<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302800#M311211</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doing the ICMP from the ASA itself follows different rules than the traffic going through the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the output of this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check that there is no &lt;STRONG&gt;"deny"&lt;/STRONG&gt; rules present.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you could simply try adding &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any echo-reply outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any time-exceeded outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any unreachable outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Oct 2013 09:19:37 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-10-10T09:19:37Z</dc:date>
    <item>
      <title>Cisco ASA Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302799#M311210</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a cisco 5510 all working well with full internet access. My only problem is i'm unable to ping the internet from the ASA itself i can fron behind on the LAN. when checking the logs i see the following.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Oct 10 2013&lt;/TD&gt;&lt;TD&gt;16:11:43&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;8.8.8.8&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;Denied ICMP type=0, code=0 from 8.8.8.8 on interface outside&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have checked my access list and cannot see any deny rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;abit confused to how this can happen as i say i can ping the internet from the LAN no problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any help would be great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:49:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302799#M311210</guid>
      <dc:creator>James Hoggard</dc:creator>
      <dc:date>2019-03-12T02:49:57Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302800#M311211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doing the ICMP from the ASA itself follows different rules than the traffic going through the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the output of this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check that there is no &lt;STRONG&gt;"deny"&lt;/STRONG&gt; rules present.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you could simply try adding &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any echo-reply outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any time-exceeded outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp permit any unreachable outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 09:19:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302800#M311211</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-10T09:19:37Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302801#M311213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;l# show run icmp&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit host **.**.**.** outside&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.1.10 management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i then added in &lt;STRONG&gt;icmp permit any echo-reply outside &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This resolved the issue striaght away.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default is this feature turned off so i have to use this command all the time?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you help anyway &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;quick response and straight to the point. Like it! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 10:12:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302801#M311213</guid>
      <dc:creator>James Hoggard</dc:creator>
      <dc:date>2013-10-10T10:12:10Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302802#M311215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco documentation says&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;The default behavior of the adaptive security appliance is to allow all ICMP traffic to the adaptive security appliance interfaces.&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think without any &lt;STRONG&gt;"icmp"&lt;/STRONG&gt; commands defined anyone can ICMP the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. It might be that if you ICMP from the ASA directly that you have to allow the Echo Reply as you are the one generating the initial ICMP Echo and the ICMP Echo reply is coming towards the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. So by default I think ASA replys to ICMP Echo but the Echo reply for the ICMP Echo that the ASA generated doesnt go through without an &lt;STRONG&gt;"icmp"&lt;/STRONG&gt; configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 10:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302802#M311215</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-10T10:33:13Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302803#M311216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi James,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you applied icmp inspection in the global policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know please if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 13:47:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302803#M311216</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2013-10-10T13:47:37Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302804#M311218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;He already told it works with the interface specific &lt;STRONG&gt;"icmp"&lt;/STRONG&gt; command though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP Inspection only applies to traffic through the ASA not from and to the ASA to my understanding. Not 100% sure without checking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 13:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302804#M311218</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-10T13:58:24Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA Issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302805#M311221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks you the update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another quick question on the cisco 5505 and 5520 what is the best way of web filtering? will an need any additional hardware?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 15:57:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-issue/m-p/2302805#M311221</guid>
      <dc:creator>James Hoggard</dc:creator>
      <dc:date>2013-10-10T15:57:25Z</dc:date>
    </item>
  </channel>
</rss>

