&amp;nbsp; I have a 2811 in front of it to handle the Bgp peering previously handled by the WG.&amp;nbsp; All is well.&amp;nbsp; There are several public facing services behind the Asa hence the additional /27.&amp;nbsp; The ouside interface of the Asa is one half of another /30.&amp;nbsp; I defined all the /27 ddresses as objects and used them ok&amp;nbsp;in access and nat rules.&amp;nbsp; The public services are ok and I can get out to the internet from Dmz and Inside networks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;I have just realised that my externally hosted monitoring service that polls (pings mostly) the public servers (the servers responding to the /27 addresses) isn't working.&amp;nbsp; I cant ping any of the /27 addresses from outside.&amp;nbsp; I can ping the outside interface /30 address.&amp;nbsp; There is an access-l rule&amp;nbsp;any any for icmp -&amp;nbsp;in on the outside interface.&lt;/P&gt;&lt;P&gt;I am missing something simple right?&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Damien.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:01:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487540#M267876</guid>
      <dc:creator>DjDamo</dc:creator>
      <dc:date>2019-03-12T04:01:33Z</dc:date>
    </item>
    <item>
      <title>Is there by chance a firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487541#M267887</link>
      <description>&lt;P&gt;Is there by chance a firewall on your internal resources that are natted to the public IPs that would prevent ICMP?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2014 18:14:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487541#M267887</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2014-04-02T18:14:02Z</dc:date>
    </item>
    <item>
      <title>DamienAnother possible cause</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487542#M267889</link>
      <description>&lt;P&gt;Damien&lt;/P&gt;&lt;P&gt;Another possible cause is if you have an acl applied to the inside interface that might be blocking the return ICMP packets.&lt;/P&gt;&lt;P&gt;If you are using ICMP inspection you should be fine but if not you would need to modify the inside acl.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2014 19:34:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487542#M267889</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-04-02T19:34:39Z</dc:date>
    </item>
    <item>
      <title>Jon, no Acls on inside</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487543#M267895</link>
      <description>&lt;P&gt;Jon, no Acls on inside interface.&amp;nbsp; But the issue unrelated to the inside.&amp;nbsp; I cant ping these public addreses from the internet. Yet I can ping the xternal interface /30 address from the internet ok.&amp;nbsp; I can also get to the natted services that are using the /27 addresses, just no icmp!&amp;nbsp; There is an any-any in rule on outside for icmp.&lt;/P&gt;&lt;P&gt;I am thinking the way I have used the /27 addresses must be incorrect.&amp;nbsp; Struggling to find any doco though.&lt;/P&gt;&lt;P&gt;Damien.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2014 02:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487543#M267895</guid>
      <dc:creator>DjDamo</dc:creator>
      <dc:date>2014-04-03T02:55:20Z</dc:date>
    </item>
    <item>
      <title>No.... some more detail in</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487544#M267897</link>
      <description>&lt;P&gt;No.... some more detail in response above.&amp;nbsp; The issue is icmp to the /27 public addresses from the internet.&amp;nbsp; Can get to any natted service just no icmp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2014 02:56:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-additional-outside-27-address-block-no-icmp-into-it/m-p/2487544#M267897</guid>
      <dc:creator>DjDamo</dc:creator>
      <dc:date>2014-04-03T02:56:46Z</dc:date>
    </item>
  </channel>
</rss>

