<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Should an inside host be able to ping the ASA DMZ interface IP? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123395#M392782</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What if you just want to permit access to the ASA on the inside interface ( so some internal users can access it from their INTERNAL PC'S) so we enable SSH,ASDM access on the inside interface of the box, and then automatically DMZ&amp;nbsp; users ( GUEST USERS)&amp;nbsp; try to access it and they connect succesfully!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you see the security vulnerability here???? I mean the ASA can do plenty of stuff ( A huge amount of stuff), if this were a limitation don't you think developers could have already fixed this??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do understand you, I got the same confusion at the beginning of my ASA journey but my friend this is how the ASA behaves and will behave until the end of times &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So any kind of traffic going to a distant, far-end interface will not be accepted by the ASA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Jan 2013 17:28:05 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-01-16T17:28:05Z</dc:date>
    <item>
      <title>Should an inside host be able to ping the ASA DMZ interface IP?</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123391#M392772</link>
      <description>&lt;P&gt;Simple question (I hope): I've got an ASA with an IP address of 10.1.1.1 on its inside interface and an IP address of 10.6.6.6 on its DMZ interface.&amp;nbsp; I have an inside host, 10.1.1.2, which is able to ping the ASA's inside IP of 10.1.1.1.&amp;nbsp; Should this host also be able to ping the ASA's DMZ IP of 10.6.6.6?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I'm seeing is that it can't.&amp;nbsp; When I ping the ASA DMZ IP of 10.6.6.6 from the host at 10.1.1.2, I get an error like the following on the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; %ASA-6-110002: Failed to locate egress interface for ICMP from inside:10.1.1.2/63320 to 10.6.6.6/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the ASA says it can't find the egress interface for 10.6.6.6--even though 10.6.6.6 is its own interface IP address.&amp;nbsp; And this happens when I try to ping *any* of the ASA's other interface IPs from 10.1.1.2.&amp;nbsp; The only interface IP I can ping from an inside host is the inside IP address (10.1.1.1).&amp;nbsp; By the way, the host at 10.1.1.2 *can* ping any other hosts on the DMZ network (e.g. 10.6.6.7, 10.6.6.8, and so on)...it's just the ASA interface IP of 10.6.6.6 that it can't ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm guessing this is just a limitation of the ASA (I seem to remember the same limitation on the PIX as well); pinging the "other side" of interfaces works on routers, but doesn't seem to work on ASAs.&amp;nbsp; If anyone can verify that one way or another I'd appreciate it.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123391#M392772</guid>
      <dc:creator>Joseph Da Rosa</dc:creator>
      <dc:date>2019-03-12T00:47:28Z</dc:date>
    </item>
    <item>
      <title>Should an inside host be able to ping the ASA DMZ interface IP?</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123392#M392775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Found the answer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"For security purposes the security appliance does&amp;nbsp; not support far-end interface ping, that is pinging the IP address of&amp;nbsp; the outside interface from the inside network."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Source: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/trouble.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/trouble.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sure wish the ASA would give a better/less misleading error in this situation than "Failed to locate egress interface for ICMP", but that's what we're stuck with.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 05:19:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123392#M392775</guid>
      <dc:creator>Joseph Da Rosa</dc:creator>
      <dc:date>2013-01-16T05:19:30Z</dc:date>
    </item>
    <item>
      <title>Should an inside host be able to ping the ASA DMZ interface IP?</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123393#M392777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exactly, you will not be able to ping a far-end interface ( Security desing)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark the question as answered so future users can learn from this&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 07:15:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123393#M392777</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-16T07:15:38Z</dc:date>
    </item>
    <item>
      <title>Should an inside host be able to ping the ASA DMZ interface IP?</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123394#M392780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Despite Cisco's explanation in that document (and what you've said), I don't see how this has anything to do with security; it seems to me it's more a limitation of the ASA that's been carried over from the PIX.&amp;nbsp; The very fact that the error message points to a packet routing problem seems to me to be evidence that this is just an implementation shortfall that's being explained away as a feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If someone has an explanation for how this improves security, I'd like to hear it.&amp;nbsp; Otherwise, I'd like to see Cisco remove this limitation from the ASA code, since it's unintuitive, confusingly signposted in terms of the error it generates, and--if Internet searches are any indication--has cost a lot of people a lot of time trying to figure out why it doesn't work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 07:36:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123394#M392780</guid>
