<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Established Access-List in a PIX? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558837#M500162</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you add (in config mode)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will disable any ping/trace route or network scans from the internet (i.e. your network will be in stealth mode), if you also add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then this will allow icmp traffic to go outbound to the internet BUT will not allow anyone from the internet to ping/trace route or scan your network!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can test all this out by going to &lt;A class="jive-link-custom" href="http://www.grc.com" target="_blank"&gt;http://www.grc.com&lt;/A&gt; and using the 'shields up' program to scan your network. Try it first without icmp deny any outside statement and then with the statement added to your configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Jun 2006 14:36:13 GMT</pubDate>
    <dc:creator>jmia</dc:creator>
    <dc:date>2006-06-21T14:36:13Z</dc:date>
    <item>
      <title>Established Access-List in a PIX?</title>
      <link>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558833#M500156</link>
      <description>&lt;P&gt;I have the below access-list applied on my "outside" interface of my PIX and I'm trying to make it so pings that originate from the "inside" work but ones that originate from the ?outside? fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With a VPN Concentrator you can build a rule/filter and apply it to the tunnel that checks for the established bit to be set.  Is there any way to do this with an access-list in a PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a PIX 501 6.3(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:59:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558833#M500156</guid>
      <dc:creator>anowell</dc:creator>
      <dc:date>2020-02-21T08:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: Established Access-List in a PIX?</title>
      <link>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558834#M500158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, you can't create an ACL on a PIX like that, but the ACL you've created should be doing the trick.  What is the issue still?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jun 2006 03:35:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558834#M500158</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2006-06-21T03:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: Established Access-List in a PIX?</title>
      <link>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558835#M500160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As Glenn states, your ACL should be good to go, have you applied it to the outside interface? i.e.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Save with: write mem and also issue clear xlate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jun 2006 06:39:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558835#M500160</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2006-06-21T06:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Established Access-List in a PIX?</title>
      <link>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558836#M500161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I want ONLY allow pings from the "inside" to work and not pings that originated from the "outside", any way to do that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jun 2006 11:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558836#M500161</guid>
      <dc:creator>anowell</dc:creator>
      <dc:date>2006-06-21T11:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: Established Access-List in a PIX?</title>
      <link>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558837#M500162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you add (in config mode)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will disable any ping/trace route or network scans from the internet (i.e. your network will be in stealth mode), if you also add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list outside permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then this will allow icmp traffic to go outbound to the internet BUT will not allow anyone from the internet to ping/trace route or scan your network!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can test all this out by going to &lt;A class="jive-link-custom" href="http://www.grc.com" target="_blank"&gt;http://www.grc.com&lt;/A&gt; and using the 'shields up' program to scan your network. Try it first without icmp deny any outside statement and then with the statement added to your configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jun 2006 14:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558837#M500162</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2006-06-21T14:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: Established Access-List in a PIX?</title>
      <link>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558838#M500163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to all that responded!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You got it right with "icmp deny any outside".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much!&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jun 2006 00:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/established-access-list-in-a-pix/m-p/558838#M500163</guid>
      <dc:creator>anowell</dc:creator>
      <dc:date>2006-06-22T00:33:38Z</dc:date>
    </item>
  </channel>
</rss>

