<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This works fine for getting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201483#M360354</link>
    <description>&lt;P&gt;This works fine for getting trace route to show when tracing traffic from the inside interface to the outside interface but what about DMZ interfaces?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have several firewalls some of which have several DMZ area's hanging off them.&amp;nbsp; Some of these firewalls have an outside connection and some do not.&amp;nbsp; It would be very beneficial for traceroute to show the firewall in its output.&amp;nbsp; I have added a class default and set connection decrement-ttl which worked when tracing internet bound traffic but not DMZ bound traffic.&amp;nbsp; When trying to trace DMZ bound traffic I'm not seeing anything getting denied and have&amp;nbsp;ACL statements to allow echo, echo-reply, time-exceeded, and unreachables.&amp;nbsp; Does anyone know if it's possible to get the firewall to show when tracing traffic destined to a DMZ and not the outside?&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;H:\&amp;gt;tracert 8.8.8.8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Tracing route to 8.8.8.8 over a maximum of 30 hops&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.1.1.254&lt;BR /&gt;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.20.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;- Firewall inside ip&lt;BR /&gt;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 1*.***.***.**2&lt;BR /&gt;&amp;nbsp; 4&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 12px;"&gt;^C&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;C:\&amp;gt;tracert 10.10.10.5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Tracing route to 10.10.10.5&lt;BR /&gt;over a maximum of 30 hops:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.1.1.254&lt;BR /&gt;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request timed out.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;lt;-&amp;nbsp;&amp;nbsp;firewall doesn't show&lt;BR /&gt;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.10.10.5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Firewall:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;icmp unreachable rate-limit 10 burst-size 5&lt;BR /&gt;icmp permit any time-exceeded outside&lt;BR /&gt;icmp permit any unreachable outside&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp deny any outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list acl_out extended permit icmp any any unreachable&lt;BR /&gt;access-list acl_out extended permit icmp any any time-exceeded&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list acl_in extended permit icmp&amp;nbsp;10.1.1.0 255.255.255.0&amp;nbsp;10.10.10.0 255.255.255.0 echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list acl_in extended permit icmp&amp;nbsp;10.1.1.0 255.255.255.0&amp;nbsp;10.10.10.0 255.255.255.0 echo-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list dmz5_access_in extended permit icmp 10.10.10.0 255.255.255.0&amp;nbsp;10.1.1.0 255.255.255.0 echo-reply&lt;BR /&gt;access-list dmz5_access_in extended permit icmp 10.10.10.0 255.255.255.0&amp;nbsp;10.1.1.0 255.255.255.0 unreachable&lt;BR /&gt;access-list dmz5_access_in extended permit icmp 10.10.10.0 255.255.255.0&amp;nbsp;10.1.1.0 255.255.255.0 time-exceeded &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;class-map CLASS_DEFAULT&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect dns&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect snmp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;class CLASS_DEFAULT&lt;BR /&gt;&amp;nbsp; set connection decrement-ttl&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Aug 2014 13:53:06 GMT</pubDate>
    <dc:creator>gchevalley</dc:creator>
    <dc:date>2014-08-29T13:53:06Z</dc:date>
    <item>
      <title>Allow Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201465#M360318</link>
      <description>&lt;P&gt;We are running version 9.1 of ASA code. I am having trouble allowing traceroute through the ASA. I don't need the ASA to be a hop in that traceroute. I have issue the fixup commands for icmp and icmp error. I have allowed ICMP, Echo, Echo Reply, time-exceeded, and unreachables. But I still can't traceroute through the ASA. If I traceroute on the ASA and source from the outside interface it works, but not from the inside interface. Looking at the logs I don't see anything indicating a problem. Ping works, just not traceroute. I have tested from both a MAC and a PC since I know that both uses different methods when performing a traceroute. Both are unable to traceroute through the ASA. &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201465#M360318</guid>
      <dc:creator>Justin Westover</dc:creator>
      <dc:date>2019-03-12T01:13:29Z</dc:date>
    </item>
    <item>
      <title>Allow Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201466#M360320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;class class_default
