<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ICMP on ASA5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982608#M401873</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would also need to configure:&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that you wont' be configuring any NAT commands in the future.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 Jul 2012 04:58:22 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-07-19T04:58:22Z</dc:date>
    <item>
      <title>ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982607#M401872</link>
      <description>&lt;P&gt;I want to allow ICMP traffic on ASA 5510 from LAN interface to DMZ. I've permit any traffic and added ICMP to the inspestion list also but still there is problem. Belos is the configuration. The image is asa822-k8.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname fw-01&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.20.4.2 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.4.65 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.1.220 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa822-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list DMZ--&amp;gt;LAN extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list DMZ--&amp;gt;LAN extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list LAN--&amp;gt;DMZ extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list LAN--&amp;gt;DMZ extended permit icmp any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu LAN 1500&lt;/P&gt;&lt;P&gt;mtu DMZ1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group LAN--&amp;gt;DMZ in interface LAN&lt;/P&gt;&lt;P&gt;access-group DMZ--&amp;gt;LAN out interface LAN&lt;/P&gt;&lt;P&gt;access-group DMZ--&amp;gt;LAN in interface DMZ&lt;/P&gt;&lt;P&gt;access-group LAN--&amp;gt;DMZ out interface DMZ&lt;/P&gt;&lt;P&gt;route LAN 10.0.0.0 255.0.0.0 172.20.4.1 1&lt;/P&gt;&lt;P&gt;route DMZ 172.30.0.0 255.255.255.0 172.20.4.66 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.0.0.5 255.255.255.255 LAN&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 LAN&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:0055841bfefc4136bb22c6cd5b425b9b&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982607#M401872</guid>
      <dc:creator>Ali Norouzi</dc:creator>
      <dc:date>2019-03-11T23:32:43Z</dc:date>
    </item>
    <item>
      <title>ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982608#M401873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would also need to configure:&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that you wont' be configuring any NAT commands in the future.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 04:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982608#M401873</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-19T04:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982609#M401874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Cisco ASA FW is a stateful FW. This means in your rules, you don't have to permit 2-way. Just do the following to permit ICMP and TRACEROUTE, and all will be good &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: Please change the security-level LAN from 50 to 100 &amp;amp; DMZ from 100 to 50.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 172.20.4.0 172.20.4.0 netmask 255.255.255.252&lt;/P&gt;&lt;P&gt;static (LAN,DMZ) 10.0.0.0 10.0.0.0 netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list DMZ--&amp;gt;LAN extended permit ip any any&lt;BR /&gt;no access-list LAN--&amp;gt;DMZ extended permit ip any any&lt;BR /&gt;no access-list LAN--&amp;gt;DMZ extended permit icmp any any&lt;BR /&gt;no access-list DMZ--&amp;gt;LAN extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ--&amp;gt;LAN extended permit icmp any any echo&lt;BR /&gt;access-list DMZ--&amp;gt;LAN extended permit icmp any any echo-reply&lt;BR /&gt;access-list DMZ--&amp;gt;LAN extended permit icmp any any time-exceeded&lt;BR /&gt;access-list DMZ--&amp;gt;LAN extended permit icmp any any unreachable&lt;BR /&gt;access-list DMZ--&amp;gt;LAN extended permit udp any any range 33434 33464&lt;BR /&gt;access-list DMZ--&amp;gt;LAN deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list LAN--&amp;gt;DMZ extended permit icmp any any echo&lt;BR /&gt;access-list LAN--&amp;gt;DMZ extended permit icmp any any echo-reply&lt;BR /&gt;access-list LAN--&amp;gt;DMZ extended permit icmp any any time-exceeded&lt;BR /&gt;access-list LAN--&amp;gt;DMZ extended permit icmp any any unreachable&lt;BR /&gt;access-list LAN--&amp;gt;DMZ extended permit udp any any range 33434 33464&lt;BR /&gt;access-list LAN--&amp;gt;DMZ deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-group DMZ--&amp;gt;LAN out interface LAN&lt;BR /&gt;no access-group LAN--&amp;gt;DMZ out interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group LAN--&amp;gt;DMZ in interface LAN&lt;BR /&gt;access-group DMZ--&amp;gt;LAN in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; set connection decrement-ttl&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Note: Provided your workstations have the correct default gateway set in LAN and DMZ.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 05:02:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982609#M401874</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-19T05:02:00Z</dc:date>
    </item>
    <item>
      <title>ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982610#M401877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeniffer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need NAT in future. Actually I started to configure this firewall but in first stage I faced this issue and that's why I permitted anything in two direction.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 05:14:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982610#M401877</guid>