      <dc:creator>Joseph Da Rosa</dc:creator>
      <dc:date>2013-01-16T07:36:17Z</dc:date>
    </item>
    <item>
      <title>Should an inside host be able to ping the ASA DMZ interface IP?</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123395#M392782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What if you just want to permit access to the ASA on the inside interface ( so some internal users can access it from their INTERNAL PC'S) so we enable SSH,ASDM access on the inside interface of the box, and then automatically DMZ&amp;nbsp; users ( GUEST USERS)&amp;nbsp; try to access it and they connect succesfully!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you see the security vulnerability here???? I mean the ASA can do plenty of stuff ( A huge amount of stuff), if this were a limitation don't you think developers could have already fixed this??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do understand you, I got the same confusion at the beginning of my ASA journey but my friend this is how the ASA behaves and will behave until the end of times &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So any kind of traffic going to a distant, far-end interface will not be accepted by the ASA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 17:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123395#M392782</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-16T17:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123396#M392783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response, but it's not the beginning of my ASA journey; I've been doing PIX/ASA work for well over a decade.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;Do you see the security vulnerability here????&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nope, sorry, but your scenario doesn't follow from the premise.&amp;nbsp; First, I've only mentioned ICMP, and second, what you're talking about would require that the ASA abandon every other security measure it uses; you're apparently thinking "if they allow A they'd have to allow B and C and D as well!", but that's not what I (or any of the many other people I've seen ask about this) have suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're talking here solely about why the ASA doesn't support ICMP from inside hosts to the other interface IPs (I mentioned DMZ, but people typically ask about outside).&amp;nbsp; A reasonable limitation to put on that would be that ICMP is only implicitly allowed from higher security interfaces to lower security interfaces, and obviously it should be subject to the ASA's entire regimen of access lists, icmp statements, etc.&amp;nbsp; I don't see any security issue whatsoever in allowing inside hosts to ping the outside interface IP, assuming that that access is allowed by all the standard ASA access control mechanisms.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;I mean the ASA can do&amp;nbsp; plenty of stuff ( A huge amount of stuff), if&amp;nbsp; this were a limitation&amp;nbsp; don't you think developers could have already&amp;nbsp; fixed this??&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, that's the best one I've heard all day. &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/laugh.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Consider that the error message above was "%ASA-6-110002: Failed to locate egress interface for ICMP from inside:10.1.1.2/63320 to 10.6.6.6/0".&amp;nbsp; That in itself is practically a bug, since the ASA should never "fail to locate" one of its own interface IPs.&amp;nbsp; If this is designed behavior, the ASA should generate a meaningful message like "Far-end interface traffic rejected for ICMP from inside:10.1.1.2/63320 to dmz:10.6.6.6/0".&amp;nbsp; The "Failed to locate egress interface" message makes it seem likely that this is just a limitation of the route lookup&amp;nbsp; code--possibly a remaining artifact of the PIX's inability to route between interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 18:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123396#M392783</guid>
      <dc:creator>Joseph Da Rosa</dc:creator>
      <dc:date>2013-01-16T18:54:25Z</dc:date>
    </item>
    <item>
      <title>Should an inside host be able to ping the ASA DMZ interface IP?</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123397#M392785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay not to offend but if you have a lot of experience with the ASA/PIX you should already know this is the expected behavior and there is nothing we can do to change that as managment traffic ( Including ICMP ) will not be allowed to a distant interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA is a firewall so apart to split the broadcast domain as any other L3 device it will also enquire you to try ( test connectivity to the box ) only from the directly connected interface,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean I have worked on several cases with this particular scenario , question, doubt ,etc,etc, etc and it does not matter if its from outside to inside, inside to outside, dmz to inside, inside to dmz the limitation based on the security meassure is there ( I am not inventing this)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Taken from cisco documentation:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG&gt;You are not able to ping interfaces on the "far side" of the PIX or ASA in any version&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if we were talking about VPN we could do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#topic0"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#topic0&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are to test connectivity by pinging another host ( not the ASA interface Ip address) on the other interface,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I could help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H4 style="color: #000000; font-size: 12px;"&gt;&lt;/H4&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 19:06:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123397#M392785</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-16T19:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123398#M392787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I know this has been expected behavior in the past (I said as much in my initial posting).