<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Denying ICMP on outside interface of ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051757#M398488</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi alain &amp;amp; julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Oct 2012 18:42:38 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2012-10-03T18:42:38Z</dc:date>
    <item>
      <title>Denying ICMP on outside interface of ASA</title>
      <link>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051749#M398474</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA&amp;nbsp; ASDM mode i config the ICMP rule &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any outside deny any IP any Mask.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So basically i am denying ICMP on outiside interface of ASA from any IP address and subnet mask.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After doing this here is results&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1&amp;gt; From ASA&amp;nbsp; ping to inside interface and outside interface IP address works&amp;nbsp; fine.&lt;/P&gt;&lt;P&gt;Need to know why --&amp;nbsp; how traffic flows?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2&amp;gt;From ASA any ping to internet does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3&amp;gt;From PC i am able to ping any internet IP address.Need to know why ping works now?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:01:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051749#M398474</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T00:01:49Z</dc:date>
    </item>
    <item>
      <title>Denying ICMP on outside interface of ASA</title>
      <link>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051750#M398475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Mahesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to share your config ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 05:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051750#M398475</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-10-01T05:27:18Z</dc:date>
    </item>
    <item>
      <title>Denying ICMP on outside interface of ASA</title>
      <link>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051751#M398477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you must differentiate forwarded traffic and traffic destined to or originated by the ASA.&lt;/P&gt;&lt;P&gt;In your case you denied ICMP messages destined to the outside interface,not ICMP messages going through your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 08:45:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051751#M398477</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2012-10-01T08:45:20Z</dc:date>
    </item>
    <item>
      <title>Denying ICMP on outside interface of ASA</title>
      <link>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051752#M398478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you say forwarded traffic is this traffic going from inside of ASA&amp;nbsp; to outside world?&lt;/P&gt;&lt;P&gt;What is traffic originated by ASA ?if you can explain that in detail please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i ping from PC&amp;nbsp; attached to inside interface&amp;nbsp; to outside host then the return traffic comes back to outside interface&lt;/P&gt;&lt;P&gt;but it allows that traffic as it is for inside interface not outside interface right ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i ping from ASA&amp;nbsp; to outside world then source traffic is originated by outside world and it is denied right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 14:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051752#M398478</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2012-10-01T14:09:15Z</dc:date>
    </item>
    <item>
      <title>Denying ICMP on outside interface of ASA</title>
      <link>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051753#M398480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;post screenshot of what you did exactly or post show run to see what you configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 14:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051753#M398480</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2012-10-01T14:12:40Z</dc:date>
    </item>
    <item>
      <title>Denying ICMP on outside interface of ASA</title>
