<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ICMP Type 3 Code 4 blocked at ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/icmp-type-3-code-4-blocked-at-asa/m-p/2288788#M310768</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am working on an issue related to ICMP Fragmentation needed but DF set. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have this topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router B----GRE/IPSEC tunnel-----Router A--------Core SW-----------ASA 5510&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that when the GRE tunnel was setup, users coming from router B could not access internet. We increased the MTU size on the tunnel interfaces of routers A and B to 1524 and now internet works but performance is affected due to fragmentation. I have done a lot of research&amp;nbsp; and everything points me to lowering the MTU instead of increasing it to avoid fragmentation but when doing this internet doesn't work (set as low as 1400 while testing).&lt;/P&gt;&lt;P&gt;I believe that the ICMP type 3 code 4 generated by router A (if I understand correctly) are being blocked by the ASA.&lt;/P&gt;&lt;P&gt;In order to not disrupt production, I have been experimenting with an ASA 5505 and packet tracer to see if a ICMP packet of this nature would be allowed or blocked and it fails every time. I am not sure if this is an accurate test of whether the firewall is allowing that traffic or not but if it is, then it certainly is being blocked.&lt;/P&gt;&lt;P&gt;I've tried multiple things including adding the inspect icmp error to the firewall but without success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See the test I did:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa# config t&lt;/P&gt;&lt;P&gt;asa(config)# class-map icmp-class&lt;/P&gt;&lt;P&gt;asa(config-cmap)# match default-inspection-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(config-cmap)# exit&lt;/P&gt;&lt;P&gt;asa(config)# policy-map icmp_policy&lt;/P&gt;&lt;P&gt;asa(config-pmap)# class icmp-class&lt;/P&gt;&lt;P&gt;asa(config-pmap-c)# inspect icmp error&lt;/P&gt;&lt;P&gt;asa(config-pmap-c)# exit&lt;/P&gt;&lt;P&gt;asa(config-pmap)# service-policy icmp_policy interface outside&lt;/P&gt;&lt;P&gt;asa(config)# end&lt;/P&gt;&lt;P&gt;asa# packet-tracer input inside icmp 10.16.10.100 3 4 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the result was dropped... see test results:&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;match ip inside 10.16.10.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;dynamic translation to pool 1 (192.168.1.72 [Interface PAT])&lt;/P&gt;&lt;P&gt;translate_hits = 309, untranslate_hits = 46&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;match ip inside 10.16.10.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;dynamic translation to pool 1 (192.168.1.72 [Interface PAT])&lt;/P&gt;&lt;P&gt;translate_hits = 309, untranslate_hits = 46&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also full config attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I missing something? Would this be an accurate test of whether the traffic would go through? Any thoughts on a better way of testing this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 02:53:17 GMT</pubDate>
    <dc:creator>Spaniard141</dc:creator>
    <dc:date>2019-03-12T02:53:17Z</dc:date>
    <item>
      <title>ICMP Type 3 Code 4 blocked at ASA</title>
      <link>https://community.cisco.com/t5/network-security/icmp-type-3-code-4-blocked-at-asa/m-p/2288788#M310768</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am working on an issue related to ICMP Fragmentation needed but DF set. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have this topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router B----GRE/IPSEC tunnel-----Router A--------Core SW-----------ASA 5510&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that when the GRE tunnel was setup, users coming from router B could not access internet. We increased the MTU size on the tunnel interfaces of routers A and B to 1524 and now internet works but performance is affected due to fragmentation. I have done a lot of research&amp;nbsp; and everything points me to lowering the MTU instead of increasing it to avoid fragmentation but when doing this internet doesn't work (set as low as 1400 while testing).&lt;/P&gt;&lt;P&gt;I believe that the ICMP type 3 code 4 generated by router A (if I understand correctly) are being blocked by the ASA.&lt;/P&gt;&lt;P&gt;In order to not disrupt production, I have been experimenting with an ASA 5505 and packet tracer to see if a ICMP packet of this nature would be allowed or blocked and it fails every time. I am not sure if this is an accurate test of whether the firewall is allowing that traffic or not but if it is, then it certainly is being blocked.&lt;/P&gt;&lt;P&gt;I've tried multiple things including adding the inspect icmp error to the firewall but without success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See the test I did:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa# config t&lt;/P&gt;&lt;P&gt;asa(config)# class-map icmp-class&lt;/P&gt;&lt;P&gt;asa(config-cmap)# match default-inspection-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(config-cmap)# exit&lt;/P&gt;&lt;P&gt;asa(config)# policy-map icmp_policy&lt;/P&gt;&lt;P&gt;asa(config-pmap)# class icmp-class&lt;/P&gt;&lt;P&gt;asa(config-pmap-c)# inspect icmp error&lt;/P&gt;&lt;P&gt;asa(config-pmap-c)# exit&lt;/P&gt;&lt;P&gt;asa(config-pmap)# service-policy icmp_policy interface outside&lt;/P&gt;&lt;P&gt;asa(config)# end&lt;/P&gt;&lt;P&gt;asa# packet-tracer input inside icmp 10.16.10.100 3 4 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the result was dropped... see test results:&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;match ip inside 10.16.10.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;dynamic translation to pool 1 (192.168.1.72 [Interface PAT])&lt;/P&gt;&lt;P&gt;translate_hits = 309, untranslate_hits = 46&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;match ip inside 10.16.10.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;dynamic translation to pool 1 (192.168.1.72 [Interface PAT])&lt;/P&gt;&lt;P&gt;translate_hits = 309, untranslate_hits = 46&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also full config attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I missing something? Would this be an accurate test of whether the traffic would go through? Any thoughts on a better way of testing this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:53:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-type-3-code-4-blocked-at-asa/m-p/2288788#M310768</guid>
      <dc:creator>Spaniard141</dc:creator>
      <dc:date>2019-03-12T02:53:17Z</dc:date>
    </item>
    <item>
      <title>ICMP Type 3 Code 4 blocked at ASA</title>
      <link>https://community.cisco.com/t5/network-security/icmp-type-3-code-4-blocked-at-asa/m-p/2288789#M310772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;did you try adding that inspect in the global policy?&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the Cisco recommended MTU is 1400 on the routers GRE tunnel interfaces in order to account for headers...&lt;/P&gt;&lt;P&gt;Also, I think there's a way to clear the DF bit on IPsec tunnels on the routers:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_dplane/configuration/15-mt/sec-df-bit-ovride.html"&gt;http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_dplane/configuration/15-mt/sec-df-bit-ovride.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Oct 2013 17:50:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-type-3-code-4-blocked-at-asa/m-p/2288789#M310772</guid>
      <dc:creator>Patrick Moubarak</dc:creator>
      <dc:date>2013-10-17T17:50:10Z</dc:date>
    </item>
  </channel>
</rss>

