<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa drops in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-drops/m-p/3923725#M5539</link>
    <description>&lt;P&gt;inspect icmp will not solve the problem ? &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;BR /&gt;Answer: It is only one part. You need to understand how traceroute work i would refer to you wiki page &lt;A href="https://en.wikipedia.org/wiki/Traceroute" target="_blank"&gt;https://en.wikipedia.org/wiki/Traceroute&lt;/A&gt;&lt;/P&gt;&lt;P&gt;And traceroute&amp;nbsp; requires any additional ports other than icmp ? &amp;nbsp;&lt;BR /&gt;I mean is there any udp ports need to be opened ? &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;Answer: UDP is used by linux based system, and for that you might required to enable&amp;nbsp;&lt;STRONG&gt;inspect icmp error&lt;/STRONG&gt;&amp;nbsp;and also additional line in Access list&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE_INGRESS extended permit icmp any any unreachable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I would say that once you go through the Wiki page, you will understand the whole idea how traceroute work.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
    <pubDate>Fri, 13 Sep 2019 06:57:03 GMT</pubDate>
    <dc:creator>bhargavdesai</dc:creator>
    <dc:date>2019-09-13T06:57:03Z</dc:date>
    <item>
      <title>asa drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-drops/m-p/3923668#M5536</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\Administrator&amp;gt;tracert fast.com&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Tracing route to fast.com [23.50.182.181]&lt;/P&gt;&lt;P&gt;over a maximum of 30 hops:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;1 &amp;lt;1 ms &amp;lt;1 ms &amp;lt;1 ms 10.0.10.1&lt;/P&gt;&lt;P&gt;2 &amp;lt;1 ms &amp;lt;1 ms &amp;lt;1 ms 172-16-10-25&lt;/P&gt;&lt;P&gt;3 112 ms 112 ms 112 ms 172.16.10.10&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;4 * * * Request timed out.&lt;/P&gt;&lt;P&gt;5 * * * Request timed out.&lt;/P&gt;&lt;P&gt;6 * * * Request timed out.&lt;/P&gt;&lt;P&gt;7 * * * Request timed out.&lt;/P&gt;&lt;P&gt;8 * * * Request timed out.&lt;/P&gt;&lt;P&gt;9 * * * Request timed out.&lt;/P&gt;&lt;P&gt;10 * * * Request timed out.&lt;/P&gt;&lt;P&gt;11 * * * Request timed out.&lt;/P&gt;&lt;P&gt;12 * * * Request timed out.&lt;/P&gt;&lt;P&gt;13 * * * Request timed out.&lt;/P&gt;&lt;P&gt;14 * * * Request timed out.&lt;/P&gt;&lt;P&gt;15 * * * Request timed out.&lt;/P&gt;&lt;P&gt;16 * * * Request timed out.&lt;/P&gt;&lt;P&gt;17 * * * Request timed out.&lt;/P&gt;&lt;P&gt;18 * * * Request timed out.&lt;/P&gt;&lt;P&gt;19 * * * Request timed out.&lt;/P&gt;&lt;P&gt;20 * * * Request timed out.&lt;/P&gt;&lt;P&gt;21 * * * Request timed out.&lt;/P&gt;&lt;P&gt;22 * * * Request timed out.&lt;/P&gt;&lt;P&gt;23 * * * Request timed out.&lt;/P&gt;&lt;P&gt;24 * * * Request timed out.&lt;/P&gt;&lt;P&gt;25 * * * Request timed out.&lt;/P&gt;&lt;P&gt;26 * * * Request timed out.&lt;/P&gt;&lt;P&gt;27 * * * Request timed out.&lt;/P&gt;&lt;P&gt;28 * * * Request timed out.&lt;/P&gt;&lt;P&gt;29 * * * Request timed out.&lt;/P&gt;&lt;P&gt;30 * * * Request timed out.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;From the above traceroute third hope is the asa firewall , I cannot reach the ip 23.50.182.181 . From the above output can I assume asa drops ?&lt;/P&gt;&lt;P&gt;How can I verify that asa drops or not ?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-drops/m-p/3923668#M5536</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2020-02-21T17:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: asa drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-drops/m-p/3923676#M5537</link>
      <description>Generally ASA drop the traceroute packets.&lt;BR /&gt;If you want to check, you can try visiting the website&lt;BR /&gt;And if you still want you can allow with below confirmation.&lt;BR /&gt;&lt;BR /&gt;Fixup protocol icmp&lt;BR /&gt;&lt;BR /&gt;access-list OUTSIDE_INGRESS remark *** ALLOW ICMP BASED TRACEROUTE ***&lt;BR /&gt;access-list OUTSIDE_INGRESS extended permit icmp any any time-exceeded&lt;BR /&gt;&lt;BR /&gt;access-group OUTSIDE_INGRESS in interface Outside&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 13 Sep 2019 04:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-drops/m-p/3923676#M5537</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-13T04:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: asa drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-drops/m-p/3923707#M5538</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have inspect icmp in the&amp;nbsp; policy map&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;inspect icmp will not solve the problem ?