<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How do I block pings on the outside interface of a ASA 5505? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218128#M350616</link>
    <description>&lt;P&gt;I was asked to block pings from the internet to the outside interface of our ASA-5505 firewall.&amp;nbsp; I found a post that said to enter "icmp deny any outside", however that does not do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created an ACL to try and do the trick, also to no avail:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have a clue what I'm doing wrong?&amp;nbsp; I'm not the firewall guy as you can tell.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Block / Deny ICMP Echo (Ping) on Cisco ASA Outside Interface&lt;/H2&gt;&lt;DIV&gt;&lt;DIV style="width: 96px; float: right;"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="display: block; margin-bottom: 6px;"&gt;&lt;P id="___plusone_0"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;Most networks that you protect with a Cisco ASA device, will probably want to deny ICMP (maybe not all ICMP types, but a lot of network admins will want to block ICMP Echo, etc.) on the outside interface. This will make the network harder to find through external enumeration, but not impossible.&lt;/P&gt;&lt;PRE&gt;ASA5505(config)#icmp deny any outside&lt;/PRE&gt;&lt;P&gt;You will deny ICMP on the outside interface, but if you include ICMP as a protocol in the default global policy map, you can ping from the inside to any host on the outside, and it will be permitted back through the ASA, as it knows about the previous ICMP “connection&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:38:08 GMT</pubDate>
    <dc:creator>tdennehy</dc:creator>
    <dc:date>2019-03-12T01:38:08Z</dc:date>
    <item>
      <title>How do I block pings on the outside interface of a ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218128#M350616</link>
      <description>&lt;P&gt;I was asked to block pings from the internet to the outside interface of our ASA-5505 firewall.&amp;nbsp; I found a post that said to enter "icmp deny any outside", however that does not do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created an ACL to try and do the trick, also to no avail:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have a clue what I'm doing wrong?&amp;nbsp; I'm not the firewall guy as you can tell.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Block / Deny ICMP Echo (Ping) on Cisco ASA Outside Interface&lt;/H2&gt;&lt;DIV&gt;&lt;DIV style="width: 96px; float: right;"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="display: block; margin-bottom: 6px;"&gt;&lt;P id="___plusone_0"&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;Most networks that you protect with a Cisco ASA device, will probably want to deny ICMP (maybe not all ICMP types, but a lot of network admins will want to block ICMP Echo, etc.) on the outside interface. This will make the network harder to find through external enumeration, but not impossible.&lt;/P&gt;&lt;PRE&gt;ASA5505(config)#icmp deny any outside&lt;/PRE&gt;&lt;P&gt;You will deny ICMP on the outside interface, but if you include ICMP as a protocol in the default global policy map, you can ping from the inside to any host on the outside, and it will be permitted back through the ASA, as it knows about the previous ICMP “connection&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:38:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218128#M350616</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2019-03-12T01:38:08Z</dc:date>
    </item>
    <item>
      <title>How do I block pings on the outside interface of a ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218129#M350617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command should basically do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide us with the output of the command &lt;STRONG&gt;"show run icmp"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the newer softwares you are able to also configure an ACL that controls the traffic targeted to your actual ASA interface. The above ACL wont do that. It controls traffic "through the box"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 15:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218129#M350617</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-03T15:56:55Z</dc:date>
    </item>
    <item>
      <title>How do I block pings on the outside interface of a ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218130#M350618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA(config)# sh run icmp&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;ASA(config)#&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 18:09:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218130#M350618</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-05-03T18:09:41Z</dc:date>
    </item>
    <item>
      <title>How do I block pings on the outside interface of a ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218131#M350619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems you only have the statement blocking the ICMP to the "outside" interface IP address and this should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested this on my own ASA also and seems to work fine when I enter/remove/re-enter the command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe it is some bug or the ASA is in need of a reload or something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share the whole configuration (partially mask public IP addresses etc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link to ASA 8.2 Command Reference and the ICMP command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i1.html#wp1697623"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i1.html#wp1697623&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 18:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218131#M350619</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-03T18:18:53Z</dc:date>
    </item>
    <item>