&amp;nbsp; The reason why it threw me in this case was that the extremely misleading error message from the ASA points to a route lookup failure; that's why it seemed possible that recent ASA releases had lifted this limitation, and I was just running into some other issue that was preventing it from working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't say you're inventing this (and there's no need to cite Cisco documentation for it when I've already done so myself).&amp;nbsp; But you're also not offering a reasonable explanation as to how it increases security.&amp;nbsp; That's fine--I can live with it just being a limitation of the ASA just as it was a limitation of the PIX.&amp;nbsp; Regardless, I'd say Cisco should change the error message that's generated in this case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 19:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123398#M392787</guid>
      <dc:creator>Joseph Da Rosa</dc:creator>
      <dc:date>2013-01-16T19:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123399#M392789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agree with you on the fact that the error message could be more specific ( people may want to read packet being dropped as traffic to a far-end interface is not allowed ) but the log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; %ASA-6-110002: Failed to locate egress interface for ICMP from inside x.x.x.x to y.y.y.y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is also accurate as based on the Accelerated Security Path algorightm used by the ASA , it will not be able to locate the egress interface as it's written on it's code that traffic to a far-end interface cannot happen, it's receiving invalid traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway I hope I could help you on this,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 19:41:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123399#M392789</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-16T19:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123400#M392791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want to be able to ping the far-end IP of a firewall, goes with Checkpoint Firewall &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 20:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123400#M392791</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2013-01-16T20:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123401#M392792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great answer. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 21:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123401#M392792</guid>
      <dc:creator>Joseph Da Rosa</dc:creator>
      <dc:date>2013-01-16T21:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123402#M392793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Agree with you on the fact that the error message could be more specific ( people may want to read packet being dropped as traffic to a far-end interface is not allowed ) but the log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;%ASA-6-110002: Failed to locate egress interface for ICMP from inside x.x.x.x to y.y.y.y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;is also accurate as based on the Accelerated Security Path algorightm used by the ASA , it will not be able to locate the egress interface as it's written on it's code that traffic to a far-end interface cannot happen, it's receiving invalid traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM style="text-decoration: underline; "&gt;Also a good answer &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if you have a contract ( A Valid Contract with us) you can contact your Account Manager in order to open an enhacement request, that is not a problem for us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if you think that just because ICMP traffic to a particular host does not work and that is enough to move forward to another company ( whatever the brand is ) then yes you should go to Checkpoint,etc,etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now as you have 10 years working with CISCO ASA's I dont think you are going somewhere else as you know the ASA can do a lot of stuff , the rest of the brands can't&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway have a good one my friend &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/laugh.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 22:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123402#M392793</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-16T22:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123403#M392794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;jcarvaja wrote:&lt;/P&gt; &lt;P&gt;Now as you have 10 years working with CISCO ASA's I dont think you are going somewhere else as you know the ASA can do a lot of stuff , the rest of the brands can't&lt;/P&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you tell me which features that ASA can do that other firewall brands can not?