&lt;/P&gt;&lt;P&gt;And traceroute&amp;nbsp; requires any additional ports other than icmp ?&lt;/P&gt;&lt;P&gt;I mean is there any udp ports need to be opened ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2019 06:02:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-drops/m-p/3923707#M5538</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2019-09-13T06:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: asa drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-drops/m-p/3923725#M5539</link>
      <description>&lt;P&gt;inspect icmp will not solve the problem ? &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;BR /&gt;Answer: It is only one part. You need to understand how traceroute work i would refer to you wiki page &lt;A href="https://en.wikipedia.org/wiki/Traceroute" target="_blank"&gt;https://en.wikipedia.org/wiki/Traceroute&lt;/A&gt;&lt;/P&gt;&lt;P&gt;And traceroute&amp;nbsp; requires any additional ports other than icmp ? &amp;nbsp;&lt;BR /&gt;I mean is there any udp ports need to be opened ? &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;Answer: UDP is used by linux based system, and for that you might required to enable&amp;nbsp;&lt;STRONG&gt;inspect icmp error&lt;/STRONG&gt;&amp;nbsp;and also additional line in Access list&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE_INGRESS extended permit icmp any any unreachable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I would say that once you go through the Wiki page, you will understand the whole idea how traceroute work.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2019 06:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-drops/m-p/3923725#M5539</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-13T06:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: asa drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-drops/m-p/3924288#M5540</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the reply .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is my toplogy &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-09-14 at 1.00.36 PM.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/44942iC10EC65F7083891E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-09-14 at 1.00.36 PM.png" alt="Screen Shot 2019-09-14 at 1.00.36 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the traceroute output it does not show&amp;nbsp; asa , instead it show&amp;nbsp; the R2'S interface ,this is normal ?&lt;/P&gt;&lt;P&gt;or to show asa inside interface in the traceroute what should I do ? .&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Sep 2019 10:07:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-drops/m-p/3924288#M5540</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2019-09-14T10:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: asa drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-drops/m-p/3924293#M5541</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;By default the ASA does not appear as a hop in a traceroute, to enable:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="wp-block-preformatted"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;policy-map global_policy&lt;BR /&gt; class class-default&lt;BR /&gt; set connection decrement-ttl&lt;/EM&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;More information &lt;A href="https://integratingit.wordpress.com/2018/12/15/allow-icmp-traceroute-through-cisco-asa/" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 14 Sep 2019 10:20:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-drops/m-p/3924293#M5541</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-09-14T10:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: asa drops</title>
      <link>https://community.cisco.com/t5/network-security/asa-drops/m-p/3924342#M5542</link>
      <description>As per our expert &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; You can enable the ASA to show in tracerout but there must be strong reason do so as it is not enable by default as part of security best practices.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Sat, 14 Sep 2019 16:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-drops/m-p/3924342#M5542</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-14T16:56:38Z</dc:date>
    </item>
  </channel>
</rss>