      <dc:creator>Ali Norouzi</dc:creator>
      <dc:date>2012-07-19T05:14:06Z</dc:date>
    </item>
    <item>
      <title>ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982611#M401878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that case, pls configure the following instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,LAN) 172.30.0.0 172.30.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (DMZ,LAN) 172.20.4.64 172.20.4.64 netmask 255.255.255.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate" after the changes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 05:19:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982611#M401878</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-19T05:19:15Z</dc:date>
    </item>
    <item>
      <title>ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982612#M401880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Problem still exist. I have tested it on ASA5520 and there is no problem on that. Is there diffrence between them in rules?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 06:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982612#M401880</guid>
      <dc:creator>Ali Norouzi</dc:creator>
      <dc:date>2012-07-19T06:11:05Z</dc:date>
    </item>
    <item>
      <title>ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982613#M401882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, there is no difference at all between 5520 and 5510 as far as software and configuration is concern, they should behave in exactly the same way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you trying to ping the host or interface of the ASA?&lt;/P&gt;&lt;P&gt;Just FYI, you can't ping cross interface, ie: from a host on LAN you can't ping ASA DMZ interface and vice versa. You can only ping through the ASA, ie: from host on LAN towards host on DMZ and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise what you are trying to ping to and from, and also run "debug icmp trace" to see if the ASA is receiving and replying to the ICMP packets.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 06:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982613#M401882</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-19T06:58:42Z</dc:date>
    </item>
    <item>
      <title>ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982614#M401884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I want to ping through ASA. From host on LAN towards host on DMZ. Debug icmp shows that packet is coming from LAN interface to DMZ, but no reply is sent back.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 07:19:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982614#M401884</guid>
      <dc:creator>Ali Norouzi</dc:creator>
      <dc:date>2012-07-19T07:19:04Z</dc:date>
    </item>
    <item>
      <title>ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982615#M401885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please advise what ip address you are trying to ping from and to?&lt;/P&gt;&lt;P&gt;Also does the DMZ host and/or 172.20.4.66 device knows to route back towards the ASA DMZ Interface IP for access towards LAN host?&lt;/P&gt;&lt;P&gt;Can you ping between the 172.20.4.66 and 172.20.4.1 devices through the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 07:26:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982615#M401885</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-19T07:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982616#M401886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi i am sending topology and running config ,i hope it will help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am able to recieve icmp packet from lan to dmz and dmz to lan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.1.1.1 255.0.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 20.1.1.1 255.0.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet2&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.20.4.2 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet3&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.4.65 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list LAN_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list DMZ_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu LAN 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group LAN_access_in in interface LAN&lt;/P&gt;&lt;P&gt;access-group LAN_access_out out interface LAN&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;access-group DMZ_access_out out interface DMZ&lt;/P&gt;&lt;P&gt;route LAN 173.1.0.0 255.255.0.0 172.20.4.1 1&lt;/P&gt;&lt;P&gt;route DMZ 174.1.0.0 255.255.0.0 172.20.4.66 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.1.1.2 255.255.255.255 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; crl configure&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/3/3/0/96033-Untitled.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 12:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982616#M401886</guid>
      <dc:creator>gaurav bhardwaj</dc:creator>
      <dc:date>2012-07-19T12:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982617#M401887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;and boss there is also another way to do this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can create a police map or edit default policy map &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 13:03:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-on-asa5510/m-p/1982617#M401887</guid>
      <dc:creator>gaurav bhardwaj</dc:creator>
      <dc:date>2012-07-19T13:03:19Z</dc:date>
    </item>
  </channel>
</rss>