&amp;nbsp; I would like to know&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 22:53:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123403#M392794</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2013-01-16T22:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123404#M392795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check on the CSC, there are a lot of posts refering to that specific topic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am studying right now so I cannot focus on the CSC,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 23:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123404#M392795</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-16T23:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123405#M392796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;jcarvaja wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check on the CSC, there are a lot of posts refering to that specific topic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you referring to Content Security and Control (CSC) Service module?&amp;nbsp; Let see here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Comprehensive malware protection:&amp;nbsp; &lt;/STRONG&gt;also available in Checkpoint as well a long time ago&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Advanced content filtering:&amp;nbsp; &lt;/STRONG&gt;also available in Checkpoint as well a long time ago&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Integrated message security:&amp;nbsp; &lt;/STRONG&gt;also available in Checkpoint as well a long time ago&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Customization and tuning capabilities:&amp;nbsp; &lt;/STRONG&gt;also available in Checkpoint as well a long time ago&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Ease of management and automatic update capabilities:&amp;nbsp; &lt;/STRONG&gt;also availabe in Checkpoint a long time ago &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know a few things that are supported by Checkpoint firewall but not Cisco ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Checkpoint firewall can run BGP.&amp;nbsp; ASA can not (at least in version that I use 8.2.1),&lt;/P&gt;&lt;P&gt;- you can combine 16 checkpoint physical firewalls into an Active-Active....Active firewall cluster.&amp;nbsp; I don't think you can combine 16 ASA firewall into a single firewall cluster.&lt;/P&gt;&lt;P&gt;- At least in version 8.2.1 that I use, Active-Active in ASA is really Active/Active for different context.&amp;nbsp; Within a single context, it is really Active/Standby.&amp;nbsp; In other words, it is HSRP with different group within ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is something that Cisco ASA can do but Checkpoint can not:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the static NAT, or PAT, you can specify embryonic connection for each NAT in ASA but you can not do that with Checkpoint (I've not used Checkpoint Gaia yet so I don't know.&amp;nbsp; It may be there but not in NGx R71.30).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As someone who work with firewall technologies, I use both Cisco and Checkpoint and like them both.&amp;nbsp; They both have strenghs and weaknesses.&amp;nbsp; I don't think it is correct to say that Cisco ASA can do a lot of stuffs that other brands can not.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One can also argue that other firewall brands can do a lot of stuffs that Cisco ASA can not &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; as mentioned above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 00:36:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123405#M392796</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2013-01-17T00:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123406#M392797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CSC:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;C&lt;/STRONG&gt;isco &lt;STRONG&gt;S&lt;/STRONG&gt;upport &lt;STRONG&gt;C&lt;/STRONG&gt;ommunity&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 00:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123406#M392797</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-17T00:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: Should an inside host be able to ping the ASA DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123407#M392798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Here is something that Cisco ASA can do but Checkpoint can not:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in&amp;nbsp; the static NAT, or PAT, you can specify embryonic connection for each&amp;nbsp; NAT in ASA but you can not do that with Checkpoint (I've not used&amp;nbsp; Checkpoint Gaia yet so I don't know.&amp;nbsp; It may be there but not in NGx&amp;nbsp; R71.30).&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;It's not that simple any more, unfortunately.&amp;nbsp; You used to be able to apply a different embryonic limit easily to each static, but now you've got to do it all via MPF--so you have to come up with some way to ensure that the MPF policy maps the desired embryonic limits correctly to each of the different static mappings for which you'd have previously wanted to control embryonic connections, that it doesn't over-apply to any others, that the policy works in combination with the global policy rather than overriding it, etc.&amp;nbsp; In fact I'm currently migrating an old PIX to a brand new ASA and that's exactly the hassle I'm dealing with right now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it is at least true that you *can* still specify the embryonic connection limit on an ASA, even though it's so much more complex than it used to be.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 02:21:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/should-an-inside-host-be-able-to-ping-the-asa-dmz-interface-ip/m-p/2123407#M392798</guid>
      <dc:creator>Joseph Da Rosa</dc:creator>
      <dc:date>2013-01-17T02:21:59Z</dc:date>
    </item>
  </channel>
</rss>