      <link>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051754#M398483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alain,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what i did &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ciscoasa(config)# icmp deny any outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# end&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;/P&gt;&lt;P&gt;ciscoasa# sh running-config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password .vV.3QsyXqiTEfZu encrypted&lt;/P&gt;&lt;P&gt;passwd PnBz02JMnfQN7Ggt encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.11.5 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner motd&lt;/P&gt;&lt;P&gt;banner motd +-+&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;banner motd | *** Unauthorized Use or Access Prohibited *** |&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;banner motd | For Authorized Official Use Only |&lt;/P&gt;&lt;P&gt;banner motd | You must have explicit permission to access or |&lt;/P&gt;&lt;P&gt;banner motd | configure this device. All activities performed |&lt;/P&gt;&lt;P&gt;banner motd | on this device may be logged, and violations of |&lt;/P&gt;&lt;P&gt;banner motd | this policy may result in disciplinary action, and |&lt;/P&gt;&lt;P&gt;banner motd | may be reported to law enforcement authorities. |&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;banner motd | There is no right to privacy on this device. |&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;banner motd +-+&lt;/P&gt;&lt;P&gt;banner motd&lt;/P&gt;&lt;P&gt;banner motd&lt;/P&gt;&lt;P&gt;banner motd +-+&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;banner motd | *** Unauthorized Use or Access Prohibited *** |&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;banner motd | For Authorized Official Use Only |&lt;/P&gt;&lt;P&gt;banner motd | You must have explicit permission to access or |&lt;/P&gt;&lt;P&gt;banner motd | configure this device. All activities performed |&lt;/P&gt;&lt;P&gt;banner motd | on this device may be logged, and violations of |&lt;/P&gt;&lt;P&gt;banner motd | this policy may result in disciplinary action, and |&lt;/P&gt;&lt;P&gt;banner motd | may be reported to law enforcement authorities. |&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;banner motd | There is no right to privacy on this device. |&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;banner motd +-+&lt;/P&gt;&lt;P&gt;banner motd&lt;/P&gt;&lt;P&gt;boot system disk0:/asa825-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone MST -7&lt;/P&gt;&lt;P&gt;clock summer-time MST recurring&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.1.0&lt;/P&gt;&lt;P&gt;pager lines 30&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-649.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 10 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.11.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 60&lt;/P&gt;&lt;P&gt;dhcpd dns 64.59.135.145&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.5-192.168.1.250 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 91.103.24.10&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username mintoo password AILiHuRWFGgkbsI5 encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DD"&gt;https://tools.cisco.com/its/service/oddce/services/DD&lt;/A&gt;&lt;/P&gt;&lt;P&gt;CEService&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:0123ac8c2120560e08333cb9edbde873&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pinging IP in outside world&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# ping 4.2.2.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 4.2.2.2, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;ciscoasa# debug icmp tra&lt;/P&gt;&lt;P&gt;ciscoasa# debug icmp trace&lt;/P&gt;&lt;P&gt;debug icmp trace enabled at level 1&lt;/P&gt;&lt;P&gt;ciscoasa# ping 4.2.2.2&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 4.2.2.2, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.11.5 to 4.2.2.2 ID=37045 seq=58604 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 4.2.2.2 to 192.168.11.5 ID=37045 seq=58604 len=72&lt;/P&gt;&lt;P&gt;Denied ICMP type = 0, code = 0 from 4.2.2.2on interface 2&lt;/P&gt;&lt;P&gt;?ICMP echo request from 192.168.11.5 to 4.2.2.2 ID=37045 seq=58604 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 4.2.2.2 to 192.168.11.5 ID=37045 seq=58604 len=72&lt;/P&gt;&lt;P&gt;Denied ICMP type = 0, code = 0 from 4.2.2.2on interface 2&lt;/P&gt;&lt;P&gt;?ICMP echo request from 192.168.11.5 to 4.2.2.2 ID=37045 seq=58604 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 4.2.2.2 to 192.168.11.5 ID=37045 seq=58604 len=72&lt;/P&gt;&lt;P&gt;Denied ICMP type = 0, code = 0 from 4.2.2.2on interface 2&lt;/P&gt;&lt;P&gt;?ICMP echo request from 192.168.11.5 to 4.2.2.2 ID=37045 seq=58604 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 4.2.2.2 to 192.168.11.5 ID=37045 seq=58604 len=72&lt;/P&gt;&lt;P&gt;Denied ICMP type = 0, code = 0 from 4.2.2.2on interface 2&lt;/P&gt;&lt;P&gt;?ICMP echo request from 192.168.11.5 to 4.2.2.2 ID=37045 seq=58604 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 4.2.2.2 to 192.168.11.5 ID=37045 seq=58604 len=72&lt;/P&gt;&lt;P&gt;Denied ICMP type = 0, code = 0 from 4.2.2.2on interface 2&lt;/P&gt;&lt;P&gt;?