<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Understanding ASA/FW operation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725393#M537152</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would you please do a show run service-policy ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Jun 2011 03:05:36 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2011-06-29T03:05:36Z</dc:date>
    <item>
      <title>Understanding ASA/FW operation</title>
      <link>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725388#M537145</link>
      <description>&lt;P&gt;ASA Newbie here.&amp;nbsp; I couldn't find this exact thread so far - although I saw a number of similar threads.&amp;nbsp; I understand the role of a FW as a stateful connection monitor, the organization of interfaces into "zones" of varying security levels, and understand how routing and NAT works, so I cannot figure out what I DO NOT understand in terms of basic connectivity through a firewall.&amp;nbsp; Since I'm emulating functionality via GNS3 I'm only really testing with ICMP right now.&amp;nbsp; I read that the connectionless nature of ICMP makes it something a firewall can't monitor the state of so that unless a "conduit" (pix language I know) or specific ACL is configured to allow this.&amp;nbsp; Topologically, I'm having the same basic problem as outlined here: &lt;A _jive_internal="true" href="https://community.cisco.com/message/3306478#3306478" target="_blank"&gt;https://supportforums.cisco.com/message/3306478#3306478&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping to and from the local fw interfaces, but traffic THROUGH the firewall fails.&amp;nbsp; My basic config is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside Interface:&lt;/P&gt;&lt;P&gt;ip add 10.0.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outisde Interface:&lt;/P&gt;&lt;P&gt;ip add 192.168.137.2 255.255.255.0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Route:&lt;/P&gt;&lt;P&gt;ip route 0 0 192.168.137.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat/Pat:&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.255.255.0 (I honestly don't understand the need for the "1" here or in the PAT statement)&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.137.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought that would've been enough - but apparently not.&amp;nbsp; I have not tried to implement the solution suggested in the thread I cited, mostly because I'm not sure I understand why those dozen configuration lines would be needed to allow a simple ICMP through the ASA.&amp;nbsp; That's most important to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got the "IMCP is not monitorable/stateful info from the PIX/ASA handbook, which neglects to offer an easily understandable solution to my issue, and I have not finished going through this link: &lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094aad.shtml#topic2" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094aad.shtml#topic2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which appears to have some suggestions I'd like to try, but really, I was hoping there was a more elegant solution than a dozen line service-policy to allow ICMP replies to known hosts back in through the outside interface.&amp;nbsp; I'm also interested in confirming the information I read about ICMP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any replies.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725388#M537145</guid>
      <dc:creator>Trey Grun</dc:creator>
      <dc:date>2019-03-11T20:51:40Z</dc:date>
    </item>
    <item>
      <title>Understanding ASA/FW operation</title>
      <link>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725389#M537147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Trey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok let me explain you in detail how this going to work, in case of ICMP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets consider this topo:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router----------------------ASA-----------------------------PC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you want to initiate a ping from the PC to the router interface, first thing that you would need is&amp;nbsp; the NAT statement;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&amp;nbsp; (pat the internal IP's to outside interface of the firewall)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here '1' is&amp;nbsp; the nat identifier, it is used to bind the nat statement with a specific global statement, for eg you can also have another nat statement, if you had configured another interface like,&lt;/P&gt;&lt;P&gt;nat (dmz) 2 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (outside) 2 192.168.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so users behind DMZ should be natted to global statement with identifier 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now second we would need a default route on the ASA, something like:&lt;/P&gt;&lt;P&gt;route outside 0 0 192.168.137.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the next we would need to allow the icmp return packets on the outside interface, since ICMP is a stateless connection:&lt;/P&gt;&lt;P&gt;access-list out_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list out_in in interface outside&amp;nbsp;&amp;nbsp; (this means apply the acl for traffic coming into the outside interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess this is enough to allow ICMP through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover have a look at these docs for NAT and basic ASA CLI configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA configuration:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/customer/docs/security/asa/asa82/configuration/guide/config.html"&gt;http://www.cisco.com/en/US/customer/docs/security/asa/asa82/configuration/guide/config.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I was able clear your doubts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2011 05:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725389#M537147</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-06-28T05:43:28Z</dc:date>
    </item>
    <item>
      <title>Understanding ASA/FW operation</title>