&amp;nbsp; set connection decrement-ttl&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 04:28:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201466#M360320</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-13T04:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201467#M360322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Justin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Hope you are having a great day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;First of all lets set the basics:&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Linux and Cisco devices will send UDP packets&amp;nbsp; to a pseudorandom port to build the network map, the reply will be an UDP ICMP Port-Unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Windows use ICMP messages,with a TTL of 1 and then incrementing hop by hop. the reply will be a TTL Exceeded.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;So Far so good right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;So on the Scenario you are showing us we can see the traceroute working as we can reach the destination but looks like some devices responses are not reaching us.. Why is that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Well that is because we have the ASA in place and those particular ICMP message codes are not permited by default &lt;SPAN __jive_emoticon_name="grin"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;So let's do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list Julio permit icmp any any eq time-exceeded&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list Julio permit icmp any any eq unreachable&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-group Julio in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Hope that I could help &lt;SPAN __jive_emoticon_name="grin"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Julio Carvajal&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Advanced Security Trainer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 05:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201467#M360322</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-13T05:20:30Z</dc:date>
    </item>
    <item>
      <title>Allow Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201468#M360324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the same issue on a 5545 running 9.1. I followed the steps outlined here, but it doesn't work. I've succesfully done this before on older ASA's running 8.x code, so I know it works. The ACL on the outside interface is there, ICMP inspection is turned on, but traceroutes from inside to outside show "Request timed out". Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 19:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201468#M360324</guid>
      <dc:creator>rkusak</dc:creator>
      <dc:date>2013-03-28T19:47:58Z</dc:date>
    </item>
    <item>
      <title>Allow Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201469#M360326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah I still have the same problem. I can't figure it out. I have ICMP fixup on (inspection) and the proper ACLs but still I only get a "request timed out" &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 19:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201469#M360326</guid>
      <dc:creator>Justin Westover</dc:creator>
      <dc:date>2013-03-28T19:50:20Z</dc:date>
    </item>
    <item>
      <title>Allow Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201470#M360328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Justin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will need to see the configuration as it does not make sense, it should work &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 19:56:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201470#M360328</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-28T19:56:52Z</dc:date>
    </item>
    <item>
      <title>Allow Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201471#M360330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alright, i'll post the ACLs and the policy-map that shows the inspections later today/tonight. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 20:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201471#M360330</guid>
      <dc:creator>Justin Westover</dc:creator>
      <dc:date>2013-03-28T20:00:59Z</dc:date>
    </item>
    <item>
      <title>Allow Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201472#M360332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any Update regarding this ??&lt;/P&gt;&lt;P&gt;I am having same issue with ASA v 9.1(2)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jan 2014 11:06:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201472#M360332</guid>
      <dc:creator>tarek issa</dc:creator>
      <dc:date>2014-01-29T11:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201473#M360334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, no update. This was for a customer and they decided they didn't want this feature enabled. I haven't ran across this issue since then. Definitely keep pushing to get an answer as I am sure I will eventually run across this again.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jan 2014 12:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201473#M360334</guid>
      <dc:creator>Justin Westover</dc:creator>
      <dc:date>2014-01-29T12:21:46Z</dc:date>
    </item>
    <item>
      <title>Has anyone found a solution</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201474#M360336</link>
      <description>&lt;P&gt;Has anyone found a solution to this? I've tried a number of things found in the forums, and none seem to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2014 12:33:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201474#M360336</guid>
      <dc:creator>k.aumell</dc:creator>
      <dc:date>2014-03-11T12:33:02Z</dc:date>
    </item>
    <item>
      <title>There are two requirements to</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201475#M360343</link>
      <description>&lt;P&gt;There are two requirements to get ICMP based traceroute to work:&lt;/P&gt;&lt;P&gt;* Inspect ICMP from the inside heading out.&lt;/P&gt;&lt;P&gt;* Allow ICMP time-exceeded inbound from outside.&lt;/P&gt;&lt;P&gt;Missing either requirement will cause traceroute to fail as seen from an internal host. So as an example:&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_INGRESS remark *** ALLOW ICMP BASED TRACEROUTE ***&lt;BR /&gt;access-list OUTSIDE_INGRESS extended permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_INGRESS in interface Outside&lt;/P&gt;&lt;P&gt;class-map inside-inspection&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map inside-policy&lt;BR /&gt;&amp;nbsp;class inside-inspection&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;service-policy inside-policy interface Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are just the relevant pieces of a working firewall config. If you are using the global service-policy and inspecting icmp, then you don't need to worry about any of the class-map, policy-map, or service-policy configuraton in my example above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Joe Doran&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2014 20:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201475#M360343</guid>