&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pinging inside interface does not work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# ping 192.168.1.1&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.11.5 to 192.168.1.1 ID=21179 seq=62282 len=72&lt;/P&gt;&lt;P&gt;?ICMP echo request from 192.168.11.5 to 192.168.1.1 ID=21179 seq=62282 len=72&lt;/P&gt;&lt;P&gt;?ICMP echo request from 192.168.11.5 to 192.168.1.1 ID=21179 seq=62282 len=72&lt;/P&gt;&lt;P&gt;?ICMP echo request from 192.168.11.5 to 192.168.1.1 ID=21179 seq=62282 len=72&lt;/P&gt;&lt;P&gt;?ICMP echo request from 192.168.11.5 to 192.168.1.1 ID=21179 seq=62282 len=72&lt;/P&gt;&lt;P&gt;?&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping to PC&amp;nbsp; IP works&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;iscoasa# ping 192.168.1.5&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.1.5, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.1.1 to 192.168.1.5 ID=51867 seq=57002 len=72&lt;/P&gt;&lt;P&gt;!ICMP echo reply from 192.168.1.5 to 192.168.1.1 ID=51867 seq=57002 len=72&lt;/P&gt;&lt;P&gt;!ICMP echo request from 192.168.1.1 to 192.168.1.5 ID=51867 seq=57002 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.1.5 to 192.168.1.1 ID=51867 seq=57002 len=72&lt;/P&gt;&lt;P&gt;!ICMP echo request from 192.168.1.1 to 192.168.1.5 ID=51867 seq=57002 len=72&lt;/P&gt;&lt;P&gt;!ICMP echo reply from 192.168.1.5 to 192.168.1.1 ID=51867 seq=57002 len=72&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;ciscoasa# ICMP echo request from 192.168.1.1 to 192.168.1.5 ID=51867 seq=57002 l&lt;/P&gt;&lt;P&gt;en=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.1.5 to 192.168.1.1 ID=51867 seq=57002 len=72&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.1.1 to 192.168.1.5 ID=51867 seq=57002 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 192.168.1.5 to 192.168.1.1 ID=51867 seq=57002 len=72&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 14:26:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051754#M398483</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2012-10-01T14:26:55Z</dc:date>
    </item>
    <item>
      <title>Denying ICMP on outside interface of ASA</title>
      <link>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051755#M398485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me try to help here.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;icmp any outside&lt;/SPAN&gt; : This will deny any traffic &lt;STRONG&gt;to&lt;/STRONG&gt; the outside interface of the ASA. The key part is the &lt;STRONG&gt;to.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Now the ICMP echo-reply should be dropped so that is why you are not getting a succesful rate when pinging 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;When i ping from PC&amp;nbsp; attached to inside interface&amp;nbsp; to outside host then the return traffic comes back to outside interface&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;but it allows that traffic as it is for inside interface not outside interface right ?&lt;/P&gt;&lt;P&gt; A/ In this scenario the answer is no as the traffic needs to traverse the outside interface and you have a deny ICMP there so no matter what it will get denied ( even if you have the inspection on)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other question..Sure.. Just remember to rate all of my answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 17:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051755#M398485</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-01T17:47:04Z</dc:date>
    </item>
    <item>
      <title>Denying ICMP on outside interface of ASA</title>
      <link>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051756#M398487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ok so this is what I thought, you have disabled icmp messages on outside interface( those destined to this interface)&lt;/P&gt;&lt;P&gt;so&lt;/P&gt;&lt;P&gt;1) ping 4.2.2.2 is not working because icmp echo-replies are dropped&lt;/P&gt;&lt;P&gt;2) is not working because the echo-requests are sourced from interface outside but replies are dropped&lt;/P&gt;&lt;P&gt;3)ping to PC works because the requests are sourced from inside and replies are accepted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PC when communicating with internet are routed by ASA so the return icmp replies are permitted either by an ACL applied inbound on outside interface or by inspecting ICMP( which is your case)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2012 18:04:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051756#M398487</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2012-10-01T18:04:05Z</dc:date>
    </item>
    <item>
      <title>Denying ICMP on outside interface of ASA</title>
      <link>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051757#M398488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi alain &amp;amp; julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2012 18:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denying-icmp-on-outside-interface-of-asa/m-p/2051757#M398488</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2012-10-03T18:42:38Z</dc:date>
    </item>
  </channel>
</rss>

