<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: allow icmp dmz to inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407343#M306233</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would use this format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN permit icmp &lt;SPAN style="color: #ff0000;"&gt;host&lt;/SPAN&gt; 192.168.10.50 10.10.10.40 255.255.255.0 echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"host"&lt;/STRONG&gt; parameter defines that a single host IP address will follow. This would allow only the single source host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the the IP addresses I used in my example are made up and you should use the ones you have configured in your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Jan 2014 22:17:01 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-01-06T22:17:01Z</dc:date>
    <item>
      <title>allow icmp dmz to inside</title>
      <link>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407336#M306218</link>
      <description>&lt;P&gt;In asa version 9.x how can I allow icmp (ping) from hosts in the dmz to the inside interface?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:25:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407336#M306218</guid>
      <dc:creator>tolinrome tolinrome</dc:creator>
      <dc:date>2019-03-12T03:25:42Z</dc:date>
    </item>
    <item>
      <title>allow icmp dmz to inside</title>
      <link>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407337#M306220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There should not be much that needs to be done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would be easier to see the actual firewall configuration to see the reason why it might not be working at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I were to presume that you dont have any ACL configured on the &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interface of the ASA and that the&lt;STRONG&gt; "dmz" &lt;/STRONG&gt;interface of the ASA is of lower &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; than the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface then you would have to configure an ACL and attach it to the &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interface to both allow traffic out to the Internet from the &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; and also allow traffic that you need (for example ICMP) to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your software level you would not really need any NAT configurations between the&lt;STRONG&gt; "dmz" &lt;/STRONG&gt;and the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; like it was in the older software levels so I would imagine that should not be the case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also add ICMP Inspection to your configurations unless they are already present.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to check current &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; configurations on the ASA with the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run policy-map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually there is the default &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; configuration and its usually attached globally which you can check with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run service-policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to either enter the following commands under the &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or try to insert the following old format commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is still some problems would really need to look at the actual configurations and probably take some &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; outputs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;DMZ interface="" name=""&gt; icmp &lt;SOURCE ip=""&gt; 8 0 &lt;DESTINATION ip=""&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/DMZ&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In some cases its also good to check the actual destination hosts since they might be blocking the ICMP and not the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 20:32:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407337#M306220</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-06T20:32:51Z</dc:date>
    </item>
    <item>
      <title>allow icmp dmz to inside</title>
      <link>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407338#M306222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for all that information but for now I just need to know how to simply create the acl in the cli to allow from the dmz to inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 21:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407338#M306222</guid>
      <dc:creator>tolinrome tolinrome</dc:creator>
      <dc:date>2014-01-06T21:16:09Z</dc:date>
    </item>
    <item>
      <title>allow icmp dmz to inside</title>
      <link>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407339#M306224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well there are still some things to consider.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I were to create an ACL that simply only allows ICMP from the DMZ to the INSIDE then that would mean that all other traffic would be blocked and I don't know what other traffic should be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I were to presume the following information to start with&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;INSIDE = 10.10.10.0/24&lt;/LI&gt;&lt;LI&gt;DMZ = 192.168.10.0/24&lt;/LI&gt;&lt;LI&gt;Allow ICMP traffic from DMZ-&amp;gt;INSIDE but block all other traffic in this direction&lt;/LI&gt;&lt;LI&gt;Allow DMZ-&amp;gt;OUTSIDE traffic&lt;/LI&gt;&lt;LI&gt;DMZ interface &lt;STRONG&gt;"nameif"&lt;/STRONG&gt; is &lt;STRONG&gt;"dmz"&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I would configure a simple ACL like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN remark Allow ICMP to INSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN permit icmp 192.168.10.0 255.255.255.0 10.10.10.0 255.255.255.0 echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN remark Block other traffic to INSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN deny ip 192.168.10.0 255.255.255.0 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN remark Allow all other outbound traffic to OUTSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN permit ip 192.168.10.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group DMZ-IN in interface dmz&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 21:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407339#M306224</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-06T21:28:21Z</dc:date>
    </item>
    <item>
      <title>allow icmp dmz to inside</title>
      <link>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407340#M306225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;Thanks. I already have hosts in the dmz that can access the inside and traffic is flowing fine from outside to dmz to inside and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to know how to create the acl for a new host and allow the acl rule to allow icmp.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 21:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407340#M306225</guid>
      <dc:creator>tolinrome tolinrome</dc:creator>
      <dc:date>2014-01-06T21:38:42Z</dc:date>
    </item>
    <item>
      <title>allow icmp dmz to inside</title>
      <link>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407341#M306227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well from the above this ACL rule allows the ICMP Echo from DMZ to INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN permit icmp 192.168.10.0 255.255.255.0 10.10.10.0 255.255.255.0 echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using an existing ACL on the DMZ interface then this would have to be added to that ACL with the correct IP address information to allow the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have no ACL on the DMZ interface then if DMZ hosts can already connect to INSIDE then they should also be able to ICMP the hosts on the INSIDE provided that the INSIDE hosts reply to ICMP. Its possible the hosts software firewalls block that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without seeing any configurations its impossible for me to give any specific instructions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 21:42:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407341#M306227</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-06T21:42:49Z</dc:date>
    </item>
    <item>
      <title>allow icmp dmz to inside</title>
      <link>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407342#M306231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; is it possible to have th erule only allow one host on the dmz to ping the inside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I enter the command you suggested it looks liek that will enable for the entire interface. But if I only want a host on the dmz to ping a host inside I tried:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-IN permit icmp 192.168.10.50 255.255.255.0 10.10.10.40 255.255.255.0 echo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the error says 192.168.10.50 0.0.0.0&amp;gt; doesn't pair&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 22:13:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407342#M306231</guid>
      <dc:creator>tolinrome tolinrome</dc:creator>
      <dc:date>2014-01-06T22:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: allow icmp dmz to inside</title>
      <link>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407343#M306233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would use this format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN permit icmp &lt;SPAN style="color: #ff0000;"&gt;host&lt;/SPAN&gt; 192.168.10.50 10.10.10.40 255.255.255.0 echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"host"&lt;/STRONG&gt; parameter defines that a single host IP address will follow. This would allow only the single source host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the the IP addresses I used in my example are made up and you should use the ones you have configured in your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 22:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-icmp-dmz-to-inside/m-p/2407343#M306233</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-06T22:17:01Z</dc:date>
    </item>
  </channel>
</rss>