      <dc:creator>Joe Doran</dc:creator>
      <dc:date>2014-03-27T20:45:48Z</dc:date>
    </item>
    <item>
      <title>Thank you Doran, you saved my</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201476#M360345</link>
      <description>&lt;P&gt;Thank you Doran, you saved my day.&lt;/P&gt;&lt;P&gt;I was running ASA 5510 v9.1 and I was experiencing the same problem. I was not able to traceroute from the internal LAN interface. I have already done the second requirement:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;* Allow ICMP time-exceeded inbound from outside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And I was wondering what is happening? So when I saw your post I checked the first requirement and it appears that I have not defined an inspect rule for the outgoing ICPM traffic. So I added it and everything looks good.&lt;/P&gt;&lt;P&gt;Can you explain or give me a link with information why I need to inspect the ICMP traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you again and have a nice day!&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 13:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201476#M360345</guid>
      <dc:creator>tsvetani90</dc:creator>
      <dc:date>2014-03-31T13:34:13Z</dc:date>
    </item>
    <item>
      <title>Sure,The ICMP inspection</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201477#M360347</link>
      <description>&lt;P&gt;Sure,&lt;/P&gt;&lt;P&gt;The ICMP inspection allows the ASA to keep track of the ICMP connections built *through* the ASA. In your case, if you only had the ACL the TTL traffic is allowed in from the outside, but the ASA did not keep track of the connection, so the traffic was still denied.&lt;/P&gt;&lt;P&gt;In the other case, people may have had the ICMP inspection configuration so the ASA keeps track of the ICMP connections built through the ASA, but that command only dynamically allows ICMP echo replies back in, not the TTL expired, so it gets denied again in this scenario.&lt;/P&gt;&lt;P&gt;You need both pieces for the ICMP based traceroute so that you are allowed time expired traffic in, but you need the ASA also to know the details of the ICMP connection through the ASA.&lt;/P&gt;&lt;P&gt;I hope that helps. We can get much more detailed but I don't have time at the moment.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 13:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201477#M360347</guid>
      <dc:creator>Joe Doran</dc:creator>
      <dc:date>2014-03-31T13:46:22Z</dc:date>
    </item>
    <item>
      <title>Wonderful !Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201478#M360349</link>
      <description>&lt;P&gt;Wonderful !&lt;BR /&gt;Thank you for the explanation.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 13:57:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201478#M360349</guid>
      <dc:creator>tsvetani90</dc:creator>
      <dc:date>2014-03-31T13:57:17Z</dc:date>
    </item>
    <item>
      <title>Hi, I tried but it is not</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201479#M360350</link>
      <description>&lt;P&gt;Hi, I tried&amp;nbsp;but it is not working &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please any help&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list outside _in extended permit icmp any any time-exceeded&lt;BR /&gt;access-list outside _in extended permit icmp any any unreachable&lt;BR /&gt;access-list outside _in extended permit icmp any any traceroute&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;outside _in in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; set connection decrement-ttl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When trying I got this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CORE_4500#traceroute 4.2.2.2&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Tracing the route to 4.2.2.2&lt;BR /&gt;&amp;nbsp; 1 10.110.0.252 0 msec 0 msec 0 msec&lt;BR /&gt;&amp;nbsp; 2 4.2.2.2 4 msec 0 msec 0 msec&lt;BR /&gt;&amp;nbsp; 3 4.2.2.2 4 msec 0 msec 4 msec&lt;BR /&gt;&amp;nbsp; 4 4.2.2.2 20 msec 24 msec 20 msec&lt;BR /&gt;&amp;nbsp; 5 4.2.2.2 28 msec 24 msec 24 msec&lt;BR /&gt;&amp;nbsp; 6 4.2.2.2 24 msec 20 msec 24 msec&lt;BR /&gt;&amp;nbsp; 7 4.2.2.2 28 msec 28 msec 24 msec&lt;BR /&gt;&amp;nbsp; 8 4.2.2.2 24 msec 24 msec 24 msec&lt;BR /&gt;&amp;nbsp; 9 4.2.2.2 36 msec 32 msec 32 msec&lt;BR /&gt;&amp;nbsp;10 &amp;nbsp;* &amp;nbsp;32 msec 28 msec&lt;BR /&gt;&amp;nbsp;11 &amp;nbsp;* &amp;nbsp;* &amp;nbsp;*&lt;BR /&gt;&amp;nbsp;12 4.2.2.2 36 msec 32 msec 36 msec&lt;BR /&gt;&amp;nbsp;13 4.2.2.2 32 msec 36 msec 36 msec&lt;BR /&gt;&amp;nbsp;14 4.2.2.2 36 msec 36 msec 36 msec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its shows same IP for all hops&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 18:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201479#M360350</guid>
      <dc:creator>rparrat666</dc:creator>
      <dc:date>2014-08-21T18:53:20Z</dc:date>
    </item>
    <item>
      <title>You have a routing issue.</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201480#M360351</link>
      <description>&lt;P&gt;You have a routing issue. Traceroute is working.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 18:55:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201480#M360351</guid>