      <title>How do I block pings on the outside interface of a ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218132#M350620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Rebooted the ASA.&amp;nbsp; No change.&amp;nbsp; Still can ping 10.47.240.225 from 10.47.240.150, which is a host on the little switch where the ASA's outside interface is connected.&amp;nbsp; Still on the bench... not production, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the config...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;domain-name guest.com&lt;/P&gt;&lt;P&gt;enable password ulioxzQNlwbZR encrypted&lt;/P&gt;&lt;P&gt;passwd ulioxzNlUYwNR encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan80&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.96.1 255.255.252.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan240&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.47.240.225 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;switchport access vlan 80&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 80&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;switchport access vlan 80&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;switchport access vlan 80&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;switchport access vlan 80&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;switchport access vlan 240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;switchport access vlan 240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name guest.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list outside_in extended deny ip any any log&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging console debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-625-53.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;route management 10.2.10.10 255.255.255.255 10.47.240.1 1&lt;/P&gt;&lt;P&gt;route management 10.57.3.10 255.255.255.255 10.47.240.1 1&lt;/P&gt;&lt;P&gt;route management 10.96.1.12 255.255.255.255 10.47.240.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ (management) host 10.2.10.10&lt;/P&gt;&lt;P&gt;key *****&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.0.0.0 255.0.0.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcprelay server 10.96.1.12 management&lt;/P&gt;&lt;P&gt;dhcprelay enable inside&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;tftp-server management 10.57.240.5 BlahBlahBlah&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;anyconnect-essentials&lt;/P&gt;&lt;P&gt;username BlahBlahBlah password c23.VFGsxHlpzvDf rypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum client auto&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;inspect ftp&lt;/P&gt;&lt;P&gt;inspect h323 h225&lt;/P&gt;&lt;P&gt;inspect h323 ras&lt;/P&gt;&lt;P&gt;inspect ip-options&lt;/P&gt;&lt;P&gt;inspect netbios&lt;/P&gt;&lt;P&gt;inspect rsh&lt;/P&gt;&lt;P&gt;inspect rtsp&lt;/P&gt;&lt;P&gt;inspect skinny&lt;/P&gt;&lt;P&gt;inspect esmtp&lt;/P&gt;&lt;P&gt;inspect sqlnet&lt;/P&gt;&lt;P&gt;inspect sunrpc&lt;/P&gt;&lt;P&gt;inspect tftp&lt;/P&gt;&lt;P&gt;inspect sip&lt;/P&gt;&lt;P&gt;inspect xdmcp&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;inspect icmp error&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt;profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DD"&gt;https://tools.cisco.com/its/service/oddce/services/DD&lt;/A&gt;&lt;/P&gt;&lt;P&gt;CEService&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callyourmom@cisco.com"&gt;callyourmom@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;destination transport-method http&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:544e8d1dff1e5dfdd277d295328e7321&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASA#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 20:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218132#M350620</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-05-03T20:01:22Z</dc:date>
    </item>
    <item>
      <title>How do I block pings on the outside interface of a ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218133#M350621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;ASA5505(config)#icmp deny any outside&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command should be enough to block the pings to outside interface. I haven't seen a similar caveat yet. As Jauni mentioned, can you paste the complete 'show run' for review?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&lt;/P&gt;&lt;P&gt;Sourav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 20:03:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218133#M350621</guid>
      <dc:creator>sokakkar</dc:creator>
      <dc:date>2013-05-03T20:03:18Z</dc:date>
    </item>
    <item>
      <title>How do I block pings on the outside interface of a ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218134#M350622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IPs you mention are part of the "management" interface, NOT the "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To block that icmp you would have to use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;icmp deny any management&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 20:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218134#M350622</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-03T20:06:22Z</dc:date>
    </item>
    <item>
      <title>How do I block pings on the outside interface of a ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218135#M350623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; As you quickly figured out, I was configuring the wrong interface.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":neutral_face:"&gt;😐&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 21:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218135#M350623</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-05-03T21:08:11Z</dc:date>
    </item>
    <item>
      <title>How do I block pings on the outside interface of a ASA 5505?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218136#M350624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad we sorted it out &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 21:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-block-pings-on-the-outside-interface-of-a-asa-5505/m-p/2218136#M350624</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-03T21:19:33Z</dc:date>
    </item>
  </channel>
</rss>