      <link>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725390#M537149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Totallly correct about ALL you said, however it may be simpler that you think. The ASA is able to inspect ICMP messages thru the firewall (keep track of ICMP sessions)&amp;nbsp; but it is disabled by default. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something to take in consideration is that is not the ICMP request the one that is being dropped, is the reply, since the ASA did not created an "state session". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order for the ASA to permit the icmp echo-reply you need one of two things, one the an acl on the outside interface to permit the ICMP echo-reply or the inspection for ICMP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA firewall has some inspections by default, so the only thing that you need to do is to add the ICMP inspection.&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; class class-default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only problem is that it wont allow all types of ICMP, it will just allow the ones that have initiated a session and it has a reply (icmp echo, echo-reply) the other ones will be dropped, (time exceeded, unrechable etc). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a very important link that you may read to understand it better. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2011 05:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725390#M537149</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-28T05:44:47Z</dc:date>
    </item>
    <item>
      <title>Understanding ASA/FW operation</title>
      <link>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725391#M537150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And yes, as per the thread, to allow the return traffic you can either apply inspect icmp or the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2011 05:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725391#M537150</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-06-28T05:45:21Z</dc:date>
    </item>
    <item>
      <title>Understanding ASA/FW operation</title>
      <link>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725392#M537151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Maykol and Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your replies!&amp;nbsp; I was able to get the ACL based reply to work, but not the inspection.&amp;nbsp; To summ up my topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CLOUD&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; \&lt;/P&gt;&lt;P&gt; asa1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; asa2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp; R1-serial-R2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt; lans&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lans&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the idea is to build a site-to-site VPN between the ASAs and use the serial link ONLY for specific traffic (already built a route-map for that) BUT STEP 1 is to validate connectivity to the cloud.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The *simple* thing would be to slap the ACL onto both ASAs to do so and then build my site-to-site VPN, but I would really like to get a death-grip on 2-way icmp communication through these things so I can confidently know when it *should* work in the event I'm at a customer site and some telco or other entity wants to play the "blame the firewall" game.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas *why* the policy-map may not be working?&amp;nbsp; here's how it appears in my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not much to it!&amp;nbsp; I'm sure it's a semantic thing I'm over-looking - Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jun 2011 01:48:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725392#M537151</guid>
      <dc:creator>Trey Grun</dc:creator>
      <dc:date>2011-06-29T01:48:36Z</dc:date>
    </item>
    <item>
      <title>Understanding ASA/FW operation</title>
      <link>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725393#M537152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would you please do a show run service-policy ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jun 2011 03:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725393#M537152</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-29T03:05:36Z</dc:date>
    </item>
    <item>
      <title>Understanding ASA/FW operation</title>
      <link>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725394#M537153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;WH-ASA# show run service-policy&lt;/P&gt;&lt;P&gt;WH-ASA#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no output.&amp;nbsp; That's wierd.&amp;nbsp; I assumed the "policy-map global_policy" statement would've established that.&amp;nbsp; Thanks for the prompt reply!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jun 2011 03:28:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725394#M537153</guid>
      <dc:creator>Trey Grun</dc:creator>
      <dc:date>2011-06-29T03:28:38Z</dc:date>
    </item>
    <item>
      <title>Understanding ASA/FW operation</title>
      <link>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725395#M537154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No issues, that is basically the problem, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do the following on both asa's on config mode, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jun 2011 03:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725395#M537154</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-29T03:38:28Z</dc:date>
    </item>
    <item>
      <title>Understanding ASA/FW operation</title>
      <link>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725396#M537155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Like I said - semantics.&amp;nbsp; Dead-on - got both methods working now.&amp;nbsp; What an excellent first exchange in this forum.&amp;nbsp; Thanks for everything!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jun 2011 04:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-asa-fw-operation/m-p/1725396#M537155</guid>
      <dc:creator>Trey Grun</dc:creator>
      <dc:date>2011-06-29T04:30:59Z</dc:date>
    </item>
  </channel>
</rss>