      <dc:creator>Joe Doran</dc:creator>
      <dc:date>2014-08-21T18:55:43Z</dc:date>
    </item>
    <item>
      <title>Nop, I was missing inspect</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201481#M360352</link>
      <description>&lt;P&gt;Nop, I was missing&amp;nbsp;inspect icmp error&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 18:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201481#M360352</guid>
      <dc:creator>rparrat666</dc:creator>
      <dc:date>2014-08-21T18:57:18Z</dc:date>
    </item>
    <item>
      <title>Hi, I solved it, I was</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201482#M360353</link>
      <description>&lt;P&gt;Hi, I solved it, I was missing "inspect icmp error" on&amp;nbsp;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;&amp;nbsp;class inspection_default, by the way, confighuring:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;&amp;nbsp;&lt;/SPAN&gt;icmp unreachable rate-limit 10 burst-size 5&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; set connection decrement-ttl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will show the asa as a hop&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 18:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201482#M360353</guid>
      <dc:creator>rparrat666</dc:creator>
      <dc:date>2014-08-21T18:59:29Z</dc:date>
    </item>
    <item>
      <title>This works fine for getting</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201483#M360354</link>
      <description>&lt;P&gt;This works fine for getting trace route to show when tracing traffic from the inside interface to the outside interface but what about DMZ interfaces?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have several firewalls some of which have several DMZ area's hanging off them.&amp;nbsp; Some of these firewalls have an outside connection and some do not.&amp;nbsp; It would be very beneficial for traceroute to show the firewall in its output.&amp;nbsp; I have added a class default and set connection decrement-ttl which worked when tracing internet bound traffic but not DMZ bound traffic.&amp;nbsp; When trying to trace DMZ bound traffic I'm not seeing anything getting denied and have&amp;nbsp;ACL statements to allow echo, echo-reply, time-exceeded, and unreachables.&amp;nbsp; Does anyone know if it's possible to get the firewall to show when tracing traffic destined to a DMZ and not the outside?&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;H:\&amp;gt;tracert 8.8.8.8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Tracing route to 8.8.8.8 over a maximum of 30 hops&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.1.1.254&lt;BR /&gt;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.20.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;- Firewall inside ip&lt;BR /&gt;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 1*.***.***.**2&lt;BR /&gt;&amp;nbsp; 4&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 12px;"&gt;^C&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;C:\&amp;gt;tracert 10.10.10.5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Tracing route to 10.10.10.5&lt;BR /&gt;over a maximum of 30 hops:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.1.1.254&lt;BR /&gt;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request timed out.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;lt;-&amp;nbsp;&amp;nbsp;firewall doesn't show&lt;BR /&gt;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.10.10.5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Firewall:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;icmp unreachable rate-limit 10 burst-size 5&lt;BR /&gt;icmp permit any time-exceeded outside&lt;BR /&gt;icmp permit any unreachable outside&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp deny any outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list acl_out extended permit icmp any any unreachable&lt;BR /&gt;access-list acl_out extended permit icmp any any time-exceeded&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list acl_in extended permit icmp&amp;nbsp;10.1.1.0 255.255.255.0&amp;nbsp;10.10.10.0 255.255.255.0 echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list acl_in extended permit icmp&amp;nbsp;10.1.1.0 255.255.255.0&amp;nbsp;10.10.10.0 255.255.255.0 echo-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list dmz5_access_in extended permit icmp 10.10.10.0 255.255.255.0&amp;nbsp;10.1.1.0 255.255.255.0 echo-reply&lt;BR /&gt;access-list dmz5_access_in extended permit icmp 10.10.10.0 255.255.255.0&amp;nbsp;10.1.1.0 255.255.255.0 unreachable&lt;BR /&gt;access-list dmz5_access_in extended permit icmp 10.10.10.0 255.255.255.0&amp;nbsp;10.1.1.0 255.255.255.0 time-exceeded &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;class-map CLASS_DEFAULT&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect dns&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect snmp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;class CLASS_DEFAULT&lt;BR /&gt;&amp;nbsp; set connection decrement-ttl&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2014 13:53:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201483#M360354</guid>
      <dc:creator>gchevalley</dc:creator>
      <dc:date>2014-08-29T13:53:06Z</dc:date>
    </item>
    <item>
      <title>This was very helpfuly.</title>
      <link>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201484#M360355</link>
      <description>&lt;P&gt;This was very helpfuly.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;/Shane&lt;/P&gt;</description>
      <pubDate>Sat, 14 Nov 2015 23:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traceroute-through-asa/m-p/2201484#M360355</guid>
      <dc:creator>shane.francis</dc:creator>
      <dc:date>2015-11-14T23:59:52Z</dc:date>
    </item>
  </channel>
</rss>

