<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic icmp in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/icmp/m-p/2092109#M393813</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry my bad. my access list was still ponting to internal host.&lt;/P&gt;&lt;P&gt;Thanks!!! all good now!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 23 Dec 2012 19:37:33 GMT</pubDate>
    <dc:creator>klaudiuszmichalik</dc:creator>
    <dc:date>2012-12-23T19:37:33Z</dc:date>
    <item>
      <title>icmp</title>
      <link>https://community.cisco.com/t5/network-security/icmp/m-p/2092103#M393806</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have an issue with allowing ICMP from outside to inside. Inside to Outside works great.&lt;/P&gt;&lt;P&gt;I would really appreciate if someone could give me some advise.&lt;/P&gt;&lt;P&gt;Thanks for all your help!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;r13 (210.1.1.2) &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; (210.1.1.1) outside ASA inside (172.20.1.2)&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;(172.20.1.1) r7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find extract from show config from ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.0.0 external description externalpingable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.1.2 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 210.1.1.1 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object external 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 210.1.1.0 255.255.255.252&lt;/P&gt;&lt;P&gt;access-list from_outside extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip object-group DM_INLINE_NETWORK_1 172.20.1.0 255.255.255.248 log disable &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 101 interface&lt;/P&gt;&lt;P&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 210.1.1.2 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.20.1.1 255.255.255.255 management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect snmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global-policy global&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:40:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp/m-p/2092103#M393806</guid>
      <dc:creator>klaudiuszmichalik</dc:creator>
      <dc:date>2019-03-12T00:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: icmp</title>
      <link>https://community.cisco.com/t5/network-security/icmp/m-p/2092104#M393808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it icmp/echo that you want to allow in?&lt;/P&gt;&lt;P&gt;Then you have to migrate the "from_outside"-ACL into the ACL that is bound to the outside-interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list outside_access_in extended permit icmp any any echo&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition you need a static translation for the systems that you want to ping from outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Dec 2012 17:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp/m-p/2092104#M393808</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-12-23T17:23:34Z</dc:date>
    </item>
    <item>
      <title>icmp</title>
      <link>https://community.cisco.com/t5/network-security/icmp/m-p/2092105#M393809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your feedback.&lt;/P&gt;&lt;P&gt;I ll try and let you know&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Dec 2012 17:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp/m-p/2092105#M393809</guid>
      <dc:creator>klaudiuszmichalik</dc:creator>
      <dc:date>2012-12-23T17:43:31Z</dc:date>
    </item>
    <item>
      <title>icmp</title>
      <link>https://community.cisco.com/t5/network-security/icmp/m-p/2092106#M393810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Do you want me to apply static NAT to inside host on its way out? Not sure how this can help.&lt;/P&gt;&lt;P&gt;Could you please clarify?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Dec 2012 18:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp/m-p/2092106#M393810</guid>
      <dc:creator>klaudiuszmichalik</dc:creator>
      <dc:date>2012-12-23T18:16:11Z</dc:date>
    </item>
    <item>
      <title>icmp</title>
      <link>https://community.cisco.com/t5/network-security/icmp/m-p/2092107#M393811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When communicating from the lower to the higher security-level you need a static translation for the server that should be reachable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or do you just want to give r13 the possibility to communicate to r7? Then the ACL is all you need on the ASA. But r13 needs a route to the network 172.20.1.0/29.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Dec 2012 18:32:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp/m-p/2092107#M393811</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-12-23T18:32:31Z</dc:date>
    </item>
    <item>
      <title>icmp</title>
      <link>https://community.cisco.com/t5/network-security/icmp/m-p/2092108#M393812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Karsten thanks for your reply.&lt;/P&gt;&lt;P&gt;I applied ACL and static routing but it still isnt working.&lt;/P&gt;&lt;P&gt;I can see hits against ACL and translations/ untranslations but ping still fails.&lt;/P&gt;&lt;P&gt;My runn conf looks like this:Result of the command: "show run"&lt;/P&gt;&lt;P&gt; Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.0.0 external description externalpingable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.1.2 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 210.1.1.1 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object external 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 210.1.1.0 255.255.255.252&lt;/P&gt;&lt;P&gt;access-list from_outside extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip object-group DM_INLINE_NETWORK_1 172.20.1.0 255.255.255.248 log disable &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 101 interface&lt;/P&gt;&lt;P&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 210.1.1.2 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.20.1.1 255.255.255.255 management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect snmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global-policy global&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Dec 2012 19:28:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp/m-p/2092108#M393812</guid>
      <dc:creator>klaudiuszmichalik</dc:creator>
      <dc:date>2012-12-23T19:28:27Z</dc:date>
    </item>
    <item>
      <title>icmp</title>
      <link>https://community.cisco.com/t5/network-security/icmp/m-p/2092109#M393813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry my bad. my access list was still ponting to internal host.&lt;/P&gt;&lt;P&gt;Thanks!!! all good now!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Dec 2012 19:37:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp/m-p/2092109#M393813</guid>
      <dc:creator>klaudiuszmichalik</dc:creator>
      <dc:date>2012-12-23T19:37:33Z</dc:date>
    </item>
  </channel>
</rss>

